Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.generic.ml.22865.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ArtDeco_green_6.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MpCommu.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OLIGOCARPOUS.SNO
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SourceCodePro-Black.otf
|
OpenType font data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\analysekapitlet.ini
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\applications-system.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lang-1034.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libfreetype-6.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libpcre-1.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lilas.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun
Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\microphone-hardware-disabled-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\multimedia-player-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\network-server.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsr150B.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\task-past-due.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.fides-kenya.com/yem/wam.bin
|
5.9.197.244
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://V58nqJBvA8Uitwi1EyuW.com
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
https://api.telegram.org/
|
unknown
|
||
http://hqQZjN.com
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
|
unknown
|
||
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
http://www.avast.com0/
|
unknown
|
||
http://scripts.sil.org/OFLSource
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocument
|
149.154.167.220
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
|
unknown
|
||
https://api.telegram.org/bot5147163644:AAEDa60jT_0f_OgilwiEp-CBiARVO2Rx3Mo/sendDocumentdocument-----
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fides-kenya.com
|
5.9.197.244
|
||
www.fides-kenya.com
|
unknown
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.9.197.244
|
fides-kenya.com
|
Germany
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlen
|
INTWISTING
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Klarings\DIALEKTEN
|
Ratifikationsdokumenternes159
|
||
HKEY_CURRENT_USER\SOFTWARE\Knscellens122\tabulr
|
Expand String Value
|
||
HKEY_CURRENT_USER\SOFTWARE\Struldbruggism\Redbook227
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Klinken\Supervision
|
faststtende
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
|
FileDirectory
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F00000
|
remote allocation
|
page execute and read and write
|
||
1D5C1000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
direct allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FCA0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2219B502000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1E5C1000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D06D000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
716A6000
|
unkown
|
page readonly
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB29000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20266000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1D27A000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
84B8CFE000
|
stack
|
page read and write
|
||
2219B45E000
|
heap
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D0BF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1E5E7000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
3A60000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FB5D000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
185E7130000
|
unclassified section
|
page readonly
|
||
6DF000
|
heap
|
page read and write
|
||
20249000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
202B0000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB7C000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB2C000
|
heap
|
page read and write
|
||
2538DA02000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1F8A0000
|
remote allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
A8C1A7C000
|
stack
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
1E678000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
185E7213000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
84B8EF9000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF5E000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
185E724E000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
20246000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2042E000
|
unkown
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
7FA00000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
2538DA00000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
185E722A000
|
heap
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
23A4000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1D61B000
|
trusted library allocation
|
page read and write
|
||
20310000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
463000
|
unkown
|
page readonly
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20320000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6A1000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF13000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
1E6D8000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
BB0000
|
remote allocation
|
page read and write
|
||
2538DB76000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB3B000
|
heap
|
page read and write
|
||
1D4B0000
|
heap
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB0E000
|
heap
|
page read and write
|
||
1C756000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
20312000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1F8A0000
|
remote allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
1DACA000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1F7A0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20430000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20310000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20300000
|
trusted library allocation
|
page read and write
|
||
185E727E000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
202EC000
|
trusted library allocation
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
F00000
|
remote allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20260000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219BE02000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB41000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D040000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D3FA000
|
trusted library allocation
|
page execute and read and write
|
||
1CB9E000
|
stack
|
page read and write
|
||
1D3C2000
|
trusted library allocation
|
page execute and read and write
|
||
20310000
|
trusted library allocation
|
page read and write
|
||
1F910000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2917000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B400000
|
heap
|
page read and write
|
||
2219B3A0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1DAD0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB2D000
|
heap
|
page read and write
|
||
185E6FB0000
|
heap
|
page read and write
|
||
202A0000
|
trusted library allocation
|
page read and write
|
||
20320000
|
trusted library allocation
|
page read and write
|
||
1FE00000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
201A0000
|
trusted library section
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FDF0000
