Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
|
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-205
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
|
@wmploc.dll,-102
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C4A3F3F000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
21B21202000
|
trusted library allocation
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
804C7F000
|
stack
|
page read and write
|
||
14BC8CFC000
|
heap
|
page read and write
|
||
1C4A189B000
|
heap
|
page read and write
|
||
1C4A3F37000
|
heap
|
page read and write
|
||
24573802000
|
heap
|
page read and write
|
||
1C4A18D7000
|
heap
|
page read and write
|
||
14BC3D59000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
21B20B02000
|
heap
|
page read and write
|
||
1C49F8A0000
|
heap
|
page read and write
|
||
C4AF4FD000
|
stack
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
2B980830000
|
heap
|
page read and write
|
||
1CE5C070000
|
heap
|
page read and write
|
||
1CE5C079000
|
heap
|
page read and write
|
||
14BC31E0000
|
heap
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
344AEFE000
|
stack
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B92000
|
heap
|
page read and write
|
||
18CD8202000
|
heap
|
page read and write
|
||
1C4A1A6A000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
14BC3A80000
|
trusted library allocation
|
page read and write
|
||
1C49FA3E000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
1C49FA3A000
|
heap
|
page read and write
|
||
1C4A189C000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
C4AF57E000
|
stack
|
page read and write
|
||
1C49FA33000
|
heap
|
page read and write
|
||
16F19B8E000
|
heap
|
page read and write
|
||
A7CD87B000
|
stack
|
page read and write
|
||
1C4A66B0000
|
heap
|
page readonly
|
||
1DF566A3000
|
heap
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
16F19B8B000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
1C49FA65000
|
heap
|
page read and write
|
||
344B37F000
|
stack
|
page read and write
|
||
1C4A18B4000
|
heap
|
page read and write
|
||
16F1926F000
|
heap
|
page read and write
|
||
1C49FA30000
|
heap
|
page read and write
|
||
1C4A1891000
|
heap
|
page read and write
|
||
21B20A4F000
|
heap
|
page read and write
|
||
1C4A1A24000
|
heap
|
page read and write
|
||
1CE5C083000
|
heap
|
page read and write
|
||
1C4A1A65000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
68B647B000
|
stack
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
24573FC0000
|
trusted library allocation
|
page read and write
|
||
14BC326F000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
1C4A18E3000
|
heap
|
page read and write
|
||
14BC8860000
|
trusted library allocation
|
page read and write
|
||
1C4A1891000
|
heap
|
page read and write
|
||
68B667B000
|
stack
|
page read and write
|
||
2B9815A0000
|
trusted library allocation
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C49FAB4000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A18DB000
|
heap
|
page read and write
|
||
684A67E000
|
stack
|
page read and write
|
||
1000FE000
|
stack
|
page read and write
|
||
18CD824B000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
344AF7D000
|
stack
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
1DF566A3000
|
heap
|
page read and write
|
||
14BC89A1000
|
trusted library allocation
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
14BC3313000
|
heap
|
page read and write
|
||
1C4A14D5000
|
heap
|
page read and write
|
||
14BC8AA0000
|
trusted library allocation
|
page read and write
|
||
804E7F000
|
stack
|
page read and write
|
||
21B20A86000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
14BC4340000
|
trusted library allocation
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F191C0000
|
remote allocation
|
page read and write
|
||
1C49FA4F000
|
heap
|
page read and write
|
||
14BC8AB0000
|
trusted library allocation
|
page read and write
|
||
16F19B85000
|
heap
|
page read and write
|
||
1C4A3F66000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
21B20B08000
|
heap
|
page read and write
|
||
344B07B000
|
stack
|
page read and write
|
||
80487E000
|
stack
|
page read and write
|
||
1C4A18D5000
|
heap
|
page read and write
|
||
1DF566A3000
|
heap
|
page read and write
|
||
16F19B99000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C49FA4F000
|
heap
|
page read and write
|
||
