IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libcrypto-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent_core-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libevent_extra-2-1-7.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libgcc_s_sjlj-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libssl-1_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libssp-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\libwinpthread-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-gencert.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\zlib1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3D94.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\p.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\report.lock
very short file (no magic)
modified
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-certs (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-certs.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\cached-microdescs.new
ASCII text, with very long lines (15714)
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\state (copy)
ASCII text, with very long lines (351), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\state.tmp
ASCII text, with very long lines (351), with CRLF line terminators
modified
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\unverified-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\data\unverified-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\geoip
ASCII text
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\geoip6
ASCII text
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hostname (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hostname.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_public_key (copy)
data
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_public_key.tmp
data
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_secret_key (copy)
data
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\host\hs_ed25519_secret_key.tmp
data
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-bg.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc.txt
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with very long lines (307), with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "file" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\file.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\user\Desktop\file.exe" &&START "" "C:\Users\user\AppData\Local\Starlabs\file.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn "file" /sc MINUTE /tr "C:\Users\user\AppData\Local\Starlabs\file.exe" /rl HIGHEST /f
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
"C:\Users\user\AppData\Local\Starlabs\file.exe"
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
C:\Users\user\AppData\Local\Starlabs\file.exe
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
C:\Users\user\AppData\Local\Starlabs\file.exe
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
C:\Users\user\AppData\Local\Starlabs\file.exe
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
C:\Users\user\AppData\Local\Starlabs\file.exe
malicious
C:\Users\user\AppData\Local\Starlabs\file.exe
C:\Users\user\AppData\Local\Starlabs\file.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\timeout.exe
timeout /t 3
C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe
"C:\Users\user\AppData\Local\zfzs6gcqx8\tor\tor-real.exe" -f "C:\Users\user\AppData\Local\zfzs6gcqx8\tor\torrc.txt"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr /R /C:"[ ]:[ ]"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr "SSID BSSID Signal"
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://104.161.33.60:8080
unknown
malicious
http://104.161.33.60:8080/mnemonic-verify/9632B569333595844815947611/CB82FF607F9FC43225429330EDBC46C9
104.161.33.60
malicious
https://blog.torproject.org/v2-deprecation-timelineCalled
unknown
malicious
https://blog.torproject.org/v2-deprecation-timeline
unknown
malicious
http://104.161.33.60:8080/sendData?pk=Q0I4MkZGNjA3RjlGQzQzMjI1NDI5MzMwRURCQzQ2Qzk=&ta=Qk9UX1BIQU5fQU5I&un=am9uZXM=&pc=MjI2NTMz&co=VW5pdGVkIFN0YXRlcw==&wa=MA==&be=MQ==
104.161.33.60
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://104.161.33.60:8080/mnemonic-verify/9632B569333595844815947611/CB82FF607F9FC43225429330EDBC46C
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.217.98.121:80
unknown
https://138.2.92.67:443
unknown
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%s
unknown
https://github.com
unknown
http://167.235.70.96:8080
unknown
http://20.78.55.47:8080
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.torproject.org/
unknown
http://107.161.20.142:8080
unknown
https://5.196.181.135:443
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://bugs.torproject.org/tpo/core/tor/14917.
unknown
http://101.43.160.136:8080
unknown
https://192.99.196.191:443
unknown
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
unknown
http://168.138.211.88:8099
unknown
http://ip-api.com/line?fields=query,country
208.95.112.1
http://www.w3.
unknown
http://104.161.33.60:80808
unknown
http://18.228.80.130:80
unknown
http://127.0.0.1:8395/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://www.torproject.org/documentation.html
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://ip-api.com
unknown
https://freehaven.net/anonbib/#hs-attack06
unknown
http://185.217.98.121:8080
unknown
http://104.161.33.60:8080/sendData?pk=Q0I4MkZGNjA3RjlGQzQzMjI1NDI5MzMwRURCQzQ2Qzk=&ta=Qk9UX1BIQU5fQU
unknown
http://8.219.110.16:9999
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://8.216.92.21:8080
unknown
http://65.49.205.24:8080
unknown
https://objects.githubusercontent.com/github-production-release-asset-2e65be/146779096/943f13f9-3eb9
unknown
http://47.96.78.224:8080
unknown
https://node.trezor.io
unknown
http://129.151.109.160:8080
unknown
https://2019.www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks.%sDANGEROU
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://147.28.185.29:80
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://154.9.207.142:443
unknown
http://127.0.0.1:21325/enumerate
unknown
http://209.38.221.184:8080
unknown
http://www.w3.or
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://206.166.251.4:8080
unknown
https://bugs.torproject.org/tpo/core/tor/21155.
unknown
http://194.164.198.113:8080
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://38.207.174.88:8080
unknown
http://ip-api.com/line?fields=query
unknown
http://159.203.174.113:8090
unknown
http://101.126.19.171:80
unknown
http://104.161.33.60:8080/sendData
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://185.217.98.121:443
unknown
http://46.235.26.83:8080
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://116.202.101.219:8080
unknown
http://127.0.0.1:
unknown
http://38.60.191.38:80
unknown
http://67.230.176.97:8080
unknown
https://objects.githubusercontent.com
unknown
https://www.torproject.org/download/download#warningalphabetaThis
unknown
http://mingw-w64.sourceforge.net/X
unknown
http://www.zlib.net/D
unknown
https://blog.torproject.org/blog/lifecycle-of-a-new-relayCan
unknown
https://sabotage.net
unknown
http://127.0.0.1:8395/Data
unknown
http://132.145.17.167:9090
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://104.161.33.60:80802m
unknown
https://www.openssl.org/H
unknown
http://51.159.4.50:8080
unknown
http://8.222.143.111:8080
unknown
https://www.torproject.org/download/download#warning
unknown
https://support.mozilla.org
unknown
https://5.196.181.135:443Pk
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://41.87.207.180:9090
unknown
https://bugs.torproject.org/tpo/core/tor/8742.
unknown
https://www.torproject.org/docs/faq.html#BestOSForRelay
unknown
http://crl.v
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
github.com
140.82.121.4
ip-api.com
208.95.112.1
objects.githubusercontent.com
185.199.110.133

IPs

IP
Domain
Country
Malicious
104.161.33.60
unknown
United States
malicious
81.83.37.138
unknown
Belgium
45.91.101.18
unknown
Germany
81.21.4.110
unknown
Ukraine
140.82.121.4
github.com
United States
208.95.112.1
ip-api.com
United States
185.233.107.110
unknown
Germany
81.17.25.195
unknown
Switzerland
51.255.106.85
unknown
France
131.188.40.189
unknown
Germany
68.67.32.32
unknown
Canada
176.9.38.121
unknown
Germany
185.199.110.133
objects.githubusercontent.com
Netherlands
127.0.0.1
unknown
unknown
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BF1C161000
trusted library allocation
page read and write
malicious
4E1D000
heap
page read and write
266D3593000
trusted library allocation
page read and write
2CB12B62000
heap
page read and write
2463B6AD000
trusted library allocation
page read and write
2463B9C4000
trusted library allocation
page read and write
1BF1C446000
trusted library allocation
page read and write
4BCA000
heap
page read and write
1A90000
heap
page read and write
4E32000
heap
page read and write
1C8ACFC0000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2463B9CB000
trusted library allocation
page read and write
4DB8000
heap
page read and write
1D6C7645000
heap
page read and write
4A9C000
heap
page read and write
1B6E000
heap
page read and write
63BB000
heap
page read and write
27569570000
heap
page execute and read and write
1BF2CFC8000
trusted library allocation
page read and write
15B55740000
heap
page read and write
4B17000
heap
page read and write
3B25000
heap
page read and write
5275000
heap
page read and write
3AB5000
heap
page read and write
45FB000
heap
page read and write
1BF2C262000
trusted library allocation
page read and write
3A99000
heap
page read and write
1BF2D844000
trusted library allocation
page read and write
1BF1C5EF000
trusted library allocation
page read and write
49E7000
heap
page read and write
D7988FF000
stack
page read and write
4A7A000
heap
page read and write
3AAF000
heap
page read and write
3AD3000
