Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
olPUTAxpzu.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19ca88f8\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19bd84ad\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7448.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Apr 20 13:17:08 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E6A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8030.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D9B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Apr 20 22:09:27 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7732.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\olPUTAxpzu.exe
|
"C:\Users\user\Desktop\olPUTAxpzu.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.brutalhax.net/
|
unknown
|
||
https://api.brutal-hax.net/notification.txt
|
unknown
|
||
https://api.brutal-hax.net/Online/get_online_users.php?username=
|
unknown
|
||
https://api.brutal-hax.net/loader_authentification_new.php?username=
|
unknown
|
||
https://api.brutal-hax.net/loader_statut_new.php
|
unknown
|
||
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/
|
unknown
|
||
http://pki-ocsp.symauth.com0
|
unknown
|
||
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys
|
unknown
|
||
https://discord.gg/brutal-hax
|
unknown
|
||
http://foo/bhicon.png
|
unknown
|
||
http://defaultcontainer/Login.xaml
|
unknown
|
||
https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
|
unknown
|
||
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
|
unknown
|
||
https://api.brutal-hax.net/loader_get_cheats.php?username=
|
unknown
|
||
https://brutal-hax.net/
|
unknown
|
||
http://defaultcontainer/bhicon.png
|
unknown
|
||
http://foo/bar/bhicon.png
|
unknown
|
||
https://api.brutal-hax.net/loader_version.php
|
unknown
|
||
http://foo/bar/login.baml
|
unknown
|
||
https://api.brutal-hax.net/Online/set_online_status.php?username=
|
unknown
|
||
https://api.brutal-hax.net/info/cheat_status.php?hack_id=
|
unknown
|
||
http://foo/Login.xaml
|
unknown
|
||
http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07
|
unknown
|
There are 13 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
ProgramId
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
FileId
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
LowerCaseLongPath
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
LongPathHash
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
Name
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
Publisher
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
Version
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
BinFileVersion
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
BinaryType
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
ProductName
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
ProductVersion
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
LinkDate
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
BinProductVersion
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
Size
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
Language
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
IsPeFile
|
||
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProgramId
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
FileId
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LowerCaseLongPath
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LongPathHash
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Name
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Publisher
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Version
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinFileVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinaryType
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProductName
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
ProductVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
LinkDate
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
BinProductVersion
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Size
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
Language
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
IsPeFile
|
||
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00180008F3870B0F
|
There are 32 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27559B6A000
|
heap
|
page read and write
|
||
282262AB000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
ED2000
|
trusted library allocation
|
page read and write
|
||
27559BA6000
|
heap
|
page read and write
|
||
27559A89000
|
heap
|
page read and write
|
||
27559B43000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A36E000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1DBFE040000
|
heap
|
page read and write
|
||
481607C000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1DBFDE70000
|
heap
|
page read and write
|
||
27559ADC000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
27559ACB000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201B7E57000
|
heap
|
page read and write
|
||
2755A330000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BD9000
|
heap
|
page read and write
|
||
282262D1000
|
heap
|
page read and write
|
||
201BD480000
|
trusted library allocation
|
page read and write
|
||
27559ADA000
|
heap
|
page read and write
|
||
2755A36B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559B3D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C02BD18000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B93000
|
heap
|
page read and write
|
||
27559B77000
|
heap
|
page read and write
|
||
33C8FE000
|
stack
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
27559BDA000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2755A705000
|
heap
|
page read and write
|
||
27559B8D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B63000
|
heap
|
page read and write
|
||
27559B9B000
|
heap
|
page read and write
|
||
1CD6EC4A000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
8D803FF000
|
stack
|
page read and write
|
||
A61252E000
|
stack
|
page read and write
|
||
1C02D6C0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A77000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B45C67F000
|
stack
|
page read and write
|
||
706437E000
|
stack
|
page read and write
|
||
18A1000
|
unkown
|
page execute and read and write
|
||
27559A72000
|
heap
|
page read and write
|
||
48156BB000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
27559B51000
|
heap
|
page read and write
|
||
2755A3FA000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page execute and read and write
|
||
28226090000
|
heap
|
page read and write
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
1CD6EC69000
|
heap
|
page read and write
|
||
1DBFE06D000
|
heap
|
page read and write
|
||
1B0F8E36000
|
heap
|
page read and write
|
||
201B7BA0000
|
heap
|
page read and write
|
||
B45BD7B000
|
stack
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
296C5C6F000
|
heap
|
page read and write
|
||
1CD6EBC0000
|
heap
|
page read and write
|
||
1C0942F0000
|
heap
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page execute and read and write
|
||
27559B71000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A333000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE657000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AE1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1884000
|
unkown
|
page execute and read and write
|
||
27559AC5000
|
heap
|
page read and write
|
||
2755A373000
|
heap
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
296C5D08000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1EF00F52000
|
heap
|
page read and write
|
||
2755A1E0000
|
remote allocation
|
page read and write
|
||
1C02BBE0000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page execute and read and write
|
||
27559BAD000
|
heap
|
page read and write
|
||
27559B4D000
|
heap
|
page read and write
|
||
1CD6EC68000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AEB000
|
heap
|
page read and write
|
||
1CD6EC54000
|
heap
|
page read and write
|
||
1CD6EC6B000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
27559B8D000
|
heap
|
page read and write
|
||
28226B79000
|
heap
|
page read and write
|
||
1122000
|
unkown
|
page execute and read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
1CD6EC45000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
27559B28000
|
heap
|
page read and write
|
||
27559A82000
|
heap
|
page read and write
|
||
525BEFE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B29000
|
heap
|
page read and write
|
||
27559AC0000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
DDC9CFE000
|
stack
|
page read and write
|
||
27559B83000
|
heap
|
page read and write
|
||
2ABF7C13000
|
heap
|
page read and write