1C49FAB6000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C49F9CF000
|
heap
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
1006F7000
|
stack
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
18CD8020000
|
heap
|
page read and write
|
||
1CE5BF40000
|
heap
|
page read and write
|
||
21B207B0000
|
heap
|
page read and write
|
||
1C49FAB7000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A1A27000
|
heap
|
page read and write
|
||
14BC328F000
|
heap
|
page read and write
|
||
14BC8CB9000
|
heap
|
page read and write
|
||
A7CD67B000
|
stack
|
page read and write
|
||
14BC8C8C000
|
heap
|
page read and write
|
||
1C4A18B1000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B99000
|
heap
|
page read and write
|
||
14BC8A50000
|
trusted library allocation
|
page read and write
|
||
2457386E000
|
heap
|
page read and write
|
||
1C4A18D8000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A19BD000
|
heap
|
page read and write
|
||
2B98087E000
|
heap
|
page read and write
|
||
14BC3180000
|
heap
|
page read and write
|
||
16F19B1F000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC8AD0000
|
trusted library allocation
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
1C49FA60000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
18CD8213000
|
heap
|
page read and write
|
||
14BC8AE0000
|
remote allocation
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
1C4A18B5000
|
heap
|
page read and write
|
||
21B20A4A000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
2B980877000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
14BC3D59000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
68B6C7F000
|
unkown
|
page read and write
|
||
16F192E7000
|
heap
|
page read and write
|
||
1CE5BF50000
|
heap
|
page read and write
|
||
1008FE000
|
stack
|
page read and write
|
||
2B9817E0000
|
trusted library allocation
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
B8AFEF9000
|
stack
|
page read and write
|
||
2B980836000
|
heap
|
page read and write
|
||
1C4A3F5F000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A19C4000
|
heap
|
page read and write
|
||
16F19B92000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1DF566B2000
|
heap
|
page read and write
|
||
21B20B00000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A3F37000
|
heap
|
page read and write
|
||
16F19BC2000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
18CD8248000
|
heap
|
page read and write
|
||
1C49FA3E000
|
heap
|
page read and write
|
||
1C4A13F0000
|
heap
|
page read and write
|
||
16F191C0000
|
remote allocation
|
page read and write
|
||
1C49FA87000
|
heap
|
page read and write
|
||
1C49FA45000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
1C4A3F21000
|
heap
|
page read and write
|
||
684A7FB000
|
stack
|
page read and write
|
||
14BC8CE2000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A1A64000
|
heap
|
page read and write
|
||
16F192B3000
|
heap
|
page read and write
|
||
C4AF5F9000
|
stack
|
page read and write
|
||
1DF56510000
|
heap
|
page read and write
|
||
21B20A0B000
|
heap
|
page read and write
|
||
14BC3C02000
|
heap
|
page read and write
|
||
18CD824E000
|
heap
|
page read and write
|
||
14BC3325000
|
heap
|
page read and write
|
||
2B981800000
|
trusted library allocation
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C4A191D000
|
heap
|
page read and write
|
||
344AE7B000
|
stack
|
page read and write
|
||
16F19BAC000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
68B657E000
|
stack
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1CE5CA02000
|
trusted library allocation
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A19EB000
|
heap
|
page read and write
|
||
1CE5C04C000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A1A76000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
1C4A3F00000
|
heap
|
page read and write
|
||
16F19B87000
|
heap
|
page read and write
|
||
B8AFB2A000
|
stack
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A6440000
|
trusted library allocation
|
page read and write
|
||
1C4A19CC000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
16F19282000
|
heap
|
page read and write
|
||
1C4A3F37000
|
heap
|
page read and write
|
||
16F19B4A000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
80497A000
|
stack
|
page read and write
|
||
14BC3D02000
|
heap
|
page read and write
|
||
52B355B000
|
stack