heap
page read and write
4385000
heap
page read and write
4A4E000
heap
page read and write
3AC0000
heap
page read and write
6371000
heap
page read and write
1BF1A8D0000
trusted library allocation
page read and write
4D56000
heap
page read and write
3A91000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1BF1C49B000
trusted library allocation
page read and write
1C8AEE99000
trusted library allocation
page read and write
51FA000
heap
page read and write
CF5B36E000
stack
page read and write
1C8AE940000
heap
page read and write
1BF34EED000
heap
page read and write
2250047F000
trusted library allocation
page read and write
C8DFF3B000
stack
page read and write
1BF2C23D000
trusted library allocation
page read and write
1BF1C695000
trusted library allocation
page read and write
27567EB5000
heap
page read and write
1BF2DFB7000
trusted library allocation
page read and write
1C8AEE73000
trusted library allocation
page read and write
266D15B0000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
94CB3FD000
stack
page read and write
6C1C0000
unkown
page readonly
5176000
heap
page read and write
1BF2DF8E000
trusted library allocation
page read and write
1C8ACD0C000
heap
page read and write
1AD13370000
heap
page read and write
2250002F000
trusted library allocation
page read and write
286003A3000
trusted library allocation
page read and write
4B4D000
heap
page read and write
1B45000
heap
page read and write
3AB9000
heap
page read and write
27567A40000
heap
page read and write
452E000
heap
page read and write
1BF2CFA5000
trusted library allocation
page read and write
1BF1A76C000
heap
page read and write
6654000
heap
page read and write
22500093000
trusted library allocation
page read and write
6C671000
unkown
page execute read
7FFD9B8A0000
trusted library allocation
page execute and read and write
BD951FA000
stack
page read and write
E5145FF000
stack
page read and write
62F1000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1BF34980000
trusted library section
page read and write
1C8AEE89000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1BF2D812000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3A91000
heap
page read and write
1C8AEB53000
trusted library allocation
page read and write
4BD7000
heap
page read and write
3AAF000
heap
page read and write
1BF2D796000
trusted library allocation
page read and write
1AD13605000
heap
page read and write
1BF2D7D9000
trusted library allocation
page read and write
3AD4000
heap
page read and write
49E6000
heap
page read and write
3AB2000
heap
page read and write
1AD1333A000
heap
page read and write
CCB927C000
stack
page read and write
3A91000
heap
page read and write
431F000
stack
page read and write
4BF1000
heap
page read and write
2464B681000
trusted library allocation
page read and write
266D358D000
trusted library allocation
page read and write
3AA2000
heap
page read and write
28600013000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
43B6000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
3AC0000
heap
page read and write
28600081000
trusted library allocation
page read and write
2860047D000
trusted library allocation
page read and write
3AAF000
heap
page read and write
1C8AD1C5000
heap
page read and write
1BF1A650000
heap
page read and write
5474000
heap
page read and write
1BF2C25B000
trusted library allocation
page read and write
1BF2C867000
trusted library allocation
page read and write
1BF1C3F4000
trusted library allocation
page read and write
1F65000
heap
page read and write
266D15C0000
heap
page read and write
3AC0000
heap
page read and write
C27DCFE000
stack
page read and write
27567B10000
heap
page read and write
2257ABA0000
heap
page execute and read and write
3AB8000
heap
page read and write
1BF2CA25000
trusted library allocation
page read and write
1C8AEB30000
heap
page execute and read and write
3AC9000
heap
page read and write
2463B70D000
trusted library allocation
page read and write
2463B6FF000
trusted library allocation
page read and write
266D15EA000
heap
page read and write
4BD7000
heap
page read and write
4B17000
heap
page read and write
22500011000
trusted library allocation
page read and write
3ABF000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
24639B2F000
heap
page read and write
BD93FBE000
stack
page read and write
22500081000
trusted library allocation
page read and write
6C274000
unkown
page readonly
55F6000
heap
page read and write
6619000
heap
page read and write
4501000
heap
page read and write
4CD2000
heap
page read and write
4BBA000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
4448000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
3A93000
heap
page read and write
6333000
heap
page read and write
1820000
heap
page read and write
3A91000
heap
page read and write
4BDC000
heap
page read and write
1BF1A620000
heap
page read and write
1BF2C84A000
trusted library allocation
page read and write
6C1F0000
unkown
page readonly
225792F5000
heap
page read and write
5134000
heap
page read and write
E5140FF000
stack
page read and write
CF5B7FF000
stack
page read and write
4AEE000
heap
page read and write
22579120000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
27567A20000
heap
page read and write
1BF34D0D000
heap
page read and write
3AC9000
heap
page read and write
2463B70B000
trusted library allocation
page read and write
526D000
heap
page read and write
266D1980000
heap
page read and write
2867CC05000
heap
page read and write
1BF2D80A000
trusted library allocation
page read and write
2867C915000
heap
page read and write
1BF2D7F6000
trusted library allocation
page read and write
4385000
heap
page read and write
1BF1C7E1000
trusted library allocation
page read and write
4BF0000
heap
page read and write
1206000
unkown
page readonly
3ACA000
heap
page read and write
4DDB000
heap
page read and write
1BF1C835000
trusted library allocation
page read and write
6C1C1000
unkown
page execute read
27569F53000
heap
page read and write
1206000
unkown
page readonly
4340000
heap
page read and write
4360000
heap
page read and write
27567AD0000
heap
page read and write
1BF2D790000
trusted library allocation
page read and write
BD944FF000
stack
page read and write
1C8ACCEB000
heap
page read and write
2867CAE0000
trusted library allocation
page read and write
1BF1C2B3000
trusted library allocation
page read and write
C27E3FE000
stack
page read and write
6C4B3000
unkown
page readonly
4382000
heap
page read and write
286003ED000
trusted library allocation
page read and write
1BF2D1D0000
trusted library allocation
page read and write
3AB8000
heap
page read and write
28600355000
trusted library allocation
page read and write
495E000
heap
page read and write
4B4D000
heap
page read and write
1BF1C455000
trusted library allocation
page read and write
563F000
heap
page read and write
5354000
heap
page read and write
28115650000
heap
page read and write
5271000
heap
page read and write
148E4D10000
heap
page read and write
4A72000
heap
page read and write
65EF000
heap
page read and write
3A9E000
heap
page read and write
148E6690000
heap
page read and write
1BF1C427000
trusted library allocation
page read and write
1BF1C3F0000
trusted library allocation
page read and write
1C8AEBC3000
trusted library allocation
page read and write
1BF2C81E000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
BD952FB000
stack
page read and write
1BF2C1E6000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
C1169FD000
stack
page read and write
6C780000
unkown
page readonly
1BF2C2DC000
trusted library allocation
page read and write
2463B709000
trusted library allocation
page read and write
3AB2000
heap
page read and write
6E506FF000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
22500013000
trusted library allocation
page read and write
43A4000
heap
page read and write
4529000
heap
page read and write
3AC0000
heap
page read and write
1F60000
heap
page read and write
7FFD9B929000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
4492000
heap
page read and write
2CB12C10000
heap
page read and write
22578FBA000
heap
page read and write
3AC9000
heap
page read and write
3ABF000
heap
page read and write
3AA5000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
65EC000
heap
page read and write
4340000
heap
page read and write
1BF2D7C0000
trusted library allocation
page read and write
28600011000
trusted library allocation
page read and write
2860034D000
trusted library allocation
page read and write
1C8ACFC5000
heap
page read and write
2463B715000
trusted library allocation
page read and write
2463B713000
trusted library allocation
page read and write
1C8AEF2D000
trusted library allocation
page read and write
3AA5000
heap
page read and write
65E4000
heap
page read and write
65FC000
heap
page read and write
1BF2C267000
trusted library allocation
page read and write
49A1000
heap
page read and write
1C8AEE84000
trusted library allocation
page read and write
43A0000
heap
page read and write
2CB12B61000
heap
page read and write
1BF1C1F1000
trusted library allocation
page read and write
6C68D000
unkown
page readonly
4AEE000
heap
page read and write
28600077000
trusted library allocation
page read and write
18B0000
heap
page read and write
1BF2C3AE000
trusted library allocation
page read and write
1BF2C902000
trusted library allocation
page read and write
6C26D000
unkown
page read and write
28115658000
heap
page read and write
6C5D5000
unkown
page readonly
1D75C507000
heap
page read and write
4380000
heap
page read and write
6601000
heap
page read and write
49A0000
heap
page read and write
1BF34EEB000
heap
page read and write
1BF2DA5A000
trusted library allocation
page read and write
1C8AEB75000
trusted library allocation
page read and write
1D6C7387000
heap
page read and write
22500355000
trusted library allocation
page read and write
12E4000
unkown
page readonly
1BF2DAA5000
trusted library allocation
