Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SSMD34590-DDMV09.pdf
|
PDF document, version 1.3
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
|
data
|
modified
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220811122419Z-198.bmp
|
PC bitmap, Windows 3.x format, 117 x -152 x 32
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
|
SQLite 3.x database, last written using SQLite version 3024000
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.6064
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
|
PostScript document text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
|
data
|
dropped
|
There are 43 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
|
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\SSMD34590-DDMV09.pdf
|
||
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
|
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
tFileSource
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
sDate
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uFileSize
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
|
uPageCount
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
aFS
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tDIText
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
tFileName
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sFileAncestors
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDI
|
||
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
|
sDate
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
216A9EDD000
|
heap
|
page read and write
|
||
216A9C38000
|
heap
|
page read and write
|
||
216A54C0000
|
trusted library allocation
|
page read and write
|
||
216A9F9C000
|
heap
|
page read and write
|
||
1632AC65000
|
heap
|
page read and write
|
||
1AE36EA0000
|
remote allocation
|
page read and write
|
||
2092F6AD000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
2092FF75000
|
heap
|
page read and write
|
||
216A9EB9000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
18A7F400000
|
heap
|
page read and write
|
||
1D5365C3000
|
trusted library allocation
|
page read and write
|
||
216A45F0000
|
trusted library allocation
|
page read and write
|
||
2092F6FF000
|
heap
|
page read and write
|
||
1A758FF000
|
stack
|
page read and write
|
||
20930402000
|
heap
|
page read and write
|
||
23874300000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A9EA0000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A4975000
|
heap
|
page read and write
|
||
216A9DC5000
|
heap
|
page read and write
|
||
216A9EAA000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A3FC2000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216AB470000
|
trusted library allocation
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
216A9C38000
|
heap
|
page read and write
|
||
216A9E31000
|
heap
|
page read and write
|
||
216A9C62000
|
heap
|
page read and write
|
||
216A9F57000
|
heap
|
page read and write
|
||
216A9880000
|
trusted library allocation
|
page read and write
|
||
216A9E9F000
|
heap
|
page read and write
|
||
13E1126D000
|
heap
|
page read and write
|
||
216A9D1B000
|
heap
|
page read and write
|
||
216A49A8000
|
heap
|
page read and write
|
||
2092FFA6000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
1632AC5F000
|
heap
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A9F1C000
|
heap
|
page read and write
|
||
216A9ECC000
|
heap
|
page read and write
|
||
216A472F000
|
heap
|
page read and write
|
||
216A49CA000
|
heap
|
page read and write
|
||
95CDC7E000
|
stack
|
page read and write
|
||
216A9D9B000
|
heap
|
page read and write
|
||
216A47DF000
|
heap
|
page read and write
|
||
216A9E32000
|
heap
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
13E11260000
|
heap
|
page read and write
|
||
216A9C3C000
|
heap
|
page read and write
|
||
216A494C000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A498B000
|
heap
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
13E11200000
|
heap
|
page read and write
|
||
390D2FE000
|
stack
|
page read and write
|
||
579F8FF000
|
stack
|
page read and write
|
||
216A9C53000
|
heap
|
page read and write
|
||
216A9FCA000
|
heap
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
1D53B610000
|
trusted library allocation
|
page read and write
|
||
22FCB2E1000
|
heap
|
page read and write
|
||
216A49C4000
|
heap
|
page read and write
|
||
5887A7B000
|
stack
|
page read and write
|
||
13E1127B000
|
heap
|
page read and write
|
||
216A49FB000
|
heap
|
page read and write
|
||
9C99E7F000
|
stack
|
page read and write
|
||
20930400000
|
heap
|
page read and write
|
||
216A498B000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9696000
|
trusted library allocation
|
page read and write
|
||
2092F6C4000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
23874228000
|
heap
|
page read and write
|
||
216A9FDA000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A9EB8000
|
heap
|
page read and write
|
||
1D53B234000
|
heap
|
page read and write
|
||
216A9DD4000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
2092F6B9000
|
heap
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
216A9DB9000
|
heap
|
page read and write
|
||
55CD279000
|
stack
|
page read and write
|
||
1FC9AD02000
|
heap
|
page read and write
|
||
216A9950000
|
trusted library allocation
|
page read and write
|
||
2092F6C1000
|
heap
|
page read and write
|
||
2733B68E000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
1D535E76000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
1B2F2DB0000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
787C5FE000
|
stack
|
page read and write
|
||
5BCCBF7000
|
stack
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
1AE36851000
|
heap
|
page read and write
|
||
216A9F00000
|
heap
|
page read and write
|
||
2F06FFF000
|
stack
|
page read and write
|
||
22FCBA02000
|
heap
|
page read and write
|
||
216A3E85000
|
heap
|
page read and write
|
||
2092F716000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
43D4FBC000
|
stack
|
page read and write
|
||
216A9D03000
|
heap
|
page read and write
|
||
1D535E8B000
|
heap
|
page read and write
|
||
1632B402000
|
trusted library allocation
|
page read and write
|
||
216A4802000
|
heap
|
page read and write
|
||
216A9694000
|
trusted library allocation
|
page read and write
|
||
216A97D0000
|
trusted library allocation
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
1B02A115000
|
heap
|
page read and write
|
||
216A9F8A000
|
heap
|
page read and write
|
||
22FCB200000
|
heap
|
page read and write
|
||
1D53B257000
|
heap
|
page read and write
|
||
2092FF17000
|
heap
|
page read and write
|
||
216A9D7B000
|
heap
|
page read and write
|
||
13E11262000
|
heap
|
page read and write
|
||
1632AC13000
|
heap
|