|
||
27559AEA000
|
heap
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
1CD6EC48000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B26000
|
heap
|
page read and write
|
||
16EA000
|
unkown
|
page execute and read and write
|
||
1C30000
|
unkown
|
page execute read
|
||
201B7E13000
|
heap
|
page read and write
|
||
201B7E00000
|
heap
|
page read and write
|
||
1C574113000
|
heap
|
page read and write
|
||
525B77B000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
282262C0000
|
heap
|
page read and write
|
||
27559B6B000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
27559B0F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BAC000
|
heap
|
page read and write
|
||
28226253000
|
heap
|
page read and write
|
||
15E8000
|
unkown
|
page execute and read and write
|
||
201BD703000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
28226B74000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD3B0000
|
trusted library allocation
|
page read and write
|
||
92202F9000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2822701B000
|
heap
|
page read and write
|
||
1DBFE057000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C0943EF000
|
heap
|
page read and write
|
||
2755A713000
|
heap
|
page read and write
|
||
2755A383000
|
heap
|
page read and write
|
||
1C574002000
|
heap
|
page read and write
|
||
296C5C4B000
|
heap
|
page read and write
|
||
28226BA0000
|
heap
|
page read and write
|
||
201BD705000
|
heap
|
page read and write
|
||
28226B7E000
|
heap
|
page read and write
|
||
1CD6EC4C000
|
heap
|
page read and write
|
||
A6124AC000
|
stack
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
ED7000
|
trusted library allocation
|
page execute and read and write
|
||
27559BC9000
|
heap
|
page read and write
|
||
1C02BD02000
|
heap
|
page read and write
|
||
296C5D13000
|
heap
|
page read and write
|
||
28226BAB000
|
heap
|
page read and write
|
||
201B8700000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B96000
|
heap
|
page read and write
|
||
1EF00F47000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C02BC63000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE3297B000
|
stack
|
page read and write
|
||
27559B27000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
1C02D680000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B5D000
|
heap
|
page read and write
|
||
1C094370000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CEE02000
|
trusted library allocation
|
page read and write
|
||
1CD6EC13000
|
heap
|
page read and write
|
||
ED7000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A34C000
|
heap
|
page read and write
|
||
B0E38FD000
|
stack
|
page read and write
|
||
27559B91000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
2755A600000
|
heap
|
page read and write
|
||
1C57407A000
|
heap
|
page read and write
|
||
1CD6EC51000
|
heap
|
page read and write
|
||
7077AF8000
|
stack
|
page read and write
|
||
AE32DFA000
|
stack
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
2755A602000
|
heap
|
page read and write
|
||
27559AA1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD510000
|
trusted library allocation
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A371000
|
heap
|
page read and write
|
||
1E8CE654000
|
heap
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
1C0943ED000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BDF000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
525BBFF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AB5000
|
heap
|
page read and write
|
||
1F4CA0D0000
|
heap
|
page read and write
|
||
1C02D740000
|
remote allocation
|
page read and write
|
||
201BD60F000
|
heap
|
page read and write
|
||
28227021000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
15E8000
|
unkown
|
page execute and read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
27559AD9000
|
heap
|
page read and write
|
||
2755A71B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
525BCFD000
|
stack
|
page read and write
|
||
279761E0000
|
heap
|
page read and write
|
||
1C095210000
|
trusted library allocation
|
page read and write
|
||
1EF00F20000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE613000
|
heap
|
page read and write
|
||
27559B4F000
|
heap
|
page read and write
|
||
525C1FE000
|
stack
|
page read and write
|
||
27559BA5000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page execute and read and write
|
||
2755A389000
|
heap
|
page read and write
|
||
28226030000
|
heap
|
page read and write
|
||
922007F000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
27559BC0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
27559A13000
|
heap
|
page read and write
|
||
27559BA3000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559B5F000
|
heap
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
201BD290000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
1C574041000
|
heap
|
page read and write
|
||
90B0CDC000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
BB8000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
201BD3F4000
|
trusted library allocation
|
page read and write
|
||
2755A39C000
|
heap
|
page read and write
|
||
27559B40000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
16CE000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE680000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1C094380000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD6FA000
|
heap
|
page read and write
|
||
2755A713000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
27559B15000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C574076000
|
heap
|
page read and write
|
||
1C02D802000
|
trusted library allocation
|
page read and write
|
||
27559AB2000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
27559BA3000
|
heap
|
page read and write
|
||
1C095220000
|
heap
|
page readonly
|
||
27559B6F000
|
heap
|
page read and write
|
||
201B7E8C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
18D0000
|
unkown
|
page execute and read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
DDC9AFE000
|
stack
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
201BD6F6000
|
heap
|
page read and write
|
||
1B0F8DF5000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
2ABF7B80000
|
trusted library allocation
|
page read and write
|
||
18C4000
|
unkown
|
page execute and read and write
|
||
2755A32B000
|
heap
|
page read and write
|
||
27559A90000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201B7E29000
|
heap
|
page read and write
|
||
2755A3FB000
|
heap
|
page read and write
|
||
28226BB2000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
1B0F8D50000
|
heap
|
page read and write
|
||
201BD6A4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B44000
|
heap
|
page read and write
|
||
18DC000
|
unkown
|
page execute and read and write
|
||
201B7F07000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A60B000
|
heap
|
page read and write
|
||
1F4CA2CD000
|
heap
|
page read and write
|
||
2ABF7C4D000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
27559AB0000
|
heap
|
page read and write
|
||
28226B93000
|
heap
|
page read and write
|
||
28226BB3000
|
heap
|
page read and write
|
||
2755A70E000
|
heap
|
page read and write
|
||
27559B4F000
|
heap
|
page read and write
|
||
18C4000
|
unkown
|
page execute and read and write
|
||
16B2000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B8E000
|
heap
|
page read and write
|
||
28227062000
|
heap
|
page read and write
|
||
27559BBE000
|
heap
|
page read and write
|
||
1DBFE000000
|
heap
|
page read and write
|
||
27559BC2000
|
heap
|
page read and write
|
||
27559AF6000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B81000
|
heap
|
page read and write
|
||
7077BFA000
|
stack
|
page read and write
|
||
70786FE000
|
stack
|
page read and write
|
||
2755A341000
|
heap
|
page read and write
|
||
707768B000
|
stack
|
page read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
279761D0000
|
heap
|
page read and write
|
||
18A3000
|
unkown
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B85000
|
heap
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
27559B50000
|
heap
|
page read and write
|
||
15E8000
|
unkown
|
page execute and read and write
|
||
27559B88000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
7077CFB000
|
stack
|
page read and write
|
||
2755A37B000
|
heap
|
page read and write
|
||
2ABF7D08000
|
heap
|
page read and write
|
||
27559A98000
|
heap
|
page read and write
|
||
7077EFB000
|
stack
|
page read and write
|
||
2755A337000
|
heap
|
page read and write
|
||
296C5C51000
|
heap
|
page read and write
|
||
27559B46000
|
heap
|
page read and write
|
||
2ABF7C70000
|
heap
|
page read and write
|
||
6350000
|
remote allocation
|
page read and write
|
||
