Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ZT3pxe2Tb4.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\3IMqqsTTOd.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6WkFIbRMFr.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7nxekELsf0.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Gu3WPocxsu.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\I3W1TCNLwG.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\OwDUg2gYJx.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ZMh4UPVO0I.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e2HUAivGfO.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s2nU7uS06N.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wuC6fcDv5B.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\AFOsBjYP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\AaPSReOe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BxnIYuRz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CGTrJaEm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\COTaDrJc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CQeYyQPa.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CTQIQVae.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CdkYHFFH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CgRzmzKC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CkrRJHNx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DACRVJoK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DEcjsSrF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DQsQlVoZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DdBAnNSZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DnshUSLJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ELDRalsN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\EOpBrqDR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\EQFIYaOX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FWXhQVXq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FWzHsBqG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FvSbvlyH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GGiHtSpS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GPSaXBQY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GspafaHt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HlvZPcYC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HuSZzPsz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HxFJRUCD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IHwzgXOR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IbKgwPay.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IdUqmnRm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IiRYzRio.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IsWIxvZJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JAxqeOaQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JavyIngh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JfyqGcCs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JvAHRkKP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KOmOGvDg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KWVhlfdm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KjbhtTTT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KnZYovDz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KszgdGmQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LovAYRCw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LtTWIWgh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MHvzAhUM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MLVQXpXH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MMDorhKp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MPlPWbPk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MTLhtkSf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NMMXsbef.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NWMxEuQr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NgoGZspx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NmOPODYO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OEWHVhjH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ORiFVhtH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OemrfNDp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OgxpbmIn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OjpXkDnJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OnJqPAWm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OzZYIDTF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PCgnLZlk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PEqxAxdY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PwAgeDiA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QfCxRbIn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QkEpPQey.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QpCXcuuA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RCCOzYeY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RMCoLrQk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RMaOjKxV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RMfXVWDe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RRcFiATg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RnzHiPIs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RraOLYZw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SKewgrff.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SbqYhYfr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SdGfOIqy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TCIWpNeY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\THFECrua.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TORFqFIZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TWBYVoif.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TYRgCYum.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TlbPEPXm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ULtOMFWU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UOaorzbP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UbSwNisy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VPWFywnw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VWGgLdif.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WAZwZzli.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WYfWtHNc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WgOpYqoh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WuogHSdp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WvXEaKPX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WzsNMHNJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XEIwxBIS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XFfNnXVZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XsyMwKeS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XxwvJouT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XzFFzMmI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XzKOkXsR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YBjETBXN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YMjefUJa.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YOQFKOOU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YUSxJEkf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YVGePHcW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YnJNkaiG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YsHvxEyH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZbufrXkm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZklVGaxA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZtZwWUdP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aABfDneW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aFyNQRuY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aLYWFcdp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aVjDvRpd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aYVnMXzh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\auteTnDC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\avWEvUWS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\bAJNFhyM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\bYjfzcZg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\blWejAjG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cixmEAyA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cnAeDqUL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dKmMwLxf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dabMNWxu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dbVNVLdb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dpYUmTzI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eCwwaQCH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fLnmpTPV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\feqUKmVF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fqGCEpSY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fuaVjmBB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fvxnZIOH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fyqViYtd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fzXEwQRC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gmudUmpb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hJcmyZDP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hRSCUTxn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hezDLgou.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hsmnhNDB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iANVPgEI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iJlVzTXF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iKNvbzqU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ifAdEpGk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ikDUDecv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\inkviYhq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\inpEUjnz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ipFMCTyG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jECTfuuL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kMzdwiuP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kQZvTrxL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kUpuTdpn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\kdNuDPIk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lCADkPID.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lHCvjEeO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lThKWNPp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ldamqVhj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mCNvXUiC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mJblSiJK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\maCuLVwe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mbeUnBPt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\msUTDNPI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nHlSHaLn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nJodFojJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nJvbxzCb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ntFcgnCN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\oQWKeSDj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\oTDkKMId.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ouGCZwUD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pJXAdKPi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pMKkuPam.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\phJkSByL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\piqUgtXk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pntLeisv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pzYaRqdW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qguCdZEu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qiEMTywj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qiKKKJQB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qxbJOXLg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rAfUMkjC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rmtKjMmm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rrvChBIx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rudcNvNr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sQxsIGwX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sXAbZyyE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sYhLnqXd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sihlzJJp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tAOrkGQb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tIxJOpqh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tqrrAUxf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uHokLZDZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uJzjHyIX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uRiBlhjd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uvZrYWTP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uztLDTCs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wHLAFYKX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wOXBumXW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wsOrhbIJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xHZssejW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xOrrZDRn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xgyKnYKq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xkYbKhNl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xvPIrmGV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yEAAOeyR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ylQifTUJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zReaumVj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zTojkKNX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zfzIrCEh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zldaSYtH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zntiAIEO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zsrQNmVQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zuGjoWSN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zzDSBAiP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\5b884080fd4f94
|
ASCII text, with very long lines (917), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ZT3pxe2Tb4.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9a5gxuAtmR
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HB2xslwwvT
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Haf5RcGt9x
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IlQIezJnYm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\J8UmnJMZzF
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\JA6yKsxCrA
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KXBTTC0yId
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Q6MZwzjQ2O
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SRst0rCoYd
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\t4K12zjFmm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 227 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ZT3pxe2Tb4.exe
|
"C:\Users\user\Desktop\ZT3pxe2Tb4.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\user\AppData\Local\fontdrvhost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\user\AppData\Local\fontdrvhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Users\user\AppData\Local\fontdrvhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\e2HUAivGfO.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
C:\Users\user\AppData\Local\fontdrvhost.exe
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
C:\Users\user\AppData\Local\fontdrvhost.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\wuC6fcDv5B.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\6WkFIbRMFr.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\OwDUg2gYJx.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s2nU7uS06N.bat"
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ZMh4UPVO0I.bat"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\I3W1TCNLwG.bat"
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\7nxekELsf0.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\Gu3WPocxsu.bat"
|
||
C:\Users\user\AppData\Local\fontdrvhost.exe
|
"C:\Users\user\AppData\Local\fontdrvhost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\3IMqqsTTOd.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 43 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://89.23.98.225/8pollDbvoiddb/DatalifeFlowerWp/processbaseMariadb1/Defaultbigloadpython/Generator/videoLowUpdateDbasync.php
