IOC Report
9D7RwuJrth.exe

loading gif

Files

File Path
Type
Category
Malicious
9D7RwuJrth.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\smss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\smss.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Windows Defender\en-GB\qLBhpsNtheWbwIdhOeZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Defender\en-GB\qLBhpsNtheWbwIdhOeZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files\Windows Media Player\en-GB\qLBhpsNtheWbwIdhOeZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\OneDrive\qLBhpsNtheWbwIdhOeZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9D7RwuJrth.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\9O9rrJCHDg.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\BBca1gliPd.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\BLXo76X4ph.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\FYUTXnTyLD.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\KvMN3vAFGm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\g6UJbp2Exv.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\gA6Kj9AC8z.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\grDS520PRI.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\x3fbj0yJ9Y.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\yRPxJCkWkW.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\AEgOhmic.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ANxQZOiH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AVufnTwx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\AddxSDXD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BRrXbneT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BjyqpIYV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\BwryKsoE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CDLiAAVt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CJLfMmRu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\COJNZQhv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\CvcPWQun.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DCtffNkc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\DpMeoAtV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\EvEoCbHu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\FDIxLbbR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GQJohFLp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\GfifQgAx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HBUOKBdR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HENwTSHn.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HGufhKgM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HiuOyNKb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\HoTXnYtt.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Hwddojgi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ITFobKbD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IonNSomK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\IpLeIKzQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JENuXwBf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JUqyElOI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JdPmuXvO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\JpYWvPZP.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KMHfZCnD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KSAetdQl.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KebpbcGE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\KrawoXqF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LALnLPjB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\LsLFRydK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MFWOLyZB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MPcmOdeg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MbDxwcVz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\MsfvwPWb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NZNelUXb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\NhwwQEyh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OIrVAZQe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OLjDJquB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OPbwNHKO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OQhlWUKC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OdqVYMoD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OzPMecrY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QJwUIRwB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QLdDWJUZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QfdDtvsy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QfjBlGMR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\QnTUQpnW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RUOvtANV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RXHdCRrs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RfxtYLmQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RngMDvMV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\RoOvQmlu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SFRmUDLH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\STgXZIan.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\SYsmfrex.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TMiCdAAw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TcjfiIuK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\TideCjWs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\UAlWJNil.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VBmvCWAb.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VNPvpVFD.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\VfEmYjln.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XOCTRFXH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XQkCfxwg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XYaTBrrE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XgJlfaRK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XprDnjwZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\XujdOCGR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YiicOEwG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YqcMQKie.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YrKlkCVM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\YvkCHKYH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZDFmwSFw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZELbGgFk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZOCRVjRy.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZRpBnocC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ZWwCXoEW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aOwTdXyg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\aghuugwS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bHyKcPKg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\bXhLAPqc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\brYbblpC.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cItldMID.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cLlTmcma.