Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
hFGZpat9Mf.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_319baef4101f2973dda1833cdb25524ddf68727_82810a17_11720b30\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER410A.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Jan 27 01:03:17 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5399.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6656.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 684
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://31.214.157.187/drew/n9Q8SXORQfxecr/MW5_2Fu9_2Bgocr6670ju/D1JJTVEHrWL1TxqL/xGoJ_2FQlD36_2B/GkPBzrjzE3l7JBLY9O/1EFPlHsMW/m5HxfuFe9CAmeE3Sv9mV/WruJ_2B6bq6RWMaARg5/48WJvcYD9cWVaImnFjKYnp/qqfI438hlaFuV/Cz10Llo3/y28DCtREPMb5OZnUZKj2hAx/fvbD6E0k2X/xMHWSCI5symguz2Bp/FnCO_2F0QOq8/vwhEVJIxW/5.jlk
|
31.214.157.187
|
||
http://habpfans.at/drew/AvYfyTR_2B2G3/_2F4h5ah/TJ34ZXtaMR1Oc3_2BPI0hI4/GdwumcM9XU/qAwknuMeebVU2QdSF/VN2ToaIYsZPU/kI1do_2B9jW/Q9gfyv85CoHPvT/SnqcLw3TTcQW61PNrLWiv/_2BkKhdRaMJkT9HD/82Fg3tERnOrn6Yg/fT2SNRr4ih8M1B9lEq/WIX8riitn/8yNrCBKJNgpm3khA4gSx/B8X3zDAJaQCYV1F4k99/jQHMcxYL/Il8wT6lWu/Ih.jlk
|
61.36.14.230
|
||
http://giporedtrip.at/drew/vDXEGqf4EaI6e/GBZCusNA/wGFZ17UZEew5_2F3lztpfux/SlqAMrP7W1/XBD36Fnf1Eq7wA6HD/bZQhlGWv2oMx/02wZPYg1S9_/2FsBPVVzIGiliu/ZgesoO3_2BU1Itp9mWBBQ/zS9Fa06G7Ifi1Qdi/yVB_2BRlu8Zp_2B/LJtKQv4YtcqH6IAzxR/L6Ho0ZvfB/evXUKtmzU_2B4Fe1cs5B/1wJA25jdSjnKCVAyqP7/xAdhGKLVvM/CvkvXIJYGs/9.jlk
|
181.129.180.251
|
||
http://194.76.226.200/drew/ozC7eSUmzahvYkYKrp/EnTXsLZQu/ZxwfzvyOea6Ms_2FcWiK/QVPuXmRecwMBmPtS2pP/K1YuqB0TTP3PJ7dc3csdFA/1Ac_2BGJ3ahfL/ClNkrX58/ZDofYbeDbIVvrUisO8PwbQv/pc3vAH6GWF/x_2B4_2BbH_2B0wxz/YCHkmZmDbaCX/aMf9JRtYupc/_2Ben2gyoQcqJb/gP1jDokjfsnRCuX4LwXIc/R6CnFb_2FUwS1dKT/G7Z9QUvFXshW5HS/y.jlk
|
194.76.226.200
|
||
http://194.76.226.200/drew/t4UXVVFvbg_2F3LXo8gXBT/1icGJdsG14mTA/YOVrBwZF/xARqsNBXczJePkKt2X6ww_2/BWmoPwSUrF/dMkwNYvCaezjn8JBl/H0ytvGxBbW3l/zR2N_2BHrz_/2FvsAN_2FRzTTC/lSSKBusA2w75D7HkZKGJs/DACOMqt0XK0wSfc5/bo0iFsZeiFg2i2l/JDzyY2V7hheHpK0ocJ/ZgcshLwb0/jlOmaQmjqFbHJJo3m7Pt/o4K7mLse1jm/1K47Z.jlk
|
194.76.226.200
|
||
http://habpfans.at/
|
unknown
|
||
http://habpfans.at/drew/5tHE_2Fl/pXBoYLIb7sXj6_2FbgEdP7S/1g8RiyhGmo/7FzHWL9Gm5Pao_2Bw/5oh73gE4juwn/w
|
unknown
|
||
http://31.214.157.187/drew/XdSo6qg_2FEgYysST/WOvXNJFccrJx/zVwG0bEZwA1/FgOrwJqVq8qQMt/gJKBdkHK_2BRbM8cGXljg/dR5mjLhLFYJj3437/sCPrzkqYN8vu4UK/Lv8bHqBMBEjz1n4JUX/xuOm6McxD/U7cQGMW7Bxk_2BVYpR1Y/2dwD1RGZgWHtptGZcjA/6KkSFpd8oqg4xHg9j8CKKi/XQJvRiHHSuj0_/2BwWvoV7/60l_2BahFJ3qIHK1CvN87c7/jOCSFwu.jlk
|
31.214.157.187
|
||
http://giporedtrip.at/drew/CNAO_2FMqt2bQnnFTS9A/gZCx4lwGHYQjpKz_2Bo/eC3Q_2B6RQnBEorg_2FJk6/uEN67LHG_2FS5/_2BBd1X9/aVPauq0optO45rzbpdCQm0T/aYIRRNsEBo/KjgLaOYvR_2BgwzfQ/25S5OlQYXnss/XWKrlvnyLdL/zvJbW2nKGtMp_2/BhAqVJaOXmJzkoWYA4_2B/1sUQfL4pghiYPQ_2/Bk4zNXCpOm9uy6W/_2FwvvWoJCQywtXfuj/zSz8jbk7z4_2FaKsy/ujc.jlk
|
211.119.84.112
|
||
http://habpfans.at/drew/5tHE_2Fl/pXBoYLIb7sXj6_2FbgEdP7S/1g8RiyhGmo/7FzHWL9Gm5Pao_2Bw/5oh73gE4juwn/wLkUkA7sRnm/cso3yuTSujNtgI/CMmvYVa7e4KaoltzEmBTc/sgUl10rzE9jSORq1/rqqMvEmtzS52b3S/MwqSqUIn0qJ41lN07l/ltNVceIDT/qjCtCMmp_2FbkkqAoDDI/2nZPBTOmmpjaMrj1ust/QMCPjE0wKPGXBQrFS0WE_2/B3SVbiens/K.jlk
|
41.41.255.235
|
||
http://habpfans.at/drew/AvYfyTR_2B2G3/_2F4h5ah/TJ34ZXtaMR1Oc3_2BPI0hI4/GdwumcM9XU/qAwknuMeebVU2QdSF/
|
unknown
|
||
http://habpfans.at/g
|
unknown
|
||
http://www.dhtmlcentral.com/forums/forum.asp?FORUM_ID=2&CAT_ID=1&Forum_Title=CoolMenus
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://31.214.157.187/drew/XdSo6qg_2FEgYysST/WOvXNJFccrJx/zVwG0bEZwA1/FgOrwJqVq8qQMt/gJKBdkHK_2BRbM8
|
unknown
|
||
http://31.214.157.187/
|
unknown
|
||
http://194214.157.187/
|
unknown
|
||
http://www.dhtmlcentral.com/tutorial.asp
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
giporedtrip.at
|
211.119.84.112
|
||
habpfans.at
|
41.41.255.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
181.129.180.251
|
unknown
|
Colombia
|
||
41.41.255.235
|
habpfans.at
|
Egypt
|
||
211.119.84.112
|
giporedtrip.at
|
Korea Republic of
|
||
31.214.157.187
|
unknown
|
Germany
|
||
61.36.14.230
|
unknown
|
Korea Republic of
|
||
194.76.226.200
|
unknown
|
Germany
|
||
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
001880053FEEE7CA
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A09000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page execute and read and write
|
||
8A0000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1DE2021F000
|
unkown
|
page read and write
|
||
1E2BBB6D000
|
unkown
|
page read and write
|
||
2BF9000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA15B0000
|
heap
|
page read and write
|
||
21EDC702000
|
unkown
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2EDA000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
28D29410000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BBC12000
|
unkown
|
page read and write
|
||
28F0A660000
|
trusted library allocation
|
page read and write
|
||
1FAA1F9F000
|
unkown
|
page read and write
|
||
18CFB822000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F05DA0000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2501000
|
unclassified section
|
page execute read
|
||
907EF6F000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
700000
|
unkown
|
page readonly
|
||
CAFBEBB000
|
stack
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B88000
|
heap
|
page read and write
|
||
17E59113000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F04EFF000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
E0B03F9000
|
stack
|
page read and write
|
||
252BCF4C000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
18CFB913000
|
unkown
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
252BD130000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
1DE20060000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
2B9AAD40000
|
heap
|
page read and write
|
||
3AA817C000
|
stack
|
page read and write
|
||
1E2BB254000
|
unkown
|
page read and write
|
||
1DE20513000
|
unkown
|
page read and write
|
||