|
89.23.98.225
|
||
http://89.23.98.225
|
unknown
|
||
http://89.23.98.225/8pollDbvoiddb/DatalifeFlowerWp/processbaseMariadb1/Defaultbigloadpython/Generato
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.23.98.225
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\68258479fe38876547aa0d161e34fbfd6b764f04
|
ce7857c5edabaa73226ecdf741096f794b654aa9
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fontdrvhost_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
13466000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
unkown
|
page readonly
|
||
1ABCB000
|
stack
|
page read and write
|
||
7FFD9C1CE000
|
trusted library allocation
|
page read and write
|
||
1B350000
|
heap
|
page read and write
|
||
7FFD9C0F5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEA5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA4000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FFD9BE65000
|
trusted library allocation
|
page read and write
|
||
35D4000
|
trusted library allocation
|
page read and write
|
||
13651000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1429C000
|
trusted library allocation
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
1BDD7000
|
heap
|
page read and write
|
||
2294D250000
|
heap
|
page read and write
|
||
13553000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page execute and read and write
|
||
7FFD9C243000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page read and write
|
||
127D4000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA1B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
7FFD9C209000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E7000
|
trusted library allocation
|
page read and write
|
||
1BA97000
|
heap
|
page read and write
|
||
2709000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A3000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
7FFD9BF5E000
|
trusted library allocation
|
page read and write
|
||
12F8A000
|
trusted library allocation
|
page read and write
|
||
12B7A000
|
trusted library allocation
|
page read and write
|
||
1415C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
12B14000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB49000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA08000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C186000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
1B7C0000
|
heap
|
page read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
12CFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C6000
|
trusted library allocation
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
136AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C068000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF0D000
|
trusted library allocation
|
page read and write
|
||
13FD3000
|
trusted library allocation
|
page read and write
|
||
1C3CE000
|
stack
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
2CA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
3621000
|
trusted library allocation
|
page read and write
|
||
1332B000
|
trusted library allocation
|
page read and write
|
||
127A2000
|
trusted library allocation
|
page read and write
|
||
1BCB0000
|
unkown
|
page readonly
|
||
1344A000
|
trusted library allocation
|
page read and write
|
||
13F03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB1D000
|
trusted library allocation
|
page read and write
|
||
13896000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9C070000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page execute and read and write
|
||
2F02000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
267E000
|
trusted library allocation
|
page read and write
|
||
7FFD9C245000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
12E60000
|
trusted library allocation
|
page read and write
|
||
2D69000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0AC000
|
trusted library allocation
|
page read and write
|
||
1B02C000
|
heap
|
page read and write
|
||
7FFD9B8CD000
|
trusted library allocation
|
page execute and read and write
|
||
14253000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
1CC92000
|
heap
|
page read and write
|
||
7FFD9BE73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA5000
|
trusted library allocation
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB55000
|
trusted library allocation
|
page read and write
|
||
7FFD9C213000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEEE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2BE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
1459D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
1C1EF000
|
stack
|
page read and write
|
||
7FFD9BA58000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB19000
|
trusted library allocation
|
page read and write
|
||
1421E000
|
trusted library allocation
|
page read and write
|
||
1B549000
|
heap
|
page read and write
|
||
1CB8B000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
116A000
|
stack
|
page read and write
|
||
7FFD9C242000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
184B0F67000
|
heap
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page read and write
|
||
141C4000
|
trusted library allocation
|
page read and write
|
||
30B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7FFD9BC54000
|
trusted library allocation
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
7FFD9B8E8000
|
trusted library allocation
|
page read and write
|
||
13BCC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page execute and read and write
|
||
14062000
|
trusted library allocation
|
page read and write
|
||
1404C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page execute and read and write
|
||
9CB000
|
heap
|
page read and write
|
||
13740000
|
trusted library allocation
|
page read and write
|
||
132C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
1B8AE000
|
stack
|
page read and write
|
||
1B8B3000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
1B61F000
|
heap
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
1C0B0000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
1BCD2000
|
unkown
|
page readonly
|
||
13612000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C300000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF96000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
24AED9B0000
|
heap
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
13FB3000
|
trusted library allocation
|
page read and write
|
||
1B43E000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA91000
|
trusted library allocation
|
page read and write
|
||
13884000
|
trusted library allocation
|
page read and write
|
||
12D92000
|
trusted library allocation
|
page read and write
|
||
35D8000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C249000
|
trusted library allocation
|
page read and write
|
||
140D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9C310000
|
trusted library allocation
|
page execute and read and write
|
||
1896000
|
heap
|
page read and write
|
||
1438E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
1BCF0000
|
unkown
|
page readonly
|
||
12B23000
|
trusted library allocation
|
page read and write
|
||
1306F000
|
trusted library allocation
|
page read and write
|
||
138A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
13886000
|
trusted library allocation
|
page read and write
|
||
1BD6F000
|
heap
|
page read and write
|
||
7FFD9B9EB000
|
trusted library allocation
|
page execute and read and write
|
||
31C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB24000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1BDF0000
|
unkown
|
page readonly
|
||
184B0F20000
|
heap
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
1BF75000
|
heap
|
page read and write
|
||
1BD72000
|
unkown
|
page readonly
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
3812000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
14A4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1BAFD000
|
stack
|
page read and write
|
||
7FFD9BBCC000
|
trusted library allocation
|
page read and write
|
||
1BDA0000
|
unkown
|
page readonly
|
||
1B110000
|
heap
|
page read and write
|
||
7FFD9BAD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD6000
|
trusted library allocation
|
page read and write
|
||
1552000
|
unkown
|
page readonly
|
||
1BDD4000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC9000
|
trusted library allocation
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
7FFD9C10A000
|
trusted library allocation
|
page execute and read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
14119000
|
trusted library allocation
|
page read and write
|
||
1373C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA2B000
|
trusted library allocation
|
page execute and read and write
|
||
D4BF11F000
|
stack
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
1BAFC000
|
heap
|
page read and write
|
||
7FFD9C227000
|
trusted library allocation
|
page read and write
|
||
1B70A000
|
stack
|
page read and write
|
||
1BDF2000
|
unkown
|
page readonly
|
||
17CE000
|
stack
|
page read and write
|
||
7FFD9BE83000
|
trusted library allocation
|
page read and write
|
||
1B950000
|
heap
|
page read and write
|
||
1B7E3000
|
heap
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
13301000
|
trusted library allocation
|
page read and write
|
||
7FFD9C300000
|
trusted library allocation
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page read and write
|
||
12843000
|
trusted library allocation
|
page read and write
|
||
1C143000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
13ECD000
|
trusted library allocation
|
page read and write
|
||
1C69D000
|
stack
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
25FD07F0000
|
heap
|
page read and write
|
||
1B7A1000
|
heap
|
page read and write
|
||
13200000
|
trusted library allocation
|
page read and write
|
||
7FFD9C07C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1C49E000
|
stack
|
page read and write
|
||
3752000
|
trusted library allocation
|
page read and write
|
||
1BF1E000
|
heap
|
page read and write
|
||
1B413000
|
heap
|
page execute and read and write
|
||
7FFD9BED7000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1CE000
|
trusted library allocation
|
page read and write
|
||
136D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
1341B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1F000
|
trusted library allocation
|
page execute and read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
7FFD9C163000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
13E31000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB5000
|
trusted library allocation
|
page read and write
|
||
1B7CF000
|
stack
|
page read and write
|
||
7FFD9BA2B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFD6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
13927000
|
trusted library allocation
|
page read and write
|
||
1CCBE000
|
heap
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE72000
|
trusted library allocation
|
page read and write
|
||
1C710000
|
heap
|
page read and write
|
||
7FFD9C0AC000
|
trusted library allocation
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
30B9000
|
trusted library allocation
|
page read and write
|
||
28F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
153B000
|
heap
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
1324A000
|
trusted library allocation
|
page read and write
|
||
91A000
|
stack
|
page read and write
|
||
137C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C160000
|
trusted library allocation
|
page read and write
|
||
1CA0D000
|
stack
|
page read and write
|
||
7FFD9BEC6000
|
trusted library allocation
|
page read and write
|
||
13F70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
1BA50000
|
heap
|
page read and write
|
||
7FFD9BF0B000
|
trusted library allocation
|
page read and write
|
||
1363B000
|
trusted library allocation
|
page read and write
|
||
12E0B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
3262000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF3000
|
trusted library allocation
|
page read and write
|
||
13189000
|
trusted library allocation
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
1C50D000
|
stack
|
page read and write
|
||
14349000
|
trusted library allocation
|
page read and write
|
||
1A67CE70000
|
heap
|
page read and write
|
||
14A56000
|
trusted library allocation
|
page read and write
|
||
1AF2B000
|
stack
|
page read and write
|
||
7FFD9C27A000
|
trusted library allocation
|
page read and write
|
||
136DC000
|
trusted library allocation
|
page read and write
|
||
1B76C000
|
heap
|
page read and write
|
||
7FFD9C207000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
trusted library allocation
|
page read and write
|
||
37FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
1B980000
|
heap
|
page read and write
|
||
7FFD9C048000
|
trusted library allocation
|
page read and write
|
||
7FFD9C050000
|
trusted library allocation
|
page read and write
|
||
7FFD9C060000
|
trusted library allocation
|
page read and write
|
||
38DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C274000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
14638000
|
trusted library allocation
|
page read and write
|
||
25FD0870000
|
heap
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page execute and read and write
|
||
13624000
|
trusted library allocation
|
page read and write
|
||
7FFD9C071000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
184B1290000
|
heap
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
25D3000
|
heap
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
127B9000
|
trusted library allocation
|
page read and write
|
||
3794000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB8000
|
trusted library allocation
|
page read and write
|
||
13476000
|
trusted library allocation
|
page read and write
|
||
1405E000
|
trusted library allocation
|
page read and write
|
||
FF8000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
1419B000
|
trusted library allocation
|
page read and write
|
||
24AEDA09000
|
heap
|
page read and write
|
||
7FFD9BE5F000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
7FFD9C27F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
12F16000
|
trusted library allocation
|
page read and write
|
||
184B1295000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2F07000
|
trusted library allocation
|
page read and write
|
||
2294D240000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
133CF000
|
trusted library allocation
|
page read and write
|
||
141618E0000
|
heap
|
page read and write
|
||
7FFD9BEF7000
|
trusted library allocation
|
page read and write
|
||
1BA65000
|
heap
|
page read and write
|
||
7FFD9BA0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9C29A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF71000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
848BF0F000
|
stack
|
page read and write
|
||
1C564000
|
heap
|
page read and write
|
||
1510000
|
unkown
|
page readonly
|
||
14478000
|
trusted library allocation
|
page read and write
|
||
1BA5B000
|
stack
|
page read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA06000
|
trusted library allocation
|
page execute and read and write
|
||
1B50B000
|
heap
|
page read and write
|
||
12702000
|
trusted library allocation
|
page read and write
|
||
3294000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C170000
|
trusted library allocation
|
page read and write
|
||
13EF5000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BECD000
|
trusted library allocation