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
14BC3BF3000
|
trusted library allocation
|
page read and write
|
||
24573800000
|
heap
|
page read and write
|
||
14BC89C4000
|
trusted library allocation
|
page read and write
|
||
C4AF47B000
|
stack
|
page read and write
|
||
14BC328B000
|
heap
|
page read and write
|
||
1C4A1A76000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C4A18DF000
|
heap
|
page read and write
|
||
14BC329F000
|
heap
|
page read and write
|
||
16F19B70000
|
heap
|
page read and write
|
||
1C4A18AF000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
2B980750000
|
heap
|
page read and write
|
||
1C49FA2F000
|
heap
|
page read and write
|
||
2B980880000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
16F191C0000
|
remote allocation
|
page read and write
|
||
16F1924F000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
C4AF6FE000
|
stack
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C4A19C9000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F1924C000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
14BC8CE8000
|
heap
|
page read and write
|
||
21B20A02000
|
heap
|
page read and write
|
||
16F18F90000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C49FA4D000
|
heap
|
page read and write
|
||
68B68F7000
|
stack
|
page read and write
|
||
1DF568B5000
|
heap
|
page read and write
|
||
1C4A19CC000
|
heap
|
page read and write
|
||
14BC8988000
|
trusted library allocation
|
page read and write
|
||
52B3BFB000
|
stack
|
page read and write
|
||
16F19B87000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
2B980BB9000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
1C4A19DE000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19250000
|
heap
|
page read and write
|
||
16F19B5A000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
18CD8313000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
16F19B9C000
|
heap
|
page read and write
|
||
18CD8200000
|
heap
|
page read and write
|
||
1C4A18B4000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
80467E000
|
stack
|
page read and write
|
||
1C4A18E5000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C49FA5A000
|
heap
|
page read and write
|
||
344B277000
|
stack
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A19C1000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A19B0000
|
heap
|
page read and write
|
||
2B981860000
|
trusted library allocation
|
page read and write
|
||
16F19B9D000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A18DB000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
B8AFE7E000
|
stack
|
page read and write
|
||
1C4A189F000
|
heap
|
page read and write
|
||
A7CD6FF000
|
stack
|
page read and write
|
||
804577000
|
stack
|
page read and write
|
||
1C4A3F66000
|
heap
|
page read and write
|
||
16F19221000
|
heap
|
page read and write
|
||
16F19B78000
|
heap
|
page read and write
|
||
16F192C5000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A19EB000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC3279000
|
heap
|
page read and write
|
||
14BC8C4D000
|
heap
|
page read and write
|
||
1005FB000
|
stack
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19213000
|
heap
|
page read and write
|
||
1C4A19DF000
|
heap
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
14BC3D18000
|
heap
|
page read and write
|
||
1C4A18D9000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
1DF56640000
|
heap
|
page read and write
|
||
804BFF000
|
stack
|
page read and write
|
||
16F19B70000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
1C4A1980000
|
heap
|
page read and write
|
||
1CE5BFB0000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
1C49FAA4000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
16F19B6E000
|
heap
|
page read and write
|
||
1C4A19CE000
|
heap
|
page read and write
|
||
14BC8C00000
|
heap
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
24573828000
|
heap
|
page read and write
|
||
16F19A02000
|
heap
|
page read and write
|
||
18CD8010000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
684A47E000
|
stack
|
page read and write
|
||
2B981520000
|
trusted library allocation
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
1C4A19CE000
|
heap
|
page read and write
|
||
16F19B91000
|
heap
|
page read and write
|
||
16F19B78000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A18A4000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