page read and write
3AA7000
heap
page read and write
3A8D000
heap
page read and write
1BF2CFA8000
trusted library allocation
page read and write
51FA000
heap
page read and write
4FA9000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
4385000
heap
page read and write
2463BAF6000
trusted library allocation
page read and write
444D000
heap
page read and write
6574000
heap
page read and write
6C7D0000
unkown
page readonly
1BF1A6EB000
heap
page read and write
4AD2000
heap
page read and write
4D56000
heap
page read and write
3AAF000
heap
page read and write
1BF1C468000
trusted library allocation
page read and write
1BF34F11000
heap
page read and write
7FFD9B792000
trusted library allocation
page read and write
22500476000
trusted library allocation
page read and write
2867CD95000
heap
page read and write
1AD132B0000
heap
page read and write
1BF2D8E5000
trusted library allocation
page read and write
4EE3000
heap
page read and write
2463B703000
trusted library allocation
page read and write
2867C957000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
3ABF000
heap
page read and write
45D8000
heap
page read and write
1C8AEBC1000
trusted library allocation
page read and write
6C268000
unkown
page readonly
54B6000
heap
page read and write
4AFC000
heap
page read and write
27567EB0000
heap
page read and write
1BF1C66D000
trusted library allocation
page read and write
3AAF000
heap
page read and write
4AC5000
heap
page read and write
5813AFF000
stack
page read and write
1C8AEB49000
trusted library allocation
page read and write
1BF2D930000
trusted library allocation
page read and write
1BF1A6B0000
heap
page read and write
1BF2D130000
trusted library allocation
page read and write
1BF1A640000
heap
page read and write
1C8ACC20000
heap
page read and write
148E4C20000
heap
page read and write
4360000
heap
page read and write
2250034B000
trusted library allocation
page read and write
27567A60000
heap
page read and write
4A95000
heap
page read and write
1BF1C1F5000
trusted library allocation
page read and write
266D1520000
heap
page read and write
1BF1C439000
trusted library allocation
page read and write
15B55840000
heap
page read and write
1D75C710000
heap
page read and write
CF5BAFF000
stack
page read and write
1C8AEE8B000
trusted library allocation
page read and write
1BF2CFD0000
trusted library allocation
page read and write
1BF1C5E6000
trusted library allocation
page read and write
3A91000
heap
page read and write
2756A0F0000
heap
page execute and read and write
18C0000
heap
page read and write
1BF1A6C1000
heap
page read and write
4BE3000
heap
page read and write
2867C850000
heap
page read and write
7FFD9B98A000
trusted library allocation
page read and write
1BF1A8C0000
trusted library allocation
page read and write
5846000
heap
page read and write
3AA5000
heap
page read and write
660B000
heap
page read and write
7FFD9B919000
trusted library allocation
page read and write
2463B6B7000
trusted library allocation
page read and write
1BF1C1DD000
trusted library allocation
page read and write
2860006F000
trusted library allocation
page read and write
3AE4000
heap
page read and write
2CB12DB0000
heap
page read and write
2750002D000
trusted library allocation
page read and write
28600037000
trusted library allocation
page read and write
6605000
heap
page read and write
4523000
heap
page read and write
6C784000
unkown
page readonly
7FFD9B782000
trusted library allocation
page read and write
4AAA000
heap
page read and write
2250034D000
trusted library allocation
page read and write
3ACA000
heap
page read and write
4348000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1BF2D004000
trusted library allocation
page read and write
4C54000
heap
page read and write
6650000
heap
page read and write
7FFD9B8F9000
trusted library allocation
page read and write
EF0000
unkown
page readonly
4B80000
heap
page read and write
1BF2C40E000
trusted library allocation
page read and write
4B3F000
heap
page read and write
4D38000
heap
page read and write
1BF1C7A3000
trusted library allocation
page read and write
BD954FD000
stack
page read and write
2250034F000
trusted library allocation
page read and write
22500347000
trusted library allocation
page read and write
1BF1C448000
trusted library allocation
page read and write
22578F7F000
heap
page read and write
6C2E1000
unkown
page execute read
1BF2D0DA000
trusted library allocation
page read and write
6C829000
unkown
page read and write
2250007F000
trusted library allocation
page read and write
C27D9FE000
stack
page read and write
1BF34F34000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2463B6FB000
trusted library allocation
page read and write
6C787000
unkown
page read and write
1D75C460000
heap
page read and write
6C252000
unkown
page read and write
C1168FE000
stack
page read and write
C1166FF000
stack
page read and write
4B85000
heap
page read and write
1C8AEBB1000
trusted library allocation
page read and write
266D15F9000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
1C8AEE9B000
trusted library allocation
page read and write
1BF2D830000
trusted library allocation
page read and write
27500464000
trusted library allocation
page read and write
4BBA000
heap
page read and write
28600091000
trusted library allocation
page read and write
2463BAFB000
trusted library allocation
page read and write
3AAF000
heap
page read and write
1BF2D25A000
trusted library allocation
page read and write
4B84000
heap
page read and write
1BF1C41E000
trusted library allocation
page read and write
22578F76000
heap
page read and write
1BF2C8FA000
trusted library allocation
page read and write
1BF2CAE5000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
4AC5000
heap
page read and write
1BF1C2A7000
trusted library allocation
page read and write
2463B9D9000
trusted library allocation
page read and write
3A99000
heap
page read and write
4B03000
heap
page read and write
50F2000
heap
page read and write
4BC7000
heap
page read and write
225003AD000
trusted library allocation
page read and write
2867CAC0000
trusted library allocation
page read and write
2463BAC8000
trusted library allocation
page read and write
1C8AEBD1000
trusted library allocation
page read and write
1BF2D125000
trusted library allocation
page read and write
1BF34D70000
trusted library allocation
page read and write
266D3453000
trusted library allocation
page read and write
3AB7000
heap
page read and write
24639ED5000
heap
page read and write
4AB7000
heap
page read and write
2860047F000
trusted library allocation
page read and write
24639AB8000
heap
page read and write
1BF2D905000
trusted library allocation
page read and write
43AC000
heap
page read and write
452F000
heap
page read and write
3A91000
heap
page read and write
BD93F6D000
stack
page read and write
1BF2D7D1000
trusted library allocation
page read and write
1BF2C83F000
trusted library allocation
page read and write
27EBFCF000
stack
page read and write
3AAF000
heap
page read and write
18CA000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
BD957FE000
stack
page read and write
4AC5000
heap
page read and write
2463B691000
trusted library allocation
page read and write
4FEA000
heap
page read and write
1BF1A686000
heap
page read and write
24639ED0000
heap
page read and write
1BF2CFE6000
trusted library allocation
page read and write
1BF2D7DE000
trusted library allocation
page read and write
28600085000
trusted library allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1BF2C8E5000
trusted library allocation
page read and write
1BF2C96F000
trusted library allocation
page read and write
266D3587000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2463B9CF000
trusted library allocation
page read and write
1BF2C819000
trusted library allocation
page read and write
1C8AEBD5000
trusted library allocation
page read and write
1D6C73AB000
heap
page read and write
2463B9CD000
trusted library allocation
page read and write
286003AD000
trusted library allocation
page read and write
3ABF000
heap
page read and write
1BF1A6C3000
heap
page read and write
BD94CFE000
stack
page read and write
4329000
heap
page read and write
4382000
heap
page read and write
1D6C73AB000
heap
page read and write
C27D7FE000
stack
page read and write
6607000
heap
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
266D358A000
trusted library allocation
page read and write
7FFD9B929000
trusted library allocation
page read and write
1BF2D105000
trusted library allocation
page read and write
CF5BBFE000
stack
page read and write
15B55AC0000
heap
page read and write
4AEE000
heap
page read and write
5313000
heap
page read and write
1BF35130000
heap
page read and write
2750046A000
trusted library allocation
page read and write
188F000
stack
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2463BAEA000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1BF2C1D4000
trusted library allocation
page read and write
2463B705000
trusted library allocation
page read and write
45F4000
heap
page read and write
6C544000
unkown
page readonly
266D1440000
heap
page read and write
1BF2C30E000
trusted library allocation
page read and write
3ABF000
heap
page read and write
2860034B000
trusted library allocation
page read and write
5B29000
heap
page read and write
1BF2C2BE000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1BF2C821000
trusted library allocation
page read and write
EF1000
unkown
page execute read
6C7D1000
unkown
page execute read
4C91000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1C8AEBCD000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
22579140000
heap
page read and write
27567B43000
heap
page read and write
1AD13352000
heap
page read and write
3A91000
heap
page read and write
1D6C73BA000
heap
page read and write
6C5E1000
unkown
page execute read
7FFD9B78D000
trusted library allocation
page execute and read and write
3DAC9AF000
stack
page read and write