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
7FFD9C071000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF09000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
142EE000
|
trusted library allocation
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF27000
|
trusted library allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
7FFD9B8D8000
|
trusted library allocation
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB71000
|
trusted library allocation
|
page read and write
|
||
14293000
|
trusted library allocation
|
page read and write
|
||
146B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD8000
|
trusted library allocation
|
page read and write
|
||
13E69000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
12DF1000
|
trusted library allocation
|
page read and write
|
||
1B70B000
|
heap
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
7FFD9BE7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
heap
|
page execute and read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page execute and read and write
|
||
13F62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE75000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
1D28D000
|
stack
|
page read and write
|
||
1C40E000
|
stack
|
page read and write
|
||
7FFD9C156000
|
trusted library allocation
|
page read and write
|
||
7FFD9C080000
|
trusted library allocation
|
page read and write
|
||
1C00B000
|
heap
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB37000
|
trusted library allocation
|
page read and write
|
||
13EEE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF86000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
142B2000
|
trusted library allocation
|
page read and write
|
||
1B4B1000
|
heap
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
1D62B000
|
stack
|
page read and write
|
||
7FFD9C0E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
1C59D000
|
stack
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9C081000
|
trusted library allocation
|
page read and write
|
||
14593000
|
trusted library allocation
|
page read and write
|
||
13C6A000
|
trusted library allocation
|
page read and write
|
||
1B9F0000
|
heap
|
page execute and read and write
|
||
7FFD9BC22000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
7FFD9C140000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page execute and read and write
|
||
100A000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
37FD000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C12A000
|
trusted library allocation
|
page execute and read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
unkown
|
page readonly
|
||
129F3000
|
trusted library allocation
|
page read and write
|
||
135C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C215000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE9F000
|
trusted library allocation
|
page read and write
|
||
134EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC5000
|
trusted library allocation
|
page read and write
|
||
14733000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA06000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
12F58000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
7FFD9C24E000
|
trusted library allocation
|
page read and write
|
||
1AAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1BCE2000
|
unkown
|
page readonly
|
||
7FFD9BA2A000
|
trusted library allocation
|
page execute and read and write
|
||
16F0000
|
heap
|
page execute and read and write
|
||
7FFD9C24B000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
7FFD9C279000
|
trusted library allocation
|
page read and write
|
||
7FFD9B95C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
201A4C10000
|
heap
|
page read and write
|
||
2294D130000
|
heap
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B7000
|
trusted library allocation
|
page read and write
|
||
1348E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFBA000
|
trusted library allocation
|
page read and write
|
||
4BF55DC000
|
stack
|
page read and write
|
||
7FFD9C2F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C081000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
7FFD9BF07000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF96000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
7FFD9BB37000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C310000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C091000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
145F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
1BB50000
|
heap
|
page read and write
|
||
7FFD9C245000
|
trusted library allocation
|
page read and write
|
||
3E13000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C7000
|
trusted library allocation
|
page read and write
|
||
2F53000
|
trusted library allocation
|
page read and write
|
||
1894000
|
heap
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
360B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C190000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF55000
|
trusted library allocation
|
page read and write
|
||
7FFD9C170000
|
trusted library allocation
|
page read and write
|
||
1309B000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
135B9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFBA000
|
trusted library allocation
|
page read and write
|
||
13E96000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
13C79000
|
trusted library allocation
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
12C5B000
|
trusted library allocation
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
13B2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA6000
|
trusted library allocation
|
page read and write
|
||
1C80E000
|
stack
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
140E5000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2F1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page execute and read and write
|
||
14369000
|
trusted library allocation
|
page read and write
|
||
1BCE0000
|
unkown
|
page readonly
|
||
7FFD9BA3A000
|
trusted library allocation
|
page execute and read and write
|
||
FCA000
|
heap
|
page read and write
|
||
35D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF79000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
69ADBCF000
|
stack
|
page read and write
|
||
12F54000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC24000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
heap
|
page read and write
|
||
7FFD9C0A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C073000
|
trusted library allocation
|
page read and write
|
||
149F4000
|
trusted library allocation
|
page read and write
|
||
13F36000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E4000
|
trusted library allocation
|
page read and write
|
||
127F000
|
heap
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF55000
|
trusted library allocation
|
page read and write
|
||
140FA000
|
trusted library allocation
|
page read and write
|
||
13F89000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE4E000
|
trusted library allocation
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
7FFD9C070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD8000
|
trusted library allocation
|
page execute and read and write
|
||
13FF7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB85000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
CC232BC000
|
stack
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
unkown
|
page readonly
|
||
7FFD9BA86000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
1B30D000
|
stack
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
1B9EA000
|
heap
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
1B645000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
1376D000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
12F9F000
|
trusted library allocation
|
page read and write
|
||
272D000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page execute and read and write
|
||
115F000
|
stack
|
page read and write
|
||
7FFD9BA5A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA88000
|
trusted library allocation
|
page read and write
|
||
1F607BB0000
|
heap
|
page read and write
|
||
7FFD9BE7F000
|
trusted library allocation
|
page read and write
|
||
12DE2000
|
trusted library allocation
|
page read and write
|
||
146A4000
|
trusted library allocation
|
page read and write
|
||
180151C0000
|
heap
|
page read and write
|
||
21E23820000
|
heap
|
page read and write
|
||
3087000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA54000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C038000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
7FFD9BE84000
|
trusted library allocation
|
page read and write
|
||
12CA1000
|
trusted library allocation
|
page read and write
|
||
162CE707000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1857000
|
heap
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
351F000
|
trusted library allocation
|
page read and write
|
||
AFE49CC000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
7FFD9C08E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1CA90000
|
heap
|
page read and write
|
||
18BB000
|
heap
|
page read and write
|
||
7FFD9C2BB000
|
trusted library allocation
|
page read and write
|
||
275F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
1C9D2000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE92000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1B9DC000
|
heap
|
page read and write
|
||
7FFD9B8E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBD000
|
trusted library allocation
|
page read and write
|
||
2D88000
|
trusted library allocation
|
page read and write
|
||
14873000
|
trusted library allocation
|
page read and write
|
||
7FFD9C048000
|
trusted library allocation
|
page read and write
|
||
1BEA0000
|
unkown
|
page readonly
|
||
3ACD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA2B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
2D03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
1BAAB000
|
heap
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
282A000
|
stack
|
page read and write
|
||
7FFD9BEC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED9000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
7FFD9B8D8000
|
trusted library allocation
|
page read and write
|
||
7FFD9C227000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB07000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9C070000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEAA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C080000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
14A83000
|
trusted library allocation
|
page read and write
|
||
1BF70000
|
heap
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
150D000
|
heap
|
page read and write
|
||
1BE64000
|
heap
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
7FFD9BEC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
36FE000
|
trusted library allocation
|
page read and write
|
||
13EAA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C21E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7B000
|
trusted library allocation
|
page read and write
|
||
3807000
|
trusted library allocation
|
page read and write
|
||
1BE82000
|
heap
|
page read and write
|
||
1A67CD90000
|
heap
|
page read and write
|
||
7FFD9BB2D000
|
trusted library allocation
|
page read and write
|
||
1B800000
|
heap
|
page read and write
|
||
7FFD9BEA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7C000
|
trusted library allocation
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
unkown
|
page readonly
|
||
12903000
|
trusted library allocation
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page execute and read and write
|
||
1B39D000
|
heap
|
page read and write
|
||
14271000
|
trusted library allocation
|
page read and write
|
||
141617C0000
|
heap
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF25000
|
trusted library allocation
|
page read and write
|
||
7FFD9C239000
|
trusted library allocation
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
1389C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFDA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE75000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB91000
|
trusted library allocation
|
page read and write
|
||
381A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF99000
|
trusted library allocation
|
page read and write
|
||
7FFD9C190000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1C20E000
|
stack
|
page read and write
|
||
16C2000
|
unkown
|
page readonly
|
||
7FFD9BB3E000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C09B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE83000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
2F08000
|
trusted library allocation
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
1BDAC000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2D000
|
trusted library allocation
|
page read and write
|
||
1BAAE000
|
stack
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
1B9AE000
|
stack
|
page read and write
|
||
13B13000
|
trusted library allocation
|
page read and write
|
||
1670000
|
unkown
|
page readonly
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C050000
|
trusted library allocation
|
page read and write
|
||
1500000
|
unkown
|
page readonly
|
||
D8213DC000
|
stack
|
page read and write
|
||
7FFD9C2E3000
|
trusted library allocation
|
page read and write
|
||
13121000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
140BD000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
trusted library allocation
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB91000
|
trusted library allocation
|
page read and write
|
||
3A74000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
3178000
|
trusted library allocation
|
page read and write
|
||
13E72000
|
trusted library allocation
|
page read and write
|
||
7FFD9C113000
|
trusted library allocation
|
page execute and read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA58000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C22E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
7FFD9C28D000
|
trusted library allocation
|
page read and write
|
||
2759000
|
trusted library allocation
|
page read and write
|
||
162CE640000
|
heap
|
page read and write
|
||
7FFD9BB59000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
7FFD9C1F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
2BF1000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page execute and read and write
|
||
1282D000
|
trusted library allocation
|
page read and write
|
||
1830000
|
heap
|
page read and write
|
||
1539000
|
heap
|
page read and write
|
||
13D73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
12E76000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
CC2333E000
|
stack
|
page read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
1C0B8000
|
heap
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
1BCA0000
|
heap
|
page read and write
|
||
1CA4E000
|
stack
|
page read and write
|
||
13B73000
|
trusted library allocation
|
page read and write
|
||
1B0B2000
|
heap
|
page read and write
|
||
7FFD9C0E0000
|
trusted library allocation
|
page read and write
|
||
14161AC5000
|
heap
|
page read and write
|
||
7FFD9C0D5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE84000
|
trusted library allocation
|
page read and write
|
||
1B36D000
|
stack
|
page read and write
|
||
1C02C000
|
heap
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
1C8FD000
|
stack
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B986000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5F000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
14174000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFE0000
|
trusted library allocation