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\cvCSNcGe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\czckklIZ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dVAarBMu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\decjNzkA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\dsdajcUY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eJEjcPHs.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eNYCHMrV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\eoNbkqdw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fkGLlyFI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fkHAryTS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\fnytvPjf.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gGCbQipO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gUkCADyL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gmasiRfw.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gqAKFZhr.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\guQJELZU.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\gxIrOcDq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\haeBUeau.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hdVuXvrH.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\hyUuvhPg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iEOtPIrO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\iayrzvUL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ijPsrWTp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\imHaAnxM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\infrqIKS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jFPSHRJE.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jOdAThRi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jrYzshHe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\jwQjNADO.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kChIFuMg.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kOAKeIBA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kWkcJscF.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kcQjpOfp.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\kjAKCvZY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lHCBdANz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lZsrLOuk.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\lkUrzNzM.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mRnsAsGv.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\mUfaJIkR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nSHawKfi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\niPqzeHY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\nzWIOABa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oOOAVsVq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\oTbQbbYz.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ocsSTCYe.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\pdjZooeB.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qKWRQFlK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qQwaFPUc.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\qpMzVwBT.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\quKhiaRV.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rAfaFgSo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rEFrcoVj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rMoKHXwo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rNXibPjW.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rgoKfKUN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\rrlpDagQ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sOOpvBpu.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\sUsSQXQL.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\seyqUCWq.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\smiIylww.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tLkzZqkX.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tPKQwznS.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\tojirtOm.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uILHvqzR.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\uMlYSzCN.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vVohbyWj.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\vhcgKXhJ.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wipYxcGI.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\wvgrNMIh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xBgoYyEi.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xFRjkDBd.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xJQGDhfo.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\xtqXCEKK.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yCtrFDQY.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yNVrtDVA.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\yWtgjqCG.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\ywOZehbx.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zHFGLnTh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zgMHUZTa.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\zuvWKvqh.log
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\69ddcba757bf72
ASCII text, with very long lines (600), with no line terminators
dropped
C:\Program Files (x86)\Windows Defender\en-GB\6661cc8d955995
ASCII text, with very long lines (314), with no line terminators
dropped
C:\Program Files\Windows Media Player\en-GB\6661cc8d955995
ASCII text, with very long lines (851), with no line terminators
dropped
C:\Program Files\Windows Media Player\en-GB\qLBhpsNtheWbwIdhOeZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\Default\OneDrive\6661cc8d955995
ASCII text, with very long lines (633), with no line terminators
dropped
C:\Users\Default\OneDrive\qLBhpsNtheWbwIdhOeZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\31uZT8RR1g
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\80hMChn298
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\LT16qBpyUU
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bieogrRRF6
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\c209pDRrD0
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\hBObAi4A4j
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\oh1XY3CFsG
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rN7wUyQB6L
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vDeTwOLJho
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\x8N8qyiaI1
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\74ca659111f950
ASCII text, with very long lines (933), with no line terminators
dropped
C:\Windows\GameBarPresenceWriter\24dbde2999530e
ASCII text, with very long lines (582), with no line terminators
dropped
C:\Windows\INF\WmiApRpl\WmiApRpl.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\INF\WmiApRpl\WmiApRpl.ini
Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
dropped
C:\Windows\System32\PerfStringBackup.INI
data
dropped
C:\Windows\System32\PerfStringBackup.TMP
data
dropped
C:\Windows\System32\perfc009.dat
data
dropped
C:\Windows\System32\perfh009.dat
data
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
dropped