page read and write
|
||
216A9C4F000
|
heap
|
page read and write
|
||
5BCC8FE000
|
stack
|
page read and write
|
||
13E1127E000
|
heap
|
page read and write
|
||
13E11264000
|
heap
|
page read and write
|
||
216A98C0000
|
trusted library allocation
|
page read and write
|
||
18A7F43E000
|
heap
|
page read and write
|
||
1B029E57000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A9C50000
|
heap
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A9D85000
|
heap
|
page read and write
|
||
2733B661000
|
heap
|
page read and write
|
||
216A9F02000
|
heap
|
page read and write
|
||
216A9EE6000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
22FCB120000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A96CE000
|
trusted library allocation
|
page read and write
|
||
216A9EEB000
|
heap
|
page read and write
|
||
2F06EFF000
|
stack
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A9FF2000
|
heap
|
page read and write
|
||
1D535E8D000
|
heap
|
page read and write
|
||
13E1126B000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
216A9EA8000
|
heap
|
page read and write
|
||
216A9F26000
|
heap
|
page read and write
|
||
216A9E9B000
|
heap
|
page read and write
|
||
13E11229000
|
heap
|
page read and write
|
||
216A9D82000
|
heap
|
page read and write
|
||
390CBDE000
|
stack
|
page read and write
|
||
216A9D6F000
|
heap
|
page read and write
|
||
216A4792000
|
heap
|
page read and write
|
||
216A9E2D000
|
heap
|
page read and write
|
||
216A9850000
|
trusted library allocation
|
page read and write
|
||
216A9EA0000
|
heap
|
page read and write
|
||
2092FF00000
|
heap
|
page read and write
|
||
216A9780000
|
remote allocation
|
page read and write
|
||
579FBFE000
|
stack
|
page read and write
|
||
216A472A000
|
heap
|
page read and write
|
||
1AE36800000
|
heap
|
page read and write
|
||
787C3FC000
|
stack
|
page read and write
|
||
2092FFB8000
|
heap
|
page read and write
|
||
216A9FA6000
|
heap
|
page read and write
|
||
1D53B2B0000
|
heap
|
page read and write
|
||
216A9720000
|
trusted library allocation
|
page read and write
|
||
216A9D83000
|
heap
|
page read and write
|
||
216A9FEB000
|
heap
|
page read and write
|
||
43D527E000
|
stack
|
page read and write
|
||
18A7F370000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
1FC9AC75000
|
heap
|
page read and write
|
||
216A3E00000
|
heap
|
page read and write
|
||
216A4998000
|
heap
|
page read and write
|
||
216A49E5000
|
heap
|
page read and write
|
||
2733B708000
|
heap
|
page read and write
|
||
216A9EC9000
|
heap
|
page read and write
|
||
216A9ECD000
|
heap
|
page read and write
|
||
216A4969000
|
heap
|
page read and write
|
||
216A4700000
|
heap
|
page read and write
|
||
1B2F304E000
|
heap
|
page read and write
|
||
216A9F15000
|
heap
|
page read and write
|
||
216A969C000
|
trusted library allocation
|
page read and write
|
||
216A4823000
|
heap
|
page read and write
|
||
2733B5E0000
|
heap
|
page read and write
|
||
1B029DF0000
|
heap
|
page read and write
|
||
216A4990000
|
heap
|
page read and write
|
||
9C9A07B000
|
stack
|
page read and write
|
||
216A9F6F000
|
heap
|
page read and write
|
||
1D535E55000
|
heap
|
page read and write
|
||
216A9F46000
|
heap
|
page read and write
|
||
216A3BE0000
|
heap
|
page read and write
|
||
216A9EC9000
|
heap
|
page read and write
|
||
216A49E5000
|
heap
|
page read and write
|
||
216A9C62000
|
heap
|
page read and write
|
||
216A9690000
|
trusted library allocation
|
page read and write
|
||
43D577F000
|
stack
|
page read and write
|
||
216A49F7000
|
heap
|
page read and write
|
||
2092FF76000
|
heap
|
page read and write
|
||
216A49CE000
|
heap
|
page read and write
|
||
216A9688000
|
trusted library allocation
|
page read and write
|
||
216A9E50000
|
heap
|
page read and write
|
||
1D53B2E9000
|
heap
|
page read and write
|
||
90334FA000
|
stack
|
page read and write
|
||
2092F654000
|
heap
|
page read and write
|
||
1B2F3102000
|
heap
|
page read and write
|
||
13E11213000
|
heap
|
page read and write
|
||
1D535D80000
|
trusted library section
|
page read and write
|
||
1FC9AC00000
|
heap
|
page read and write
|
||
216A4EC0000
|
trusted library allocation
|
page read and write
|
||
216A471D000
|
heap
|
page read and write
|
||
216A96CE000
|
trusted library allocation
|
page read and write
|
||
1D53B500000
|
trusted library allocation
|
page read and write
|
||
216A969C000
|
trusted library allocation
|
page read and write
|
||
579F3FF000
|
stack
|
page read and write
|
||
1632AAB0000
|
heap
|
page read and write
|
||
2092F627000
|
heap
|
page read and write
|
||
1D53B670000
|
remote allocation
|
page read and write
|
||
1D537160000
|
trusted library allocation
|
page read and write
|
||
216A3E65000
|
heap
|
page read and write
|
||
1D53B300000
|
heap
|
page read and write
|
||
13E11256000
|
heap
|
page read and write
|
||
216A9D82000
|
heap
|
page read and write
|
||
216A9C2C000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
216A9F76000
|
heap
|
page read and write
|
||
1632AC24000
|
heap
|
page read and write
|
||
216A9ED1000
|
heap
|
page read and write
|
||
216A9688000
|
trusted library allocation
|
page read and write
|
||
216A9F7D000
|
heap
|
page read and write
|
||
216A4999000
|
heap
|
page read and write
|
||
216A9DD1000
|
heap
|
page read and write
|
||
1632AD08000
|
heap
|
page read and write
|
||
13E1124F000
|
heap
|
page read and write
|
||
1AE3683D000
|
heap
|
page read and write
|
||
572D0FD000
|
stack
|
page read and write
|
||
18A7F42F000
|
heap
|
page read and write
|
||
23874050000
|
heap
|
page read and write
|
||
216A9D05000
|
heap
|
page read and write
|
||
216A9690000
|
trusted library allocation
|
page read and write
|
||
43D5AFC000
|
stack
|
page read and write
|
||
2092FF90000
|
heap
|
page read and write
|
||
216A9C58000
|
heap
|
page read and write
|
||
1D53B521000
|
trusted library allocation
|
page read and write
|
||
1D536718000
|
heap
|
page read and write
|
||
216A9E59000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A9DD1000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
216A9E2F000
|
heap
|
page read and write
|
||
216A9D4E000
|
heap
|
page read and write
|
||
1B2F3002000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
1FC9AC64000
|
heap
|
page read and write
|
||
216A9E13000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A9C55000
|
heap
|
page read and write
|
||
1632AC02000
|
heap
|
page read and write
|
||
216A495C000
|
heap
|
page read and write
|
||
1D535C00000
|
heap
|
page read and write
|
||
216A4602000
|
heap
|
page read and write
|
||
216A968E000
|
trusted library allocation
|
page read and write
|
||
23874A02000
|
trusted library allocation
|
page read and write
|
||
588797F000
|
stack
|
page read and write
|
||
1D53B508000
|
trusted library allocation