|
trusted library allocation
|
page read and write
|
||
1FDC0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B451000
|
heap
|
page read and write
|
||
203AD000
|
unkown
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1F8F0000
|
trusted library allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538DB56000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DA15000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
463000
|
unkown
|
page readonly
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
202A0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
20280000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1D407000
|
trusted library allocation
|
page execute and read and write
|
||
201E0000
|
trusted library allocation
|
page read and write
|
||
35A7DFA000
|
stack
|
page read and write
|
||
1D3D2000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D0CF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FCFB000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C441000
|
heap
|
page read and write
|
||
1D3EA000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538DB02000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1CF00000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D402000
|
trusted library allocation
|
page read and write
|
||
1DA5A000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2219B425000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
remote allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1E640000
|
trusted library allocation
|
page read and write
|
||
185E7202000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B425000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20300000
|
trusted library allocation
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
1FCCE000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2538D113000
|
heap
|
page read and write
|
||
2538D8C0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB5B000
|
heap
|
page read and write
|
||
2538DB70000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
20250000
|
trusted library allocation
|
page read and write
|
||
2538DB2A000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538D000000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D68E000
|
trusted library allocation
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538D08F000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C6BE000
|
stack
|
page read and write
|
||
2219B413000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
remote allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20310000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB2C000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
35A7BFE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538D089000
|
heap
|
page read and write
|
||
2538DB0E000
|
heap
|
page read and write
|
||
2538DB37000
|
heap
|
page read and write
|
||
1FCB6000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
202D0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF17000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2219B402000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FCF9000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538D013000
|
heap
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
3AA0000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FDC0000
|
trusted library allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2219B420000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B2F0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1F890000
|
trusted library allocation
|
page execute and read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D5BE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
20270000
|
trusted library allocation
|
page read and write
|
||
20320000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D430000
|
heap
|
page read and write
|
||
185E7240000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
A8C1C7E000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D694000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20430000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB40000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2219B44A000
|
heap
|
page read and write
|
||
1FCEA000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D05F000
|
heap
|
page read and write
|
||
A8C1D7D000
|
stack
|
page read and write
|
||
185E7251000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2538D0A5000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D3F0000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
A8C167B000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2009E000
|
stack
|
page read and write
|
||
2538DB13000
|
heap
|
page read and write
|
||
20310000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
185E7237000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D40B000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB7C000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
20360000
|
trusted library allocation
|
page read and write
|
||
2219B465000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
84B870B000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
A8C1B7B000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2219B42A000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
20270000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB6D000
|
heap
|
page read and write
|
||
1CEEF000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2005E000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1F810000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
3C5B000
|
stack
|
page read and write
|
||
1D410000
|
trusted library allocation
|
page read and write
|
||
2219B432000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
716A4000
|
unkown
|
page readonly
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
201E0000
|
trusted library allocation
|
page read and write
|
||
1FF0C000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D3B0000
|
trusted library allocation
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
A8C197F000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB6B000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
1D490000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B390000
|
unclassified section
|
page readonly
|
||
1D400000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
35A787B000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
4F09000
|
trusted library allocation
|
page read and write
|
||
716A0000
|
unkown
|
page readonly
|
||
2538DB4B000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D621000
|
trusted library allocation
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
185E7271000
|
heap
|
page read and write
|
||
2538DB10000
|
heap
|
page read and write
|
||
1FDD0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20300000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FCEE000
|
trusted library allocation
|
page read and write
|
||
2538D100000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB00000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
185E7140000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538D2D0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20470000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D097000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2019F000
|
stack
|
page read and write
|
||
1D3E6000
|
trusted library allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1F8EC000
|
stack
|
page read and write
|
||
1FE10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