49A4000
heap
page read and write
4B5B000
heap
page read and write
266D17E5000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
C8E02FF000
unkown
page read and write
C11635E000
stack
page read and write
4BDB000
heap
page read and write
3AA5000
heap
page read and write
6C1E0000
unkown
page readonly
634E000
heap
page read and write
266D15E7000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
4ADF000
heap
page read and write
2250047D000
trusted library allocation
page read and write
28600479000
trusted library allocation
page read and write
3A96000
heap
page read and write
2463BA25000
trusted library allocation
page read and write
4EE2000
heap
page read and write
148E4D18000
heap
page read and write
1BF1A8A0000
trusted library allocation
page read and write
2CB12B33000
heap
page read and write
2463B6B3000
trusted library allocation
page read and write
6225000
heap
page read and write
266D318F000
trusted library allocation
page read and write
4C65000
heap
page read and write
1C8AEB73000
trusted library allocation
page read and write
4AD2000
heap
page read and write
6402000
heap
page read and write
24639A78000
heap
page read and write
1D75C500000
heap
page read and write
4A8F000
heap
page read and write
1BF1A990000
heap
page execute and read and write
28600467000
trusted library allocation
page read and write
1BF1C20D000
trusted library allocation
page read and write
1BF34D48000
heap
page read and write
3AAF000
heap
page read and write
27567892000
unkown
page readonly
1BF2C836000
trusted library allocation
page read and write
637A000
heap
page read and write
45EB000
heap
page read and write
27567AFD000
heap
page read and write
4359000
heap
page read and write
C27DFFB000
stack
page read and write
1BF2CFF7000
trusted library allocation
page read and write
1BF35231000
heap
page read and write
1BF2C85F000
trusted library allocation
page read and write
633C000
heap
page read and write
1BF1C480000
trusted library allocation
page read and write
51D2000
heap
page read and write
1BF1C442000
trusted library allocation
page read and write
3DACC7F000
stack
page read and write
4A10000
heap
page read and write
4D98000
heap
page read and write
1BF2D8A5000
trusted library allocation
page read and write
1BF1C464000
trusted library allocation
page read and write
2463B9D5000
trusted library allocation
page read and write
6C1DA000
unkown
page readonly
7FFD9B912000
trusted library allocation
page read and write
2860007F000
trusted library allocation
page read and write
28600359000
trusted library allocation
page read and write
6333000
heap
page read and write
15B558E0000
heap
page read and write
1BF2CFF0000
trusted library allocation
page read and write
2860002F000
trusted library allocation
page read and write
1D6C7640000
heap
page read and write
2250033F000
trusted library allocation
page read and write
45FF000
heap
page read and write
1BF2D000000
trusted library allocation
page read and write
139B000
stack
page read and write
1D6C736B000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
28600033000
trusted library allocation
page read and write
24653FF0000
heap
page read and write
6603000
heap
page read and write
1BF2D838000
trusted library allocation
page read and write
28600079000
trusted library allocation
page read and write
4C14000
heap
page read and write
4FEA000
heap
page read and write
1BF2DF68000
trusted library allocation
page read and write
286003A1000
trusted library allocation
page read and write
C8E03FF000
stack
page read and write
C27E0FD000
stack
page read and write
1BF1C861000
trusted library allocation
page read and write
1BF1A8E0000
heap
page read and write
1AD132D0000
heap
page read and write
22500448000
trusted library allocation
page read and write
1BF2CA9A000
trusted library allocation
page read and write
22578FBE000
heap
page read and write
1BF2DFA6000
trusted library allocation
page read and write
BD950FE000
stack
page read and write
1BF2C859000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
6E50AFE000
stack
page read and write
4B0A000
heap
page read and write
1B52000
heap
page read and write
1C8AEEE3000
trusted library allocation
page read and write
225791A0000
trusted library allocation
page read and write
411E000
stack
page read and write
1C8BEB41000
trusted library allocation
page read and write
2867C8F0000
heap
page read and write
4AD2000
heap
page read and write
1BF2D819000
trusted library allocation
page read and write
3A96000
heap
page read and write
4450000
heap
page read and write
28600031000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1D75C360000
heap
page read and write
24639AB6000
heap
page read and write
1BF34F2E000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
CF5BDFF000
stack
page read and write
3AB9000
heap
page read and write
1BF2C306000
trusted library allocation
page read and write
52C0000
heap
page read and write
1BF1C407000
trusted library allocation
page read and write
1BF2D0FA000
trusted library allocation
page read and write
1F10000
unclassified section
page read and write
3AAD000
heap
page read and write
1C8AEBB7000
trusted library allocation
page read and write
2463B6F9000
trusted library allocation
page read and write
1BF2C2B6000
trusted library allocation
page read and write
63C0000
heap
page read and write
1BF34D3F000
heap
page read and write
1BF1C44A000
trusted library allocation
page read and write
27500467000
trusted library allocation
page read and write
CF5B8FE000
stack
page read and write
22578F10000
heap
page read and write
28600071000
trusted library allocation
page read and write
28600473000
trusted library allocation
page read and write
1BF1A870000
heap
page read and write
22578FB8000
heap
page read and write
C1167FE000
stack
page read and write
7FFD9B836000
trusted library allocation
page read and write
6C273000
unkown
page write copy
4359000
heap
page read and write
2463BAF9000
trusted library allocation
page read and write
2463B701000
trusted library allocation
page read and write
2250007B000
trusted library allocation
page read and write
3AE3000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
BD93FFE000
stack
page read and write
1C8AEF23000
trusted library allocation
page read and write
6C5F3000
unkown
page readonly
7FFD9B930000
trusted library allocation
page execute and read and write
1BF2C9DA000
trusted library allocation
page read and write
1BF2D7C4000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
4321000
heap
page read and write
275004AC000
trusted library allocation
page read and write
6C689000
unkown
page readonly
1BF1C764000
trusted library allocation
page read and write
4CD2000
heap
page read and write
4CF5000
heap
page read and write
1BF2D8D0000
trusted library allocation
page read and write
22500035000
trusted library allocation
page read and write
3A91000
heap
page read and write
3A9E000
heap
page read and write
4AC5000
heap
page read and write
3AA5000
heap
page read and write
4F0A000
heap
page read and write
1BF2D78E000
trusted library allocation
page read and write
63BB000
heap
page read and write
3AA5000
heap
page read and write
1BF34190000
trusted library allocation
page read and write
1C8AEB6F000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
1A9A000
heap
page read and write
3A91000
heap
page read and write
1BF2DFC0000
trusted library allocation
page read and write
4B46000
heap
page read and write
94CB7FF000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
12DF000
unkown
page write copy
C116AFE000
stack
page read and write
7FFD9B792000
trusted library allocation
page read and write
1BF34B00000
heap
page read and write
12DE000
unkown
page write copy
1BF2C1EF000
trusted library allocation
page read and write
65E6000
heap
page read and write
50A8000
heap
page read and write
2250008D000
trusted library allocation
page read and write
3AA7000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
22578F20000
heap
page read and write
1BF2C965000
trusted library allocation
page read and write
1BF2C811000
trusted library allocation
page read and write
2CB12B4C000
heap
page read and write
43A1000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
6C4B2000
unkown
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
4406000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
3AC9000
heap
page read and write
4AF5000
heap
page read and write
27510001000
trusted library allocation
page read and write
4AAA000
heap
page read and write
CCB937F000
stack
page read and write
1BF1C451000
trusted library allocation
page read and write
3A99000
heap
page read and write
1BF1A8D3000
trusted library allocation
page read and write
4B6D000
heap
page read and write
3AC9000
heap
page read and write
266D3121000
trusted library allocation
page read and write
1C8AEE91000
trusted library allocation
page read and write
435A000
heap
page read and write
4BD7000
heap
page read and write
4C01000
heap
page read and write
1BF2CFCE000
trusted library allocation
page read and write
3AAF000
heap
page read and write
27567C40000
heap
page read and write
2867C880000
heap
page read and write
1BF1A68C000
heap
page read and write
2463B6B5000
trusted library allocation
page read and write
61E4000
heap
page read and write
1C8AEBCB000
trusted library allocation
page read and write
4B96000
heap
page read and write
1BF1C7DB000
trusted library allocation
page read and write
C116DFE000
stack
page read and write
2867C8F8000
heap
page read and write
1BF2D8DA000
trusted library allocation
page read and write
1BF1C1F9000
trusted library allocation
page read and write
1C8AEFB9000
trusted library allocation
page read and write
6E500FD000
stack
page read and write
444F000
heap
page read and write
2860034F000
trusted library allocation
page read and write
1BF34B03000
heap
page read and write
4C37000
heap
page read and write
5050000
heap
page read and write
CF5B9FD000
stack
page read and write
1BF2C396000
trusted library allocation