201BD4D0000
|
trusted library allocation
|
page read and write
|
||
27559AB7000
|
heap
|
page read and write
|
||
27559B40000
|
heap
|
page read and write
|
||
1E8CE655000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B38000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
DDC9EF7000
|
stack
|
page read and write
|
||
1B0F8E50000
|
heap
|
page read and write
|
||
27559B74000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
296C5C66000
|
heap
|
page read and write
|
||
28226B21000
|
heap
|
page read and write
|
||
1E8CE67E000
|
heap
|
page read and write
|
||
AE32CFF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
201B8759000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
201B7F14000
|
heap
|
page read and write
|
||
DDC9B7E000
|
stack
|
page read and write
|
||
1CD6EBF0000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2ABF7B50000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page execute and read and write
|
||
27559B52000
|
heap
|
page read and write
|
||
28226B76000
|
heap
|
page read and write
|
||
1B0F8E44000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B4C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A63000
|
heap
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559B86000
|
heap
|
page read and write
|
||
16CE000
|
unkown
|
page readonly
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BC1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AA3000
|
heap
|
page read and write
|
||
201B9210000
|
trusted library allocation
|
page read and write
|
||
27559B1C000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
525B8FF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6EC6F000
|
heap
|
page read and write
|
||
27559B6C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C574013000
|
heap
|
page read and write
|
||
27976370000
|
remote allocation
|
page read and write
|
||
201BD6DF000
|
heap
|
page read and write
|
||
27559A84000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559BDB000
|
heap
|
page read and write
|
||
1C02BC47000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BC1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
201B7F02000
|
heap
|
page read and write
|
||
27559B9D000
|
heap
|
page read and write
|
||
2ABF7D13000
|
heap
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
201B8704000
|
heap
|
page read and write
|
||
1E8CE64F000
|
heap
|
page read and write
|
||
525BFFF000
|
stack
|
page read and write
|
||
B45BF7F000
|
stack
|
page read and write
|
||
1C0942F9000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B70000
|
direct allocation
|
page read and write
|
||
27559A6F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
1122000
|
unkown
|
page execute read
|
||
1C094490000
|
trusted library allocation
|
page read and write
|
||
201BD3BE000
|
trusted library allocation
|
page read and write
|
||
1CD6EC66000
|
heap
|
page read and write
|
||
27559A89000
|
heap
|
page read and write
|
||
1CD6EC6D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
8DFFFFF000
|
stack
|
page read and write
|
||
5C7D000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AB5000
|
heap
|
page read and write
|
||
27559BB3000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28227003000
|
heap
|
page read and write
|
||
2ABF7C8A000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
27559B98000
|
heap
|
page read and write
|
||
28226B7B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A86000
|
heap
|
page read and write
|
||
296C5A60000
|
heap
|
page read and write
|
||
27559A29000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
18C4000
|
unkown
|
page execute and read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
B70000
|
unclassified section
|
page read and write
|
||
2755A353000
|
heap
|
page read and write
|
||
2755A397000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A702000
|
heap
|
page read and write
|
||
B0E39FE000
|
stack
|
page read and write
|
||
F12307F000
|
stack
|
page read and write
|
||
1F4CA313000
|
heap
|
page read and write
|
||
1DBFE113000
|
heap
|
page read and write
|
||
28226B8C000
|
heap
|
page read and write
|
||
27559B37000
|
heap
|
page read and write
|
||
27559AD3000
|
heap
|
page read and write
|
||
1F4CA2C4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201B8615000
|
heap
|
page read and write
|
||
27559ABB000
|
heap
|
page read and write
|
||
2755A37D000
|
heap
|
page read and write
|
||
27559B5D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226BAC000
|
heap
|
page read and write
|
||
27559B8F000
|
heap
|
page read and write
|
||
2ABF7D00000
|
heap
|
page read and write
|
||
28226B88000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page execute and read and write
|
||
5E93000
|
heap
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B21000
|
heap
|
page read and write
|
||
275598C0000
|
heap
|
page read and write
|
||
2ABF7C47000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2755A3F1000
|
heap
|
page read and write
|
||
BB8000
|
trusted library allocation
|
page read and write
|
||
2ABF7AE0000
|
heap
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page execute and read and write
|
||
1F4CAC02000
|
heap
|
page read and write
|
||
2755A319000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
1DBFE102000
|
heap
|
page read and write
|
||
27559B66000
|
heap
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
A6129FB000
|
stack
|
page read and write
|
||
27559BD6000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
27559AEE000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A334000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
282262EA000
|
heap
|
page read and write
|
||
1CD6EC43000
|
heap
|
page read and write
|
||
1DBFDE60000
|
heap
|
page read and write
|
||
27559B59000
|
heap
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
481617E000
|
stack
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
921FDEA000
|
stack
|
page read and write
|
||
2755A35C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F122E7E000
|
stack
|
page read and write
|
||
1E8CE700000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
1C095240000
|
trusted library allocation
|
page read and write
|
||
1C02D740000
|
remote allocation
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
201BD6FD000
|
heap
|
page read and write
|
||
27559BD3000
|
heap
|
page read and write
|
||
1E8CE600000
|
heap
|
page read and write
|
||
1CD6EC29000
|
heap
|
page read and write
|
||
18A9000
|
unkown
|
page execute and read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
28226B93000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B4E000
|
heap
|
page read and write
|
||
27559860000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B91000
|
heap
|
page read and write
|
||
28226020000
|
heap
|
page read and write
|
||
2755A3F8000
|
heap
|
page read and write
|
||
1C30000
|
unkown
|
page execute read
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
70784FA000
|
stack
|
page read and write
|
||
27559BB8000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A72C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A3F0000
|
heap
|
page read and write
|
||
27559BA1000
|
heap
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
27559B33000
|
heap
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
5C7D000
|
stack
|
page read and write
|
||
1B0F8E48000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B9F000
|
heap
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
282262C7000
|
heap
|
page read and write
|
||
27559B78000
|
heap
|
page read and write
|
||
27559BCE000
|
heap
|
page read and write
|
||
1C02BC2A000
|
heap
|
page read and write
|
||
201BD6AA000
|
heap
|
page read and write
|
||
28226B85000
|
heap
|
page read and write
|
||
27559B54000
|
heap
|
page read and write
|
||
1C574050000
|
heap
|
page read and write
|
||
5F9C000
|
stack
|
page read and write
|
||
27559ABC000
|
heap
|
page read and write
|
||
1E8CE652000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
201B8718000
|
heap
|
page read and write
|
||
27559BD9000
|
heap
|
page read and write
|
||
16AF000
|
unkown
|
page readonly
|
||
2755A702000
|
heap
|
page read and write
|
||
201B8602000
|
heap
|
page read and write
|
||
B0E37FC000
|
stack
|
page read and write
|
||
B45B92C000
|
stack
|
page read and write
|
||
B82000
|
direct allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A736000
|
heap
|
page read and write
|
||
27559B58000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27976458000
|
heap
|
page read and write
|
||
201BD480000
|
trusted library allocation
|
page read and write
|
||
9220179000
|
stack
|
page read and write
|
||
201BD61D000
|
heap
|
page read and write
|
||
27559B2F000
|
heap
|
page read and write
|
||