|
page read and write
|
||
1B060000
|
heap
|
page execute and read and write
|
||
7FFD9C18B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page execute and read and write
|
||
12E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB07000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FFD9BB27000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1D38D000
|
stack
|
page read and write
|
||
131E4000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page execute and read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FFD9BB65000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2CB000
|
trusted library allocation
|
page read and write
|
||
2A89000
|
heap
|
page read and write
|
||
7FFD9C0AE000
|
trusted library allocation
|
page read and write
|
||
14362000
|
trusted library allocation
|
page read and write
|
||
25FD0710000
|
heap
|
page read and write
|
||
1452C000
|
trusted library allocation
|
page read and write
|
||
1B22B000
|
stack
|
page read and write
|
||
12D21000
|
trusted library allocation
|
page read and write
|
||
1B04E000
|
heap
|
page read and write
|
||
7FFD9BB29000
|
trusted library allocation
|
page read and write
|
||
1BE9E000
|
heap
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB5000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
13402000
|
trusted library allocation
|
page read and write
|
||
1BDA2000
|
unkown
|
page readonly
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
13073000
|
trusted library allocation
|
page read and write
|
||
7FFD9B918000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA3000
|
trusted library allocation
|
page read and write
|
||
1BCAD000
|
stack
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D8000
|
trusted library allocation
|
page read and write
|
||
7FFD9C269000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
unkown
|
page readonly
|
||
1A67CBC8000
|
heap
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
1BDA0000
|
heap
|
page execute and read and write
|
||
7FFD9BB13000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1DB000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4D000
|
trusted library allocation
|
page read and write
|
||
14153000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF99000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1D1FD000
|
stack
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
7FFD9C29A000
|
trusted library allocation
|
page read and write
|
||
1364C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF99000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
1430D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB95000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page execute and read and write
|
||
269B5D97000
|
heap
|
page read and write
|
||
13CD6000
|
trusted library allocation
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C068000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page execute and read and write
|
||
3A7A000
|
trusted library allocation
|
page read and write
|
||
180150C0000
|
heap
|
page read and write
|
||
345F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA5000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
heap
|
page execute and read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
136CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6D000
|
trusted library allocation
|
page read and write
|
||
1C070000
|
heap
|
page read and write
|
||
16D2000
|
unkown
|
page readonly
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
1433A000
|
trusted library allocation
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
1CBD0000
|
heap
|
page read and write
|
||
7FFD9BF39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C209000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC4000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
12BF2000
|
trusted library allocation
|
page read and write
|
||
A15000
|
unkown
|
page readonly
|
||
134D1000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
13D5B000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
7FFD9BB19000
|
trusted library allocation
|
page read and write
|
||
1C66E000
|
stack
|
page read and write
|
||
D4BF19F000
|
stack
|
page read and write
|
||
7FFD9BECA000
|
trusted library allocation
|
page read and write
|
||
143C4000
|
trusted library allocation
|
page read and write
|
||
143E3000
|
trusted library allocation
|
page read and write
|
||
262F000
|
trusted library allocation
|
page read and write
|
||
352E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA71000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
2BF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0E4000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1B46F000
|
heap
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
7FFD9C163000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
7FFD9C08C000
|
trusted library allocation
|
page read and write
|
||
1B80F000
|
heap
|
page read and write
|
||
13536000
|
trusted library allocation
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBC000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
trusted library allocation
|
page read and write
|
||
135D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
12FBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
1C100000
|
heap
|
page execute and read and write
|
||
107D000
|
heap
|
page read and write
|
||
7FFD9C071000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
2619000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
13216000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7F000
|
trusted library allocation
|
page read and write
|
||
2B98000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE95000
|
trusted library allocation
|
page read and write
|
||
7FFD9C28F000
|
trusted library allocation
|
page read and write
|
||
37F0000
|
trusted library allocation
|
page read and write
|
||
12841000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
1CC4E000
|
stack
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
1D49F000
|
stack
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1B343000
|
heap
|
page execute and read and write
|
||
7FFD9C173000
|
trusted library allocation
|
page read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
7FFD9C080000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE7E000
|
trusted library allocation
|
page read and write
|
||
1BF3E000
|
heap
|
page read and write
|
||
136EC000
|
trusted library allocation
|
page read and write
|
||
13C1E000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
1F607C07000
|
heap
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
13D67000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
1471E000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
1C02E000
|
stack
|
page read and write
|
||
14064000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page execute and read and write
|
||
7FFD9BC34000
|
trusted library allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C249000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC44000
|
trusted library allocation
|
page read and write
|
||
7FFD9C24F000
|
trusted library allocation
|
page read and write
|
||
DB3000
|
stack
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F6000
|
trusted library allocation
|
page execute and read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB45000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
7FFD9B8DD000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1BDC0000
|
heap
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
AFE4C7F000
|
stack
|
page read and write
|
||
2294D245000
|
heap
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
13DC4000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
1C05A000
|
heap
|
page read and write
|
||
7FFD9C1CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
13552000
|
trusted library allocation
|
page read and write
|
||
255E000
|
stack
|
page read and write
|
||
131C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBB8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C038000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B986000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
1BFAA000
|
heap
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
1AC0000
|
heap
|
page execute and read and write
|
||
13F53000
|
trusted library allocation
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF4E000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
3803000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE8E000
|
trusted library allocation
|
page read and write
|
||
1429E000
|
trusted library allocation
|
page read and write
|
||
3227000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA5A000
|
trusted library allocation
|
page execute and read and write
|
||
201A4C17000
|
heap
|
page read and write
|
||
1BB82000
|
unkown
|
page readonly
|
||
37CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9C099000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB9000
|
trusted library allocation
|
page read and write
|
||
13FAB000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1B7F0000
|
heap
|
page execute and read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9C183000
|
trusted library allocation
|
page read and write
|
||
7FFD9C272000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
13216000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC14000
|
trusted library allocation
|
page read and write
|
||
1C6EE000
|
stack
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
1413E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC24000
|
trusted library allocation
|
page read and write
|
||
1B060000
|
heap
|
page read and write
|
||
269B5CD0000
|
heap
|
page read and write
|
||
1B9F3000
|
heap
|
page execute and read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page execute and read and write
|
||
1B58D000
|
stack
|
page read and write
|
||
7FFD9BB3F000
|
trusted library allocation
|
page read and write
|
||
13746000
|
trusted library allocation
|
page read and write
|
||
14666000
|
trusted library allocation
|
page read and write
|
||
7FFD9C255000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
580000
|
heap
|
page read and write
|
||
7FFD9BE7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF1B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
130A4000
|
trusted library allocation
|
page read and write
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB03000
|
trusted library allocation
|
page read and write
|
||
7FFD9C113000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
133E9000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
1B81A000
|
heap
|
page read and write
|
||
7FFD9C20F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C100000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC54000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
1C3DE000
|
stack
|
page read and write
|
||
131B4000
|
trusted library allocation
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page execute and read and write
|
||
99F000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1F607DC5000
|
heap
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1B940000
|
heap
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1B0F0000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8D3000
|
trusted library allocation
|
page execute and read and write
|
||
1560000
|
heap
|
page read and write
|
||
13CBE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C19E000
|
trusted library allocation
|
page read and write
|
||
201A4E30000
|
heap
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
1A870000
|
trusted library allocation
|
page read and write
|
||
1B20000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
201A4BF0000
|
heap
|
page read and write
|
||
7FFD9C153000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
2E0A000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page execute and read and write
|
||
965000
|
heap
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
1CBFD000
|
stack
|
page read and write
|
||
7FFD9C0F3000
|
trusted library allocation
|
page execute and read and write
|
||
141618A0000
|
heap
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
1C9DE000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7FFD9C262000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB71000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F0000
|
trusted library allocation
|
page read and write
|
||
1C39F000
|
stack
|
page read and write
|
||
13751000
|
trusted library allocation
|
page read and write
|
||
1BF24000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
1CD00000
|
heap
|
page read and write
|
||
1B5C9000
|
heap
|
page read and write
|
||
1C56E000
|
stack
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C19B000
|
trusted library allocation
|
page read and write
|
||
2F3B000
|
trusted library allocation
|
page read and write
|
||
1359A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C254000
|
trusted library allocation
|
page read and write
|
||
967BD1C000
|
stack
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
13C22000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
269B5D89000
|
heap
|
page read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
13F72000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
1A67CBC0000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
1A780000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB17000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
unkown
|
page readonly
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page execute and read and write
|
||
14227000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
39CF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB8000
|
trusted library allocation
|
page read and write
|
||
1B517000
|
heap
|
page read and write
|
||
7FFD9C0E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
149A4000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
1B0DC000
|
heap
|
page read and write
|
||
7FFD9BB49000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
7FFD9B9FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB37000
|
trusted library allocation
|
page read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1BB000
|
trusted library allocation
|
page read and write
|
||
1820000
|
heap
|
page execute and read and write
|
||
1B9C6000
|
heap
|
page read and write
|
||
7FFD9BB92000
|
trusted library allocation
|
page read and write
|
||
7FFD9B97C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C07E000
|
trusted library allocation
|
page read and write
|
||
13081000
|
trusted library allocation
|
page read and write
|
||
1CA3D000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
14523000
|
trusted library allocation
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
3205000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF39000
|
trusted library allocation
|
page read and write
|
||
31A9000
|
trusted library allocation
|
page read and write
|
||
1CF4B000
|
stack
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
269B5D97000
|
heap
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
12C46000
|
trusted library allocation
|
page read and write
|
||
1B9DA000
|
heap
|
page read and write
|
||
7FFD9C26B000
|
trusted library allocation
|
page read and write
|
||
12EFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
25CD000
|
heap
|
page read and write
|
||
7FFD9BE93000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
13986000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
13D03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF6F000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
heap
|
page read and write
|
||
3606000
|
trusted library allocation
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
7FFD9BAE7000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