|
page read and write
|
||
1D535E71000
|
heap
|
page read and write
|
||
23874279000
|
heap
|
page read and write
|
||
216A49E5000
|
heap
|
page read and write
|
||
216A9E5F000
|
heap
|
page read and write
|
||
216A9FF0000
|
heap
|
page read and write
|
||
216A9660000
|
trusted library allocation
|
page read and write
|
||
216A9F68000
|
heap
|
page read and write
|
||
216A9E52000
|
heap
|
page read and write
|
||
2733BE02000
|
trusted library allocation
|
page read and write
|
||
1B2F303C000
|
heap
|
page read and write
|
||
216A9698000
|
trusted library allocation
|
page read and write
|
||
2733B570000
|
heap
|
page read and write
|
||
216A96E5000
|
trusted library allocation
|
page read and write
|
||
216A9E6D000
|
heap
|
page read and write
|
||
216A9E00000
|
heap
|
page read and write
|
||
216A9E9F000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
216A9E3D000
|
heap
|
page read and write
|
||
216A9F6F000
|
heap
|
page read and write
|
||
2733B63C000
|
heap
|
page read and write
|
||
216A9FDE000
|
heap
|
page read and write
|
||
216A9660000
|
trusted library allocation
|
page read and write
|
||
216A9FDC000
|
heap
|
page read and write
|
||
216A49F9000
|
heap
|
page read and write
|
||
238741C0000
|
trusted library allocation
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
13E1122D000
|
heap
|
page read and write
|
||
2733B688000
|
heap
|
page read and write
|
||
216A49C7000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
216A480A000
|
heap
|
page read and write
|
||
9032FFB000
|
stack
|
page read and write
|
||
9033C7F000
|
stack
|
page read and write
|
||
216A9E4B000
|
heap
|
page read and write
|
||
216A9C53000
|
heap
|
page read and write
|
||
216A9900000
|
trusted library allocation
|
page read and write
|
||
216A9F42000
|
heap
|
page read and write
|
||
216A49CA000
|
heap
|
page read and write
|
||
2092F651000
|
heap
|
page read and write
|
||
43D52FE000
|
stack
|
page read and write
|
||
216A9ED3000
|
heap
|
page read and write
|
||
9C9A67D000
|
stack
|
page read and write
|
||
216A9DC1000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
1D536602000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A9F13000
|
heap
|
page read and write
|
||
2092FFA1000
|
heap
|
page read and write
|
||
216A9FD0000
|
heap
|
page read and write
|
||
1D53B2FC000
|
heap
|
page read and write
|
||
216A9C00000
|
heap
|
page read and write
|
||
216A9E93000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A9FB6000
|
heap
|
page read and write
|
||
579F4FC000
|
stack
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
1B2F3113000
|
heap
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
1632AC52000
|
heap
|
page read and write
|
||
2092FF8D000
|
heap
|
page read and write
|
||
216A9EAE000
|
heap
|
page read and write
|
||
216A49CF000
|
heap
|
page read and write
|
||
2733B580000
|
heap
|
page read and write
|
||
2092F440000
|
heap
|
page read and write
|
||
1FC9AC7C000
|
heap
|
page read and write
|
||
2092F64D000
|
heap
|
page read and write
|
||
2092FF9E000
|
heap
|
page read and write
|
||
1AE37002000
|
trusted library allocation
|
page read and write
|
||
572CAFE000
|
stack
|
page read and write
|
||
43D547E000
|
stack
|
page read and write
|
||
22FCB190000
|
heap
|
page read and write
|
||
216A4943000
|
heap
|
page read and write
|
||
216A485A000
|
heap
|
page read and write
|
||
43D5877000
|
stack
|
page read and write
|
||
216A4998000
|
heap
|
page read and write
|
||
95CD75E000
|
stack
|
page read and write
|
||
22FCB2B8000
|
heap
|
page read and write
|
||
1D53B204000
|
heap
|
page read and write
|
||
216A9E97000
|
heap
|
page read and write
|
||
216A3FEB000
|
heap
|
page read and write
|
||
13E1123D000
|
heap
|
page read and write
|
||
23874200000
|
heap
|
page read and write
|
||
2092F6B1000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A9C5F000
|
heap
|
page read and write
|
||
2092F685000
|
heap
|
page read and write
|
||
1632AD02000
|
heap
|
page read and write
|
||
216A4900000
|
heap
|
page read and write
|
||
1B02A110000
|
heap
|
page read and write
|
||
216A9FE0000
|
heap
|
page read and write
|
||
95CD6DB000
|
stack
|
page read and write
|
||
1D53B200000
|
heap
|
page read and write
|
||
1B2F3013000
|
heap
|
page read and write
|
||
216A4999000
|
heap
|
page read and write
|
||
2092F650000
|
heap
|
page read and write
|
||
216A49A7000
|
heap
|
page read and write
|
||
216A969C000
|
trusted library allocation
|
page read and write
|
||
216A9F98000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
579F9FF000
|
stack
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
1D53B50E000
|
trusted library allocation
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
1A756F9000
|
stack
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
9033A7F000
|
stack
|
page read and write
|
||
216A9EF5000
|
heap
|
page read and write
|
||
216A9C5C000
|
heap
|
page read and write
|
||
5BCC87E000
|
stack
|
page read and write
|
||
216A97B0000
|
trusted library allocation
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
216A98F0000
|
trusted library allocation
|
page read and write
|
||
1632AC5C000
|
heap
|
page read and write
|
||
2092FF74000
|
heap
|
page read and write
|
||
216A47F3000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
13E111F0000
|
trusted library allocation
|
page read and write
|
||
216A9FA9000
|
heap
|
page read and write
|
||
1D53B1D0000
|
trusted library allocation
|
page read and write
|
||
216A9EB2000
|
heap
|
page read and write
|
||
216A4990000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
216A9F35000
|
heap
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
216A54B0000
|
trusted library section
|
page readonly
|
||
216A9D6A000
|
heap
|
page read and write
|
||
2092FF97000
|
heap
|
page read and write
|
||
216AA010000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
1AE366A0000
|
heap
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
216A9FEE000
|
heap
|
page read and write
|
||
216A481B000
|
heap
|
page read and write
|
||
1632ABB0000
|
trusted library allocation
|
page read and write
|
||
9033B7E000
|
stack
|
page read and write
|
||
216A9F68000
|
heap
|
page read and write
|
||
216A967C000
|
trusted library allocation
|
page read and write
|
||
1B2F3066000
|
heap
|
page read and write
|
||
2092FF69000
|
heap
|
page read and write
|
||
216A9EE3000
|
heap
|
page read and write
|
||
1D53B2E8000
|
heap
|
page read and write
|
||
23874264000
|
heap
|
page read and write
|
||
2092F5B0000
|
trusted library allocation
|
page read and write
|
||
1632AC00000
|
heap
|
page read and write
|
||
1D536E00000
|
trusted library section
|
page readonly
|
||
216A9F53000
|
heap
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A9EE9000
|
heap
|