28226271000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BE6000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BAD000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
2755A70C000
|
heap
|
page read and write
|
||
201BD3D1000
|
trusted library allocation
|
page read and write
|
||
27559B70000
|
heap
|
page read and write
|
||
70642FF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
90B12FE000
|
stack
|
page read and write
|
||
16E0000
|
unkown
|
page readonly
|
||
F12289C000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
27559BFC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2822624B000
|
heap
|
page read and write
|
||
27559A94000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD3D0000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
27559BD8000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
8DFFF7E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C0943D4000
|
heap
|
page read and write
|
||
201BD220000
|
trusted library allocation
|
page read and write
|
||
27559B95000
|
heap
|
page read and write
|
||
27559A6F000
|
heap
|
page read and write
|
||
1CD6EC41000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AD6000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1F4CA140000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
DDC9C7B000
|
stack
|
page read and write
|
||
27559B45000
|
heap
|
page read and write
|
||
2755A36D000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
28226BB3000
|
heap
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
27559B6A000
|
heap
|
page read and write
|
||
27559BA8000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226261000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226BA0000
|
heap
|
page read and write
|
||
27559B6B000
|
heap
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BD1000
|
heap
|
page read and write
|
||
201BD4C0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE63C000
|
heap
|
page read and write
|
||
27559B25000
|
heap
|
page read and write
|
||
1B0F8E31000
|
heap
|
page read and write
|
||
AE32AFA000
|
stack
|
page read and write
|
||
16EA000
|
unkown
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559B2D000
|
heap
|
page read and write
|
||
1F4CA170000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2755A391000
|
heap
|
page read and write
|
||
2755A37F000
|
heap
|
page read and write
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
4815F7C000
|
stack
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559ACD000
|
heap
|
page read and write
|
||
B45C0FC000
|
stack
|
page read and write
|
||
27559B6E000
|
heap
|
page read and write
|
||
27559B64000
|
heap
|
page read and write
|
||
18A5000
|
unkown
|
page execute and read and write
|
||
C15000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
1DBFDFD0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B31000
|
heap
|
page read and write
|
||
27559B8B000
|
heap
|
page read and write
|
||
27559B56000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6EC42000
|
heap
|
page read and write
|
||
27559AE8000
|
heap
|
page read and write
|
||
2755A360000
|
heap
|
page read and write
|
||
27559ADE000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
28226B8A000
|
heap
|
page read and write
|
||
27559B9F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B35000
|
heap
|
page read and write
|
||
1E8CE490000
|
heap
|
page read and write
|
||
27559A80000
|
heap
|
page read and write
|
||
27559B19000
|
heap
|
page read and write
|
||
1C094360000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
27559B4B000
|
heap
|
page read and write
|
||
201BD500000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F122DFB000
|
stack
|
page read and write
|
||
201BD63C000
|
heap
|
page read and write
|
||
1122000
|
unkown
|
page execute and read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
27559B69000
|
heap
|
page read and write
|
||
1C574102000
|
heap
|
page read and write
|
||
27559B34000
|
heap
|
page read and write
|
||
296C5D00000
|
heap
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page execute and read and write
|
||
98A3D7B000
|
stack
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE64C000
|
heap
|
page read and write
|
||
2755A375000
|
heap
|
page read and write
|
||
201B9200000
|
trusted library allocation
|
page read and write
|
||
27559BC2000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
27559A00000
|
heap
|
page read and write
|
||
1C02BC13000
|
heap
|
page read and write
|
||
90B107E000
|
stack
|
page read and write
|
||
27559B54000
|
heap
|
page read and write
|
||
27559B96000
|
heap
|
page read and write
|
||
ED7000
|
trusted library allocation
|
page execute and read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
201BD600000
|
heap
|
page read and write
|
||
1EF010E0000
|
heap
|
page read and write
|
||
201B8713000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page execute and read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2755A334000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1B0F8E46000
|
heap
|
page read and write
|
||
27559B73000
|
heap
|
page read and write
|
||
1CD6EC7D000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
2755A3F5000
|
heap
|
page read and write
|
||
28226A02000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
EDB000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
16B2000
|
unkown
|
page readonly
|
||
B0E34F9000
|
stack
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
28226BA1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6EC86000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AA0000
|
heap
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
201B7EA5000
|
heap
|
page read and write
|
||
27559ACD000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
1B0F8E20000
|
heap
|
page read and write
|
||
201B7C10000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
1C095290000
|
trusted library allocation
|
page read and write
|
||
98A387B000
|
stack
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
5F9C000
|
stack
|
page read and write
|
||
201BD510000
|
remote allocation
|
page read and write
|
||
27559A71000
|
heap
|
page read and write
|
||
27559B61000
|
heap
|
page read and write
|
||
201BD3F0000
|
trusted library allocation
|
page read and write
|
||
70640FD000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BFB000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C095230000
|
trusted library allocation
|
page read and write
|
||
1E8CE708000
|
heap
|
page read and write
|
||
27559A83000
|
heap
|
page read and write
|
||
296C5C8C000
|
heap
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
1C0942F5000
|
heap
|
page read and write
|
||
28226BB1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
8D802FF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1B0F8DF0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2822623C000
|
heap
|
page read and write
|
||
27559BE9000
|
heap
|
page read and write
|
||
201B8718000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6ED02000
|
heap
|
page read and write
|
||
98A3E7F000
|
stack
|
page read and write
|
||
27559B3A000
|
heap
|
page read and write
|
||
1C57405B000
|
heap
|
page read and write
|
||
27559BCE000
|
heap
|
page read and write
|
||
27976240000
|
heap
|
page read and write
|
||
201B9203000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
5E93000
|
heap
|
page execute and read and write
|
||
525B9FD000
|
stack
|
page read and write
|
||
2797643D000
|
heap
|
page read and write
|
||
938000
|
stack
|
page read and write
|
||
27559A8C000
|
heap
|
page read and write
|
||
1F4CA23E000
|
heap
|
page read and write
|
||
1C02BC00000
|
heap
|
page read and write
|
||
1C02BC40000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A73000
|
heap
|
page read and write
|
||
27559BB1000
|
heap
|
page read and write
|
||
16E0000
|
unkown
|
page readonly
|
||
2755A1E0000
|
remote allocation
|
page read and write
|
||
27559AC0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A93000
|
heap
|
page read and write
|
||
27559B7C000
|
heap
|
page read and write
|
||
1B0F8E50000
|
heap
|
page read and write
|
||
27559BBA000
|
heap
|
page read and write
|
||
1DBFDED0000
|
heap
|
page read and write
|
||
27559BE3000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
2755A385000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
90B157D000
|
stack
|
page read and write
|
||
2ABF7C7D000
|
heap
|
page read and write
|
||
B45C27B000
|
stack
|
page read and write
|
||
18DC000
|
unkown
|
page execute and read and write
|
||
A612DFE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A738000
|
heap
|
page read and write
|
||
1F4CA229000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
70783FA000
|
stack
|
page read and write
|
||
27559A99000
|
heap
|
page read and write
|
||
15DA000
|
unkown