C:\Windows\system32\wbem\Performance\WmiApRpl.h (copy)
ASCII text, with CRLF line terminators
dropped
C:\Windows\system32\wbem\Performance\WmiApRpl.ini (copy)
Unicode text, UTF-16, little-endian text, with very long lines (405), with CRLF line terminators
dropped
\Device\Null
ASCII text
dropped
There are 210 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9D7RwuJrth.exe
"C:\Users\user\Desktop\9D7RwuJrth.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\gA6Kj9AC8z.bat"
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yRPxJCkWkW.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\g6UJbp2Exv.bat"
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\grDS520PRI.bat"
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FYUTXnTyLD.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\KvMN3vAFGm.bat"
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\x3fbj0yJ9Y.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9O9rrJCHDg.bat"
malicious
C:\Windows\System32\PING.EXE
ping -n 10 localhost
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\BBca1gliPd.bat"
malicious
C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe
"C:\Windows\GameBarPresenceWriter\WmiPrvSE.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\BLXo76X4ph.bat"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 40 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://304773cm.n9sh
unknown
malicious
http://304773cm.n9shteam.in/jscpuGamegeneratorprivate.php
188.114.96.3
malicious
http://304773cm.n9shteam.in
unknown
malicious
http://304773cm.n9shteam.in/
unknown
malicious
http://304773cm.n9Pb
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://304773cm.n9shteam.in/jscpuGamegeneratorprivate.php0
unknown
http://304773cm.n9P
unknown

Domains

Name
IP
Malicious
304773cm.n9shteam.in
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
304773cm.n9shteam.in
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\fee4b4d7d2c1350130b9ec097b7df75c1abf9a3e
06417c29153971e5909b84f2bc92df26cfabb971
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WmiPrvSE_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Updating
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Updating
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
Last Counter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
Last Help
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
First Counter
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
First Help
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WmiApRpl\Performance
Object List
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\system32\kernelbase.dll[MofResourceName]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\system32\en-US\kernelbase.dll.mui[MofResourceName]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\ACPI.sys[ACPIMOFResource]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\en-US\ACPI.sys.mui[ACPIMOFResource]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\lsi_sas.sys[MofResource]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\processr.sys[PROCESSORWMI]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\en-US\processr.sys.mui[PROCESSORWMI]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\mssmbios.sys[MofResource]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\en-US\mssmbios.sys.mui[MofResource]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\system32\drivers\ndis.sys[MofResourceName]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\system32\drivers\en-US\ndis.sys.mui[MofResourceName]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\drivers\HDAudBus.sys[HDAudioMofName]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\WDM\DREDGE
C:\Windows\System32\Drivers\portcls.SYS[PortclsMof]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Last Counter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Last Help
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Last Counter
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Last Help
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wbem\PROVIDERS\Performance
Performance Data
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12A61000
trusted library allocation
page read and write
malicious
412000
unkown
page readonly
malicious
7FFD9BA66000
trusted library allocation
page execute and read and write
13570000
trusted library allocation
page read and write
1B842000
heap
page read and write
7FFD9BE54000
trusted library allocation
page read and write
7FFD9BFD0000
trusted library allocation
page execute and read and write
7FFD9BEC0000
trusted library allocation
page read and write
7FFD9BED0000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
7FFD9C1BA000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
7FFD9C0C6000
trusted library allocation
page read and write
C00000
heap
page read and write
3705000
trusted library allocation
page read and write
1B80E000
stack
page read and write
13C3F000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
1B5F2000
unkown
page readonly
140C6000
trusted library allocation
page read and write
13023000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
1017000
trusted library allocation
page read and write
7FFD9BF29000
trusted library allocation
page read and write
22E0AF12000
heap
page read and write
13329000
trusted library allocation
page read and write
389B000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
1C86F000
heap
page read and write
13149000
trusted library allocation
page read and write
1428C000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
3010000
heap
page execute and read and write
7FFD9BF20000
trusted library allocation
page read and write
7FFD9BE90000
trusted library allocation
page read and write
2A4AB5F0000
heap
page read and write
21D0F4C0000
heap
page read and write
7FFD9C1A7000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
1760000
heap
page read and write
3399000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
352B000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
7FFD9C140000
trusted library allocation
page read and write
12EC0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
32CF000
trusted library allocation
page read and write
7FFD9BBB5000
trusted library allocation
page read and write
7FFD9C100000
trusted library allocation
page read and write
7FFD9C1D1000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
287E000
stack
page read and write
13E7000
trusted library allocation
page read and write
7FFD9C204000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
1CA30000
heap
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
13021000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
137A0000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
3A60000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
3A5D000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
1D2CD000
stack
page read and write
1B831633000
heap
page read and write