page read and write
|
||
216A9C38000
|
heap
|
page read and write
|
||
1D53B1C0000
|
trusted library allocation
|
page read and write
|
||
216A9EB5000
|
heap
|
page read and write
|
||
216A9F2E000
|
heap
|
page read and write
|
||
216A49D7000
|
heap
|
page read and write
|
||
1D536702000
|
heap
|
page read and write
|
||
216A4600000
|
heap
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
216A9D86000
|
heap
|
page read and write
|
||
216A9F5E000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
2092FF75000
|
heap
|
page read and write
|
||
18A7F380000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A9F76000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
1B029E46000
|
heap
|
page read and write
|
||
13E11248000
|
heap
|
page read and write
|
||
216A9EDE000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
2092FF15000
|
heap
|
page read and write
|
||
216A98D0000
|
trusted library allocation
|
page read and write
|
||
216A9D9D000
|
heap
|
page read and write
|
||
1D5365D0000
|
trusted library allocation
|
page read and write
|
||
95CD7DE000
|
stack
|
page read and write
|
||
216A9EC9000
|
heap
|
page read and write
|
||
2092F6F2000
|
heap
|
page read and write
|
||
1B029E10000
|
heap
|
page read and write
|
||
2092F6CA000
|
heap
|
page read and write
|
||
2092FF8D000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
390CFFE000
|
stack
|
page read and write
|
||
216A498B000
|
heap
|
page read and write
|
||
1D535E78000
|
heap
|
page read and write
|
||
579FAFF000
|
stack
|
page read and write
|
||
1D535EA4000
|
heap
|
page read and write
|
||
1AE36710000
|
heap
|
page read and write
|
||
1D53B1D0000
|
trusted library allocation
|
page read and write
|
||
1FC9AC13000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
1B2F3044000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
23874313000
|
heap
|
page read and write
|
||
18A7F413000
|
heap
|
page read and write
|
||
2F06DF7000
|
stack
|
page read and write
|
||
9033D7D000
|
stack
|
page read and write
|
||
9C991DB000
|
stack
|
page read and write
|
||
390CB5B000
|
stack
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
2F06BFB000
|
stack
|
page read and write
|
||
216A9660000
|
trusted library allocation
|
page read and write
|
||
13E11246000
|
heap
|
page read and write
|
||
1D536DD0000
|
trusted library section
|
page readonly
|
||
216A97C0000
|
trusted library allocation
|
page read and write
|
||
2733B67D000
|
heap
|
page read and write
|
||
216A49FD000
|
heap
|
page read and write
|
||
1D53B2B9000
|
heap
|
page read and write
|
||
13E11268000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
2092FF69000
|
heap
|
page read and write
|
||
9C9A27E000
|
stack
|
page read and write
|
||
2092FF8D000
|
heap
|
page read and write
|
||
216A5158000
|
trusted library allocation
|
page read and write
|
||
216A3E5C000
|
heap
|
page read and write
|
||
216A3D50000
|
trusted library allocation
|
page read and write
|
||
23874277000
|
heap
|
page read and write
|
||
216A9D62000
|
heap
|
page read and write
|
||
216A968C000
|
trusted library allocation
|
page read and write
|
||
216A9685000
|
trusted library allocation
|
page read and write
|
||
2733B629000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
55CCEBA000
|
stack
|
page read and write
|
||
216A9E54000
|
heap
|
page read and write
|
||
216A9ECC000
|
heap
|
page read and write
|
||
1D53B2FE000
|
heap
|
page read and write
|
||
216A3E29000
|
heap
|
page read and write
|
||
2092FF76000
|
heap
|
page read and write
|
||
216A9FD2000
|
heap
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
216A49D5000
|
heap
|
page read and write
|
||
216A9F24000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
216A9D66000
|
heap
|
page read and write
|
||
216A9DD4000
|
heap
|
page read and write
|
||
216A9D50000
|
heap
|
page read and write
|
||
216A9C55000
|
heap
|
page read and write
|
||
18A7F445000
|
heap
|
page read and write
|
||
216A9FE2000
|
heap
|
page read and write
|
||
20930402000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
216A3E93000
|
heap
|
page read and write
|
||
216A9E4E000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A9690000
|
trusted library allocation
|
page read and write
|
||
216A5150000
|
trusted library allocation
|
page read and write
|
||
2092F671000
|
heap
|
page read and write
|
||
2092F6AB000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
13E1127A000
|
heap
|
page read and write
|
||
2092FF69000
|
heap
|
page read and write
|
||
216A9EB0000
|
heap
|
page read and write
|
||
2733B702000
|
heap
|
page read and write
|
||
1FC9B402000
|
trusted library allocation
|
page read and write
|
||
216A9D44000
|
heap
|
page read and write
|
||
1B2F3029000
|
heap
|
page read and write
|
||
216A49D1000
|
heap
|
page read and write
|
||
216A9E94000
|
heap
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
216A9E90000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
1D53B1E0000
|
trusted library allocation
|
page read and write
|
||
20930402000
|
heap
|
page read and write
|
||
13E11277000
|
heap
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
1AE36EA0000
|
remote allocation
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
22FCB302000
|
heap
|
page read and write
|
||
216A9F6F000
|
heap
|
page read and write
|
||
216A97E0000
|
trusted library allocation
|
page read and write
|
||
1D535E00000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A9C5B000
|
heap
|
page read and write
|
||
216A9EE7000
|
heap
|
page read and write
|
||
216A9C62000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A3E13000
|
heap
|
page read and write
|
||
1B2F2E20000
|
heap
|
page read and write
|
||
9033F7F000
|
stack
|
page read and write
|
||
1D53B2F3000
|
heap
|
page read and write
|
||
1D5365E0000
|
trusted library allocation
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A3F13000
|
heap
|
page read and write
|
||
1B2F2FF0000
|
trusted library allocation
|
page read and write
|
||
22FCB229000
|
heap
|
page read and write
|
||
13E11020000
|
heap
|
page read and write
|
||
1632AD00000
|
heap
|
page read and write
|
||
1FC9AC65000
|
heap
|
page read and write
|
||
2733B65B000
|
heap
|
page read and write
|
||
216A4990000
|
heap
|
page read and write
|
||
5BCCD7F000
|
stack
|
page read and write
|
||
1FC9AC5A000
|
heap
|
page read and write
|
||
9C998FA000
|
stack
|
page read and write
|
||
216A9D7B000
|
heap
|
page read and write
|
||
2092F450000
|
heap
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
9C9A375000
|
stack
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
18A7F43B000
|
heap
|
page read and write
|
||
2092F6F5000
|
heap
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
1D53B29B000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
90337FB000
|
stack