page read and write
1C8ACCC0000
trusted library allocation
page read and write
1C8ACD37000
heap
page read and write
4832000
heap
page read and write
1C8AEFB3000
trusted library allocation
page read and write
3A91000
heap
page read and write
1845000
heap
page read and write
22500359000
trusted library allocation
page read and write
2463BAF0000
trusted library allocation
page read and write
50A4000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
4C20000
heap
page read and write
1BF2C857000
trusted library allocation
page read and write
1BF350E0000
heap
page read and write
4C71000
heap
page read and write
3A91000
heap
page read and write
28600353000
trusted library allocation
page read and write
6C53F000
unkown
page read and write
5176000
heap
page read and write
1BF34F02000
heap
page read and write
3ABF000
heap
page read and write
1D6C73BA000
heap
page read and write
3AC1000
heap
page read and write
3A96000
heap
page read and write
22500085000
trusted library allocation
page read and write
28600093000
trusted library allocation
page read and write
3A8D000
heap
page read and write
4529000
heap
page read and write
4874000
heap
page read and write
6C5EB000
unkown
page readonly
1C8ACD0A000
heap
page read and write
1C8ACCD8000
heap
page read and write
527E000
heap
page read and write
62AF000
heap
page read and write
4E5E000
heap
page read and write
1BF1C5DE000
trusted library allocation
page read and write
1BF2C1D9000
trusted library allocation
page read and write
225003E1000
trusted library allocation
page read and write
1BF1C46C000
trusted library allocation
page read and write
94CADCE000
stack
page read and write
BD942FE000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
24639A50000
heap
page read and write
3AA5000
heap
page read and write
4320000
heap
page read and write
27567B13000
heap
page read and write
3A99000
heap
page read and write
22500470000
trusted library allocation
page read and write
4B25000
heap
page read and write
24639A75000
heap
page read and write
12E4000
unkown
page readonly
266D169E000
heap
page read and write
1BF2C3B6000
trusted library allocation
page read and write
1BF2D060000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
4D15000
heap
page read and write
C27DBFF000
stack
page read and write
1BF34ED0000
heap
page read and write
2CB12A20000
heap
page read and write
28115840000
heap
page read and write
6C832000
unkown
page write copy
7FFD9B7BC000
trusted library allocation
page execute and read and write
3A91000
heap
page read and write
511A000
heap
page read and write
266D3599000
trusted library allocation
page read and write
1BF1C300000
trusted library allocation
page read and write
43A0000
heap
page read and write
1BF2C18C000
trusted library allocation
page read and write
28600476000
trusted library allocation
page read and write
4E21000
heap
page read and write
4382000
heap
page read and write
22578F7B000
heap
page read and write
3AC9000
heap
page read and write
4D14000
heap
page read and write
1BF353D4000
heap
page read and write
1BF34ED9000
heap
page read and write
E5143FD000
stack
page read and write
5971000
heap
page read and write
3A8D000
heap
page read and write
22500001000
trusted library allocation
page read and write
2CB12DB5000
heap
page read and write
4B5A000
heap
page read and write
1BF2C3A6000
trusted library allocation
page read and write
3AA5000
heap
page read and write
225003E3000
trusted library allocation
page read and write
1BF1C86D000
trusted library allocation
page read and write
2250006F000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1BF2C93A000
trusted library allocation
page read and write
11FA000
unkown
page read and write
1C8AEBC9000
trusted library allocation
page read and write
286003E3000
trusted library allocation
page read and write
1BF1C323000
trusted library allocation
page read and write
452D000
heap
page read and write
22578F8D000
heap
page read and write
6352000
heap
page read and write
437F000
heap
page read and write
5813A7C000
stack
page read and write
1BF1C4C8000
trusted library allocation
page read and write
5813B7F000
stack
page read and write
3ACA000
heap
page read and write
45F2000
heap
page read and write
51B8000
heap
page read and write
1D6C73BA000
heap
page read and write
1BF1C65D000
trusted library allocation
page read and write
4A75000
heap
page read and write
4F66000
heap
page read and write
17F5000
stack
page read and write
65F1000
heap
page read and write
1C8AEFAD000
trusted library allocation
page read and write
1BF2D7E5000
trusted library allocation
page read and write
1BF2DFC4000
trusted library allocation
page read and write
1BF1C833000
trusted library allocation
page read and write
22500357000
trusted library allocation
page read and write
3ABA000
heap
page read and write
2463B711000
trusted library allocation
page read and write
1C8ACCFA000
heap
page read and write
1BF34CCF000
heap
page read and write
6024000
heap
page read and write
1BF1C44C000
trusted library allocation
page read and write
2867CC00000
heap
page read and write
1BF1C675000
trusted library allocation
page read and write
22500037000
trusted library allocation
page read and write
28600347000
trusted library allocation
page read and write
E5144FE000
stack
page read and write
2750006F000
trusted library allocation
page read and write
1BF2C945000
trusted library allocation
page read and write
1BF1C3C6000
trusted library allocation
page read and write
28600095000
trusted library allocation
page read and write
28600339000
trusted library allocation
page read and write
7FFD9B92B000
trusted library allocation
page read and write
1BF1C416000
trusted library allocation
page read and write
1BF2C37D000
trusted library allocation
page read and write
635E000
heap
page read and write
1BF34EE9000
heap
page read and write
6C686000
unkown
page readonly
266D1790000
heap
page read and write
1BF2CFD6000
trusted library allocation
page read and write
6C657000
unkown
page readonly
1BF2D817000
trusted library allocation
page read and write
4A73000
heap
page read and write
6E509FE000
stack
page read and write
2250008B000
trusted library allocation
page read and write
22500089000
trusted library allocation
page read and write
665F000
heap
page read and write
225003A3000
trusted library allocation
page read and write
45E7000
heap
page read and write
15B558EA000
heap
page read and write
3A99000
heap
page read and write
452E000
heap
page read and write
1A99000
heap
page read and write
6C255000
unkown
page readonly
22500031000
trusted library allocation
page read and write
2463B9BF000
trusted library allocation
page read and write
1800000
heap
page read and write
148E65E0000
heap
page read and write
62B7000
heap
page read and write
6C831000
unkown
page read and write
2CB12B1A000
heap
page read and write
15B558E7000
heap
page read and write
6375000
heap
page read and write
1BF1C681000
trusted library allocation
page read and write
1BF1C7A5000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1BF1C1E6000
trusted library allocation
page read and write
43A1000
heap
page read and write
24639C40000
heap
page read and write
3B2B000
heap
page read and write
6C786000
unkown
page readonly
1AD13380000
heap
page read and write
1BF2D7FF000
trusted library allocation
page read and write
4F24000
heap
page read and write
2860007B000
trusted library allocation
page read and write
4F24000
heap
page read and write
22500071000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
1BF2D8C2000
trusted library allocation
page read and write
3AC9000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
51B9000
heap
page read and write
1BF1C34D000
trusted library allocation
page read and write
65FE000
heap
page read and write
94CB2FF000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2463B9C9000
trusted library allocation
page read and write
2463B9DB000
trusted library allocation
page read and write
4BBD000
heap
page read and write
28115820000
heap
page read and write
523C000
heap
page read and write
4D99000
heap
page read and write
1C8AEB6D000
trusted library allocation
page read and write
5396000
heap
page read and write
27567ADC000
heap
page read and write
1BF1C3E4000
trusted library allocation
page read and write
527E000
heap
page read and write
3B49000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
49AB000
heap
page read and write
286003A5000
trusted library allocation
page read and write
1BF1C48C000
trusted library allocation
page read and write
24639D85000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1BF2C90F000
trusted library allocation
page read and write
5D15000
heap
page read and write
61E4000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
523D000
heap
page read and write
4BD2000
heap
page read and write
2463B689000
trusted library allocation
page read and write
6C78A000
unkown
page readonly
3B2B000
heap
page read and write
1BF2C852000
trusted library allocation
page read and write
1BF1C78E000
trusted library allocation
page read and write
2CB12C30000
heap
page read and write
6C1E5000
unkown
page readonly
27567BBB000
heap
page read and write
2750046D000
trusted library allocation
page read and write
4ADF000
heap
page read and write
4ADF000
heap
page read and write
5A53000
heap
page read and write
1BF1C492000
trusted library allocation
page read and write
4B17000
heap
page read and write
5494000
heap
page read and write
2250002D000
trusted library allocation
page read and write
1840000
heap
page read and write
5265000
heap
page read and write
6130000
heap
page read and write
2257901D000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
1C8ACC30000
heap
page read and write
3AB9000
heap
page read and write
6C2E0000
unkown
page readonly
3A99000
heap
page read and write
475D000
heap
page read and write
48B6000
heap
page read and write
10A69CC000
stack
page read and write
1BF2D925000
trusted library allocation