14BC8CB0000
|
heap
|
page read and write
|
||
1C4A19D2000
|
heap
|
page read and write
|
||
14BC3170000
|
heap
|
page read and write
|
||
1C4A3F60000
|
heap
|
page read and write
|
||
14BC47E0000
|
trusted library allocation
|
page read and write
|
||
B8AFF79000
|
stack
|
page read and write
|
||
1C49FA5E000
|
heap
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
24574002000
|
trusted library allocation
|
page read and write
|
||
1C49FA60000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
14BC8CFF000
|
heap
|
page read and write
|
||
18CD828E000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
684AA79000
|
stack
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
14BC8CE6000
|
heap
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
16F1922C000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C4A1A50000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
16F19BB1000
|
heap
|
page read and write
|
||
1C4A18DB000
|
heap
|
page read and write
|
||
16F19B99000
|
heap
|
page read and write
|
||
1C4A19EB000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A19F1000
|
heap
|
page read and write
|
||
804A7B000
|
stack
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
21B20910000
|
trusted library allocation
|
page read and write
|
||
1C4A19D6000
|
heap
|
page read and write
|
||
1C49FA51000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F1924B000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
14BC89C0000
|
trusted library allocation
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
16F19B97000
|
heap
|
page read and write
|
||
1C4A1A26000
|
heap
|
page read and write
|
||
2B981590000
|
trusted library allocation
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A1A27000
|
heap
|
page read and write
|
||
16F19B9F000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19308000
|
heap
|
page read and write
|
||
24573857000
|
heap
|
page read and write
|
||
68B6AF7000
|
stack
|
page read and write
|
||
21B207A0000
|
heap
|
page read and write
|
||
1C49FA5B000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
1DF56694000
|
heap
|
page read and write
|
||
16F18FA0000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
1C4A1891000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
1C4A19EB000
|
heap
|
page read and write
|
||
14BC8980000
|
trusted library allocation
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
1C4A18A6000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A3F27000
|
heap
|
page read and write
|
||
804D7E000
|
stack
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
1C49FAB4000
|
heap
|
page read and write
|
||
16F192A9000
|
heap
|
page read and write
|
||
2B9817F0000
|
heap
|
page readonly
|
||
1C4A18DB000
|
heap
|
page read and write
|
||
1C49FAA4000
|
heap
|
page read and write
|
||
14BC3C00000
|
heap
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
80517F000
|
stack
|
page read and write
|
||
24573900000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F1A000000
|
heap
|
page read and write
|
||
16F19B9B000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
1C49FA59000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C49FA60000
|
heap
|
page read and write
|
||
14BC3229000
|
heap
|
page read and write
|
||
1C49FA3E000
|
heap
|
page read and write
|
||
1C49FABC000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
21B20A29000
|
heap
|
page read and write
|
||
18CD823C000
|
heap
|
page read and write
|
||
16F19302000
|
heap
|
page read and write
|
||
1C4A18D7000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
18CD8253000
|
heap
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
1DF56696000
|
heap
|
page read and write
|
||
1C4A1A09000
|
heap
|
page read and write
|
||
16F19B80000
|
heap
|
page read and write
|
||
1C4A1891000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
16F192E4000
|
heap
|
page read and write
|
||
16F19B96000
|
heap
|
page read and write
|
||
A7CDC7E000
|
stack
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
1C4A1A27000
|
heap
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
14BC8C64000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C49FA5B000
|
heap
|
page read and write
|
||
16F19B8B000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
52B3AFB000
|
stack
|
page read and write
|
||
24573720000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
14BC323E000
|
heap
|