|
page read and write
|
||
216A9C13000
|
heap
|
page read and write
|
||
216A49DA000
|
heap
|
page read and write
|
||
2092FFA6000
|
heap
|
page read and write
|
||
216A9C55000
|
heap
|
page read and write
|
||
216A3F8E000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
20930444000
|
heap
|
page read and write
|
||
1D535EBC000
|
heap
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
216A4E40000
|
trusted library allocation
|
page read and write
|
||
43D59F8000
|
stack
|
page read and write
|
||
216A49D9000
|
heap
|
page read and write
|
||
216A9500000
|
trusted library allocation
|
page read and write
|
||
1B029E75000
|
heap
|
page read and write
|
||
1FC9AC02000
|
heap
|
page read and write
|
||
216A9EEF000
|
heap
|
page read and write
|
||
13E11263000
|
heap
|
page read and write
|
||
216A969E000
|
trusted library allocation
|
page read and write
|
||
13E1122E000
|
heap
|
page read and write
|
||
216A49AF000
|
heap
|
page read and write
|
||
216A49CB000
|
heap
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
13E11274000
|
heap
|
page read and write
|
||
216A54A0000
|
trusted library section
|
page readonly
|
||
1FC9AB30000
|
heap
|
page read and write
|
||
216A9890000
|
trusted library allocation
|
page read and write
|
||
1D53B514000
|
trusted library allocation
|
page read and write
|
||
13E11247000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
216A9EA2000
|
heap
|
page read and write
|
||
216A9F19000
|
heap
|
page read and write
|
||
1D53B2D8000
|
heap
|
page read and write
|
||
216A9FCE000
|
heap
|
page read and write
|
||
5BCCE7F000
|
stack
|
page read and write
|
||
216A9F36000
|
heap
|
page read and write
|
||
216A9D64000
|
heap
|
page read and write
|
||
13E1123A000
|
heap
|
page read and write
|
||
2092FF7C000
|
heap
|
page read and write
|
||
1D53B524000
|
trusted library allocation
|
page read and write
|
||
216A3E8B000
|
heap
|
page read and write
|
||
2092FF70000
|
heap
|
page read and write
|
||
216A47C8000
|
heap
|
page read and write
|
||
2092F713000
|
heap
|
page read and write
|
||
1632AC80000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
2733B65E000
|
heap
|
page read and write
|
||
90339FE000
|
stack
|
page read and write
|
||
216A47B0000
|
heap
|
page read and write
|
||
216A49FF000
|
heap
|
page read and write
|
||
216A9E5C000
|
heap
|
page read and write
|
||
579F6FD000
|
stack
|
page read and write
|
||
216A9D13000
|
heap
|
page read and write
|
||
216A4998000
|
heap
|
page read and write
|
||
1FC9AC55000
|
heap
|
page read and write
|
||
58872BB000
|
stack
|
page read and write
|
||
216A47F5000
|
heap
|
page read and write
|
||
1D53B5A0000
|
trusted library allocation
|
page read and write
|
||
1D535E7B000
|
heap
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
22FCB2C9000
|
heap
|
page read and write
|
||
216A9E54000
|
heap
|
page read and write
|
||
13E11240000
|
heap
|
page read and write
|
||
216A9E61000
|
heap
|
page read and write
|
||
2092F600000
|
heap
|
page read and write
|
||
216A96A0000
|
trusted library allocation
|
page read and write
|
||
216A4990000
|
heap
|
page read and write
|
||
1D53B305000
|
heap
|
page read and write
|
||
2F06A7E000
|
stack
|
page read and write
|
||
787C37D000
|
stack
|
page read and write
|
||
216A9E5A000
|
heap
|
page read and write
|
||
1D53B600000
|
trusted library allocation
|
page read and write
|
||
22FCBB12000
|
heap
|
page read and write
|
||
2092FFA0000
|
heap
|
page read and write
|
||
13E11249000
|
heap
|
page read and write
|
||
216A9FD8000
|
heap
|
page read and write
|
||
1632AA50000
|
heap
|
page read and write
|
||
216A9880000
|
trusted library allocation
|
page read and write
|
||
216A9EC4000
|
heap
|
page read and write
|
||
2733B713000
|
heap
|
page read and write
|
||
216A9EB3000
|
heap
|
page read and write
|
||
2092FF9F000
|
heap
|
page read and write
|
||
216A9E3B000
|
heap
|
page read and write
|
||
787BB0B000
|
stack
|
page read and write
|
||
18A7FB30000
|
trusted library allocation
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
55CD2F8000
|
stack
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A96A2000
|
trusted library allocation
|
page read and write
|
||
216A9DD4000
|
heap
|
page read and write
|
||
579F5FE000
|
stack
|
page read and write
|
||
579F7FF000
|
stack
|
page read and write
|
||
1D53B302000
|
heap
|
page read and write
|
||
2092FF65000
|
heap
|
page read and write
|
||
216A96CA000
|
trusted library allocation
|
page read and write
|
||
13E10FB0000
|
heap
|
page read and write
|
||
216A5470000
|
trusted library section
|
page readonly
|
||
216A9D0B000
|
heap
|
page read and write
|
||
572C70B000
|
stack
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
1AE36902000
|
heap
|
page read and write
|
||
1B029E60000
|
heap
|
page read and write
|
||
216A9C56000
|
heap
|
page read and write
|
||
1B2F3073000
|
heap
|
page read and write
|
||
13E11261000
|
heap
|
page read and write
|
||
1D536801000
|
trusted library allocation
|
page read and write
|
||
9C99AFA000
|
stack
|
page read and write
|
||
216A9AA0000
|
trusted library allocation
|
page read and write
|
||
2733B666000
|
heap
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
216A9F68000
|
heap
|
page read and write
|
||
216A9780000
|
remote allocation
|
page read and write
|
||
2093041A000
|
heap
|
page read and write
|
||
216A5490000
|
trusted library section
|
page readonly
|
||
216A9EF1000
|
heap
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
216A9FAB000
|
heap
|
page read and write
|
||
18A7FC02000
|
trusted library allocation
|
page read and write
|
||
216A9E29000
|
heap
|
page read and write
|
||
1D535D70000
|
trusted library allocation
|
page read and write
|
||
216A9EA2000
|
heap
|
page read and write
|
||
216A9E5D000
|
heap
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
9C9987B000
|
stack
|
page read and write
|
||
2F06AFE000
|
stack
|
page read and write
|
||
216AA010000
|
heap
|
page read and write
|
||
1D536DF0000
|
trusted library section
|
page readonly
|
||
572CEFF000
|
stack
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
390D0FE000
|
stack
|
page read and write
|
||
216A9ECA000
|
heap
|
page read and write
|
||
9C99F7E000
|
stack
|
page read and write
|
||
1D53B24A000
|
heap
|
page read and write
|
||
13E11245000
|
heap
|
page read and write
|
||
216A9DC1000
|
heap
|
page read and write
|
||
216A45D1000
|
trusted library allocation
|
page read and write
|
||
1D53B2EB000
|
heap
|
page read and write
|
||
1D535E92000
|
heap
|
page read and write
|
||
216A9E56000
|
heap
|
page read and write
|
||
2092FF70000
|
heap
|
page read and write
|
||
2F067CC000
|
stack
|
page read and write
|
||
787C6FC000
|
stack
|
page read and write
|
||
216A9694000
|
trusted library allocation
|
page read and write