1AEFB000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
F80000
heap
page read and write
3975000
trusted library allocation
page read and write
28E2000
unkown
page readonly
2A80000
heap
page execute and read and write
6D16FF000
stack
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9C0B3000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
5064CFF000
stack
page read and write
2922000
unkown
page readonly
2F50000
heap
page execute and read and write
7FFD9BF59000
trusted library allocation
page read and write
7FFD9BEF2000
trusted library allocation
page read and write
7FFD9BE31000
trusted library allocation
page read and write
22E0AEE0000
heap
page read and write
7FFD9C290000
trusted library allocation
page execute and read and write
7FFD9BE5F000
trusted library allocation
page read and write
3804000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
1C4FB000
heap
page read and write
13D10000
trusted library allocation
page read and write
132B2000
trusted library allocation
page read and write
1429A000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
7FFD9C2AD000
trusted library allocation
page read and write
1FCF55B0000
heap
page read and write
21E0F960000
heap
page read and write
13810000
trusted library allocation
page read and write
13261000
trusted library allocation
page read and write
1B54E000
stack
page read and write
7FFD9BF50000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
B10000
trusted library allocation
page read and write
1659000
heap
page read and write
7FFD9C0C3000
trusted library allocation
page read and write
11C8000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
3D7E000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
3AC2000
trusted library allocation
page read and write
7FFD9BC31000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
18C0000
heap
page execute and read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1C680000
heap
page read and write
7FFD9C12B000
trusted library allocation
page read and write
1BBBC000
heap
page read and write
7FFD9BF2B000
trusted library allocation
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
1C8BC000
heap
page read and write
7FFD9BE58000
trusted library allocation
page read and write
1B92A000
heap
page read and write
7FFD9BB36000
trusted library allocation
page read and write
146A000
heap
page read and write
1A9A0000
trusted library allocation
page read and write
1B5E1FC0000
heap
page read and write
1518000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BE4A000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9C07B000
trusted library allocation
page read and write
7FFD9C283000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
1C16E000
stack
page read and write
D50000
heap
page read and write
3B22000
trusted library allocation
page read and write
7FFD9C1EF000
trusted library allocation
page read and write
12BBB000
trusted library allocation
page read and write
18140390000
heap
page read and write
7FFD9BFDC000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
3489000
trusted library allocation
page read and write
7FFD9BF3D000
trusted library allocation
page read and write
1C5AD000
stack
page read and write
30C0000
heap
page execute and read and write
13A0F000
trusted library allocation
page read and write
1BA70000
unkown
page readonly
1C575A30000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9C099000
trusted library allocation
page read and write
378C000
trusted library allocation
page read and write
7FFD9C28C000
trusted library allocation
page read and write
1C8DC000
heap
page read and write
199E4CB0000
heap
page read and write
7FFD9C1FA000
trusted library allocation
page read and write
136B3000
trusted library allocation
page read and write
2A4AB5F6000
heap
page read and write
339D000
trusted library allocation
page read and write
17B0000
heap
page read and write
F20547F000
stack
page read and write
1B6F0000
heap
page read and write
7FFD9BF37000
trusted library allocation
page read and write
929747B000
stack
page read and write
CD0000
heap
page read and write
2A61000
trusted library allocation
page read and write
2469D355000
heap
page read and write
31C7000
trusted library allocation
page read and write
1B603000
heap
page execute and read and write
7FFD9C270000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9C276000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
3B3C000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
7FFD9BB48000
trusted library allocation
page read and write
7FFD9BCA7000
trusted library allocation
page read and write
1190000
heap
page execute and read and write
7FFD9C1B0000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BE31000
trusted library allocation
page read and write
3793000
trusted library allocation
page read and write
7FFD9BB58000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9BB2D000
trusted library allocation
page read and write
28B0000
heap
page execute and read and write
7FFD9C14B000
trusted library allocation
page read and write
230CF110000
heap
page read and write
28D34BC7000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
1CDE7000
heap
page read and write
33E0000
trusted library allocation
page read and write
1399F000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
7FFD9BF94000
trusted library allocation
page read and write
1B5AE000
heap
page read and write
1CE6E000
stack
page read and write
7FFD9BB9C000
trusted library allocation
page read and write
7FFD9BFA4000
trusted library allocation
page read and write
21D0F120000
heap
page read and write
7FFD9BBE7000
trusted library allocation
page read and write
1C48E000
stack
page read and write
7FFD9C1F0000
trusted library allocation
page execute and read and write
7FFD9BFA2000
trusted library allocation
page read and write
7FFD9BE74000
trusted library allocation
page read and write
7FFD9BF50000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
FE0000
heap
page read and write
1CB16000
heap
page read and write
2D7E000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
1B9C3000
heap
page execute and read and write
7FFD9BF37000
trusted library allocation
page read and write
7FFD9C0B6000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
3B8E000
trusted library allocation
page read and write
12CE000
heap
page read and write
34C9000
trusted library allocation
page read and write
7FFD9C079000
trusted library allocation
page read and write
129D9000
trusted library allocation
page read and write
72E000
stack
page read and write
FFE2C7F000
stack
page read and write
3277000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
382C000
trusted library allocation
page read and write
37EC000
trusted library allocation
page read and write
3B30000
trusted library allocation
page read and write
1B8315F0000
heap
page read and write
33F7000
trusted library allocation
page read and write
139B8000
trusted library allocation
page read and write
B9097FF000
stack
page read and write