|
page execute and read and write
|
||
1DBFE013000
|
heap
|
page read and write
|
||
296C5A50000
|
heap
|
page read and write
|
||
282269F0000
|
remote allocation
|
page read and write
|
||
27559B57000
|
heap
|
page read and write
|
||
27559AD4000
|
heap
|
page read and write
|
||
2755A33B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C574073000
|
heap
|
page read and write
|
||
1DBFE075000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B9F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B99000
|
heap
|
page read and write
|
||
2755A202000
|
heap
|
page read and write
|
||
1EF00F28000
|
heap
|
page read and write
|
||
2755A70A000
|
heap
|
page read and write
|
||
28226B7A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BA9000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD68B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
296C5C02000
|
heap
|
page read and write
|
||
1C02BC48000
|
heap
|
page read and write
|
||
707770F000
|
stack
|
page read and write
|
||
27559B36000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559B23000
|
heap
|
page read and write
|
||
28226BB1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AE3000
|
heap
|
page read and write
|
||
27559BC5000
|
heap
|
page read and write
|
||
1CD6EC76000
|
heap
|
page read and write
|
||
1C02BB90000
|
heap
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
1EF00F51000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
282269F0000
|
remote allocation
|
page read and write
|
||
525C0FE000
|
stack
|
page read and write
|
||
2755A71C000
|
heap
|
page read and write
|
||
1CD6EC53000
|
heap
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
201BD510000
|
remote allocation
|
page read and write
|
||
2755A72F000
|
heap
|
page read and write
|
||
A612AF7000
|
stack
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
27559A9B000
|
heap
|
page read and write
|
||
1B0F8DB0000
|
heap
|
page read and write
|
||
16B2000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE68A000
|
heap
|
page read and write
|
||
18D0000
|
unkown
|
page execute and read and write
|
||
27559B7B000
|
heap
|
page read and write
|
||
1EF010E5000
|
heap
|
page read and write
|
||
1DBFE002000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
EDB000
|
trusted library allocation
|
page execute and read and write
|
||
27559B1E000
|
heap
|
page read and write
|
||
201BD700000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
2ABF7C68000
|
heap
|
page read and write
|
||
201BD5F0000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B45C07E000
|
stack
|
page read and write
|
||
4815E7E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6EC4F000
|
heap
|
page read and write
|
||
27559AE5000
|
heap
|
page read and write
|
||
18A9000
|
unkown
|
page execute and read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
27559BBC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B52000
|
heap
|
page read and write
|
||
2755A344000
|
heap
|
page read and write
|
||
201BD490000
|
trusted library allocation
|
page read and write
|
||
2755A3A2000
|
heap
|
page read and write
|
||
2ABF7C4A000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B42000
|
heap
|
page read and write
|
||
27559B84000
|
heap
|
page read and write
|
||
27559A92000
|
heap
|
page read and write
|
||
27559B65000
|
heap
|
page read and write
|
||
201B7E8E000
|
heap
|
page read and write
|
||
1CD6EC5C000
|
heap
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559ADE000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201B7E27000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
201BD3B8000
|
trusted library allocation
|
page read and write
|
||
27559A73000
|
heap
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page execute and read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
33C6FD000
|
stack
|
page read and write
|
||
28226B52000
|
heap
|
page read and write
|
||
28226BA0000
|
heap
|
page read and write
|
||
28226B5B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
DDC9FFE000
|
stack
|
page read and write
|
||
27559BAF000
|
heap
|
page read and write
|
||
27559B61000
|
heap
|
page read and write
|
||
2ABF7C68000
|
heap
|
page read and write
|
||
1C09440D000
|
heap
|
page read and write
|
||
27976413000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
201BD6DA000
|
heap
|
page read and write
|
||
27559BBE000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B0E33FF000
|
stack
|
page read and write
|
||
28226B7F000
|
heap
|
page read and write
|
||
2755A3E2000
|
heap
|
page read and write
|
||
27559B5A000
|
heap
|
page read and write
|
||
27559A24000
|
heap
|
page read and write
|
||
27559AC8000
|
heap
|
page read and write
|
||
1C573DA0000
|
heap
|
page read and write
|
||
27559B2F000
|
heap
|
page read and write
|
||
296C5C80000
|
heap
|
page read and write
|
||
27559B55000
|
heap
|
page read and write
|
||
90B11FC000
|
stack
|
page read and write
|
||
2755A339000
|
heap
|
page read and write
|
||
201BD4F0000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
27559B29000
|
heap
|
page read and write
|
||
ED2000
|
trusted library allocation
|
page read and write
|
||
1CD6EC30000
|
heap
|
page read and write
|
||
201BD6F3000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A315000
|
heap
|
page read and write
|
||
27559BA7000
|
heap
|
page read and write
|
||
1C094190000
|
trusted library allocation
|
page read and write
|
||
1C574802000
|
trusted library allocation
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B7C000
|
heap
|
page read and write
|
||
201B7E6F000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
8DFFEFE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
1F4CA302000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A355000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B88000
|
heap
|
page read and write
|
||
AE3255C000
|
stack
|
page read and write
|
||
27559BDC000
|
heap
|
page read and write
|
||
1C02BD00000
|
heap
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
201BD510000
|
remote allocation
|
page read and write
|
||
27559A6C000
|
heap
|
page read and write
|
||
2755A700000
|
heap
|
page read and write
|
||
15DA000
|
unkown
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B24000
|
heap
|
page read and write
|
||
27559B39000
|
heap
|
page read and write
|
||
18D9000
|
unkown
|
page execute and read and write
|
||
1EF00F42000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
90B147E000
|
stack
|
page read and write
|
||
5DB4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
201B7E93000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BAC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AC2000
|
heap
|
page read and write
|
||
1CD6EC5C000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1884000
|
unkown
|
page execute and read and write
|
||
1F4CA213000
|
heap
|
page read and write
|
||
B45C57C000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
4815D7E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BE1000
|
heap
|
page read and write
|
||
2755A3B8000
|
heap
|
page read and write
|
||
275599C0000
|
trusted library allocation
|
page read and write
|
||
1C094180000
|
heap
|
page read and write
|
||
27559850000
|
heap
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
28226B96000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A39A000
|
heap
|
page read and write
|
||
1B0F8E63000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BCC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A62000
|
heap
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
201BD3E0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2822624F000
|
heap
|
page read and write
|
||
1DBFE100000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
27559BD0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
27559B82000
|
heap
|
page read and write
|
||
27559BFB000
|
heap
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B13000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1F4CA0E0000
|
heap
|
page read and write
|
||
27559B6D000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
27559B06000
|
heap
|
page read and write
|
||
706407B000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
1E8CE702000
|
heap
|
page read and write
|
||
27559AA9000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AAE000
|
heap
|
page read and write
|
||
28226255000
|
heap
|
page read and write
|
||
1E8CE713000
|
heap
|
page read and write
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
201BD3F0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B74000
|
direct allocation
|
page read and write
|
||
27559BDD000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE3287E000
|
stack
|
page read and write
|
||
27559BCD000
|
heap
|
page read and write
|
||
201BD6E7000
|
heap
|
page read and write