|
||
216A9F0A000
|
heap
|
page read and write
|
||
787C7FE000
|
stack
|
page read and write
|
||
216A47C5000
|
heap
|
page read and write
|
||
22FCBB00000
|
heap
|
page read and write
|
||
2092F613000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
216A9E2B000
|
heap
|
page read and write
|
||
216A3E92000
|
heap
|
page read and write
|
||
43D53FB000
|
stack
|
page read and write
|
||
1632AD13000
|
heap
|
page read and write
|
||
2733B613000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
9C9A47E000
|
stack
|
page read and write
|
||
216A9EC9000
|
heap
|
page read and write
|
||
1B029D90000
|
heap
|
page read and write
|
||
787C1FE000
|
stack
|
page read and write
|
||
216A49B4000
|
heap
|
page read and write
|
||
9C994FE000
|
stack
|
page read and write
|
||
216A96E5000
|
trusted library allocation
|
page read and write
|
||
216A494D000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
2092F6C4000
|
heap
|
page read and write
|
||
1D535EFE000
|
heap
|
page read and write
|
||
43D58FF000
|
unkown
|
page read and write
|
||
216A3E90000
|
heap
|
page read and write
|
||
9033BFE000
|
stack
|
page read and write
|
||
1D535F02000
|
heap
|
page read and write
|
||
216A9D43000
|
heap
|
page read and write
|
||
216A9690000
|
trusted library allocation
|
page read and write
|
||
1D535E58000
|
heap
|
page read and write
|
||
216A9D00000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A9DFD000
|
heap
|
page read and write
|
||
1B2F3602000
|
trusted library allocation
|
page read and write
|
||
43D5677000
|
stack
|
page read and write
|
||
216A5460000
|
trusted library section
|
page readonly
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A4800000
|
heap
|
page read and write
|
||
2092FCD0000
|
remote allocation
|
page read and write
|
||
216A9D20000
|
heap
|
page read and write
|
||
216A97D0000
|
trusted library allocation
|
page read and write
|
||
216A9694000
|
trusted library allocation
|
page read and write
|
||
2092FCD0000
|
remote allocation
|
page read and write
|
||
2092FF8D000
|
heap
|
page read and write
|
||
216A9E2F000
|
heap
|
page read and write
|
||
2092FFAF000
|
heap
|
page read and write
|
||
216A9FEC000
|
heap
|
page read and write
|
||
9C995FB000
|
stack
|
page read and write
|
||
216A970C000
|
trusted library allocation
|
page read and write
|
||
216A9C3F000
|
heap
|
page read and write
|
||
2092FF74000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
1B029E58000
|
heap
|
page read and write
|
||
1632AC69000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
2733B684000
|
heap
|
page read and write
|
||
216A9DD1000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
13E1126A000
|
heap
|
page read and write
|
||
216A969A000
|
trusted library allocation
|
page read and write
|
||
216A499B000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
216A9D7B000
|
heap
|
page read and write
|
||
216A3BF0000
|
heap
|
page read and write
|
||
1D535DE1000
|
trusted library allocation
|
page read and write
|
||
23874302000
|
heap
|
page read and write
|
||
1AE36E70000
|
trusted library allocation
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
2092FF57000
|
heap
|
page read and write
|
||
23874256000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
13E1124C000
|
heap
|
page read and write
|
||
216A9DF4000
|
heap
|
page read and write
|
||
2733B600000
|
heap
|
page read and write
|
||
216A969A000
|
trusted library allocation
|
page read and write
|
||
1D536DE0000
|
trusted library section
|
page readonly
|
||
5BCC9FB000
|
stack
|
page read and write
|
||
1B2F3060000
|
heap
|
page read and write
|
||
1A7519C000
|
stack
|
page read and write
|
||
1D536DC0000
|
trusted library section
|
page readonly
|
||
216A9FB1000
|
heap
|
page read and write
|
||
55CCF3F000
|
stack
|
page read and write
|
||
90335F9000
|
stack
|
page read and write
|
||
216A4702000
|
heap
|
page read and write
|
||
1FC9AB60000
|
trusted library allocation
|
page read and write
|
||
216A9F29000
|
heap
|
page read and write
|
||
2092FF6B000
|
heap
|
page read and write
|
||
216A9E27000
|
heap
|
page read and write
|
||
1FC9AC6F000
|
heap
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
216A94C0000
|
trusted library allocation
|
page read and write
|
||
1632AC61000
|
heap
|
page read and write
|
||
9C9A17D000
|
stack
|
page read and write
|
||
216A97FC000
|
trusted library allocation
|
page read and write
|
||
2387423C000
|
heap
|
page read and write
|
||
23874060000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9E6E000
|
heap
|
page read and write
|
||
95CDF7E000
|
stack
|
page read and write
|
||
216A9EA8000
|
heap
|
page read and write
|
||
1AE36829000
|
heap
|
page read and write
|
||
216A9C10000
|
heap
|
page read and write
|
||
9C99DFA000
|
stack
|
page read and write
|
||
20930402000
|
heap
|
page read and write
|
||
216A9F92000
|
heap
|
page read and write
|
||
216A9AB0000
|
trusted library allocation
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
216A9DC3000
|
heap
|
page read and write
|
||
1D536CE0000
|
trusted library allocation
|
page read and write
|
||
1D53B670000
|
remote allocation
|
page read and write
|
||
1D53B213000
|
heap
|
page read and write
|
||
216A9D7B000
|
heap
|
page read and write
|
||
216A49CE000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
1B029E60000
|
heap
|
page read and write
|
||
90333F7000
|
stack
|
page read and write
|
||
216A49AB000
|
heap
|
page read and write
|
||
216A9EB1000
|
heap
|
page read and write
|
||
1D535F13000
|
heap
|
page read and write
|
||
216A9C39000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
216A9DB8000
|
heap
|
page read and write
|
||
216A9685000
|
trusted library allocation
|
page read and write
|
||
9C99CFE000
|
stack
|
page read and write
|
||
9C999FB000
|
stack
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
579F07B000
|
stack
|
page read and write
|
||
13E11250000
|
heap
|
page read and write
|
||
95CDE7F000
|
stack
|
page read and write
|
||
216A9690000
|
trusted library allocation
|
page read and write
|
||
1D535E40000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A9840000
|
trusted library allocation
|
page read and write
|
||
1D53B500000
|
trusted library allocation
|
page read and write
|
||
216A9D76000
|
heap
|
page read and write
|
||
216A9EDE000
|
heap
|
page read and write
|
||
18A7F452000
|
heap
|
page read and write
|
||
216A4732000
|
heap
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
216A9E3A000
|
heap
|
page read and write
|
||
55CD37E000
|
stack
|
page read and write
|
||
216A9D18000
|
heap
|
page read and write
|
||
1D53B500000
|
trusted library allocation
|
page read and write
|
||
9C99C7F000
|
stack
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
2092FF6C000
|
heap
|
page read and write