12627000
|
trusted library allocation
|
page read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9C080000
|
trusted library allocation
|
page read and write
|
||
2EE9000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page execute and read and write
|
||
134A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE9A000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
201A4E35000
|
heap
|
page read and write
|
||
7FFD9C24E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
132BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
162CE560000
|
heap
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
13056000
|
trusted library allocation
|
page read and write
|
||
14347000
|
trusted library allocation
|
page read and write
|
||
12CCD000
|
trusted library allocation
|
page read and write
|
||
269B5CB0000
|
heap
|
page read and write
|
||
7FFD9BF71000
|
trusted library allocation
|
page read and write
|
||
7FFD9BECD000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F0000
|
trusted library allocation
|
page execute and read and write
|
||
C08000
|
heap
|
page read and write
|
||
12AB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF16000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
heap
|
page execute and read and write
|
||
4019AFF000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
14335000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
1389F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
13161000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4C5000
|
heap
|
page read and write
|
||
52B000
|
stack
|
page read and write
|
||
141618E7000
|
heap
|
page read and write
|
||
7FFD9BE54000
|
trusted library allocation
|
page read and write
|
||
14243000
|
trusted library allocation
|
page read and write
|
||
131D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB81000
|
trusted library allocation
|
page read and write
|
||
1B171000
|
heap
|
page read and write
|
||
12901000
|
trusted library allocation
|
page read and write
|
||
1B0C6000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
131EA000
|
trusted library allocation
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
45F03AC000
|
stack
|
page read and write
|
||
7FFD9BB06000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C083000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
290A000
|
trusted library allocation
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
1BD5F000
|
heap
|
page read and write
|
||
12FAF000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page read and write
|
||
162CE660000
|
heap
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C27D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
16B8000
|
unkown
|
page readonly
|
||
1ABD000
|
heap
|
page read and write
|
||
D82167F000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
1692000
|
unkown
|
page readonly
|
||
1550000
|
unkown
|
page readonly
|
||
7FFD9BE64000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1BD92000
|
unkown
|
page readonly
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
1AEF0000
|
heap
|
page read and write
|
||
7FFD9BA54000
|
trusted library allocation
|
page execute and read and write
|
||
13D13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB71000
|
trusted library allocation
|
page read and write
|
||
1C6F0000
|
heap
|
page read and write
|
||
7FFD9BEFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
21E238EA000
|
heap
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
7FFD9BB3D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD8000
|
trusted library allocation
|
page read and write
|
||
1A67CE75000
|
heap
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
7FFD9C00D000
|
trusted library allocation
|
page read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF4000
|
trusted library allocation
|
page read and write
|
||
1CCDC000
|
stack
|
page read and write
|
||
7FFD9B8D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C225000
|
trusted library allocation
|
page read and write
|
||
1B13A000
|
heap
|
page read and write
|
||
287D000
|
trusted library allocation
|
page read and write
|
||
1B81E000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
14714000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page execute and read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA1000
|
trusted library allocation
|
page read and write
|
||
1CA80000
|
heap
|
page read and write
|
||
35EE000
|
trusted library allocation
|
page read and write
|
||
18014FC0000
|
heap
|
page read and write
|
||
7FFD9BA1B000
|
trusted library allocation
|
page execute and read and write
|
||
14211000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA2B000
|
trusted library allocation
|
page execute and read and write
|
||
FAB000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FF000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C170000
|
trusted library allocation
|
page read and write
|
||
2EF3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C300000
|
trusted library allocation
|
page execute and read and write
|
||
13742000
|
trusted library allocation
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
1C90E000
|
stack
|
page read and write
|
||
1CD4D000
|
stack
|
page read and write
|
||
1B9C0000
|
heap
|
page read and write
|
||
1C81B000
|
stack
|
page read and write
|
||
7FFD9BB4D000
|
trusted library allocation
|
page read and write
|
||
144A1000
|
trusted library allocation
|
page read and write
|
||
3842000
|
trusted library allocation
|
page read and write
|
||
1C9AB000
|
stack
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FFD9C2CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6E000
|
trusted library allocation
|
page read and write
|
||
13086000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF69000
|
trusted library allocation
|
page read and write
|
||
573000
|
stack
|
page read and write
|
||
1C8EE000
|
stack
|
page read and write
|
||
7FFD9BFB6000
|
trusted library allocation
|
page read and write
|
||
69ADE7F000
|
stack
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
1B53B000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
2BF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C18B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
heap
|
page execute and read and write
|
||
1346F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5E000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C229000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0BB000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
1CFFE000
|
stack
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
13E53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
1CAFD000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
24AEDA00000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
12789000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD7000
|
trusted library allocation
|
page read and write
|
||
7FFD9C26A000
|
trusted library allocation
|
page read and write
|
||
2884000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FFD9B8F6000
|
trusted library allocation
|
page read and write
|
||
3A3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3F000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
25FD0879000
|
heap
|
page read and write
|
||
7FFD9C0B4000
|
trusted library allocation
|
page read and write
|
||
34EA000
|
trusted library allocation
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C7000
|
trusted library allocation
|
page read and write
|
||
184B0F60000
|
heap
|
page read and write
|
||
7FFD9BFB6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF51000
|
trusted library allocation
|
page read and write
|
||
137F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED7000
|
trusted library allocation
|
page read and write
|
||
13E46000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
1487C000
|
trusted library allocation
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
7FFD9BF5C000
|
trusted library allocation
|
page read and write
|
||
30DD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
7FFD9C2DE000
|
trusted library allocation
|
page read and write
|
||
1B11A000
|
stack
|
page read and write
|
||
13EC4000
|
trusted library allocation
|
page read and write
|
||
141618EA000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB03000
|
trusted library allocation
|
page read and write
|
||
184B0F40000
|
heap
|
page read and write
|
||
12F25000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5E000
|
trusted library allocation
|
page read and write
|
||
145D4000
|
trusted library allocation
|
page read and write
|
||
25C9000
|
heap
|
page read and write
|
||
7FFD9BF89000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
1C591000
|
heap
|
page read and write
|
||
7FFD9BAD3000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
unkown
|
page readonly
|
||
3053000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0FA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFDA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C244000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page execute and read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
7FFD9C000000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
1D18E000
|
stack
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB24000
|
trusted library allocation
|
page read and write
|
||
7FFD9C08C000
|
trusted library allocation
|
page read and write
|
||
3759000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
13D63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
D4BF09B000
|
stack
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
D64000
|
unkown
|
page readonly
|
||
7FFD9BA6F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C300000
|
trusted library allocation
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
1ABAD000
|
stack
|
page read and write
|
||
13BE6000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
heap
|
page read and write
|
||
7FFD9C22E000
|
trusted library allocation
|
page read and write
|
||
1C400000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
1B3F4000
|
heap
|
page read and write
|
||
12F5B000
|
trusted library allocation
|
page read and write
|
||
13460000
|
trusted library allocation
|
page read and write
|
||
1B410000
|
heap
|
page execute and read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page execute and read and write
|
||
186B000
|
heap
|
page read and write
|
||
7FFD9C0E0000
|
trusted library allocation
|
page read and write
|
||
DBA000
|
stack
|
page read and write
|
||
10DA000
|
stack
|
page read and write
|
||
1B27C000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C20B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA54000
|
trusted library allocation
|
page execute and read and write
|
||
1B141000
|
heap
|
page read and write
|
||
373E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page execute and read and write
|
||
13684000
|
trusted library allocation
|
page read and write
|
||
28FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA08000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0A1000
|
trusted library allocation
|
page read and write
|
||
3789000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE8E000
|
trusted library allocation
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
1ABC3000
|
heap
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C29A000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
13434000
|
trusted library allocation
|
page read and write
|
||
162CE70A000
|
heap
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
3232000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF57000
|
trusted library allocation
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
34C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
128D9000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FFD9B8D2000
|
trusted library allocation
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
13871000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C17B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
12631000
|
trusted library allocation
|
page read and write
|
||
16DB000
|
stack
|
page read and write
|
||
7FFD9C083000
|
trusted library allocation
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
1B4FF000
|
stack
|
page read and write
|
||
2682000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C4000
|
trusted library allocation
|
page read and write
|
||
1B834000
|
heap
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE9D000
|
trusted library allocation
|
page read and write
|
||
1F607C0A000
|
heap
|
page read and write
|
||
7FFD9C269000
|
trusted library allocation
|
page read and write
|
||
7FFD9BECA000
|
trusted library allocation
|
page read and write
|
||
21E238E0000
|
heap
|
page read and write
|
||
7FFD9C2EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
135FE000
|
trusted library allocation
|
page read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0E0000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFD9BA1F000
|
trusted library allocation
|
page execute and read and write
|
||
1C47A000
|
heap
|
page read and write
|
||
7FFD9B8D3000
|
trusted library allocation
|
page execute and read and write
|
||
1D4A0000
|
heap
|
page read and write
|
||
12E7F000
|
trusted library allocation
|
page read and write
|
||
9E2000
|
unkown
|
page readonly
|
||
7FFD9C0D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
132EB000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB22000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5F000
|
trusted library allocation
|
page read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
7FFD9C061000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE4F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA86000
|
heap
|
page read and write
|
||
13166000
|
trusted library allocation
|
page read and write
|
||
1B8BD000
|
stack
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6E000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
14114000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
147F1000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
12E4B000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
146DA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C081000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1BDD0000
|
heap
|
page read and write
|
||
7FFD9C0B9000
|
trusted library allocation
|
page read and write
|
||
12E54000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
131CF000
|
trusted library allocation
|
page read and write
|
||
13181000
|
trusted library allocation
|
page read and write
|
||
13F4B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F3000
|
trusted library allocation
|
page execute and read and write
|
||
300E000
|
trusted library allocation
|
page read and write
|
||
1CE40000
|
heap
|
page read and write
|
||
269B5D80000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEAD000
|
trusted library allocation
|
page read and write
|
||
1BF44000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C190000
|
trusted library allocation
|
page read and write
|
||
7FFD9C190000
|
trusted library allocation
|
page read and write
|
||
1CC50000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
1C103000
|
heap
|
page execute and read and write
|
||
7FFD9C2AD000
|
trusted library allocation
|
page read and write
|
||
1C5A8000
|
heap
|
page read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
7FFD9C078000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
180150C7000
|
heap
|
page read and write
|
||
13AF000
|
stack
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA85000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB3000
|
trusted library allocation
|
page read and write
|
||
111A000
|
heap
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