|
||
525B33B000
|
stack
|
page read and write
|
||
27559A8D000
|
heap
|
page read and write
|
||
1C02BB20000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
201BD704000
|
heap
|
page read and write
|
||
27559BB6000
|
heap
|
page read and write
|
||
1F4CA2E1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226BC4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE32F78000
|
stack
|
page read and write
|
||
27559BB9000
|
heap
|
page read and write
|
||
1EF00F33000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B11000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BFF000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
33C67E000
|
stack
|
page read and write
|
||
B70000
|
unclassified section
|
page read and write
|
||
1F4CA269000
|
heap
|
page read and write
|
||
2755A602000
|
heap
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
27559BAA000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B62000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BE3000
|
heap
|
page read and write
|
||
27559B47000
|
heap
|
page read and write
|
||
28226B7C000
|
heap
|
page read and write
|
||
F12291E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B9D000
|
heap
|
page read and write
|
||
28226256000
|
heap
|
page read and write
|
||
28226313000
|
heap
|
page read and write
|
||
28226B63000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
2755A1E0000
|
remote allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C573F10000
|
trusted library allocation
|
page read and write
|
||
16AF000
|
unkown
|
page readonly
|
||
1E8CE672000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559ACB000
|
heap
|
page read and write
|
||
296C5C2A000
|
heap
|
page read and write
|
||
27559BAF000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BA4000
|
heap
|
page read and write
|
||
1C02D740000
|
remote allocation
|
page read and write
|
||
27559AD0000
|
heap
|
page read and write
|
||
DDCA0FF000
|
stack
|
page read and write
|
||
27559B48000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
2755A359000
|
heap
|
page read and write
|
||
27559BD4000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
28226213000
|
heap
|
page read and write
|
||
27559BA1000
|
heap
|
page read and write
|
||
2ABF7AF0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2ABF7C3C000
|
heap
|
page read and write
|
||
2755A337000
|
heap
|
page read and write
|
||
2755A3A1000
|
heap
|
page read and write
|
||
F122F77000
|
stack
|
page read and write
|
||
F12317E000
|
stack
|
page read and write
|
||
28226B76000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A35C000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
27559B96000
|
heap
|
page read and write
|
||
2ABF8602000
|
trusted library allocation
|
page read and write
|
||
1DBFE028000
|
heap
|
page read and write
|
||
27559B93000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
27559BB6000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
2755A325000
|
heap
|
page read and write
|
||
2755A72E000
|
heap
|
page read and write
|
||
27559B1B000
|
heap
|
page read and write
|
||
1C574000000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B68000
|
heap
|
page read and write
|
||
1DBFE802000
|
trusted library allocation
|
page read and write
|
||
201B7BB0000
|
heap
|
page read and write
|
||
18B7000
|
unkown
|
page execute and read and write
|
||
27559ACB000
|
heap
|
page read and write
|
||
27559AA7000
|
heap
|
page read and write
|
||
27559B74000
|
heap
|
page read and write
|
||
27559B17000
|
heap
|
page read and write
|
||
1C094300000
|
heap
|
page read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE325DE000
|
stack
|
page read and write
|
||
28226B7E000
|
heap
|
page read and write
|
||
706427F000
|
stack
|
page read and write
|
||
2755A332000
|
heap
|
page read and write
|
||
201BD810000
|
trusted library allocation
|
page read and write
|
||
525BDFE000
|
stack
|
page read and write
|
||
938000
|
stack
|
page read and write
|
||
2755A336000
|
heap
|
page read and write
|
||
201BD3B0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
7077DFF000
|
stack
|
page read and write
|
||
4BB1000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28227000000
|
heap
|
page read and write
|
||
27559A6D000
|
heap
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C02BB30000
|
heap
|
page read and write
|
||
27559AF3000
|
heap
|
page read and write
|
||
282262EC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
16AF000
|
unkown
|
page readonly
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
27559B2B000
|
heap
|
page read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
AE32E7F000
|
unkown
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
2755A39E000
|
heap
|
page read and write
|
||
1C02BBC0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BE8000
|
heap
|
page read and write
|
||
27559A96000
|
heap
|
page read and write
|
||
481627C000
|
stack
|
page read and write
|
||
296C5AC0000
|
heap
|
page read and write
|
||
2755A300000
|
heap
|
page read and write
|
||
282269F0000
|
remote allocation
|
page read and write
|
||
27559B79000
|
heap
|
page read and write
|
||
2ABF7C48000
|
heap
|
page read and write
|
||
27559BCB000
|
heap
|
page read and write
|
||
27559BD9000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
6350000
|
remote allocation
|
page read and write
|
||
27559BCA000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A32F000
|
heap
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
28226B8E000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B17000
|
heap
|
page read and write
|
||
27559B8F000
|
heap
|
page read and write
|
||
28226B7D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
33C3CB000
|
stack
|
page read and write
|
||
609C000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BFD000
|
heap
|
page read and write
|
||
27559A94000
|
heap
|
page read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
2ABF7C00000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2ABF7D02000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B89000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B76000
|
heap
|
page read and write
|
||
1F4CA270000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
282262FA000
|
heap
|
page read and write
|
||
201BD2A0000
|
trusted library allocation
|
page read and write
|
||
28226B78000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
F12299E000
|
stack
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
2755A393000
|
heap
|
page read and write
|
||
27559B5E000
|
heap
|
page read and write
|
||
27559A7A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B72000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
27559AF3000
|
heap
|
page read and write
|
||
27559A8E000
|
heap
|
page read and write
|
||
1CD6EC49000
|
heap
|
page read and write
|
||
201B8759000
|
heap
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
1C573DB0000
|
heap
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
A612CFF000
|
stack
|
page read and write
|
||
2755A32F000
|
heap
|
page read and write
|
||
B0E35FB000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
296C5C66000
|
heap
|
page read and write
|
||
16E0000
|
unkown
|
page readonly
|
||
27559AA4000
|
heap
|
page read and write
|
||
2755A368000
|
heap
|
page read and write
|
||
27559A7F000
|
heap
|
page read and write
|
||
2755A319000
|
heap
|
page read and write
|
||
1C094399000
|
heap
|
page read and write
|
||
8DFFE7C000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B89000
|
heap
|
page read and write
|
||
27976340000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
16E0000
|
unkown
|
page readonly
|
||
28226B16000
|
heap
|
page read and write
|
||
1E8CE5F0000
|
trusted library allocation
|
page read and write
|
||
27559A9E000
|
heap
|
page read and write
|
||
2755A38E000
|
heap
|
page read and write
|
||
1CD6EC55000
|
heap
|
page read and write
|
||
27559A5E000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
98A3C7F000
|
stack
|
page read and write
|
||
201B7E55000
|
heap
|
page read and write
|
||
27559BBD000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
27559AAB000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226258000
|
heap
|
page read and write
|
||
27559B87000
|
heap
|
page read and write
|
||
201B7E74000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
98A3B7B000
|
stack
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
27559B33000
|
heap
|
page read and write
|
||
18B7000
|
unkown
|
page execute and read and write
|
||
27559B20000
|
heap
|
page read and write
|
||
706417E000
|
stack
|
page read and write
|
||
5E93000
|
heap
|
page execute and read and write
|
||
296C5BC0000
|
trusted library allocation
|
page read and write
|
||
201B7E3C000
|
heap
|
page read and write
|
||