|
||
13E11265000
|
heap
|
page read and write
|
||
216A9E27000
|
heap
|
page read and write
|
||
1FC9AD13000
|
heap
|
page read and write
|
||
1D535C70000
|
heap
|
page read and write
|
||
787BF7C000
|
stack
|
page read and write
|
||
216A9E2E000
|
heap
|
page read and write
|
||
1D53B2DF000
|
heap
|
page read and write
|
||
216A49BA000
|
heap
|
page read and write
|
||
572CE7D000
|
stack
|
page read and write
|
||
2092F702000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
13E11802000
|
trusted library allocation
|
page read and write
|
||
216A9F67000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
22FCBB3A000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A94D0000
|
trusted library allocation
|
page read and write
|
||
216A9698000
|
trusted library allocation
|
page read and write
|
||
216A9E24000
|
heap
|
page read and write
|
||
9C9977F000
|
stack
|
page read and write
|
||
2092F657000
|
heap
|
page read and write
|
||
2092FF1D000
|
heap
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A9D7D000
|
heap
|
page read and write
|
||
1632AC3C000
|
heap
|
page read and write
|
||
90336FE000
|
stack
|
page read and write
|
||
216A9EE6000
|
heap
|
page read and write
|
||
1D5365C0000
|
trusted library allocation
|
page read and write
|
||
216A9EAC000
|
heap
|
page read and write
|
||
2092FF75000
|
heap
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
1B2F3088000
|
heap
|
page read and write
|
||
216A9ECC000
|
heap
|
page read and write
|
||
1D535E29000
|
heap
|
page read and write
|
||
2092FF6D000
|
heap
|
page read and write
|
||
216A3D70000
|
trusted library allocation
|
page read and write
|
||
22FCB1C0000
|
trusted library allocation
|
page read and write
|
||
216A9F76000
|
heap
|
page read and write
|
||
2092FFC9000
|
heap
|
page read and write
|
||
2092FFA6000
|
heap
|
page read and write
|
||
5BCC5FB000
|
stack
|
page read and write
|
||
1B2F3000000
|
heap
|
page read and write
|
||
216A9FAE000
|
heap
|
page read and write
|
||
13E11242000
|
heap
|
page read and write
|
||
1D535C10000
|
heap
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
216A9680000
|
trusted library allocation
|
page read and write
|
||
18A7F3D0000
|
heap
|
page read and write
|
||
2733B700000
|
heap
|
page read and write
|
||
1D53B670000
|
remote allocation
|
page read and write
|
||
216A5148000
|
trusted library allocation
|
page read and write
|
||
216A97F4000
|
trusted library allocation
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
2092F4B0000
|
heap
|
page read and write
|
||
216A49E5000
|
heap
|
page read and write
|
||
216A9C37000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
390CE7E000
|
stack
|
page read and write
|
||
2092FF9E000
|
heap
|
page read and write
|
||
216A9E4B000
|
heap
|
page read and write
|
||
18A7F402000
|
heap
|
page read and write
|
||
1D53B5E0000
|
trusted library allocation
|
page read and write
|
||
216A9E57000
|
heap
|
page read and write
|
||
1B029E46000
|
heap
|
page read and write
|
||
13E11231000
|
heap
|
page read and write
|
||
23874202000
|
heap
|
page read and write
|
||
1FC9AC29000
|
heap
|
page read and write
|
||
216A9F7D000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A49F5000
|
heap
|
page read and write
|
||
1A757FC000
|
stack
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A9920000
|
trusted library allocation
|
page read and write
|
||
2092FFC2000
|
heap
|
page read and write
|
||
2092F6E4000
|
heap
|
page read and write
|
||
13E11275000
|
heap
|
page read and write
|
||
1AE36EA0000
|
remote allocation
|
page read and write
|
||
22FCB243000
|
heap
|
page read and write
|
||
1AE36813000
|
heap
|
page read and write
|
||
5BCCC7E000
|
stack
|
page read and write
|
||
216A9800000
|
trusted library allocation
|
page read and write
|
||
1D53B510000
|
trusted library allocation
|
page read and write
|
||
2733B654000
|
heap
|
page read and write
|
||
2092F708000
|
heap
|
page read and write
|
||
2092F6F5000
|
heap
|
page read and write
|
||
216A9FCB000
|
heap
|
page read and write
|
||
216A9C4D000
|
heap
|
page read and write
|
||
216A9696000
|
trusted library allocation
|
page read and write
|
||
216A9FD4000
|
heap
|
page read and write
|
||
216A9C02000
|
heap
|
page read and write
|
||
216A9F7D000
|
heap
|
page read and write
|
||
216A9EED000
|
heap
|
page read and write
|
||
1FC9AAD0000
|
heap
|
page read and write
|
||
13E10FC0000
|
heap
|
page read and write
|
||
216A498C000
|
heap
|
page read and write
|
||
216A9700000
|
trusted library allocation
|
page read and write
|
||
1D536615000
|
heap
|
page read and write
|
||
23874213000
|
heap
|
page read and write
|
||
1B029E60000
|
heap
|
page read and write
|
||
2092FF8D000
|
heap
|
page read and write
|
||
1D536E10000
|
trusted library section
|
page readonly
|
||
216A9F91000
|
heap
|
page read and write
|
||
216A9ECA000
|
heap
|
page read and write
|
||
1B2F3108000
|
heap
|
page read and write
|
||
216A9D83000
|
heap
|
page read and write
|
||
1FC9AAC0000
|
heap
|
page read and write
|
||
572CFFD000
|
stack
|
page read and write
|
||
216A9540000
|
trusted library allocation
|
page read and write
|
||
216A9E83000
|
heap
|
page read and write
|
||
9C99BFF000
|
stack
|
page read and write
|
||
216A9D92000
|
heap
|
page read and write
|
||
216A5380000
|
trusted library allocation
|
page read and write
|
||
1D53C000000
|
heap
|
page read and write
|
||
13E11284000
|
heap
|
page read and write
|
||
2092FF70000
|
heap
|
page read and write
|
||
903397E000
|
stack
|
page read and write
|
||
216A49A8000
|
heap
|
page read and write
|
||
1D536600000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9ED1000
|
heap
|
page read and write
|
||
55CCFBE000
|
stack
|
page read and write
|
||
216A9D68000
|
heap
|
page read and write
|
||
572CC7F000
|
stack
|
page read and write
|
||
787C4FD000
|
stack
|
page read and write
|
||
216A968C000
|
trusted library allocation
|
page read and write
|
||
9C99EFF000
|
stack
|
page read and write
|
||
216A9C3C000
|
heap
|
page read and write
|
||
2092F63C000
|
heap
|
page read and write
|
||
216A4615000
|
heap
|
page read and write
|
||
216A3E79000
|
heap
|
page read and write
|
||
2092FCD0000
|
remote allocation
|
page read and write
|
||
216A49CA000
|
heap
|
page read and write
|
||
2092FFA6000
|
heap
|
page read and write
|
||
216A9FD6000
|
heap
|
page read and write
|
||
216A9860000
|
trusted library allocation
|
page read and write
|
||
216A49EE000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
2093041A000
|
heap
|
page read and write
|
||
1D53B5F0000
|
trusted library allocation
|
page read and write
|
||
390D1FE000
|
stack
|
page read and write
|
||
13E11279000
|
heap
|
page read and write
|
||
5BCCAFB000
|
stack
|
page read and write
|
||
2092F629000
|
heap
|