7FFD9BB21000
trusted library allocation
page read and write
1915000
heap
page read and write
1B5E2110000
heap
page read and write
3B36000
trusted library allocation
page read and write
3B8B000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1C32B000
stack
page read and write
1C479000
heap
page read and write
7FFD9BF90000
trusted library allocation
page read and write
FD0000
heap
page read and write
1B25DB6F000
heap
page read and write
7FFD9C2A0000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
7FFD9BC5F000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
7FFD9C190000
trusted library allocation
page read and write
7FFD9BF3F000
trusted library allocation
page read and write
13712000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
7FFD9C07C000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
1EF77807000
heap
page read and write
7FFD9BE30000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
1B430000
heap
page execute and read and write
7FFD9C1D0000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
3AC4000
trusted library allocation
page read and write
7FFD9C1C0000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
389D000
trusted library allocation
page read and write
7FFD9C1E0000
trusted library allocation
page read and write
7FFD9C124000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
7FFD9C0D0000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
132C1000
trusted library allocation
page read and write
7FFD9BBCE000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BB58000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
14427000
trusted library allocation
page read and write
1BF7B000
stack
page read and write
32D9000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
13312000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
D6F000
heap
page read and write
7FFD9C130000
trusted library allocation
page read and write
1C5759D0000
heap
page read and write
2469D06D000
heap
page read and write
68B1FDC000
stack
page read and write
880000
heap
page read and write
7FFD9C290000
trusted library allocation
page read and write
20D0B450000
heap
page read and write
1B67B000
stack
page read and write
7FFD9C1EA000
trusted library allocation
page read and write
13520000
trusted library allocation
page read and write
333B000
trusted library allocation
page read and write
7FFD9C07B000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
CAC000
heap
page read and write
7FFD9C160000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
7FFD9BBF2000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page read and write
1345E000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
7FFD9BC11000
trusted library allocation
page read and write
7FFD9C270000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
7FFD9BCA7000
trusted library allocation
page read and write
132FA000
trusted library allocation
page read and write
7FFD9BB8D000
trusted library allocation
page read and write
130F1000
trusted library allocation
page read and write
18140420000
heap
page read and write
3ADA000
trusted library allocation
page read and write
20D0B370000
heap
page read and write
2B28000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
132C9000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
13301000
trusted library allocation
page read and write
7FFD9BBF2000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
8A4000
heap
page read and write
7FFD9C187000
trusted library allocation
page read and write
7FFD9C0B0000
trusted library allocation
page read and write
7FFD9BF3F000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
7FFD9BF84000
trusted library allocation
page read and write
1C6C0000
heap
page read and write
1460000
heap
page read and write
34C7000
trusted library allocation
page read and write
7FFD9BB38000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
1CDE1000
heap
page read and write
7FFD9C060000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
7FFD9C27B000
trusted library allocation
page read and write
13208000
trusted library allocation
page read and write
1306E000
trusted library allocation
page read and write
7FFD9C290000
trusted library allocation
page execute and read and write
7FFD9BF50000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
7FFD9C1FB000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
333F000
trusted library allocation
page read and write
1B592000
unkown
page readonly
33D0000
trusted library allocation
page read and write
B30000
heap
page read and write
2FAA000
trusted library allocation
page read and write
1C4CC000
heap
page read and write
7FFD9BF4D000
trusted library allocation
page read and write
7FFD9BBEE000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
22E0B1B0000
heap
page read and write
77F170F000
stack
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1FCF56B0000
heap
page read and write
7FFD9C200000
trusted library allocation
page execute and read and write
3279000
trusted library allocation
page read and write
7FFD9BF4D000
trusted library allocation
page read and write
13096000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
2AAD000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
1CFCB000
unkown
page read and write
A81B47F000
stack
page read and write
7FFD9C1ED000
trusted library allocation
page read and write
3B8D000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
1C34B000
heap
page read and write
1B70F000
stack
page read and write
2FA6000
trusted library allocation
page read and write
1395E000
trusted library allocation
page read and write
7FFD9C29B000
trusted library allocation
page read and write
1B831900000
heap
page read and write
7FFD9B998000
trusted library allocation
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
300B000
trusted library allocation
page read and write
7FFD9BCB6000
trusted library allocation
page read and write
1B409000
heap
page read and write
47BE2FA000
stack
page read and write
7FFD9C1A7000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9BBF2000
trusted library allocation
page read and write
165B000
heap
page read and write
7FFD9C185000
trusted library allocation
page read and write
2770000
heap
page read and write
201F3154000
heap
page read and write
13AF8000
trusted library allocation
page read and write
7FFD9BE1B000
trusted library allocation
page read and write
7FFD9BF10000
trusted library allocation
page read and write
7FFD9C180000
trusted library allocation
page read and write
13116000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
7FFD9BB74000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
7FFD9C0B6000
trusted library allocation
page read and write
7FFD9BDAD000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9BF3D000
trusted library allocation
page read and write
3AD0000
trusted library allocation
page read and write
138CF000
trusted library allocation
page read and write
380D000
trusted library allocation
page read and write