page read and write
4AEE000
heap
page read and write
266D1540000
heap
page read and write
652F000
heap
page read and write
1BF34A00000
heap
page execute and read and write
4C62000
heap
page read and write
3DAC92C000
stack
page read and write
3A96000
heap
page read and write
22500467000
trusted library allocation
page read and write
2867C8A0000
heap
page read and write
1890000
heap
page read and write
2463BA63000
trusted library allocation
page read and write
1BF1C437000
trusted library allocation
page read and write
E5142FE000
stack
page read and write
148E4E10000
heap
page read and write
1BF1A6AD000
heap
page read and write
4BE3000
heap
page read and write
27567CB0000
heap
page read and write
27567BD0000
trusted library allocation
page read and write
3AAF000
heap
page read and write
5269000
heap
page read and write
3A96000
heap
page read and write
24639A7A000
heap
page read and write
4C49000
heap
page read and write
28600344000
trusted library allocation
page read and write
22500351000
trusted library allocation
page read and write
4EE3000
heap
page read and write
EF1000
unkown
page execute read
4AFC000
heap
page read and write
1BF1C2AB000
trusted library allocation
page read and write
1A93000
heap
page read and write
3A8D000
heap
page read and write
22579265000
heap
page read and write
2463B693000
trusted library allocation
page read and write
27569F34000
heap
page read and write
94CB4FE000
stack
page read and write
4AEE000
heap
page read and write
6C26E000
unkown
page write copy
452E000
heap
page read and write
6260000
heap
page read and write
CCB92FF000
stack
page read and write
1D6C73AA000
heap
page read and write
22500009000
trusted library allocation
page read and write
BD949FB000
stack
page read and write
1AD1336B000
heap
page read and write
266D168F000
heap
page read and write
1C8AEEE1000
trusted library allocation
page read and write
1BF2DF90000
trusted library allocation
page read and write
22579180000
trusted library allocation
page read and write
3AAF000
heap
page read and write
4E1C000
heap
page read and write
4B3F000
heap
page read and write
64E2000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1BF2DF9E000
trusted library allocation
page read and write
1C8AEE7F000
trusted library allocation
page read and write
1BF34FAE000
heap
page read and write
632E000
heap
page read and write
1BF2D99A000
trusted library allocation
page read and write
1BF2D1E5000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1BF2C870000
trusted library allocation
page read and write
6C1F1000
unkown
page execute read
266D15EE000
heap
page read and write
1C8AEFB0000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
1C8AEBCF000
trusted library allocation
page read and write
6C519000
unkown
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1BF2C237000
trusted library allocation
page read and write
4323000
heap
page read and write
5255000
heap
page read and write
225792F0000
heap
page read and write
49A1000
heap
page read and write
1BF1C2E1000
trusted library allocation
page read and write
94CB1FF000
stack
page read and write
1BF2D788000
trusted library allocation
page read and write
1BF1C1E9000
trusted library allocation
page read and write
266D1560000
heap
page read and write
1BF2D1BA000
trusted library allocation
page read and write
4FA8000
heap
page read and write
1BF1C261000
trusted library allocation
page read and write
C27D6FE000
stack
page read and write
1C8AEBC7000
trusted library allocation
page read and write
1C8AEBAF000
trusted library allocation
page read and write
11FA000
unkown
page write copy
BD945FD000
stack
page read and write
1BF2C8CF000
trusted library allocation
page read and write
2CB12B51000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BF1C29F000
trusted library allocation
page read and write
2463BA61000
trusted library allocation
page read and write
286003E1000
trusted library allocation
page read and write
3A8D000
heap
page read and write
6263000
heap
page read and write
28600470000
trusted library allocation
page read and write
1BF1C64B000
trusted library allocation
page read and write
1BF2D7B0000
trusted library allocation
page read and write
1BF2D79E000
trusted library allocation
page read and write
1B69000
heap
page read and write
45EE000
heap
page read and write
C27DAFD000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
50E1000
heap
page read and write
1A91000
heap
page read and write
1C8AEB77000
trusted library allocation
page read and write
22500353000
trusted library allocation
page read and write
49FE000
heap
page read and write
1A95000
heap
page read and write
1C8AEB41000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
3A91000
heap
page read and write
4B25000
heap
page read and write
54F8000
heap
page read and write
11FF000
unkown
page write copy
1D6C7360000
heap
page read and write
1BF1C444000
trusted library allocation
page read and write
1BF1A850000
heap
page read and write
1C8ACEB0000
trusted library allocation
page read and write
3A97000
heap
page read and write
1D75C50A000
heap
page read and write
4FEA000
heap
page read and write
148E6695000
heap
page read and write
1AD132A0000
heap
page read and write
2CB12B3B000
heap
page read and write
1BF1A9B5000
heap
page read and write
435C000
heap
page read and write
22500033000
trusted library allocation
page read and write
4527000
heap
page read and write
27500470000
trusted library allocation
page read and write
22500473000
trusted library allocation
page read and write
5302000
heap
page read and write
4A11000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
502C000
heap
page read and write
27EBF4F000
stack
page read and write
2CB12C50000
heap
page read and write
2860033F000
trusted library allocation
page read and write
3A8D000
heap
page read and write
BD958FD000
stack
page read and write
2250008F000
trusted library allocation
page read and write
24639EC0000
heap
page read and write
3AA5000
heap
page read and write
225003A5000
trusted library allocation
page read and write
6C670000
unkown
page readonly
6C5ED000
unkown
page readonly
22500083000
trusted library allocation
page read and write
7FFD9B92B000
trusted library allocation
page read and write
4EE2000
heap
page read and write
1BF2C2EE000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
2860047B000
trusted library allocation
page read and write
6399000
heap
page read and write
28600009000
trusted library allocation
page read and write
1D6C7460000
heap
page read and write
28610001000
trusted library allocation
page read and write
1AD13600000
heap
page read and write
225003ED000
trusted library allocation
page read and write
1BF2DFB0000
trusted library allocation
page read and write
28600083000
trusted library allocation
page read and write
27569F20000
heap
page read and write
2860046A000
trusted library allocation
page read and write
CF5BCFE000
stack
page read and write
E5147FE000
stack
page read and write
2463BAE7000
trusted library allocation
page read and write
1BF34CD1000
heap
page read and write
4AB0000
heap
page read and write
BD959F9000
stack
page read and write
1BF1C3CC000
trusted library allocation
page read and write
43A0000
heap
page read and write
3B04000
heap
page read and write
6375000
heap
page read and write
452B000
heap
page read and write
C27DEFA000
stack
page read and write
3AC0000
heap
page read and write
2257B630000
heap
page execute and read and write
1C8ACC70000
heap
page read and write
3B25000
heap
page read and write
638D000
heap
page read and write
4AD2000
heap
page read and write
3A91000
heap
page read and write
62F1000
heap
page read and write
3AAF000
heap
page read and write
266D1626000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
2860008D000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1BF2C2E6000
trusted library allocation
page read and write
1BF1C3D7000
trusted library allocation
page read and write
1BF2D2A5000
trusted library allocation
page read and write
3AAF000
heap
page read and write
7FFD9B909000
trusted library allocation
page read and write
1BF2D9DA000
trusted library allocation
page read and write
E5141FE000
stack
page read and write
27567890000
unkown
page readonly
266D314D000
trusted library allocation
page read and write
1BF1C5DA000
trusted library allocation
page read and write
1B58000
heap
page read and write
3A9B000
heap
page read and write
2463B9D1000
trusted library allocation
page read and write
6270000
heap
page read and write
3AAF000
heap
page read and write
62AF000
heap
page read and write
4BE4000
heap
page read and write
1BF2C32E000
trusted library allocation
page read and write
2463B6F1000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1BF2C161000
trusted library allocation
page read and write
2463B6F7000
trusted library allocation
page read and write
27569F10000
heap
page read and write
1B5D000
heap
page read and write
1BF2D7A6000
trusted library allocation
page read and write
4ADF000
heap
page read and write
BD94BF7000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
1BF2D7E1000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
2867EF70000
heap
page read and write
4AE7000
heap
page read and write
3ACA000
heap
page read and write
4E5E000
heap
page read and write
3AA5000
heap
page read and write
2463B6AF000
trusted library allocation
page read and write
1C8AEB51000
trusted library allocation
page read and write
1BF2D1C5000
trusted library allocation
page read and write
1BF1A6F3000
heap
page read and write
3AF0000
heap
page read and write
45F1000
heap
page read and write
1BF2D820000
trusted library allocation
page read and write
1BF2C39E000
trusted library allocation
page read and write
15B55820000
heap
page read and write
4A8F000
heap
page read and write
24639E90000
heap
page execute and read and write
5261000
heap
page read and write
27567940000
heap
page read and write
1D6C7220000
heap
page read and write
6C51E000
unkown