18CFB84B000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1850000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BB1C0000
|
trusted library allocation
|
page read and write
|
||
1D4D7249000
|
unkown
|
page read and write
|
||
2C55000
|
heap
|
page read and write
|
||
2C03000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
1FAA1F86000
|
unkown
|
page read and write
|
||
1AC71BD0000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
14DCCC40000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04E29000
|
unkown
|
page read and write
|
||
18CFB908000
|
unkown
|
page read and write
|
||
252BCF4F000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
28F0A680000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A390000
|
trusted library allocation
|
page read and write
|
||
250C000
|
unclassified section
|
page readonly
|
||
21EDC600000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C63000
|
unkown
|
page read and write
|
||
1FAA1F87000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
28F0A350000
|
trusted library allocation
|
page read and write
|
||
1FAA1F73000
|
unkown
|
page read and write
|
||
14DCCC13000
|
unkown
|
page read and write
|
||
1FAA184F000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
1E2BB3C4000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
1FAA1FAC000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A620000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B9AB920000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BBC02000
|
unkown
|
page read and write
|
||
49EC000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFB853000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4820000
|
trusted library allocation
|
page read and write
|
||
265C000
|
stack
|
page read and write
|
||
14DCCD02000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFB83C000
|
unkown
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
5D2000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
2B9ABBF0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BB38E000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
47FB477000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2B47000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
570C2F9000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F77000
|
unkown
|
page read and write
|
||
1E2BBC0A000
|
unkown
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
2C0C000
|
heap
|
page read and write
|
||
2C0F000
|
heap
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page execute and read and write
|
||
252BCF20000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
18CFB881000
|
unkown
|
page read and write
|
||
1FAA1800000
|
unkown
|
page read and write
|
||
3840000
|
remote allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
28F04CF0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
14DCD1D0000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1902000
|
unkown
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
17E5908A000
|
unkown
|
page read and write
|
||
1E2BB3FE000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49C55FE000
|
stack
|
page read and write
|
||
242427E000
|
stack
|
page read and write
|
||
14DCC9E0000
|
heap
|
page read and write
|
||
E0B037B000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1DE20502000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2B9AAD8D000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A422000
|
unkown
|
page read and write
|
||
907F2F7000
|
stack
|
page read and write
|
||
1ED74FC000
|
stack
|
page read and write
|
||
1ED77FE000
|
stack
|
page read and write
|
||
907F7FB000
|
stack
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1813000
|
unkown
|
page read and write
|
||
4A69000
|
trusted library allocation
|
page read and write
|
||
701000
|
unkown
|
page execute read
|
||
1FAA2402000
|
unkown
|
page read and write
|
||
28F0A374000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
2423F2C000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E0B027F000
|
stack
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1BC8EA5B000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2B9AB910000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1FAA1F8A000
|
unkown
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
28F05700000
|
unkown
|
page read and write
|
||
1AC71C5C000
|
unkown
|
page read and write
|
||
3A4D000
|
stack
|
page read and write
|
||
14DCCC29000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F82000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1AC71C5A000
|
unkown
|
page read and write
|
||
1150000
|
remote allocation
|
page read and write
|
||
1DE200D0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F8C000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D71A0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
1D4D7130000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F77000
|
unkown
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
96742FE000
|
stack
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2B9AAF40000
|
heap
|
page read and write
|
||
1E2BB23C000
|
unkown
|
page read and write
|
||
2C4E000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4EC000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
17E59013000
|
unkown
|
page read and write
|
||
1FAA1FB1000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F04E73000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F5E000
|
unkown
|
page read and write
|
||
1AC71C85000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F6C000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71B30000
|
heap
|
page read and write
|
||
47FB0FE000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
18CFC002000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
931EFFB000
|
stack
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
28F04F07000
|
unkown
|
page read and write
|
||
1AC71B40000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
2AE5000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
17E59900000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49A7000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28D29602000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4E0000