13630000
trusted library allocation
page read and write
7FFD9BB38000
trusted library allocation
page read and write
7FFD9C028000
trusted library allocation
page read and write
8BF000
heap
page read and write
7FFD9BE2C000
trusted library allocation
page read and write
7FFD9C27B000
trusted library allocation
page read and write
7FFD9BB67000
trusted library allocation
page read and write
7FFD9BF80000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
B90977F000
stack
page read and write
7FFD9C038000
trusted library allocation
page read and write
1C46F000
heap
page read and write
13462000
trusted library allocation
page read and write
7FFD9BB23000
trusted library allocation
page execute and read and write
3DBE000
trusted library allocation
page read and write
134C0000
trusted library allocation
page read and write
7FFD9BF49000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
3552000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
7FFD9C1EF000
trusted library allocation
page read and write
1ADEA000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
B57000
heap
page read and write
7FFD9C060000
trusted library allocation
page read and write
C57000
trusted library allocation
page read and write
72446FF000
unkown
page read and write
132A0000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
2DC6CAD0000
heap
page read and write
13393000
trusted library allocation
page read and write
7FFD9C190000
trusted library allocation
page read and write
7FFD9BFC2000
trusted library allocation
page read and write
7FFD9C170000
trusted library allocation
page read and write
1AFF0000
heap
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
230CF3D0000
heap
page read and write
2FA4000
trusted library allocation
page read and write
1FCF5706000
heap
page read and write
13CC9000
trusted library allocation
page read and write
7FFD9BF47000
trusted library allocation
page read and write
7FFD9C071000
trusted library allocation
page read and write
1BAA0000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
7FFD9C0D0000
trusted library allocation
page read and write
1B05F0D0000
heap
page read and write
2B61000
trusted library allocation
page read and write
27A79470000
heap
page read and write
D40000
heap
page read and write
3753000
trusted library allocation
page read and write
7FFD9C0D3000
trusted library allocation
page read and write
7FFD9C1E4000
trusted library allocation
page read and write
3952000
trusted library allocation
page read and write
1170000
heap
page read and write
1BBA1000
heap
page read and write
F4F000
stack
page read and write
7FFD9C051000
trusted library allocation
page read and write
7FFD9C283000
trusted library allocation
page read and write
14195000
trusted library allocation
page read and write
7FFD9BCC2000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
1555000
heap
page read and write
7FFD9BE60000
trusted library allocation
page read and write
1402B000
trusted library allocation
page read and write
7FFD9B998000
trusted library allocation
page read and write
7FFD9C149000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
5064AFC000
stack
page read and write
199E4D23000
heap
page read and write
7FFD9BF1F000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
7FFD9BF80000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
133F8000
trusted library allocation
page read and write
1DCC15E7000
heap
page read and write
7FFD9BCA6000
trusted library allocation
page read and write
132F9000
trusted library allocation
page read and write
1CD89000
heap
page read and write
D58000
heap
page read and write
1100000
heap
page read and write
7FFD9C108000
trusted library allocation
page read and write
1C246000
heap
page read and write
1B970000
unkown
page readonly
340F000
trusted library allocation
page read and write
28EC000
unkown
page readonly
140C0000
trusted library allocation
page read and write
1560000
heap
page read and write
201F3320000
heap
page read and write
7FFD9BD9A000
trusted library allocation
page read and write
21D0F14A000
heap
page read and write
7FFD9BB63000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
13F21000
trusted library allocation
page read and write
1C830000
heap
page read and write
7FFD9BB94000
trusted library allocation
page read and write
139CE000
trusted library allocation
page read and write
3607000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
3392000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
1C57580A000
heap
page read and write
7FFD9BFA2000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
1CAB3000
heap
page read and write
1B3E0000
heap
page read and write
1D40F000
stack
page read and write
33DA000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
1B25DB6E000
heap
page read and write
7FFD9BE60000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
1CE06000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9C0E2000
trusted library allocation
page read and write
1C775000
heap
page read and write
1EF77800000
heap
page read and write
139FA000
trusted library allocation
page read and write
12C70000
trusted library allocation
page read and write
7FFD9C160000
trusted library allocation
page read and write
7FFD9C053000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
7FFD9C1C0000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
12C68000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
7FFD9C160000
trusted library allocation
page read and write
1C430000
heap
page read and write
7FFD9C2B0000
trusted library allocation
page read and write
29BE000
stack
page read and write
F20515C000
stack
page read and write
D0A000
heap
page read and write
11DC000
heap
page read and write
31CE000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
7FFD9BBA4000
trusted library allocation
page read and write
7FFD9BF1D000
trusted library allocation
page read and write
1C2D3000
heap
page read and write
3846000
trusted library allocation
page read and write
7FFD9C290000
trusted library allocation
page execute and read and write
7FFD9C0A0000
trusted library allocation
page read and write
7FFD9C180000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9C120000
trusted library allocation
page read and write
7FFD9C129000
trusted library allocation
page read and write
1BACD000
stack
page read and write
7FFD9C1C1000
trusted library allocation
page read and write
379D000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
20D0B27A000
heap
page read and write
7FFD9C100000
trusted library allocation
page read and write
7FFD9BB38000
trusted library allocation
page read and write
CCA000
heap
page read and write
13D6D000
trusted library allocation
page read and write
131C6000
trusted library allocation
page read and write
1B37F000
heap
page read and write
392A000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
7FFD9BF50000
trusted library allocation
page read and write
1C70D000
stack
page read and write
1EF777B0000
heap
page read and write