page read and write
|
||
16F192EA000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
804F79000
|
stack
|
page read and write
|
||
14BC8CFB000
|
heap
|
page read and write
|
||
B8AFBAE000
|
stack
|
page read and write
|
||
16F19B87000
|
heap
|
page read and write
|
||
B8AFFFF000
|
stack
|
page read and write
|
||
1C4A19D6000
|
heap
|
page read and write
|
||
1C4A1A27000
|
heap
|
page read and write
|
||
804DFE000
|
stack
|
page read and write
|
||
1C4A1A21000
|
heap
|
page read and write
|
||
2B980881000
|
heap
|
page read and write
|
||
1C49FA4F000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
14BC3275000
|
heap
|
page read and write
|
||
21B20A70000
|
heap
|
page read and write
|
||
1C4A3F3F000
|
heap
|
page read and write
|
||
14BC4470000
|
trusted library section
|
page readonly
|
||
21B20A7B000
|
heap
|
page read and write
|
||
2B980BC0000
|
trusted library allocation
|
page read and write
|
||
14BC3BF0000
|
trusted library allocation
|
page read and write
|
||
684A97E000
|
stack
|
page read and write
|
||
16F19B8B000
|
heap
|
page read and write
|
||
1CE5C04F000
|
heap
|
page read and write
|
||
1C4A3F3F000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
24573840000
|
heap
|
page read and write
|
||
1DF568B0000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
1C49F9C0000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC8C2F000
|
heap
|
page read and write
|
||
C4AF679000
|
stack
|
page read and write
|
||
16F19B81000
|
heap
|
page read and write
|
||
14BC4420000
|
trusted library section
|
page readonly
|
||
1C4A18E6000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
16F1924D000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F1923C000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19000000
|
heap
|
page read and write
|
||
16F19B89000
|
heap
|
page read and write
|
||
2B980BB5000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C4A19D2000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B78000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
14BC8AE0000
|
remote allocation
|
page read and write
|
||
18CD827C000
|
heap
|
page read and write
|
||
1C49FA5D000
|
heap
|
page read and write
|
||
14BC3D18000
|
heap
|
page read and write
|
||
A7CD97B000
|
stack
|
page read and write
|
||
1C4A18DA000
|
heap
|
page read and write
|
||
18CD8180000
|
trusted library allocation
|
page read and write
|
||
1C4A19E7000
|
heap
|
page read and write
|
||
68B66FE000
|
stack
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
1C4A18D8000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
1C4A19ED000
|
heap
|
page read and write
|
||
1C4A1A18000
|
heap
|
page read and write
|
||
1CE5C000000
|
heap
|
page read and write
|
||
1C4A3F5D000
|
heap
|
page read and write
|
||
1C49FA42000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A18DA000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
2B980BB0000
|
heap
|
page read and write
|
||
1C4A19DE000
|
heap
|
page read and write
|
||
1C4A1A6A000
|
heap
|
page read and write
|
||
14BC8A90000
|
trusted library allocation
|
page read and write
|
||
16F19100000
|
trusted library allocation
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
14BC8AE0000
|
trusted library allocation
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
1C49FAB4000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C4A19F0000
|
heap
|
page read and write
|
||
16F19BD6000
|
heap
|
page read and write
|
||
1C4A4340000
|
heap
|
page read and write
|
||
1C4A19E7000
|
heap
|
page read and write
|
||
14BC8870000
|
trusted library allocation
|
page read and write
|
||
684A6FE000
|
stack
|
page read and write
|
||
1CE5C013000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
A7CDB7F000
|
stack
|
page read and write
|
||
245736B0000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F192D7000
|
heap
|
page read and write
|
||
1C4A1A6A000
|
heap
|
page read and write
|
||
16F19B80000
|
heap
|
page read and write
|
||
16F19B5F000
|
heap
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
1C49FA42000
|
heap
|
page read and write
|
||
52B3DFF000
|
stack
|
page read and write
|
||
16F192F6000
|
heap
|
page read and write
|
||
1C4A191E000
|
heap
|
page read and write
|
||
1C4A18D8000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
68B67F8000
|
stack
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
1C4A19E7000
|
heap
|
page read and write
|
||