page read and write
|
||
216A9692000
|
trusted library allocation
|
page read and write
|
||
216A9780000
|
remote allocation
|
page read and write
|
||
1B029E41000
|
heap
|
page read and write
|
||
787C27C000
|
stack
|
page read and write
|
||
216A9E9D000
|
heap
|
page read and write
|
||
216A9692000
|
trusted library allocation
|
page read and write
|
||
1D53B227000
|
heap
|
page read and write
|
||
216A9F88000
|
heap
|
page read and write
|
||
1D536713000
|
heap
|
page read and write
|
||
13E1124D000
|
heap
|
page read and write
|
||
1D53B1B0000
|
trusted library allocation
|
page read and write
|
||
216A9FA1000
|
heap
|
page read and write
|
||
1D53B1E0000
|
trusted library allocation
|
page read and write
|
||
216A4754000
|
heap
|
page read and write
|
||
216A3C50000
|
heap
|
page read and write
|
||
216A9C43000
|
heap
|
page read and write
|
||
1FC9AC41000
|
heap
|
page read and write
|
||
216A9ED1000
|
heap
|
page read and write
|
||
1632AC21000
|
heap
|
page read and write
|
||
216A49CA000
|
heap
|
page read and write
|
||
1A755FF000
|
stack
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
2092FF78000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
22FCB270000
|
heap
|
page read and write
|
||
216A4858000
|
heap
|
page read and write
|
||
216A9F5B000
|
heap
|
page read and write
|
||
2092F6DA000
|
heap
|
page read and write
|
||
216A9DE6000
|
heap
|
page read and write
|
||
95CDBFB000
|
stack
|
page read and write
|
||
1AE36802000
|
heap
|
page read and write
|
||
2092FE02000
|
heap
|
page read and write
|
||
216A9D4E000
|
heap
|
page read and write
|
||
20930402000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
1D53B209000
|
heap
|
page read and write
|
||
2092FFA6000
|
heap
|
page read and write
|
||
216A9E76000
|
heap
|
page read and write
|
||
13E11241000
|
heap
|
page read and write
|
||
216A9D82000
|
heap
|
page read and write
|
||
18A7F502000
|
heap
|
page read and write
|
||
216A9E36000
|
heap
|
page read and write
|
||
216A9D10000
|
heap
|
page read and write
|
||
2733BD40000
|
trusted library allocation
|
page read and write
|
||
216A9D2B000
|
heap
|
page read and write
|
||
22FCB213000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
1632AA40000
|
heap
|
page read and write
|
||
1AE3682D000
|
heap
|
page read and write
|
||
1D536718000
|
heap
|
page read and write
|
||
216A9F30000
|
heap
|
page read and write
|
||
22FCB2C7000
|
heap
|
page read and write
|
||
238740C0000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A9D82000
|
heap
|
page read and write
|
||
13E11244000
|
heap
|
page read and write
|
||
2092FF72000
|
heap
|
page read and write
|
||
216A49EF000
|
heap
|
page read and write
|
||
216A3E70000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
216A9C61000
|
heap
|
page read and write
|
||
1632AC5E000
|
heap
|
page read and write
|
||
216A96A0000
|
trusted library allocation
|
page read and write
|
||
216A9E38000
|
heap
|
page read and write
|
||
2092FFB7000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A9F20000
|
heap
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
216A9EA4000
|
heap
|
page read and write
|
||
572CBFE000
|
stack
|
page read and write
|
||
216A9D02000
|
heap
|
page read and write
|
||
572CD7E000
|
stack
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
1B029E30000
|
heap
|
page read and write
|
||
13E11302000
|
heap
|
page read and write
|
||
1AE366B0000
|
heap
|
page read and write
|
||
216A96A2000
|
trusted library allocation
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
22FCB313000
|
heap
|
page read and write
|
||
216A49F3000
|
heap
|
page read and write
|
||
216A967C000
|
trusted library allocation
|
page read and write
|
||
216A9D17000
|
heap
|
page read and write
|
||
22FCB130000
|
heap
|
page read and write
|
||
216A968E000
|
trusted library allocation
|
page read and write
|
||
2092F6A4000
|
heap
|
page read and write
|
||
216A9EC9000
|
heap
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A9E4C000
|
heap
|
page read and write
|
||
1D535E13000
|
heap
|
page read and write
|
||
216A9EB9000
|
heap
|
page read and write
|
||
216A9D0E000
|
heap
|
page read and write
|
||
1B029E76000
|
heap
|
page read and write
|
||
588787B000
|
stack
|
page read and write
|
||
216A9ED5000
|
heap
|
page read and write
|
||
216A9FAD000
|
heap
|
page read and write
|
||
579F27B000
|
stack
|
page read and write
|
||
5887B7E000
|
stack
|
page read and write
|
||
1B2F3100000
|
heap
|
page read and write
|
||
216A9C26000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A97F0000
|
trusted library allocation
|
page read and write
|
||
216A5480000
|
trusted library section
|
page readonly
|
||
216A476F000
|
heap
|
page read and write
|
||
216A9FB3000
|
heap
|
page read and write
|
||
216A9D83000
|
heap
|
page read and write
|
||
216A96CA000
|
trusted library allocation
|
page read and write
|
||
55CD3FC000
|
stack
|
page read and write
|
||
216A9C2F000
|
heap
|
page read and write
|
||
216A5140000
|
trusted library allocation
|
page read and write
|
||
216A3E43000
|
heap
|
page read and write
|
||
216A471D000
|
heap
|
page read and write
|
||
216A9550000
|
trusted library allocation
|
page read and write
|
||
13E11239000
|
heap
|
page read and write
|
||
216A9D6F000
|
heap
|
page read and write
|
||
2092FF88000
|
heap
|
page read and write
|
||
216A9C48000
|
heap
|
page read and write
|
||
216A47CC000
|
heap
|
page read and write
|
||
216A9EDD000
|
heap
|
page read and write
|
||
216A9C69000
|
heap
|
page read and write
|
||
216A9F50000
|
heap
|
page read and write
|
||
216A9D7B000
|
heap
|
page read and write
|
||
216A9D09000
|
heap
|
page read and write
|
||
90338FB000
|
stack
|
page read and write
|
||
1B2F2DC0000
|
heap
|
page read and write
|
||
1632AC8A000
|
heap
|
page read and write
|
||
13E11230000
|
heap
|
page read and write
|
||
43D557B000
|
stack
|
page read and write
|
||
216A9DD1000
|
heap
|
page read and write
|
||
216A9C2D000
|
heap
|
page read and write
|
||
216A9830000
|
trusted library allocation
|
page read and write
|
||
216A9D2D000
|
heap
|
page read and write
|
||
18A7F429000
|
heap
|
page read and write
|
||
95CDD77000
|
stack
|
page read and write
|
||
13E11231000
|
heap
|
page read and write
|
||
216A9EA6000
|
heap
|
page read and write
|
||
216A3E3C000
|
heap
|
page read and write
|
||
2092FF6C000
|
heap
|
page read and write
|
||
216A9C34000
|
heap
|
page read and write
|
||
1D53B268000
|
heap
|
page read and write
|
||
787C0FF000
|
stack
|
page read and write
|
||
216A969E000
|
trusted library allocation
|
page read and write
|
||
216A49E5000
|
heap
|
page read and write
|
||
2F06CFB000
|
stack
|
page read and write
|
||
1D536700000
|
heap
|
page read and write
|
There are 1150 hidden memdumps, click here to show them.