375D000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
13F76000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
13176000
trusted library allocation
page read and write
1D06E000
stack
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BEB3000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
3008000
trusted library allocation
page read and write
34C1000
trusted library allocation
page read and write
7FFD9C0B3000
trusted library allocation
page read and write
7FFD9BE2A000
trusted library allocation
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
7FFD9BBD4000
trusted library allocation
page read and write
1BCCE000
stack
page read and write
7FFD9BE6F000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
1B831700000
heap
page read and write
22E0AF0E000
heap
page read and write
22EBEAA8000
heap
page read and write
302F000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1BC90000
heap
page read and write
7FFD9C060000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
1CDAF000
heap
page read and write
27A796C0000
heap
page read and write
22E0AE50000
heap
page read and write
3323000
trusted library allocation
page read and write
7FFD9C05C000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
7FFD9BF70000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
13A98000
trusted library allocation
page read and write
2F8F000
trusted library allocation
page read and write
7FFD9C149000
trusted library allocation
page read and write
1450000
heap
page read and write
770000
heap
page read and write
7FFD9BF84000
trusted library allocation
page read and write
3899000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FFD9BF80000
trusted library allocation
page read and write
1BBB0000
heap
page read and write
7FFD9BB95000
trusted library allocation
page read and write
1B4B2000
heap
page read and write
36AF000
trusted library allocation
page read and write
34EF000
trusted library allocation
page read and write
1C575833000
heap
page read and write
13D0C000
trusted library allocation
page read and write
A81B4FF000
stack
page read and write
1315E000
trusted library allocation
page read and write
1B361000
heap
page read and write
C1D000
heap
page read and write
7FFD9BF50000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
7FFD9BFA2000
trusted library allocation
page read and write
7FFD9BE78000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
3BA9000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
130FB000
trusted library allocation
page read and write
1B4B6000
heap
page read and write
7FFD9BF63000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
7FFD9C0F0000
trusted library allocation
page read and write
7FFD9BFC0000
trusted library allocation
page read and write
1C78B000
heap
page read and write
2FB3000
heap
page execute and read and write
7FFD9BB43000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
2A4AB605000
heap
page read and write
1BBCE000
stack
page read and write
32CF000
trusted library allocation
page read and write
129A9000
trusted library allocation
page read and write
13391000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
1B9EF000
stack
page read and write
2469D06A000
heap
page read and write
3883000
trusted library allocation
page read and write
7FFD9BF2B000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
13A2E000
trusted library allocation
page read and write
7FFD9BF92000
trusted library allocation
page read and write
263E000
stack
page read and write
14133000
trusted library allocation
page read and write
7FFD9BE1B000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
30AF000
trusted library allocation
page read and write
7FFD9BE80000
trusted library allocation
page execute and read and write
7FFD9BEA9000
trusted library allocation
page execute and read and write
38A6000
trusted library allocation
page read and write
230CF3D5000
heap
page read and write
7FFD9BF90000
trusted library allocation
page read and write
7FFD9BFC0000
trusted library allocation
page read and write
1BD9D000
stack
page read and write
1C456000
heap
page read and write
2F67000
trusted library allocation
page read and write
132DD000
trusted library allocation
page read and write
13719000
trusted library allocation
page read and write
7FFD9C1DE000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
D8A000
heap
page read and write
2FB4000
trusted library allocation
page read and write
2721000
trusted library allocation
page read and write
21D0F110000
heap
page read and write
8F2000
heap
page read and write
7FFD9BF63000
trusted library allocation
page read and write
7FFD9C200000
trusted library allocation
page read and write
CCC000
heap
page read and write
7FFD9BBBB000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
154616A0000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9BBDE000
trusted library allocation
page read and write
7FFD9C0F0000
trusted library allocation
page read and write
F50000
heap
page read and write
3261000
trusted library allocation
page read and write
F80000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
7FFD9C07B000
trusted library allocation
page read and write
3906000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
12CF2000
trusted library allocation
page read and write
1BCB0000
heap
page execute and read and write
7FFD9BF67000
trusted library allocation
page read and write
34D4000
trusted library allocation
page read and write
33EF000
trusted library allocation
page read and write
1B6D8000
heap
page read and write
2902000
unkown
page readonly
1620000
heap
page read and write
7FFD9C1B0000
trusted library allocation
page read and write
EA0000
heap
page execute and read and write
326D000
trusted library allocation
page read and write
7FFD9BE76000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
7FFD9C2A3000
trusted library allocation
page read and write
7FFD9BFA2000
trusted library allocation
page read and write
1B5AB000
stack
page read and write
2F60000
heap
page read and write
8A7A47F000
stack
page read and write
1B5E2043000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
2469D020000
heap
page read and write
7FFD9C0E8000
trusted library allocation
page read and write
3B49000
trusted library allocation
page read and write
22E0AF12000
heap
page read and write
9E0000
heap
page read and write
7FFD9C1E0000
trusted library allocation
page read and write
7FFD9C0D6000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
1BDCE000
stack
page read and write
1366F000
trusted library allocation
page read and write
1B5E1EC0000
heap
page read and write
13D13000
trusted library allocation
page read and write
136B9000
trusted library allocation
page read and write
1CB0B000
heap
page read and write
199E4CFA000
heap
page read and write
364B000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page execute and read and write
39C4000
trusted library allocation
page read and write
22E0B0B0000
heap
page read and write