16F19B9B000
|
heap
|
page read and write
|
||
1C4A18C6000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
1DF56687000
|
heap
|
page read and write
|
||
24573813000
|
heap
|
page read and write
|
||
1C4A19EB000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
18CD8302000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
14BC898E000
|
trusted library allocation
|
page read and write
|
||
344B47F000
|
stack
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
684AAFA000
|
stack
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
16F19B80000
|
heap
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
18CD8308000
|
heap
|
page read and write
|
||
1C4A1A76000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B80000
|
heap
|
page read and write
|
||
1C4A18B2000
|
heap
|
page read and write
|
||
16F19BC1000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C4A1A76000
|
heap
|
page read and write
|
||
1C4A5F62000
|
trusted library allocation
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C4A18D8000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A3AC0000
|
trusted library allocation
|
page read and write
|
||
21B20B13000
|
heap
|
page read and write
|
||
16F19B9B000
|
heap
|
page read and write
|
||
14BC3294000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
2B9807E0000
|
heap
|
page read and write
|
||
80477B000
|
stack
|
page read and write
|
||
1C4A19D7000
|
heap
|
page read and write
|
||
A7CD77F000
|
stack
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
1004FB000
|
stack
|
page read and write
|
||
1C4A19F1000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC3D00000
|
heap
|
page read and write
|
||
1C49FAA0000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
18CD8229000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19BCC000
|
heap
|
page read and write
|
||
1C49FA60000
|
heap
|
page read and write
|
||
16F19BA0000
|
heap
|
page read and write
|
||
18CD828A000
|
heap
|
page read and write
|
||
1C4A19D0000
|
heap
|
page read and write
|
||
14BC87E0000
|
trusted library allocation
|
page read and write
|
||
1DF56687000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C49FAB4000
|
heap
|
page read and write
|
||
14BC3302000
|
heap
|
page read and write
|
||
16F1A003000
|
heap
|
page read and write
|
||
14BC3D13000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
1CE5C046000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
2B98087F000
|
heap
|
page read and write
|
||
1C49FA69000
|
heap
|
page read and write
|
||
21B20A7A000
|
heap
|
page read and write
|
||
1C4A3F43000
|
heap
|
page read and write
|
||
684A57D000
|
stack
|
page read and write
|
||
16F19B80000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C49FA80000
|
heap
|
page read and write
|
||
16F192B0000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
14BC87F0000
|
trusted library allocation
|
page read and write
|
||
1C49FA45000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
1C4A19D4000
|
heap
|
page read and write
|
||
1C49FA5B000
|
heap
|
page read and write
|
||
1C4A3F1F000
|
heap
|
page read and write
|
||
2B980880000
|
heap
|
page read and write
|
||
16F19B78000
|
heap
|
page read and write
|
||
16F19B76000
|
heap
|
page read and write
|
||
21B20A4D000
|
heap
|
page read and write
|
||
21B20810000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
10007C000
|
stack
|
page read and write
|
||
14BC32FD000
|
heap
|
page read and write
|
||
14BC4430000
|
trusted library section
|
page readonly
|
||
16F19B76000
|
heap
|
page read and write
|
||
1C4A19D7000
|
heap
|
page read and write
|
||
1C49FA4B000
|
heap
|
page read and write
|
||
1CE5C113000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
16F19B9D000
|
heap
|
page read and write
|
||
A7CDA77000
|
stack
|
page read and write
|
||
24573902000
|
heap
|
page read and write
|
||
14BC47C1000
|
trusted library allocation
|
page read and write
|
||
1C49FA76000
|
heap
|
page read and write
|
||
16F19B96000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC8980000
|
trusted library allocation
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
1C4A19EE000
|
heap
|
page read and write
|
||
1C4A19B3000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
684A4FE000
|
stack
|
page read and write
|
||
1C4A19D0000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
14BC3200000
|
heap
|
page read and write
|
||