7FFD9BA1F000
|
trusted library allocation
|
page execute and read and write
|
||
C3B000
|
heap
|
page read and write
|
||
13B7C000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C254000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
7FFD9B8D4000
|
trusted library allocation
|
page read and write
|
||
848BE8B000
|
stack
|
page read and write
|
||
7FFD9BA1F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1BA33000
|
heap
|
page read and write
|
||
7FFD9BAE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB49000
|
trusted library allocation
|
page read and write
|
||
1C46A000
|
heap
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C223000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
341F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF12000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE5000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FFD9BEE7000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
7FFD9BBA4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
1B340000
|
heap
|
page execute and read and write
|
||
7FFD9C040000
|
trusted library allocation
|
page read and write
|
||
12ED2000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B7000
|
trusted library allocation
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
13990000
|
trusted library allocation
|
page read and write
|
||
1380F000
|
trusted library allocation
|
page read and write
|
||
21E238E7000
|
heap
|
page read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
1305000
|
heap
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
132C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
13DD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1BB000
|
trusted library allocation
|
page read and write
|
||
134FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C26F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page execute and read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C1AB000
|
trusted library allocation
|
page read and write
|
||
1CA58000
|
heap
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
12F61000
|
trusted library allocation
|
page read and write
|
||
12FE2000
|
trusted library allocation
|
page read and write
|
||
13FC1000
|
trusted library allocation
|
page read and write
|
||
18E1000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
1BF36000
|
heap
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
1CEFE000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD29000
|
heap
|
page read and write
|
||
1C46E000
|
stack
|
page read and write
|
||
7FFD9B91B000
|
trusted library allocation
|
page execute and read and write
|
||
1BF60000
|
heap
|
page read and write
|
||
7FFD9B8E8000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
7FFD9C160000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9D000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB34000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
1438A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4E000
|
trusted library allocation
|
page read and write
|
||
28E5000
|
heap
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page execute and read and write
|
||
2629000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
1B853000
|
heap
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
13C92000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
7FFD9C170000
|
trusted library allocation
|
page read and write
|
||
2740000
|
heap
|
page execute and read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
14037000
|
trusted library allocation
|
page read and write
|
||
2978000
|
trusted library allocation
|
page read and write
|
||
18BF000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1463E000
|
trusted library allocation
|
page read and write
|
||
1320E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF86000
|
trusted library allocation
|
page read and write
|
||
13FD4000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB27000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C0F9000
|
heap
|
page read and write
|
||
1392C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE9000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
B6A000
|
stack
|
page read and write
|
||
7FFD9C091000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF8C000
|
trusted library allocation
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB85000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE9000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
1CD9C000
|
stack
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
1BD52000
|
unkown
|
page readonly
|
||
18015290000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE7000
|
trusted library allocation
|
page read and write
|
||
143CE000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
130B1000
|
trusted library allocation
|
page read and write
|
||
1477B000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7FFD9BEED000
|
trusted library allocation
|
page read and write
|
||
13F1C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C153000
|
trusted library allocation
|
page read and write
|
||
12F0D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
2F15000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
2CCF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA54000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF51000
|
trusted library allocation
|
page read and write
|
||
1B945000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE83000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3A000
|
trusted library allocation
|
page execute and read and write
|
||
2B90000
|
heap
|
page read and write
|
||
3588000
|
trusted library allocation
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
69ADB4C000
|
stack
|
page read and write
|
||
1BEA0000
|
heap
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF96000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF2000
|
trusted library allocation
|
page read and write
|
||
1C2DF000
|
stack
|
page read and write
|
||
7FFD9C25F000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA58000
|
trusted library allocation
|
page execute and read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
7FFD9BB6D000
|
trusted library allocation
|
page read and write
|
||
146DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
1B9D8000
|
heap
|
page read and write
|
||
7FFD9BFA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF07000
|
trusted library allocation
|
page read and write
|
||
24AEDD20000
|
heap
|
page read and write
|
||
37D8000
|
trusted library allocation
|
page read and write
|
||
3819000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB95000
|
trusted library allocation
|
page read and write
|
||
1CD45000
|
heap
|
page read and write
|
||
7FFD9BA61000
|
trusted library allocation
|
page read and write
|
||
21E23B00000
|
heap
|
page read and write
|
||
12CC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
1BCF2000
|
unkown
|
page readonly
|
||
1BD50000
|
unkown
|
page readonly
|
||
7FFD9BE73000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
7FFD9BB49000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF4000
|
trusted library allocation
|
page read and write
|
||
1C9FD000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2907000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB81000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
1502000
|
unkown
|
page readonly
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
25FD0810000
|
heap
|
page read and write
|
||
13B17000
|
trusted library allocation
|
page read and write
|
||
22C44FC000
|
stack
|
page read and write
|
||
1BF79000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
1B434000
|
heap
|
page read and write
|
||
12D26000
|
trusted library allocation
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
1CCEE000
|
stack
|
page read and write
|
||
1BE53000
|
heap
|
page execute and read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
13C59000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
heap
|
page execute and read and write
|
||
845000
|
heap
|
page read and write
|
||
7FFD9BF1F000
|
trusted library allocation
|
page read and write
|
||
14915000
|
trusted library allocation
|
page read and write
|
||
1BA57000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
12C31000
|
trusted library allocation
|
page read and write
|
||
33E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92D000
|
trusted library allocation
|
page execute and read and write
|
||
127CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9C292000
|
trusted library allocation
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
14892000
|
trusted library allocation
|
page read and write
|
||
14316000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA71000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
12621000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A3000
|
trusted library allocation
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
131BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2CA000
|
trusted library allocation
|
page read and write
|
||
1393C000
|
trusted library allocation
|
page read and write
|
||
1672000
|
unkown
|
page readonly
|
||
1C80D000
|
stack
|
page read and write
|
||
7FFD9BA5A000
|
trusted library allocation
|
page execute and read and write
|
||
2DDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE6000
|
trusted library allocation
|
page read and write
|
||
148ED000
|
trusted library allocation
|
page read and write
|
||
3678000
|
trusted library allocation
|
page read and write
|
||
1BA80000
|
heap
|
page read and write
|
||
37A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF0D000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7FFD9B8E2000
|
trusted library allocation
|
page read and write
|
||
1F607C00000
|
heap
|
page read and write
|
||
13E0C000
|
trusted library allocation
|
page read and write
|
||
7FFD9C058000
|
trusted library allocation
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
14043000
|
trusted library allocation
|
page read and write
|
||
12C1B000
|
trusted library allocation
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
1B9FD000
|
stack
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B6000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page execute and read and write
|
||
1B84D000
|
stack
|
page read and write
|
||
7FFD9BF5E000
|
trusted library allocation
|
page read and write
|
||
300B000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
trusted library allocation
|
page read and write
|
||
12C13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page execute and read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
1AB9000
|
heap
|
page read and write
|
||
14501000
|
trusted library allocation
|
page read and write
|
||
1C041000
|
heap
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
4BF587F000
|
stack
|
page read and write
|
||
7FFD9B8E4000
|
trusted library allocation
|
page read and write
|
||
1345C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page read and write
|
||
1B64D000
|
stack
|
page read and write
|
||
7FFD9C242000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
1BEC4000
|
heap
|
page read and write
|
||
143A4000
|
trusted library allocation
|
page read and write
|
||
1393E000
|
trusted library allocation
|
page read and write
|
||
180150CA000
|
heap
|
page read and write
|
||
1402F000
|
trusted library allocation
|
page read and write
|
||
1B048000
|
heap
|
page read and write
|
||
13D72000
|
trusted library allocation
|
page read and write
|
||
7FFD9C10A000
|
trusted library allocation
|
page execute and read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FFD9BB2E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE9E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
184B0F10000
|
heap
|
page read and write
|
||
1B0E0000
|
heap
|
page execute and read and write
|
||
1BBA0000
|
heap
|
page execute and read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
14113000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5E000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1CDFE000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FFD9B9FB000
|
trusted library allocation
|
page execute and read and write
|
||
14654000
|
trusted library allocation
|
page read and write
|
||
7FFD9C048000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
7FFD9C2B7000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
heap
|
page read and write
|
||
1BA16000
|
heap
|
page read and write
|
||
7FFD9B8DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C239000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
2BE9000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
14700000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8EB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF07000
|
trusted library allocation
|
page read and write
|
||
7FFD9C215000
|
trusted library allocation
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page execute and read and write
|
||
13596000
|
trusted library allocation
|
page read and write
|
||
7FFD9C320000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF99000
|
trusted library allocation
|
page read and write
|
||
7FFD9B976000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE6E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
7FFD9C223000
|
trusted library allocation
|
page read and write
|
||
7FFD9B976000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
180150A0000
|
heap
|
page read and write
|
||
14735000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9C274000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C1A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
13272000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
132A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF6B000
|
trusted library allocation
|
page read and write
|
||
3CFA000
|
trusted library allocation
|
page read and write
|
||
13AFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
1A650000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
1F607AB0000
|
heap
|
page read and write
|
||
14414000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAAA000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
1356E000
|
trusted library allocation
|
page read and write
|
||
7FFD9C225000
|
trusted library allocation
|
page read and write
|
||
1BBA3000
|
heap
|
page execute and read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
140AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
3025000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2A3000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
7FFD9BFE0000
|
trusted library allocation
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
1367B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA78000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page execute and read and write
|
||
1BF77000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1B340000
|
heap
|
page execute and read and write
|
||
7FFD9C2D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C190000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94C000
|
trusted library allocation
|
page execute and read and write
|
||
1BEA6000
|
heap
|
page read and write
|
||
1512000
|
unkown
|
page readonly
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
stack
|
page read and write
|
||
7FFD9BC62000
|
trusted library allocation
|
page read and write
|
||
2BDF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C150000
|
trusted library allocation
|
page read and write
|
||
21E23800000
|
heap
|
page read and write
|
||
261D000
|
heap
|
page read and write
|
||
EDA000
|
stack
|
page read and write
|
||
12E36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFAA000
|
trusted library allocation
|
page read and write
|
||