|
unkown
|
page read and write
|
||
1DE20500000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
2B80000
|
heap
|
page read and write
|
||
3F0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
28F0A690000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AE1000
|
heap
|
page read and write
|
||
E0B077F000
|
stack
|
page read and write
|
||
2B9ABC00000
|
trusted library allocation
|
page read and write
|
||
1BC8E9E0000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F7A000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
252BCF5E000
|
heap
|
page read and write
|
||
1FAA1FCD000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BBB08000
|
unkown
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
28F04EFF000
|
unkown
|
page read and write
|
||
59C000
|
stack
|
page read and write
|
||
28F0A440000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F74000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
17E59044000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
14DCD1D0000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
907FC7C000
|
stack
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
8D4FF6E000
|
stack
|
page read and write
|
||
28F04E90000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1853000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1AC71C62000
|
unkown
|
page read and write
|
||
252BCF48000
|
heap
|
page read and write
|
||
1AC71C31000
|
unkown
|
page read and write
|
||
252BCF5D000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
1FAA1F00000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
9673EFD000
|
stack
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
28D29713000
|
unkown
|
page read and write
|
||
1DE20202000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FAF000
|
unkown
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
1D4D7302000
|
unkown
|
page read and write
|
||
17E59102000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1FAA1F7C000
|
unkown
|
page read and write
|
||
49C52FE000
|
stack
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A06000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
8D4FFEE000
|
stack
|
page read and write
|
||
CAFC279000
|
stack
|
page read and write
|
||
1FAA1FDB000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1E02000
|
unkown
|
page read and write
|
||
570BB7D000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B9F000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
52CD000
|
stack
|
page read and write
|
||
252BCF4F000
|
heap
|
page read and write
|
||
28F04EA2000
|
unkown
|
page read and write
|
||
1FAA1F86000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D7247000
|
unkown
|
page read and write
|
||
1FAA1F4B000
|
unkown
|
page read and write
|
||
28F05615000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
931EB2E000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
1FAA1856000
|
unkown
|
page read and write
|
||
1BC8EA7D000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04E8C000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28D29637000
|
unkown
|
page read and write
|
||
28D29570000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D7300000
|
unkown
|
page read and write
|
||
2C5B000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page readonly
|
||
2C42000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1BC8E870000
|
heap
|
page read and write
|
||
2B9AACF0000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A0E000
|
trusted library allocation
|
page read and write
|
||
1E2BB28A000
|
unkown
|
page read and write
|
||
1FAA1F73000
|
unkown
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
1FAA15C0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
65438FE000
|
stack
|
page read and write
|
||
1FAA1F8F000
|
unkown
|
page read and write
|
||
1FAA18DE000
|
unkown
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1AC71C13000
|
unkown
|
page read and write
|
||
18CFB6C0000
|
heap
|
page read and write
|
||
1AC71C5F000
|
unkown
|
page read and write
|
||
2C5B000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71BA0000
|
heap
|
page read and write
|
||
252BCF2B000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F04E78000
|
unkown
|
page read and write
|
||
1E2BB243000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
2AEE000
|
heap
|
page read and write
|
||
1DE20402000
|
unkown
|
page read and write
|
||
1E2BBB54000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C7F000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
518B000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
252BCF32000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
1E2BBB43000
|
unkown
|
page read and write
|
||
28D29626000
|
unkown
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04EAB000
|
unkown
|
page read and write
|
||
3AA827E000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
250A000
|
unclassified section
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
17E59000000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FA1000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D7200000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28D29470000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A44D000
|
unkown
|
page read and write
|
||
1AC71C6A000
|
unkown
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
1FAA1F90000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C0C000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
28F0A506000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E7C000
|
unkown
|
page read and write
|
||
96746FF000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49C53FE000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B9AAD51000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2C4E000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1AC71C6E000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C0F000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A240000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BBA02000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A42E000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA2402000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F8A000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F8E000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