16F19B9C000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A18DA000
|
heap
|
page read and write
|
||
1C4A19E7000
|
heap
|
page read and write
|
||
10017E000
|
stack
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC3C15000
|
heap
|
page read and write
|
||
1C4A18B4000
|
heap
|
page read and write
|
||
18CD8080000
|
heap
|
page read and write
|
||
1C4A18A9000
|
heap
|
page read and write
|
||
1DF56677000
|
heap
|
page read and write
|
||
1C49FABC000
|
heap
|
page read and write
|
||
14BC89A4000
|
trusted library allocation
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
16F19200000
|
heap
|
page read and write
|
||
1CE5C100000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC8C40000
|
heap
|
page read and write
|
||
16F19B9D000
|
heap
|
page read and write
|
||
1CE5C102000
|
heap
|
page read and write
|
||
1CE5C04D000
|
heap
|
page read and write
|
||
1C4A1A6A000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
1DF56770000
|
heap
|
page read and write
|
||
68B64FE000
|
stack
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
16F19B8B000
|
heap
|
page read and write
|
||
1C4A18B9000
|
heap
|
page read and write
|
||
1C4A1A1A000
|
heap
|
page read and write
|
||
1C4A3F5D000
|
heap
|
page read and write
|
||
14BC3B90000
|
trusted library section
|
page read and write
|
||
14BC8C0F000
|
heap
|
page read and write
|
||
684ABFE000
|
stack
|
page read and write
|
||
1C4A19FB000
|
heap
|
page read and write
|
||
14BC3213000
|
heap
|
page read and write
|
||
1CE5C054000
|
heap
|
page read and write
|
||
18CD8A02000
|
trusted library allocation
|
page read and write
|
||
1C4A3F66000
|
heap
|
page read and write
|
||
18CD8300000
|
heap
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
684A5F6000
|
stack
|
page read and write
|
||
1C4A1A36000
|
heap
|
page read and write
|
||
804B7E000
|
stack
|
page read and write
|
||
1C4A18D8000
|
heap
|
page read and write
|
||
16F192C0000
|
heap
|
page read and write
|
||
1C4A18D6000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A18D5000
|
heap
|
page read and write
|
||
1C4A3F40000
|
heap
|
page read and write
|
||
1C49FA5B000
|
heap
|
page read and write
|
||
344B17B000
|
stack
|
page read and write
|
||
1C49FA7A000
|
heap
|
page read and write
|
||
1C4A18CB000
|
heap
|
page read and write
|
||
16F19229000
|
heap
|
page read and write
|
||
1CE5C057000
|
heap
|
page read and write
|
||
245736C0000
|
heap
|
page read and write
|
||
14BC3259000
|
heap
|
page read and write
|
||
14BC8AC0000
|
trusted library allocation
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
16F19313000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A18D9000
|
heap
|
page read and write
|
||
1C4A18DF000
|
heap
|
page read and write
|
||
1C4A18B2000
|
heap
|
page read and write
|
||
16F19B86000
|
heap
|
page read and write
|
||
1C4A18CA000
|
heap
|
page read and write
|
||
16F19BA1000
|
heap
|
page read and write
|
||
1C4A1A5C000
|
heap
|
page read and write
|
||
14BC89A0000
|
trusted library allocation
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C49FA04000
|
heap
|
page read and write
|
||
14BC8AE0000
|
remote allocation
|
page read and write
|
||
21B20A13000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
16F19B9C000
|
heap
|
page read and write
|
||
1C4A5F44000
|
trusted library allocation
|
page read and write
|
||
16F19B9D000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C49FA83000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1CE5C03C000
|
heap
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
1C4A1899000
|
heap
|
page read and write
|
||
684A77E000
|
stack
|
page read and write
|
||
1DF56670000
|
heap
|
page read and write
|
||
21B20A3C000
|
heap
|
page read and write
|
||
16F19B74000
|
heap
|
page read and write
|
||
1CE5C04B000
|
heap
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
1C4A18C8000
|
heap
|
page read and write
|
||
1C4A1880000
|
heap
|
page read and write
|
||
21B20A00000
|
heap
|
page read and write
|
||
1CE5BFE0000
|
trusted library allocation
|
page read and write
|
||
2B98087E000
|
heap
|
page read and write
|
||
1C4A3F24000
|
heap
|
page read and write
|
||
1C49FA23000
|
heap
|
page read and write
|
||
16F19B94000
|
heap
|
page read and write
|
||
1C4A18B2000
|
heap
|
page read and write
|
||
1C4A18CB000
|
heap
|
page read and write
|
||
1C4A18B8000
|
heap
|
page read and write
|
||
1CE5C02A000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1CE5C108000