page readonly
94CB0FF000
stack
page read and write
2867F150000
heap
page execute and read and write
1D75C440000
heap
page read and write
27567890000
unkown
page readonly
55D8000
heap
page read and write
6E507FD000
stack
page read and write
D7986FB000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2860046D000
trusted library allocation
page read and write
4AD2000
heap
page read and write
27500473000
trusted library allocation
page read and write
53F0000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
61F7000
heap
page read and write
225003A1000
trusted library allocation
page read and write
3A8D000
heap
page read and write
3ACA000
heap
page read and write
4363000
heap
page read and write
10A6DFF000
stack
page read and write
53F1000
heap
page read and write
1BF2CA05000
trusted library allocation
page read and write
22500087000
trusted library allocation
page read and write
65AC000
heap
page read and write
4AAA000
heap
page read and write
1BF2D1DA000
trusted library allocation
page read and write
1BF34F0D000
heap
page read and write
4B96000
heap
page read and write
1BF2C884000
trusted library allocation
page read and write
53A9000
heap
page read and write
28115630000
heap
page read and write
1C8AEE79000
trusted library allocation
page read and write
7FFD9B922000
trusted library allocation
page read and write
3AC0000
heap
page read and write
1BF1A680000
heap
page read and write
2463B6B1000
trusted library allocation
page read and write
52C0000
heap
page read and write
2250046A000
trusted library allocation
page read and write
1BF1C47B000
trusted library allocation
page read and write
2257B4D0000
heap
page read and write
1BF2D89A000
trusted library allocation
page read and write
4C49000
heap
page read and write
6203000
heap
page read and write
5EB3000
heap
page read and write
C116CFF000
stack
page read and write
6E508FE000
stack
page read and write
4FA8000
heap
page read and write
24639A7F000
heap
page read and write
45F2000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
22500077000
trusted library allocation
page read and write
1BF2C445000
trusted library allocation
page read and write
1BF35220000
heap
page read and write
626E000
heap
page read and write
24639C20000
heap
page read and write
266D15C8000
heap
page read and write
3A92000
heap
page read and write
1BF1A645000
heap
page read and write
1BF2C1ED000
trusted library allocation
page read and write
6E50BFE000
stack
page read and write
1C8AEE8D000
trusted library allocation
page read and write
266D359D000
trusted library allocation
page read and write
3AAF000
heap
page read and write
3AC0000
heap
page read and write
4BE3000
heap
page read and write
4B3F000
heap
page read and write
4EA0000
heap
page read and write
4AEF000
heap
page read and write
1BF1A6ED000
heap
page read and write
3ACA000
heap
page read and write
2463B707000
trusted library allocation
page read and write
22579260000
heap
page read and write
3B04000
heap
page read and write
1C8AEE95000
trusted library allocation
page read and write
2463BA6D000
trusted library allocation
page read and write
4BE3000
heap
page read and write
2250035B000
trusted library allocation
page read and write
7FF42F7A0000
trusted library allocation
page execute and read and write
27567AD6000
heap
page read and write
48F8000
heap
page read and write
1BF34C54000
heap
page read and write
5432000
heap
page read and write
22500079000
trusted library allocation
page read and write
6C5EF000
unkown
page read and write
1BF353D0000
heap
page read and write
266E3121000
trusted library allocation
page read and write
12D8000
unkown
page read and write
1BF1C466000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
1BF2CFE0000
trusted library allocation
page read and write
6444000
heap
page read and write
44D4000
heap
page read and write
2867E6E0000
heap
page read and write
22500333000
trusted library allocation
page read and write
3A9E000
heap
page read and write
4F24000
heap
page read and write
28600351000
trusted library allocation
page read and write
6375000
heap
page read and write
1AD13500000
heap
page read and write
3AA2000
heap
page read and write
246541F0000
heap
page execute and read and write
1C8ACF30000
heap
page execute and read and write
1BF2CA1A000
trusted library allocation
page read and write
47F0000
heap
page read and write
4BD7000
heap
page read and write
1BF2C2C5000
trusted library allocation
page read and write
2867C90B000
heap
page read and write
1BF1C3F8000
trusted library allocation
page read and write
4F66000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2463BAFD000
trusted library allocation
page read and write
6C81F000
unkown
page read and write
1C8AEF88000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1BF2D7A0000
trusted library allocation
page read and write
22578F50000
heap
page read and write
266D17E0000
heap
page read and write
3A99000
heap
page read and write
1C8ACC50000
heap
page read and write
5474000
heap
page read and write
94CB5FE000
stack
page read and write
1BF1A9B0000
heap
page read and write
2250047B000
trusted library allocation
page read and write
4CD2000
heap
page read and write
65E8000
heap
page read and write
4ABE000
heap
page read and write
2860002D000
trusted library allocation
page read and write
27567BBF000
heap
page read and write
E5146FE000
stack
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
28600087000
trusted library allocation
page read and write
4361000
heap
page read and write
1BF2C825000
trusted library allocation
page read and write
1BF1C420000
trusted library allocation
page read and write
7FFD9B919000
trusted library allocation
page read and write
3A99000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
C27D3ED000
stack
page read and write
2750049E000
trusted library allocation
page read and write
2867C91A000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
51E2000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
3AC0000
heap
page read and write
6C5E0000
unkown
page readonly
2463B9C7000
trusted library allocation
page read and write
506E000
heap
page read and write
C116BFE000
stack
page read and write
2463BAED000
trusted library allocation
page read and write
5681000
heap
page read and write
3B04000
heap
page read and write
1BF2D0D0000
trusted library allocation
page read and write
24639D80000
heap
page read and write
1BF1C4C2000
trusted library allocation
page read and write
22500091000
trusted library allocation
page read and write
28115905000
heap
page read and write
3AAF000
heap
page read and write
2463B9B9000
trusted library allocation
page read and write
1D6C73BC000
heap
page read and write
1BF1C2B0000
trusted library allocation
page read and write
2860008B000
trusted library allocation
page read and write
24639C60000
heap
page read and write
22500349000
trusted library allocation
page read and write
266D3596000
trusted library allocation
page read and write
4DDA000
heap
page read and write
1BF2D827000
trusted library allocation
page read and write
3AC9000
heap
page read and write
1BF344EB000
heap
page read and write
C27E1FE000
stack
page read and write
E513CFE000
stack
page read and write
4A8F000
heap
page read and write
1BF1C48A000
trusted library allocation
page read and write
27567B3C000
heap
page read and write
1AD13381000
heap
page read and write
6C835000
unkown
page readonly
1BF2C91A000
trusted library allocation
page read and write
4B53000
heap
page read and write
50F2000
heap
page read and write
1BF1C67D000
trusted library allocation
page read and write
1BF1C6A9000
trusted library allocation
page read and write
1C8AEF21000
trusted library allocation
page read and write
1BF34C50000
heap
page read and write
27500476000
trusted library allocation
page read and write
24639CA0000
trusted library allocation
page read and write
27567AFB000
heap
page read and write
1BF2D9D0000
trusted library allocation
page read and write
28600357000
trusted library allocation
page read and write
2250046D000
trusted library allocation
page read and write
6E505FE000
stack
page read and write
6C267000
unkown
page read and write
1BF2C925000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
22500339000
trusted library allocation
page read and write
2CB12B4D000
heap
page read and write
2463BA2D000
trusted library allocation
page read and write
1BF2C253000
trusted library allocation
page read and write
3AAF000
heap
page read and write
28600001000
trusted library allocation
page read and write
3AAF000
heap
page read and write
6578000
heap
page read and write
1BF2D9BA000
trusted library allocation
page read and write
266D16D0000
trusted library allocation
page read and write
18CE000
heap
page read and write
94CB6FF000
stack
page read and write
1C8ACCF5000
heap
page read and write
43A0000
heap
page read and write
EF0000
unkown
page readonly
4B5A000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1C8F000
stack
page read and write
C27E2FB000
stack
page read and write
28600035000
trusted library allocation
page read and write
3ABA000
heap
page read and write
3B04000
heap
page read and write
7FFD9B91B000
trusted library allocation
page read and write
1BF2D9C5000
trusted library allocation
page read and write
4EA1000
heap
page read and write
1BF2C2F5000
trusted library allocation
page read and write
266EB9D0000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1BF1C3DD000
trusted library allocation
page read and write
3AAF000
heap
page read and write
3AAF000
heap
page read and write
1BF2C1E0000
trusted library allocation
page read and write
6C68A000
unkown
page read and write
1BF1C3CF000
trusted library allocation
page read and write
3AC9000
heap
page read and write
1C8AEBBB000
trusted library allocation
page read and write
1BF1C424000
trusted library allocation
page read and write
4B32000
heap
page read and write
1BF1C2FB000
trusted library allocation
page read and write
1C8ACCFE000
heap
page read and write