4A69000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
E83000
|
unkown
|
page readonly
|
||
1FAA1916000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB313000
|
unkown
|
page read and write
|
||
17E59802000
|
unkown
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
931F37F000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04DF0000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
3AC000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
8D503FF000
|
stack
|
page read and write
|
||
3AA837D000
|
stack
|
page read and write
|
||
2C5B000
|
heap
|
page read and write
|
||
17E59100000
|
unkown
|
page read and write
|
||
1FAA1F88000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D71D0000
|
unkown
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49EC000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D7251000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F87000
|
unkown
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
1AC71C7C000
|
unkown
|
page read and write
|
||
1E2BB293000
|
unkown
|
page read and write
|
||
76C000
|
unkown
|
page read and write
|
||
1E2BBB19000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F70000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
3AA770B000
|
stack
|
page read and write
|
||
9673D7B000
|
stack
|
page read and write
|
||
6542ECC000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFB824000
|
unkown
|
page read and write
|
||
1FAA1FCD000
|
unkown
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
6542F4E000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
21EDC613000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A6B0000
|
remote allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA18EB000
|
unkown
|
page read and write
|
||
69FA0AB000
|
stack
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D7308000
|
unkown
|
page read and write
|
||
28F0A4A3000
|
unkown
|
page read and write
|
||
3AA7D7F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
931F177000
|
stack
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
CAFC47F000
|
stack
|
page read and write
|
||
14DCD1D0000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
14DCCC58000
|
unkown
|
page read and write
|
||
17E58F20000
|
heap
|
page read and write
|
||
28F04E58000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1AC71C6C000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FB2000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F70000
|
unkown
|
page read and write
|
||
1FAA1DF0000
|
remote allocation
|
page read and write
|
||
2B9AAD49000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
E0AFD3B000
|
stack
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
1FAA1FCE000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
47FB67F000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
242447B000
|
stack
|
page read and write
|
||
18CFB84D000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
24246FF000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
28F04E3F000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
18CFB865000
|
unkown
|
page read and write
|
||
1D4D7140000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA18C3000
|
unkown
|
page read and write
|
||
28F05600000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
907F3FA000
|
stack
|
page read and write
|
||
18CFB6B0000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28D29E02000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BBC00000
|
unkown
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1FAD000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
931F07F000
|
stack
|
page read and write
|
||
1FAA1F88000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
96741FD000
|
stack
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page execute and read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1AC71C29000
|
unkown
|
page read and write
|
||
1FAA2400000
|
unkown
|
page read and write
|
||
1D4D7248000
|
unkown
|
page read and write
|
||
28F055E3000
|
trusted library allocation
|
page read and write
|
||
28F0A370000
|
trusted library allocation
|
page read and write
|
||
21EDC460000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page execute and read and write
|
||
28F0A358000
|
trusted library allocation
|
page read and write
|
||
1E2BB269000
|
unkown
|
page read and write
|
||
1AC71C47000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F73000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1BC8EA00000
|
unkown
|
page read and write
|
||
96745FF000
|
stack
|
page read and write
|
||
1FAA18EB000
|
unkown
|
page read and write
|
||
49B2000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A412000
|
unkown
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
1AC71C57000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB1A0000
|
unkown
|
page read and write
|
||
907F5FF000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C03000
|
heap
|
page read and write
|
||
2690000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BB25B000
|
unkown
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
17E590BC000
|
unkown
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
21EDC713000
|
unkown
|
page read and write
|
||
4EC000
|
stack
|
page read and write
|
||
1DE20213000
|
unkown
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FCF000
|
unkown
|
page read and write
|
||
E83000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
CAFC2F9000
|
stack
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
252BCED0000
|
heap
|
page read and write
|
||
1FAA1F9B000
|
unkown
|
page read and write
|
||
49A3000
|
trusted library allocation
|
page read and write
|
||
1D4D727D000
|
unkown
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
252BCF4C000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A1C0000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1BC8EB02000