20260000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2219B350000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D3F2000
|
trusted library allocation
|
page execute and read and write
|
||
1FCC3000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
A8C1E7D000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
BC0000
|
unclassified section
|
page readonly
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
185E7274000
|
heap
|
page read and write
|
||
20250000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1F5C8000
|
trusted library allocation
|
page read and write
|
||
20290000
|
trusted library allocation
|
page read and write
|
||
2538CFB0000
|
heap
|
page read and write
|
||
2538DB29000
|
heap
|
page read and write
|
||
A8C1F7E000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
202E0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE0D000
|
stack
|
page read and write
|
||
1FDF3000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538CF40000
|
heap
|
page read and write
|
||
716A1000
|
unkown
|
page execute read
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
3B5C000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2538D02A000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20280000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20290000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538D089000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1CDEE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D091000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
207AE000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
2538D08F000
|
heap
|
page read and write
|
||
2538DB74000
|
heap
|
page read and write
|
||
10D0000
|
unclassified section
|
page readonly
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219B43B000
|
heap
|
page read and write
|
||
20312000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
202B0000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2219B43F000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
2538D0BA000
|
heap
|
page read and write
|
||
185E7020000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB76000
|
heap
|
page read and write
|
||
1FF12000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1C441000
|
heap
|
page read and write
|
||
205AE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D0CF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
185E7190000
|
trusted library allocation
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1DA5D000
|
trusted library allocation
|
page read and write
|
||
20340000
|
trusted library allocation
|
page read and write
|
||
20270000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538DB7C000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2538D102000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20300000
|
trusted library allocation
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D0BF000
|
heap
|
page read and write
|
||
2219B47E000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1F69C000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D4A0000
|
trusted library allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FCBC000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
201A0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2538CFF0000
|
unclassified section
|
page readonly
|
||
6E0000
|
heap
|
page read and write
|
||
2538DB32000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D07C000
|
heap
|
page read and write
|
||
2538D095000
|
heap
|
page read and write
|
||
202F2000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2538DB2C000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538D07E000
|
heap
|
page read and write
|
||
2219B41A000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538DB2F000
|
heap
|
page read and write
|
||
35A7CFE000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538D083000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D698000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D3FC000
|
trusted library allocation
|
page execute and read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1FF17000
|
trusted library allocation
|
page read and write
|
||
1FDE0000
|
trusted library allocation
|
page read and write
|
||
202E0000
|
trusted library allocation
|
page read and write
|
||
2538D064000
|
heap
|
page read and write
|
||
1F79E000
|
stack
|
page read and write
|
||
1FE20000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
202C0000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
A8C207E000
|
stack
|
page read and write
|
||
BB0000
|
remote allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
BB0000
|
remote allocation
|
page read and write
|
||
1DA40000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20330000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FCEE000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1F8A0000
|
remote allocation
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20365000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF1E000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2219BC70000
|
trusted library allocation
|
page read and write
|
||
2538DB70000
|
heap
|
page read and write
|
||
1D3E2000
|
trusted library allocation
|
page read and write
|
||
202F0000
|
trusted library allocation
|
page read and write
|
||
1D6D0000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20240000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2538D09F000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1D376000
|
stack
|
page read and write
|
||
2219B46C000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
20250000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20350000
|
trusted library allocation
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1D68C000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
B8D000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FDD0000
|
trusted library allocation
|
page read and write
|
||
2219B456000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
185E7302000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D3E0000
|
trusted library allocation
|
page read and write
|
||
1FDA0000
|
trusted library allocation
|
page execute and read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D740000
|
trusted library allocation
|
page read and write
|
||
185E7200000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
2538D07D000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
185E7A02000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
2538DB74000
|
heap
|
page read and write
|
||
1FD16000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1FF1A000
|
trusted library allocation
|
page read and write
|
||
1DA56000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1F850000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
A8C18F9000
|
stack
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
2538DB2C000
|
heap
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2219B441000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6E0000
|
heap
|
page read and write
|
||
1FF10000
|
trusted library allocation
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
1FF15000
|
trusted library allocation
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
2219B44E000
|
heap
|
page read and write
|
||
1D3CA000
|
trusted library allocation
|
page execute and read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
20260000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C750000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
There are 1184 hidden memdumps, click here to show them.