3AA5000
heap
page read and write
1C8AEE8F000
trusted library allocation
page read and write
636C000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1BF2C8DA000
trusted library allocation
page read and write
C27DDFE000
stack
page read and write
524D000
heap
page read and write
63BB000
heap
page read and write
4F66000
heap
page read and write
1BF1C224000
trusted library allocation
page read and write
3AD3000
heap
page read and write
1BF2D765000
trusted library allocation
page read and write
50B0000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
3B2C000
heap
page read and write
1BF2DF88000
trusted library allocation
page read and write
6513000
heap
page read and write
22500344000
trusted library allocation
page read and write
3AC9000
heap
page read and write
15B55AC5000
heap
page read and write
5E18000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1BF1C3DF000
trusted library allocation
page read and write
1C8AEBBF000
trusted library allocation
page read and write
62B4000
heap
page read and write
6C540000
unkown
page write copy
266D1985000
heap
page read and write
6C781000
unkown
page execute read
1BF2D768000
trusted library allocation
page read and write
1BF1C7C6000
trusted library allocation
page read and write
3AC0000
heap
page read and write
61F3000
heap
page read and write
3AA5000
heap
page read and write
6310000
heap
page read and write
4CB2000
heap
page read and write
4AB7000
heap
page read and write
1BF2C24D000
trusted library allocation
page read and write
4AD8000
heap
page read and write
1BF2DF96000
trusted library allocation
page read and write
1BF2D7B7000
trusted library allocation
page read and write
1BF1C4A1000
trusted library allocation
page read and write
22510001000
trusted library allocation
page read and write
2463BAFF000
trusted library allocation
page read and write
4B5C000
heap
page read and write
1BF2C9FA000
trusted library allocation
page read and write
3ABA000
heap
page read and write
CF5B6FE000
stack
page read and write
1BF2C27D000
trusted library allocation
page read and write
4F67000
heap
page read and write
2463B681000
trusted library allocation
page read and write
1D75C715000
heap
page read and write
54B6000
heap
page read and write
2867C860000
heap
page read and write
1BF2C878000
trusted library allocation
page read and write
50E7000
heap
page read and write
5792000
heap
page read and write
4B17000
heap
page read and write
2750047D000
trusted library allocation
page read and write
24639B1D000
heap
page read and write
1C8AEBB9000
trusted library allocation
page read and write
3AA7000
heap
page read and write
1BF362E7000
heap
page read and write
1BF2C26E000
trusted library allocation
page read and write
1BF1C46A000
trusted library allocation
page read and write
1C8AD1C0000
heap
page read and write
502C000
heap
page read and write
1BF2CA0F000
trusted library allocation
page read and write
2463B70F000
trusted library allocation
page read and write
22500479000
trusted library allocation
page read and write
1BF1C477000
trusted library allocation
page read and write
4321000
heap
page read and write
3A8D000
heap
page read and write
6C1E4000
unkown
page write copy
4BE3000
heap
page read and write
1C8AEFBD000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
1D6C7399000
heap
page read and write
49B7000
heap
page read and write
65EA000
heap
page read and write
3A99000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
28600448000
trusted library allocation
page read and write
3A50000
heap
page read and write
4B83000
heap
page read and write
27EBECC000
stack
page read and write
6E504FE000
stack
page read and write
2463BA23000
trusted library allocation
page read and write
1BF2D0E5000
trusted library allocation
page read and write
1C8AEBC5000
trusted library allocation
page read and write
1BF2C171000
trusted library allocation
page read and write
1C8AEE87000
trusted library allocation
page read and write
45C5000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BF2D8BA000
trusted library allocation
page read and write
24639A8A000
heap
page read and write
1BF1C266000
trusted library allocation
page read and write
27567CB5000
heap
page read and write
27500333000
trusted library allocation
page read and write
2867CD90000
heap
page read and write
266D15FC000
heap
page read and write
24639CC0000
trusted library allocation
page read and write
1BF1C457000
trusted library allocation
page read and write
1BF2CFDE000
trusted library allocation
page read and write
4FA8000
heap
page read and write
3A91000
heap
page read and write
4C58000
heap
page read and write
4FA7000
heap
page read and write
2463B6EF000
trusted library allocation
page read and write
4A2D000
heap
page read and write
1C8ACD9E000
heap
page read and write
2463B9D7000
trusted library allocation
page read and write
1BF2C174000
trusted library allocation
page read and write
1D6C7320000
heap
page read and write
61E2000
heap
page read and write
1BF1C669000
trusted library allocation
page read and write
1BF2C2D6000
trusted library allocation
page read and write
1BF35210000
heap
page read and write
3A9E000
heap
page read and write
266EB9A0000
heap
page execute and read and write
3AD1000
heap
page read and write
1C8AEFBF000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
27500001000
trusted library allocation
page read and write
1C8AEEE5000
trusted library allocation
page read and write
43A0000
heap
page read and write
1D6C7300000
heap
page read and write
50CE000
heap
page read and write
3A96000
heap
page read and write
5DCE000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
3ACB000
heap
page read and write
CCB93FF000
stack
page read and write
27567AB0000
trusted library allocation
page read and write
2463BA21000
trusted library allocation
page read and write
1BF2DFA0000
trusted library allocation
page read and write
4AAA000
heap
page read and write
3AB9000
heap
page read and write
1C8AEE97000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
1C8AEEED000
trusted library allocation
page read and write
1C8AEE93000
trusted library allocation
page read and write
13F0000
heap
page read and write
3AAA000
heap
page read and write
1AD1335A000
heap
page read and write
65F3000
heap
page read and write
D7987FF000
unkown
page read and write
62ED000
heap
page read and write
1D6C7384000
heap
page read and write
2867C92B000
heap
page read and write
1205000
unkown
page read and write
1C8ACF40000
heap
page read and write
C27D8FE000
stack
page read and write
24639A30000
heap
page read and write
2860035B000
trusted library allocation
page read and write
10A6CFF000
unkown
page read and write
1C8AEBD3000
trusted library allocation
page read and write
50C4000
heap
page read and write
7FFD9B929000
trusted library allocation
page read and write
2860008F000
trusted library allocation
page read and write
65FA000
heap
page read and write
3ACA000
heap
page read and write
2CB12B10000
heap
page read and write
3ACA000
heap
page read and write
2463B9B3000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
6C5F2000
unkown
page write copy
4BCE000
heap
page read and write
1C8AEFA7000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
506E000
heap
page read and write
6C51B000
unkown
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
2463B9D3000
trusted library allocation
page read and write
22579240000
heap
page read and write
4BD7000
heap
page read and write
1BF1C794000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
2867C92D000
heap
page read and write
22578F8B000
heap
page read and write
4FEA000
heap
page read and write
4B97000
heap
page read and write
1BF2C7D6000
trusted library allocation
page read and write
28600333000
trusted library allocation
page read and write
2867C91E000
heap
page read and write
4B51000
heap
page read and write
28600349000
trusted library allocation
page read and write
1BF2D8FA000
trusted library allocation
page read and write
4527000
heap
page read and write
1BF34FA5000
heap
page read and write
1C8ACCD0000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
1BF2C274000
trusted library allocation
page read and write
1BF2D9E5000
trusted library allocation
page read and write
1C8AEFBB000
trusted library allocation
page read and write
28600089000
trusted library allocation
page read and write
4B25000
heap
page read and write
2463BAF3000
trusted library allocation
page read and write
1BF1C403000
trusted library allocation
page read and write
3AA5000
heap
page read and write
1BF2D88F000
trusted library allocation
page read and write
1C8AEB71000
trusted library allocation
page read and write
275004AA000
trusted library allocation
page read and write
28115900000
heap
page read and write
1BF2C191000
trusted library allocation
page read and write
4B5C000
heap
page read and write
266D3590000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1C8AEFB6000
trusted library allocation
page read and write
1BF34C80000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
24639A8C000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
24639A6B000
heap
page read and write
6C820000
unkown
page readonly
4AB7000
heap
page read and write
1BF2D19A000
trusted library allocation
page read and write
4B25000
heap
page read and write
2811565A000
heap
page read and write
1AD13330000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
2867CBB0000
heap
page execute and read and write
1BF2DF65000
trusted library allocation
page read and write
4B3F000
heap
page read and write
437F000
heap
page read and write
6C82B000
unkown
page readonly
6C543000
unkown
page write copy
4B81000
heap
page read and write
1C8AEFAA000
trusted library allocation
page read and write
6C1E1000
unkown
page read and write
22500095000
trusted library allocation
page read and write
266D3110000
heap
page execute and read and write
4ADF000
heap
page read and write
There are 1669 hidden memdumps, click here to show them.