|
unkown
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
9E5000
|
trusted library allocation
|
page execute and read and write
|
||
1FAA1FAA000
|
unkown
|
page read and write
|
||
1AC71C4E000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1ED727C000
|
stack
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
252BCF37000
|
heap
|
page read and write
|
||
1FAA186F000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
2B9AAD8D000
|
heap
|
page read and write
|
||
3B4D000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
69FA87F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DA0000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F86000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
28F04F02000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
3AA847F000
|
stack
|
page read and write
|
||
1FAA1884000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
14DCCC00000
|
unkown
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
907F4FA000
|
stack
|
page read and write
|
||
6543479000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1ED757E000
|
stack
|
page read and write
|
||
1FAA1F9A000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F89000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D7288000
|
unkown
|
page read and write
|
||
1E2BB292000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA18F3000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
28F055F0000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
1BC8EB08000
|
unkown
|
page read and write
|
||
1AC71C67000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D7313000
|
unkown
|
page read and write
|
||
21EDC450000
|
heap
|
page read and write
|
||
14DCCA40000
|
heap
|
page read and write
|
||
49C517E000
|
stack
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1DE20315000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1BC8EA13000
|
unkown
|
page read and write
|
||
1BC8EA61000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A670000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04C80000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
372D000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1FB7000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
69FA5FB000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
931F27F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F84000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F061C0000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
1FAA1FCF000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
14DCC9D0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
907EEEB000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04E92000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2CDE000
|
heap
|
page read and write
|
||
21EDC4C0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
14DCD202000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
1E2BBB19000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A620000
|
trusted library allocation
|
page read and write
|
||
1AC71C7B000
|
unkown
|
page read and write
|
||
2B9AB990000
|
trusted library allocation
|
page read and write
|
||
397D000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
2B9C000
|
heap
|
page read and write
|
||
17E590CD000
|
unkown
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
18CFB847000
|
unkown
|
page read and write
|
||
1DE20228000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49C9000
|
trusted library allocation
|
page read and write
|
||
4A64000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C3A000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page execute and read and write
|
||
1FAA1F84000
|
unkown
|
page read and write
|
||
1FAA1DF0000
|
remote allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
49B1000
|
trusted library allocation
|
page read and write
|
||
69FA67E000
|
stack
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
17E590C4000
|
unkown
|
page read and write
|
||
2C6D000
|
heap
|
page read and write
|
||
E0B017A000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FDC000
|
unkown
|
page read and write
|
||
E7C000
|
unkown
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
252BCEB0000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
252BCF37000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
931EBAE000
|
stack
|
page read and write
|
||
28F0A45E000
|
unkown
|
page read and write
|
||
E0B05FE000
|
stack
|
page read and write
|
||
28F04E00000
|
unkown
|
page read and write
|
||
28F05702000
|
unkown
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
28D29629000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDC68A000
|
unkown
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F6C000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
28F0A502000
|
unkown
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
CAFC37F000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1FA1000
|
unkown
|
page read and write
|
||
52B000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A394000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4F9000
|
unkown
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page execute and read and write
|
||
96743FF000
|
stack
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
14DCCC02000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB265000
|
unkown
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
1D4D7229000
|
unkown
|
page read and write
|
||
3840000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFBE80000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
47FB37B000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1085000
|
trusted library allocation
|
page execute and read and write
|
||
252BCD80000
|
heap
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1FAA183C000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49C50FE000
|
stack
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
1DE20200000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A400000
|
unkown
|
page read and write
|
||
21EDC68E000
|
unkown