27559B8A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B4A000
|
heap
|
page read and write
|
||
1C02BC57000
|
heap
|
page read and write
|
||
92200FF000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A33D000
|
heap
|
page read and write
|
||
27559B81000
|
heap
|
page read and write
|
||
201BD649000
|
heap
|
page read and write
|
||
1EF00F51000
|
heap
|
page read and write
|
||
92201FE000
|
stack
|
page read and write
|
||
2755A332000
|
heap
|
page read and write
|
||
27559AD7000
|
heap
|
page read and write
|
||
16CE000
|
unkown
|
page readonly
|
||
28226243000
|
heap
|
page read and write
|
||
201BD702000
|
heap
|
page read and write
|
||
27559B49000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
28226B87000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD661000
|
heap
|
page read and write
|
||
27559B2D000
|
heap
|
page read and write
|
||
27559BB9000
|
heap
|
page read and write
|
||
27559BD9000
|
heap
|
page read and write
|
||
2822624C000
|
heap
|
page read and write
|
||
28226B78000
|
heap
|
page read and write
|
||
2755A36A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226261000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
4BB1000
|
trusted library allocation
|
page read and write
|
||
2755A302000
|
heap
|
page read and write
|
||
27559BBB000
|
heap
|
page read and write
|
||
27559AE0000
|
heap
|
page read and write
|
||
201B7F02000
|
heap
|
page read and write
|
||
1E8CE68C000
|
heap
|
page read and write
|
||
27559AF9000
|
heap
|
page read and write
|
||
1EF01020000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A3FE000
|
heap
|
page read and write
|
||
28226B96000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A62000
|
heap
|
page read and write
|
||
201B8600000
|
heap
|
page read and write
|
||
27559AC4000
|
heap
|
page read and write
|
||
27559ACA000
|
heap
|
page read and write
|
||
922027E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B91000
|
heap
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B78000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
27559B70000
|
heap
|
page read and write
|
||
27559B2B000
|
heap
|
page read and write
|
||
27559B97000
|
heap
|
page read and write
|
||
1C02BC58000
|
heap
|
page read and write
|
||
282262DC000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B9C000
|
heap
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
28226302000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
70782FB000
|
stack
|
page read and write
|
||
609C000
|
stack
|
page read and write
|
||
27559ACE000
|
heap
|
page read and write
|
||
27559A88000
|
heap
|
page read and write
|
||
27559B60000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226BB6000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
18A5000
|
unkown
|
page execute and read and write
|
||
27559A87000
|
heap
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
18D9000
|
unkown
|
page execute and read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
27559B75000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B0E36FF000
|
stack
|
page read and write
|
||
27559B76000
|
heap
|
page read and write
|
||
27559A9C000
|
heap
|
page read and write
|
||
1884000
|
unkown
|
page execute and read and write
|
||
28226200000
|
heap
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
201B7E79000
|
heap
|
page read and write
|
||
27559B18000
|
heap
|
page read and write
|
||
27559B85000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A335000
|
heap
|
page read and write
|
||
27976370000
|
remote allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
27559ABF000
|
heap
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
609C000
|
stack
|
page read and write
|
||
5F9C000
|
stack
|
page read and write
|
||
1C57403F000
|
heap
|
page read and write
|
||
1EF00F00000
|
heap
|
page read and write
|
||
2822701B000
|
heap
|
page read and write
|
||
33C879000
|
stack
|
page read and write
|
||
28226B91000
|
heap
|
page read and write
|
||
1DBFE079000
|
heap
|
page read and write
|
||
296C5C3C000
|
heap
|
page read and write
|
||
27559BB7000
|
heap
|
page read and write
|
||
296C5D02000
|
heap
|
page read and write
|
||
5C7D000
|
stack
|
page read and write
|
||
1C574068000
|
heap
|
page read and write
|
||
2755A703000
|
heap
|
page read and write
|
||
1F4CA287000
|
heap
|
page read and write
|
||
2755A717000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
2755A38B000
|
heap
|
page read and write
|
||
27559A75000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1EF00F47000
|
heap
|
page read and write
|
||
1CD6EC80000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B21000
|
heap
|
page read and write
|
||
27559AB9000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1EF01060000
|
trusted library allocation
|
page read and write
|
||
2755A381000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BB2000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A53000
|
heap
|
page read and write
|
||
1CD6EC3E000
|
heap
|
page read and write
|
||
27559B9A000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
27559B8C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2ABF7C50000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD6FF000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BD6000
|
heap
|
page read and write
|
||
1E8CE4F0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
2ABF7C49000
|
heap
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
1CD6EC7C000
|
heap
|
page read and write
|
||
B45C37C000
|
stack
|
page read and write
|
||
1CD6EC46000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B45C1FE000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
1C0943E0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B14000
|
heap
|
page read and write
|
||
201BD702000
|
heap
|
page read and write
|
||
28226281000
|
heap
|
page read and write
|
||
201BD210000
|
trusted library allocation
|
page read and write
|
||
1B0F8E50000
|
heap
|
page read and write
|
||
1CD6EC3A000
|
heap
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
2ABF7C4C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BDA000
|
heap
|
page read and write
|
||
28226B9A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A97000
|
heap
|
page read and write
|
||
DDC9DFB000
|
stack
|
page read and write
|
||
27559B7B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B66000
|
heap
|
page read and write
|
||
27559B86000
|
heap
|
page read and write
|
||
201BD3D4000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE64A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B51000
|
heap
|
page read and write
|
||
2755A35C000
|
heap
|
page read and write
|
||
1CD6EC79000
|
heap
|
page read and write
|
||
27559AAD000
|
heap
|
page read and write
|
||
2755A302000
|
heap
|
page read and write
|
||
1CD6EB50000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD4E0000
|
trusted library allocation
|
page read and write
|
||
28226B8F000
|
heap
|
page read and write
|
||
18A1000
|
unkown
|
page execute and read and write
|
||
1C30000
|
unkown
|
page execute read
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C094390000
|
heap
|
page read and write
|
||
27559B08000
|
heap
|
page read and write
|
||
27976370000
|
remote allocation
|
page read and write
|
||
27559B7E000
|
heap
|
page read and write
|
||
27559A7C000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
3CDC000
|
trusted library allocation
|
page read and write
|
||
1C02BC58000
|
heap
|
page read and write
|
||
296C5C13000
|
heap
|
page read and write
|
||
27559B3E000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28227002000
|
heap
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
1CD6EC47000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A37C000
|
heap
|
page read and write
|
||
33C7FA000
|
stack
|
page read and write
|
||
18B7000
|
unkown
|
page execute and read and write
|
||
27976402000
|
heap
|
page read and write
|
||
2755A714000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C0943D2000
|
heap
|
page read and write
|
||
27559BA7000
|
heap
|
page read and write
|
||
28226B8E000
|
heap
|
page read and write
|
||
27559BC7000
|
heap
|
page read and write
|
||
1C02BC89000
|
heap
|
page read and write
|
||
8D801FE000
|
stack
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
27559B3D000
|
heap
|
page read and write
|
||
18DC000
|
unkown
|
page execute and read and write
|
||
4BB1000
|
trusted library allocation
|
page read and write
|
||
27559B7F000
|
heap
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
28226BAD000
|
heap
|
page read and write
|
||
1CD6EC50000
|
heap
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
2755A399000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B0E2F8B000
|
stack
|
page read and write
|
||