1C5C2000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
7FFD9C245000
|
trusted library allocation
|
page read and write
|
||
7FFD9C163000
|
trusted library allocation
|
page read and write
|
||
12D44000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA99000
|
trusted library allocation
|
page read and write
|
||
1BF57000
|
heap
|
page read and write
|
||
A22000
|
unkown
|
page readonly
|
||
7FFD9C060000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC36000
|
trusted library allocation
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
13614000
|
trusted library allocation
|
page read and write
|
||
1C9FE000
|
stack
|
page read and write
|
||
7FFD9C08E000
|
trusted library allocation
|
page read and write
|
||
1C586000
|
heap
|
page read and write
|
||
3763000
|
trusted library allocation
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
1345E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
19D5000
|
heap
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB29000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
201A4BC0000
|
heap
|
page read and write
|
||
7FFD9BA7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F7000
|
trusted library allocation
|
page read and write
|
||
14134000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF17000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page execute and read and write
|
||
12BE000
|
heap
|
page read and write
|
||
2E98000
|
trusted library allocation
|
page read and write
|
||
7FFD9C25F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
376F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
3770000
|
trusted library allocation
|
page read and write
|
||
1BCDE000
|
stack
|
page read and write
|
||
7FFD9C2AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
unkown
|
page readonly
|
||
14792000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F5000
|
trusted library allocation
|
page read and write
|
||
125F000
|
stack
|
page read and write
|
||
146F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C186000
|
trusted library allocation
|
page read and write
|
||
13C8E000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
2294D2D7000
|
heap
|
page read and write
|
||
12751000
|
trusted library allocation
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
14699000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
141618C0000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
1C70E000
|
stack
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
7FFD9BB5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D4000
|
trusted library allocation
|
page read and write
|
||
2DF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
13334000
|
trusted library allocation
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C20B000
|
trusted library allocation
|
page read and write
|
||
3446000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF09000
|
trusted library allocation
|
page read and write
|
||
2F3D000
|
heap
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page execute and read and write
|
||
1A67CBB0000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9C18B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF3000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
13EE4000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
16E2000
|
unkown
|
page readonly
|
||
1B361000
|
heap
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
heap
|
page read and write
|
||
7FFD9C0F7000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC32000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
7FFD9BE92000
|
trusted library allocation
|
page read and write
|
||
34EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C27F000
|
trusted library allocation
|
page read and write
|
||
1374E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD8000
|
trusted library allocation
|
page execute and read and write
|
||
13514000
|
trusted library allocation
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE95000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
383D000
|
trusted library allocation
|
page read and write
|
||
13670000
|
trusted library allocation
|
page read and write
|
||
7FF4B74D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB6D000
|
trusted library allocation
|
page read and write
|
||
12BA2000
|
trusted library allocation
|
page read and write
|
||
1C3C0000
|
heap
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page execute and read and write
|
||
13A74000
|
trusted library allocation
|
page read and write
|
||
14021000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page execute and read and write
|
||
1669000
|
heap
|
page read and write
|
||
14533000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1D0000
|
trusted library allocation
|
page read and write
|
||
1442B000
|
trusted library allocation
|
page read and write
|
||
13E82000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB03000
|
trusted library allocation
|
page read and write
|
||
1C046000
|
heap
|
page read and write
|
||
14086000
|
trusted library allocation
|
page read and write
|
||
133F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9C303000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
14024000
|
trusted library allocation
|
page read and write
|
||
288F000
|
trusted library allocation
|
page read and write
|
||
32BB000
|
trusted library allocation
|
page read and write
|
||
14470000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB85000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
7FFD9C080000
|
trusted library allocation
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
1BCFF000
|
stack
|
page read and write
|
||
1C7ED000
|
stack
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE62000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
28DD000
|
heap
|
page read and write
|
||
7FFD9C232000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
143C4000
|
trusted library allocation
|
page read and write
|
||
13E5A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF37000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
37E5000
|
trusted library allocation
|
page read and write
|
||
12F63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0B9000
|
trusted library allocation
|
page read and write
|
||
2E8B000
|
trusted library allocation
|
page read and write
|
||
1A2E000
|
stack
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF1D000
|
trusted library allocation
|
page read and write
|
||
1B7E8000
|
heap
|
page read and write
|
||
7FFD9C235000
|
trusted library allocation
|
page read and write
|
||
1BD6D000
|
stack
|
page read and write
|
||
7FFD9C25F000
|
trusted library allocation
|
page read and write
|
||
2B99000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
14708000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF37000
|
trusted library allocation
|
page read and write
|
||
1F607DC0000
|
heap
|
page read and write
|
||
1B502000
|
heap
|
page read and write
|
||
7FFD9C207000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF4000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA6000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1C53C000
|
heap
|
page read and write
|
||
132C2000
|
trusted library allocation
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
2849000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
1BE70000
|
heap
|
page read and write
|
||
7FFD9BAFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
13C20000
|
trusted library allocation
|
page read and write
|
||
1C5ED000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
13CF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB55000
|
trusted library allocation
|
page read and write
|
||
14949000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
1BDA4000
|
heap
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
2B9D000
|
heap
|
page read and write
|
||
12E83000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BABA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
7FFD9C091000
|
trusted library allocation
|
page read and write
|
||
7FFD9C262000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1B63A000
|
stack
|
page read and write
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
7FFD9C19E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB39000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2D3000
|
trusted library allocation
|
page read and write
|
||
1C9C0000
|
heap
|
page read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
1C8A0000
|
heap
|
page read and write
|
||
7FFD9C262000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B904000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
1C4C0000
|
heap
|
page read and write
|
||
13DBE000
|
trusted library allocation
|
page read and write
|
||
1C1DF000
|
stack
|
page read and write
|
||
7FFD9BB04000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC4000
|
trusted library allocation
|
page read and write
|
||
12F22000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0D0000
|
trusted library allocation
|
page read and write
|
||
22C457F000
|
stack
|
page read and write
|
||
7FFD9BF57000
|
trusted library allocation
|
page read and write
|
||
1B0E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C27A000
|
trusted library allocation
|
page read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
201A4BD0000
|
heap
|
page read and write
|
||
13F84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page execute and read and write
|
||
1B6F3000
|
heap
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page read and write
|
||
1C126000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
7FFD9C166000
|
trusted library allocation
|
page read and write
|
||
1BEEA000
|
heap
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
2699000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF79000
|
trusted library allocation
|
page read and write
|
||
1B37A000
|
stack
|
page read and write
|
||
7FFD9C290000
|
trusted library allocation
|
page read and write
|
||
1348B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C249000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
275C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB03000
|
trusted library allocation
|
page read and write
|
||
1B9A0000
|
heap
|
page execute and read and write
|
||
184B0F6A000
|
heap
|
page read and write
|
||
7FFD9BEB6000
|
trusted library allocation
|
page read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
13243000
|
trusted library allocation
|
page read and write
|
||
12C64000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB8000
|
trusted library allocation
|
page execute and read and write
|
||
1AF1D000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page execute and read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EF000
|
trusted library allocation
|
page read and write
|
||
13E5C000
|
trusted library allocation
|
page read and write
|
||
13EAE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
1B450000
|
heap
|
page read and write
|
||
7FFD9C24B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA5A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
24AED980000
|
heap
|
page read and write
|
||
7FFD9BF7B000
|
trusted library allocation
|
page read and write
|
||
141E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
3758000
|
trusted library allocation
|
page read and write
|
||
12D6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1C4B7000
|
heap
|
page read and write
|
||
13574000
|
trusted library allocation
|
page read and write
|
||
CC233BE000
|
stack
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
7FFD9BB14000
|
trusted library allocation
|
page read and write
|
||
14664000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0C0000
|
trusted library allocation
|
page read and write
|
||
1859000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
2CED000
|
heap
|
page read and write
|
||
7FFD9BA83000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
3257000
|
trusted library allocation
|
page read and write
|
||
2E54000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92B000
|
trusted library allocation
|
page execute and read and write
|
||
162CE6E5000
|
heap
|
page read and write
|
||
1BCD0000
|
unkown
|
page readonly
|
||
7FFD9BA38000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEE6000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
heap
|
page read and write
|
||
1BBDE000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF9C000
|
trusted library allocation
|
page read and write
|
||
1C16D000
|
heap
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
7FFD9C090000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
1B7F3000
|
heap
|
page execute and read and write
|
||
7FFD9BAF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0D7000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1BA29000
|
heap
|
page read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5F000
|
trusted library allocation
|
page read and write
|
||
1BCB2000
|
unkown
|
page readonly
|
||
7FFD9C09B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E6000
|
trusted library allocation
|
page execute and read and write
|
||
13CD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
1B5B1000
|
heap
|
page read and write
|
||
24AEDA16000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1B560000
|
heap
|
page read and write
|
||
1B743000
|
heap
|
page execute and read and write
|
||
7FFD9BF80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB75000
|
trusted library allocation
|
page read and write
|
||
1B063000
|
heap
|
page execute and read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E7000
|
trusted library allocation
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
1BD11000
|
heap
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC5000
|
trusted library allocation
|
page read and write
|
||
14F2000
|
unkown
|
page readonly
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
trusted library allocation
|
page read and write
|
||
132C3000
|
trusted library allocation
|
page read and write
|
||
14442000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
1C11C000
|
heap
|
page read and write
|
||
7FFD9C2E3000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
unkown
|
page readonly
|
||
13666000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
heap
|
page read and write
|
||
7FFD9BC46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
140B9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2BE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
1AE20000
|
trusted library allocation
|
page read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
7FFD9C24F000
|
trusted library allocation
|
page read and write
|
||
2D38000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEC0000
|
trusted library allocation
|
page read and write
|
||
1CFEB000
|
stack
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
12F74000
|
trusted library allocation
|
page read and write
|
||
13C36000
|
trusted library allocation
|
page read and write
|
||
13271000
|
trusted library allocation
|
page read and write
|
||
12FA4000
|
trusted library allocation
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1BB000
|
trusted library allocation
|
page read and write
|
||
1BEA2000
|
unkown
|
page readonly
|
||
186D000
|
heap
|
page read and write
|
||
7FFD9BFBC000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
2B99000
|
heap
|
page read and write
|
||
3DF8000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
1CAD1000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
145EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C240000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C210000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF40000
|
trusted library allocation
|
page read and write
|
||
1B807000
|