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
E0B087E000
|
stack
|
page read and write
|
||
2B9ABBE0000
|
heap
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
2B9AAC80000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
880000
|
trusted library allocation
|
page execute and read and write
|
||
2C78000
|
heap
|
page read and write
|
||
28F0A461000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
2C07000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1BC8EA02000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
6543777000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
511D000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F8A000
|
unkown
|
page read and write
|
||
21EDC680000
|
unkown
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BBB16000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2B9B000
|
stack
|
page read and write
|
||
1BC8EB00000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
3AA7FFD000
|
stack
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
1ED7A7E000
|
stack
|
page read and write
|
||
1E2BB040000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page execute and read and write
|
||
4CA1000
|
trusted library allocation
|
page read and write
|
||
1FAA1F90000
|
unkown
|
page read and write
|
||
2C55000
|
heap
|
page read and write
|
||
1E2BBB8E000
|
unkown
|
page read and write
|
||
2B9AAD8D000
|
heap
|
page read and write
|
||
387D000
|
stack
|
page read and write
|
||
1FAA1F7D000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A35E000
|
trusted library allocation
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
1FAA18AF000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F90000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1BC8EA89000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1DE20230000
|
unkown
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
28F04E97000
|
unkown
|
page read and write
|
||
28F0A630000
|
trusted library allocation
|
page read and write
|
||
1DE20323000
|
heap
|
page read and write
|
||
1FAA1F89000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
21EDC5C0000
|
unkown
|
page read and write
|
||
28F05713000
|
unkown
|
page read and write
|
||
28F05704000
|
unkown
|
page read and write
|
||
96744FF000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1E2BB0A0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFB870000
|
unkown
|
page read and write
|
||
28D29664000
|
unkown
|
page read and write
|
||
1D4D7213000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4A0000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
52B000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2B9F000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
28F04C90000
|
heap
|
page read and write
|
||
28F0A620000
|
trusted library allocation
|
page read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
1FAA1F90000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1150000
|
remote allocation
|
page read and write
|
||
18CFB720000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
24244FF000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F99000
|
unkown
|
page read and write
|
||
1DE2022E000
|
unkown
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
1FAA18E8000
|
unkown
|
page read and write
|
||
49C8000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
69FA4FB000
|
stack
|
page read and write
|
||
1BC8E8E0000
|
heap
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDC653000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB229000
|
unkown
|
page read and write
|
||
1FAA1F87000
|
unkown
|
page read and write
|
||
18CFB900000
|
unkown
|
page read and write
|
||
47FB17E000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1620000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
E7C000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F04E13000
|
unkown
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28D29613000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F70000
|
unkown
|
page read and write
|
||
1AC71C46000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F6F000
|
unkown
|
page read and write
|
||
1FAA1F10000
|
unkown
|
page read and write
|
||
1FAA2402000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA18A7000
|
unkown
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
1E2BB27A000
|
unkown
|
page read and write
|
||
28F04F14000
|
unkown
|
page read and write
|
||
1FAA1F7B000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
49C54FE000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
654337E000
|
stack
|
page read and write
|
||
28D2966B000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page read and write
|
||
1E2BBB02000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4AA000
|
unkown
|
page read and write
|
||
252BCF4C000
|
heap
|
page read and write
|
||
21EDC64B000
|
unkown
|
page read and write
|
||
2509000
|
unclassified section
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
52B000
|
stack
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1085000
|
trusted library allocation
|
page execute and read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB3F4000
|
unkown
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
28D29702000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2423FAE000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1FAA1F7D000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4A8000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
1FAA1F97000
|
unkown
|
page read and write
|
||
18CFB902000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
1FAA1F8E000
|
unkown
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
931EEFB000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D7270000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
654387C000
|
stack
|
page read and write
|
||
21EDC708000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A7A0000
|
trusted library allocation
|
page read and write
|
||
931EAAB000
|
stack
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
49B4000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
17E58EC0000
|
heap
|