27559BA2000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BC9000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BE5000
|
heap
|
page read and write
|
||
27559AF7000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
90B117E000
|
stack
|
page read and write
|
||
2755A331000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B96000
|
heap
|
page read and write
|
||
33C979000
|
stack
|
page read and write
|
||
201B8702000
|
heap
|
page read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
2755A3F6000
|
heap
|
page read and write
|
||
16AE000
|
unkown
|
page readonly
|
||
1C573E10000
|
heap
|
page read and write
|
||
90B13FD000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
18D0000
|
unkown
|
page execute and read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226316000
|
heap
|
page read and write
|
||
27559AF5000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
18A3000
|
unkown
|
page execute and read and write
|
||
28226B7A000
|
heap
|
page read and write
|
||
296C5C00000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page execute and read and write
|
||
2ABF7C24000
|
heap
|
page read and write
|
||
2755A723000
|
heap
|
page read and write
|
||
1CD6EC52000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
28226B78000
|
heap
|
page read and write
|
||
27559B97000
|
heap
|
page read and write
|
||
201B7EFD000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
296C5C4E000
|
heap
|
page read and write
|
||
27559B5F000
|
heap
|
page read and write
|
||
A612BFF000
|
stack
|
page read and write
|
||
1B0F8E47000
|
heap
|
page read and write
|
||
27976502000
|
heap
|
page read and write
|
||
27559AB7000
|
heap
|
page read and write
|
||
27976C02000
|
trusted library allocation
|
page read and write
|
||
1B0F8DD0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD62B000
|
heap
|
page read and write
|
||
DDC9A7B000
|
stack
|
page read and write
|
||
1C0943ED000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A386000
|
heap
|
page read and write
|
||
2ABF7C4E000
|
heap
|
page read and write
|
||
AE32BF7000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BB1000
|
heap
|
page read and write
|
||
15DA000
|
unkown
|
page execute and read and write
|
||
1CD6EC00000
|
heap
|
page read and write
|
||
4815C7F000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A81000
|
heap
|
page read and write
|
||
27559B3B000
|
heap
|
page read and write
|
||
938000
|
stack
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE329FE000
|
stack
|
page read and write
|
||
27559B13000
|
heap
|
page read and write
|
||
1B0F8E64000
|
heap
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page execute and read and write
|
||
28226229000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B5B000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
2755A365000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BB5000
|
heap
|
page read and write
|
||
27559AC7000
|
heap
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
27559B8A000
|
heap
|
page read and write
|
||
1C02BC48000
|
heap
|
page read and write
|
||
27559B7D000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1E8CE629000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201B7EFD000
|
heap
|
page read and write
|
||
27559BAB000
|
heap
|
page read and write
|
||
28226BA2000
|
heap
|
page read and write
|
||
2755A35C000
|
heap
|
page read and write
|
||
201BD3E0000
|
trusted library allocation
|
page read and write
|
||
27559B1D000
|
heap
|
page read and write
|
||
1C094FD0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
27559B6F000
|
heap
|
page read and write
|
||
201B8DE0000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
27559AFB000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
C83000
|
heap
|
page read and write
|
||
27559ABE000
|
heap
|
page read and write
|
||
282262A4000
|
heap
|
page read and write
|
||
16EA000
|
unkown
|
page execute and read and write
|
||
1C30000
|
unkown
|
page execute read
|
||
2755A35D000
|
heap
|
page read and write
|
||
27559BE1000
|
heap
|
page read and write
|
||
28226BBE000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1CD6EC77000
|
heap
|
page read and write
|
||
27559B83000
|
heap
|
page read and write
|
||
27559B23000
|
heap
|
page read and write
|
||
ED2000
|
trusted library allocation
|
page read and write
|
||
2755A72E000
|
heap
|
page read and write
|
||
1120000
|
unkown
|
page readonly
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
2755A3A1000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
1C0942C0000
|
heap
|
page read and write
|
||
27559A99000
|
heap
|
page read and write
|
||
1122000
|
unkown
|
page execute and read and write
|
||
BC0000
|
heap
|
page read and write
|
||
27559AF2000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
B45C47F000
|
stack
|
page read and write
|
||
2755A373000
|
heap
|
page read and write
|
||
1F4CA200000
|
heap
|
page read and write
|
||
27559B3C000
|
heap
|
page read and write
|
||
1CD6EB60000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
EDB000
|
trusted library allocation
|
page execute and read and write
|
||
B70000
|
unclassified section
|
page read and write
|
||
201B7D10000
|
trusted library allocation
|
page read and write
|
||
28226190000
|
trusted library allocation
|
page read and write
|
||
1E8CE480000
|
heap
|
page read and write
|
||
27559B55000
|
heap
|
page read and write
|
||
2755A3FF000
|
heap
|
page read and write
|
||
2822624E000
|
heap
|
page read and write
|
||
1CD6F602000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559A70000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
2755A343000
|
heap
|
page read and write
|
||
A6128FB000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
18A1000
|
unkown
|
page execute and read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
27559BDD000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
27559BA0000
|
heap
|
page read and write
|
||
18A5000
|
unkown
|
page execute and read and write
|
||
2755A3EE000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B80000
|
heap
|
page read and write
|
||
1C02BD13000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
201BD480000
|
trusted library allocation
|
page read and write
|
||
1F4CA2BC000
|
heap
|
page read and write
|
||
27559B1F000
|
heap
|
page read and write
|
||
2822624A000
|
heap
|
page read and write
|
||
1C02BC02000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27976429000
|
heap
|
page read and write
|
||
2755A357000
|
heap
|
page read and write
|
||
2822628B000
|
heap
|
page read and write
|
||
28226B00000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
BB8000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
282262E9000
|
heap
|
page read and write
|
||
28226B8B000
|
heap
|
page read and write
|
||
1C0943ED000
|
heap
|
page read and write
|
||
18D9000
|
unkown
|
page execute and read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559AA5000
|
heap
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
27559A5E000
|
heap
|
page read and write
|
||
16CE000
|
unkown
|
page readonly
|
||
34F1000
|
heap
|
page read and write
|
||
1C574029000
|
heap
|
page read and write
|
||
28226308000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559B31000
|
heap
|
page read and write
|
||
2755A317000
|
heap
|
page read and write
|
||
28226BB6000
|
heap
|
page read and write
|
||
2755A3E7000
|
heap
|
page read and write
|
||
A6125AE000
|
stack
|
page read and write
|
||
1F4CAD00000
|
heap
|
page read and write
|
||
1EF00F52000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
27559BD9000
|
heap
|
page read and write
|
||
28226B84000
|
heap
|
page read and write
|
||
27559A8B000
|
heap
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
28226244000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
33C77E000
|
stack
|
page read and write
|
||
27559AB9000
|
heap
|
page read and write
|
||
2755A312000
|
heap
|
page read and write
|
||
27559AC3000
|
heap
|
page read and write
|
||
27559A65000
|
heap
|
page read and write
|
||
27559A3D000
|
heap
|
page read and write
|
||
27976400000
|
heap
|
page read and write
|
||
1EF00DC0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
||
1C57406A000
|
heap
|
page read and write
|
||
27559AF0000
|
heap
|
page read and write
|
||
201B7E9E000
|
heap
|
page read and write
|
||
28226B76000
|
heap
|
page read and write
|
||
2755A33F000
|
heap
|
page read and write
|
||
296C6402000
|
trusted library allocation
|
page read and write
|
||
18A3000
|
unkown
|
page execute and read and write
|
||
27559AFF000
|
heap
|
page read and write
|
||
18A9000
|
unkown
|
page execute and read and write
|
||
34F1000
|
heap
|
page read and write
|
||
5DB0000
|
heap
|
page read and write
|
||
34F1000
|
heap
|
page read and write
|
There are 1874 hidden memdumps, click here to show them.