|
heap
|
page read and write
|
||
1C4A19FE000
|
heap
|
page read and write
|
||
1C49F940000
|
heap
|
page read and write
|
||
16F192E9000
|
heap
|
page read and write
|
||
16F1A020000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
14BC32A1000
|
heap
|
page read and write
|
||
2B9807C0000
|
heap
|
page read and write
|
||
1C4A18D7000
|
heap
|
page read and write
|
||
1C4A18E3000
|
heap
|
page read and write
|
||
18CD826E000
|
heap
|
page read and write
|
||
1C49FA4C000
|
heap
|
page read and write
|
||
16F19B7E000
|
heap
|
page read and write
|
||
1C49FA45000
|
heap
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
2B981810000
|
trusted library allocation
|
page read and write
|
||
1C4A19D4000
|
heap
|
page read and write
|
||
1DF56682000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1C4A19DE000
|
heap
|
page read and write
|
||
1C4A14D0000
|
heap
|
page read and write
|
||
16F19316000
|
heap
|
page read and write
|
||
1C49FA45000
|
heap
|
page read and write
|
||
16F19B6D000
|
heap
|
page read and write
|
||
2B980760000
|
trusted library allocation
|
page read and write
|
||
14BC89B0000
|
trusted library allocation
|
page read and write
|
||
16F19B72000
|
heap
|
page read and write
|
||
14BC8C21000
|
heap
|
page read and write
|
||
68B69FF000
|
stack
|
page read and write
|
||
684A1D6000
|
stack
|
page read and write
|
||
1C49FA60000
|
heap
|
page read and write
|
||
1C49FA47000
|
heap
|
page read and write
|
||
684AC7C000
|
stack
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
1C4A18CB000
|
heap
|
page read and write
|
||
1C4A18C5000
|
heap
|
page read and write
|
||
14BC4450000
|
trusted library section
|
page readonly
|
||
1C4A18D5000
|
heap
|
page read and write
|
||
1C49FAB4000
|
heap
|
page read and write
|
||
16F19B5A000
|
heap
|
page read and write
|
||
1007FF000
|
stack
|
page read and write
|
||
16F1A002000
|
heap
|
page read and write
|
||
1C4A1A0A000
|
heap
|
page read and write
|
||
1C4A18D7000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
1C49FA46000
|
heap
|
page read and write
|
||
52B3CFB000
|
stack
|
page read and write
|
||
1C4A3F6E000
|
heap
|
page read and write
|
||
7DF4F7791000
|
trusted library allocation
|
page execute read
|
||
1DF56695000
|
heap
|
page read and write
|
||
C4AF779000
|
stack
|
page read and write
|
||
1C4A18C7000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
14BC4460000
|
trusted library section
|
page readonly
|
||
16F19B7A000
|
heap
|
page read and write
|
||
14BC4440000
|
trusted library section
|
page readonly
|
||
16F19B7E000
|
heap
|
page read and write
|
||
68B6BF9000
|
stack
|
page read and write
|
||
21B20A54000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
1DF566B3000
|
heap
|
page read and write
|
||
804AFF000
|
stack
|
page read and write
|
||
16F19B73000
|
heap
|
page read and write
|
||
1C4A1A32000
|
heap
|
page read and write
|
||
1DF56698000
|
heap
|
page read and write
|
||
14BC3E01000
|
trusted library allocation
|
page read and write
|
||
1C4A1A49000
|
heap
|
page read and write
|
||
2B981530000
|
trusted library allocation
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
B8B007C000
|
stack
|
page read and write
|
||
1C4A18BC000
|
heap
|
page read and write
|
||
1C49FA5B000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
80417C000
|
stack
|
page read and write
|
||
1C4A18E2000
|
heap
|
page read and write
|
||
16F19B77000
|
heap
|
page read and write
|
||
16F19B00000
|
heap
|
page read and write
|
||
16F19B93000
|
heap
|
page read and write
|
||
14BC89B0000
|
trusted library allocation
|
page read and write
|
||
16F19B87000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C4A19DE000
|
heap
|
page read and write
|
||
1C4A18AB000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C49F910000
|
heap
|
page read and write
|
||
16F19B95000
|
heap
|
page read and write
|
||
24573913000
|
heap
|
page read and write
|
||
16F19B17000
|
heap
|
page read and write
|
||
1C4A18DD000
|
heap
|
page read and write
|
||
1C4A19E7000
|
heap
|
page read and write
|
||
16F19BA7000
|
heap
|
page read and write
|
||
1CE5C047000
|
heap
|
page read and write
|
||
16F19B9A000
|
heap
|
page read and write
|
||
16F19B7A000
|
heap
|
page read and write
|
||
1C49FA45000
|
heap
|
page read and write
|
||
16F19B9C000
|
heap
|
page read and write
|
There are 916 hidden memdumps, click here to show them.