page read and write
|
||
3AA7EFC000
|
stack
|
page read and write
|
||
69FA1AE000
|
stack
|
page read and write
|
||
2B9AAC90000
|
trusted library allocation
|
page read and write
|
||
18CFB865000
|
unkown
|
page read and write
|
||
1BC8EA56000
|
unkown
|
page read and write
|
||
1DE20413000
|
unkown
|
page read and write
|
||
1FAA1F95000
|
unkown
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D723C000
|
unkown
|
page read and write
|
||
2BFC000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C49000
|
heap
|
page read and write
|
||
1BC8EB13000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BBB00000
|
unkown
|
page read and write
|
||
1D4D724C000
|
unkown
|
page read and write
|
||
1150000
|
remote allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A350000
|
trusted library allocation
|
page read and write
|
||
1BC8EA27000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C5B000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
2B9AAF49000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
17E58EB0000
|
heap
|
page read and write
|
||
1DE20070000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1D4D7A02000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28D29600000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F04E8E000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49C5000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C65000
|
unkown
|
page read and write
|
||
2B9ABC50000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
1FAA18A5000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C78000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
18CFB849000
|
unkown
|
page read and write
|
||
1BC8E880000
|
heap
|
page read and write
|
||
1FAA1F9A000
|
unkown
|
page read and write
|
||
570BF7F000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
6542FCE000
|
stack
|
page read and write
|
||
1FAA1F78000
|
unkown
|
page read and write
|
||
1FAA1F88000
|
unkown
|
page read and write
|
||
252BCF4F000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1DE20300000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDC63C000
|
unkown
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1ED78FD000
|
stack
|
page read and write
|
||
2DDC000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28D2963D000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49A7000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
17E59680000
|
unkown
|
page read and write
|
||
1ED777D000
|
stack
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A380000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
8D5027E000
|
stack
|
page read and write
|
||
28F0A6B0000
|
remote allocation
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
2D3B000
|
heap
|
page read and write
|
||
28F0A230000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
382D000
|
stack
|
page read and write
|
||
2B9ABBD0000
|
trusted library allocation
|
page read and write
|
||
28F05759000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
3840000
|
remote allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A6A000
|
trusted library allocation
|
page read and write
|
||
28D29675000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1085000
|
trusted library allocation
|
page execute and read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
28F0A6B0000
|
remote allocation
|
page read and write
|
||
1E2BB213000
|
unkown
|
page read and write
|
||
907F6FB000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4A0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C32000
|
unkown
|
page read and write
|
||
1FAA1849000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1D4D727C000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
24245F7000
|
stack
|
page read and write
|
||
28F04EA8000
|
unkown
|
page read and write
|
||
21EDC700000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDC629000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A380000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
1FAA1F70000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
1AC72402000
|
unkown
|
page read and write
|
||
28F055E0000
|
trusted library allocation
|
page read and write
|
||
252BCF46000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F05602000
|
unkown
|
page read and write
|
||
1FAA2463000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA184C000
|
unkown
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49A7000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
49C507B000
|
stack
|
page read and write
|
||
1FAA1F91000
|
unkown
|
page read and write
|
||
28D29400000
|
heap
|
page read and write
|
||
2C0D000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04EBD000
|
unkown
|
page read and write
|
||
2B9AAF50000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F99000
|
unkown
|
page read and write
|
||
1FAA1908000
|
unkown
|
page read and write
|
||
17E59029000
|
unkown
|
page read and write
|
||
1FAA1FB7000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
3AA7B7C000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
6543577000
|
stack
|
page read and write
|
||
14DCD1A0000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1BC8EA3C000
|
unkown
|
page read and write
|
||
1AC71C42000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C78000
|
unkown
|
page read and write
|
||
1090000
|
trusted library allocation
|
page execute and read and write
|
||
1FAA1F79000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1FB1000
|
unkown
|
page read and write
|
||
24247FE000
|
stack
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
1FAA1FAD000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1DE20302000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
49FA000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F8E000
|
unkown
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F04F02000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
1FAA1F89000
|
unkown
|
page read and write
|
||
49A5000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
8D4FEEA000
|
stack
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDC602000
|
unkown