heap
|
page read and write
|
||
2294D2DA000
|
heap
|
page read and write
|
||
142F4000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
7FFD9C2C7000
|
trusted library allocation
|
page read and write
|
||
1CBEE000
|
stack
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
2739000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
3392000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C310000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFE0000
|
trusted library allocation
|
page read and write
|
||
3008000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
13BCE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page execute and read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA9C000
|
trusted library allocation
|
page read and write
|
||
12E02000
|
trusted library allocation
|
page read and write
|
||
1838000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
7FFD9BF43000
|
trusted library allocation
|
page read and write
|
||
1C4EE000
|
stack
|
page read and write
|
||
7FFD9C225000
|
trusted library allocation
|
page read and write
|
||
2EBD000
|
trusted library allocation
|
page read and write
|
||
1D5AB000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
269B5BD0000
|
heap
|
page read and write
|
||
21E23B05000
|
heap
|
page read and write
|
||
31F8000
|
trusted library allocation
|
page read and write
|
||
1C30D000
|
stack
|
page read and write
|
||
24AED990000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF12000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9C068000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C08B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA88000
|
trusted library allocation
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2B0000
|
trusted library allocation
|
page read and write
|
||
201A4C1A000
|
heap
|
page read and write
|
||
7FFD9C28D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C17B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B914000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2C3000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
141B2000
|
trusted library allocation
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
1B070000
|
heap
|
page read and write
|
||
1C70F000
|
stack
|
page read and write
|
||
1B47A000
|
stack
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
1A67CDB0000
|
heap
|
page read and write
|
||
7FFD9BA58000
|
trusted library allocation
|
page execute and read and write
|
||
134E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
134C1000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
7FFD9C099000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF41000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
7FFD9C183000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1EB000
|
trusted library allocation
|
page read and write
|
||
4FCFB3C000
|
stack
|
page read and write
|
||
1B00F000
|
stack
|
page read and write
|
||
7FFD9BE6E000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
1BE16000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9C259000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB47000
|
trusted library allocation
|
page read and write
|
||
4BF58FF000
|
stack
|
page read and write
|
||
1B6B3000
|
heap
|
page execute and read and write
|
||
7FFD9C061000
|
trusted library allocation
|
page read and write
|
||
13DF000
|
stack
|
page read and write
|
||
7FFD9B8D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEAA000
|
trusted library allocation
|
page read and write
|
||
1B8C0000
|
heap
|
page read and write
|
||
7FFD9BE7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C272000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
25FD09D0000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
1305B000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page execute and read and write
|
||
7FFD9B98C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page execute and read and write
|
||
1B170000
|
heap
|
page read and write
|
||
7FFD9C1FB000
|
trusted library allocation
|
page read and write
|
||
1BE8D000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
13AA1000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
1354F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C180000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7FFD9BB34000
|
trusted library allocation
|
page read and write
|
||
1BDE0000
|
heap
|
page read and write
|
||
7FFD9BA9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
1B3E9000
|
heap
|
page read and write
|
||
1468A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB6000
|
trusted library allocation
|
page read and write
|
||
3AE8000
|
trusted library allocation
|
page read and write
|
||
2CBD000
|
trusted library allocation
|
page read and write
|
||
13189000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE9F000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
stack
|
page read and write
|
||
7FFD9C1D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
1CD0B000
|
heap
|
page read and write
|
||
7FFD9C1DE000
|
trusted library allocation
|
page read and write
|
||
13616000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA98000
|
trusted library allocation
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
7FFD9C1F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
1326E000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
13E0E000
|
trusted library allocation
|
page read and write
|
||
1C09D000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
7FFD9BAE5000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
D8216FF000
|
stack
|
page read and write
|
||
1400E000
|
trusted library allocation
|
page read and write
|
||
1BD62000
|
unkown
|
page readonly
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2D0000
|
trusted library allocation
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FFD9BFF0000
|
trusted library allocation
|
page read and write
|
||
13F29000
|
trusted library allocation
|
page read and write
|
||
131A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF3B000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
144A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEB4000
|
trusted library allocation
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page execute and read and write
|
||
25FD088F000
|
heap
|
page read and write
|
||
1CCC7000
|
heap
|
page read and write
|
||
7FFD9C260000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
3A87000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6E000
|
trusted library allocation
|
page read and write
|
||
139F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF35000
|
trusted library allocation
|
page read and write
|
||
7FFD9C280000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1BE000
|
trusted library allocation
|
page read and write
|
||
1BFA5000
|
heap
|
page read and write
|
||
7FFD9BB8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
7FFD9C26B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC34000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9C089000
|
trusted library allocation
|
page read and write
|
||
13726000
|
trusted library allocation
|
page read and write
|
||
13E7C000
|
trusted library allocation
|
page read and write
|
||
269B5CE0000
|
heap
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
7FFD9BFA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
1B135000
|
heap
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
14542000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEF0000
|
trusted library allocation
|
page read and write
|
||
14630000
|
trusted library allocation
|
page read and write
|
||
13E36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF50000
|
trusted library allocation
|
page read and write
|
||
1F607B90000
|
heap
|
page read and write
|
||
1BEF0000
|
heap
|
page read and write
|
||
7FFD9C1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C229000
|
trusted library allocation
|
page read and write
|
||
1C4CE000
|
stack
|
page read and write
|
||
7FFD9BF00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF90000
|
trusted library allocation
|
page read and write
|
||
2889000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
1BDD2000
|
unkown
|
page readonly
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1DF000
|
trusted library allocation
|
page read and write
|
||
2838000
|
trusted library allocation
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
7FFD9C220000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC34000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB29000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C6000
|
trusted library allocation
|
page execute and read and write
|
||
18015295000
|
heap
|
page read and write
|
||
7FFD9B8D8000
|
trusted library allocation
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BABA000
|
trusted library allocation
|
page read and write
|
||
7FFD9C193000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page execute and read and write
|
||
15CF000
|
stack
|
page read and write
|
||
1C9EF000
|
stack
|
page read and write
|
||
A27000
|
unkown
|
page readonly
|
||
1B140000
|
trusted library allocation
|
page read and write
|
||
13C46000
|
trusted library allocation
|
page read and write
|
||
13D29000
|
trusted library allocation
|
page read and write
|
||
7FFD9C293000
|
trusted library allocation
|
page read and write
|
||
848BF8F000
|
stack
|
page read and write
|
||
13CFE000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
7FFD9BAAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1C0000
|
trusted library allocation
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
7FFD9C071000
|
trusted library allocation
|
page read and write
|
||
135E9000
|
trusted library allocation
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
1B50E000
|
heap
|
page read and write
|
||
7FFD9BF10000
|
trusted library allocation
|
page read and write
|
||
7FFD9C0A0000
|
trusted library allocation
|
page read and write
|
||
1D08E000
|
stack
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF35000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB57000
|
trusted library allocation
|
page read and write
|
||
7FFD9B986000
|
trusted library allocation
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7FFD9B91B000
|
trusted library allocation
|
page execute and read and write
|
||
1BB94000
|
unkown
|
page readonly
|
||
1289E000
|
trusted library allocation
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
7FFD9C243000
|
trusted library allocation
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
12B91000
|
trusted library allocation
|
page read and write
|
||
4019A7C000
|
stack
|
page read and write
|
||
21E23720000
|
heap
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FFD9B9F8000
|
trusted library allocation
|
page execute and read and write
|
||
1ACD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9C250000
|
trusted library allocation
|
page read and write
|
||
2294D2D0000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
162CE6E0000
|
heap
|
page read and write
|
||
7FFD9BB7D000
|
trusted library allocation
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
4019B7F000
|
stack
|
page read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BED0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF7E000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
145C5000
|
trusted library allocation
|
page read and write
|
||
1BDD0000
|
unkown
|
page readonly
|
||
7FFD9BF19000
|
trusted library allocation
|
page read and write
|
||
13032000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFB6000
|
trusted library allocation
|
page read and write
|
||
12E66000
|
trusted library allocation
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
2729000
|
heap
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
12EF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC54000
|
trusted library allocation
|
page read and write
|
||
13D4B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFC0000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
13CBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC16000
|
trusted library allocation
|
page read and write
|
||
1BDAE000
|
heap
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page read and write
|
||
1C17E000
|
heap
|
page read and write
|
||
140FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1CB000
|
trusted library allocation
|
page read and write
|
||
2F28000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FFD9B91B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BF1B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BFD0000
|
trusted library allocation
|
page read and write
|
||
1B3AF000
|
heap
|
page read and write
|
||
7FFD9C230000
|
trusted library allocation
|
page read and write
|
||
7FFD9C1D0000
|
trusted library allocation
|
page read and write
|
||
13117000
|
trusted library allocation
|
page read and write
|
||
7FFD9C292000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
162CE700000
|
heap
|
page read and write
|
||
7FFD9C23B000
|
trusted library allocation
|
page read and write
|
||
1BD90000
|
unkown
|
page readonly
|
||
13316000
|
trusted library allocation
|
page read and write
|
||
13A6F000
|
trusted library allocation
|
page read and write
|
||
13550000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
134B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
7FFD9BFC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BEE2000
|
trusted library allocation
|
page read and write
|
||
13529000
|
trusted library allocation
|
page read and write
|
||
7FFD9C166000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
14851000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEAD000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
1BAF2000
|
heap
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
7FFD9B8DD000
|
trusted library allocation
|
page execute and read and write
|
||
1ABC0000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
14161AC0000
|
heap
|
page read and write
|
||
7FFD9C0C5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
1CE8B000
|
stack
|
page read and write
|
||
28D9000
|
heap
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
263A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAAC000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF20000
|
trusted library allocation
|
page read and write
|
||
1BB70000
|
heap
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
7FFD9C2F0000
|
trusted library allocation
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page read and write
|
||
2294D210000
|
heap
|
page read and write
|
||
2BEB000
|
trusted library allocation
|
page read and write
|
||
7FFD9C270000
|
trusted library allocation
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
12F2D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8ED000
|
trusted library allocation
|
page execute and read and write
|
||
1110000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE8E000
|
trusted library allocation
|
page read and write
|
||
1CAA4000
|
heap
|
page read and write
|
||
1AF20000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
35B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BF60000
|
trusted library allocation
|
page read and write
|
||
1A67CBCA000
|
heap
|
page read and write
|
||
7FFD9C200000
|
trusted library allocation
|
page read and write
|
||
1CB4D000
|
stack
|
page read and write
|
||
7FFD9BF09000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9C20F000
|
trusted library allocation
|
page read and write
|
||
13992000
|
trusted library allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
1BB2F000
|
heap
|
page read and write
|
||
7FFD9B8F8000
|
trusted library allocation
|
page read and write
|
There are 3159 hidden memdumps, click here to show them.