|
page read and write
|
||
8D502F9000
|
stack
|
page read and write
|
||
1DE2023D000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1FAA1F8E000
|
unkown
|
page read and write
|
||
1E2BBB02000
|
unkown
|
page read and write
|
||
1FAA1829000
|
unkown
|
page read and write
|
||
252BD135000
|
heap
|
page read and write
|
||
1FAA1913000
|
unkown
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
1BC8EA5E000
|
unkown
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1AC71C00000
|
unkown
|
page read and write
|
||
2B9AAD86000
|
heap
|
page read and write
|
||
2B9AB980000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
967392B000
|
stack
|
page read and write
|
||
28F0A7E0000
|
trusted library allocation
|
page read and write
|
||
1D4D724B000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AB2000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
47FB57E000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1BC8EA29000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE8000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
18CFB813000
|
unkown
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
2B9AAF45000
|
heap
|
page read and write
|
||
28F05758000
|
unkown
|
page read and write
|
||
21EDC66E000
|
unkown
|
page read and write
|
||
1AC71C45000
|
unkown
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
1FAA1F89000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1E2BB287000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
21EDCE02000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA1F8B000
|
unkown
|
page read and write
|
||
E0B04FA000
|
stack
|
page read and write
|
||
69FA97F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
49A2000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DA0000
|
remote allocation
|
page read and write
|
||
1E2BB277000
|
unkown
|
page read and write
|
||
48A1000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C01000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
2C4E000
|
heap
|
page read and write
|
||
18CFB800000
|
unkown
|
page read and write
|
||
17E5906E000
|
unkown
|
page read and write
|
||
47FB07B000
|
stack
|
page read and write
|
||
28F0A4F1000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
69FA777000
|
stack
|
page read and write
|
||
4CB2000
|
trusted library allocation
|
page read and write
|
||
21EDC648000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
18CFB850000
|
unkown
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
28D2964E000
|
unkown
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
2C3D000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
1AC71C40000
|
unkown
|
page read and write
|
||
1AC71C58000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
3AA807B000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
47FB27B000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
1E2BBB19000
|
unkown
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2C0F000
|
heap
|
page read and write
|
||
69FA12E000
|
stack
|
page read and write
|
||
1AC71C3D000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
1D4D7256000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1AC71C3B000
|
unkown
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2B9AAD10000
|
heap
|
page read and write
|
||
1AC71D02000
|
unkown
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DD7000
|
heap
|
page read and write
|
||
CAFC3F9000
|
stack
|
page read and write
|
||
773000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
860000
|
trusted library allocation
|
page execute and read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
1BC8F202000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2CDE000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F0A4DB000
|
unkown
|
page read and write
|
||
3AA7E7E000
|
stack
|
page read and write
|
||
907FE7E000
|
stack
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
1FAA18BC000
|
unkown
|
page read and write
|
||
1E2BB030000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2500000
|
unclassified section
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
4DA0000
|
remote allocation
|
page read and write
|
||
49EC000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F05718000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
654367E000
|
stack
|
page read and write
|
||
1FAA2402000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
4A68000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
4A6A000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
21EDC64E000
|
unkown
|
page read and write
|
||
2BFE000
|
heap
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
2AE7000
|
heap
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
1FAA18D6000
|
unkown
|
page read and write
|
||
1AC71C60000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
2C42000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
heap
|
page read and write
|
||
9673FFD000
|
stack
|
page read and write
|
||
28F04EAD000
|
unkown
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F0A500000
|
unkown
|
page read and write
|
||
1E2BB200000
|
unkown
|
page read and write
|
||
1FAA1F8C000
|
unkown
|
page read and write
|
||
1FAA1DF0000
|
remote allocation
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
1FAA17F0000
|
unkown
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page execute and read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
28F055C1000
|
trusted library allocation
|
page read and write
|
||
1FAA1F13000
|
unkown
|
page read and write
|
||
28F0A371000
|
trusted library allocation
|
page read and write
|
||
4EC000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
28F05718000
|
unkown
|
page read and write
|
||
28F0A4B0000
|
trusted library allocation
|
page read and write
|
||
28F04E7C000
|
unkown
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
8D5037F000
|
stack
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1FAA1F70000
|
unkown
|
page read and write
|
||
1FAA1F8E000
|
unkown
|
page read and write
|
||
2AEE000
|
heap
|
page read and write
|
There are 1862 hidden memdumps, click here to show them.