12AA2000
trusted library allocation
page read and write
7FFD9BF24000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1B25DA50000
heap
page read and write
7FFD9BE80000
trusted library allocation
page read and write
1C22B000
stack
page read and write
7FFD9C051000
trusted library allocation
page read and write
1B028000
heap
page read and write
33EF000
trusted library allocation
page read and write
7FFD9BF22000
trusted library allocation
page read and write
886000
heap
page read and write
7FFD9C2A0000
trusted library allocation
page read and write
1590000
heap
page read and write
47BE3FF000
unkown
page read and write
7FFD9C05E000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
7FFD9C100000
trusted library allocation
page read and write
7FFD9C2A0000
trusted library allocation
page execute and read and write
7FFD9C21B000
trusted library allocation
page execute and read and write
B6B000
heap
page read and write
7FFD9C048000
trusted library allocation
page read and write
7FFD9BFC4000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9C124000
trusted library allocation
page read and write
2FB0000
heap
page execute and read and write
7FFD9BE54000
trusted library allocation
page read and write
88C000
heap
page read and write
1C754000
heap
page read and write
7FFD9BE28000
trusted library allocation
page read and write
22E0AEEB000
heap
page read and write
1AE14000
heap
page read and write
1B5B2000
unkown
page readonly
9A0000
heap
page read and write
90CCD9B000
stack
page read and write
7FFD9C040000
trusted library allocation
page read and write
32C2000
trusted library allocation
page read and write
7FFD9C120000
trusted library allocation
page read and write
1B4FD000
heap
page read and write
7FFD9C1DA000
trusted library allocation
page read and write
1C93C000
heap
page read and write
E9E000
stack
page read and write
7FFD9C129000
trusted library allocation
page read and write
140FD000
trusted library allocation
page read and write
1C90E000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
13420000
trusted library allocation
page read and write
7FFD9C110000
trusted library allocation
page read and write
1B9C0000
heap
page execute and read and write
3B2A000
trusted library allocation
page read and write
1B831632000
heap
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
1B415000
heap
page read and write
1AFA0000
trusted library allocation
page read and write
7FFD9BB48000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
13540000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
1B5F0000
unkown
page readonly
7FFD9B947000
trusted library allocation
page read and write
1371F000
trusted library allocation
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
39FC000
trusted library allocation
page read and write
1470000
heap
page read and write
1B3A9000
heap
page read and write
28E0000
unkown
page readonly
146E000
stack
page read and write
3AE4000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
131A8000
trusted library allocation
page read and write
133E000
stack
page read and write
1B7AE000
stack
page read and write
7FFD9BE65000
trusted library allocation
page execute and read and write
FFE2CFF000
stack
page read and write
7FFD9C170000
trusted library allocation
page read and write
13F0000
heap
page read and write
1C65B000
stack
page read and write
2469D350000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
28D0000
unkown
page readonly
230CF16A000
heap
page read and write
1C31D000
heap
page read and write
7FFD9BFC2000
trusted library allocation
page read and write
2960000
heap
page execute and read and write
1CB40000
heap
page read and write
7FFD9BD82000
trusted library allocation
page read and write
7FFD9BF2D000
trusted library allocation
page read and write
3894000
trusted library allocation
page read and write
140D5000
trusted library allocation
page read and write
1910000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
E5BFAFF000
stack
page read and write
7FFD9C290000
trusted library allocation
page execute and read and write
D85000
heap
page read and write
137E5000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
28D34B20000
heap
page read and write
3BA0000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9B998000
trusted library allocation
page read and write
980000
heap
page read and write
2D7E000
trusted library allocation
page read and write
1C92C000
heap
page read and write
7FFD9BBB4000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
1C97E000
stack
page read and write
7FFD9BF20000
trusted library allocation
page read and write
13A84000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
14ED000
heap
page read and write
3391000
trusted library allocation
page read and write
20D0B29F000
heap
page read and write
3297000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
12A91000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
1309B000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
1C3F0000
heap
page read and write
7FFD9BBE6000
trusted library allocation
page read and write
1B25DB72000
heap
page read and write
89D687F000
stack
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
21E0F910000
heap
page read and write
34C5000
trusted library allocation
page read and write
12C2B000
trusted library allocation
page read and write
3B8A000
trusted library allocation
page read and write
12DE000
stack
page read and write
1C021000
heap
page read and write
11BF000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
7FFD9BFA6000
trusted library allocation
page read and write
199E4F60000
heap
page read and write
31D6000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
1AAA3000
heap
page read and write
7FFD9BBFE000
trusted library allocation
page read and write
2DC6CC90000
heap
page read and write
DB3000
heap
page read and write
7FFD9BE70000
trusted library allocation
page read and write
7FFD9C1F0000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
7FFD9BE99000
trusted library allocation
page execute and read and write
38DA000
trusted library allocation
page read and write
7FFD9BB97000
trusted library allocation
page read and write
FCA000
heap
page read and write
1B25DB4D000
heap
page read and write
2D8C000
trusted library allocation
page read and write
1204000
heap
page read and write
13470000
trusted library allocation
page read and write
1720000
heap
page execute and read and write
321D000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
1C3AD000
stack
page read and write
1C4BE000
stack
page read and write
7FFD9C1C7000
trusted library allocation
page read and write
7FFD9BF19000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
7FFD9B981000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9C140000
trusted library allocation
page read and write
7FFD9BE30000
trusted library allocation
page read and write
38EB000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
15B5000
heap
page read and write
7FFD9C180000
trusted library allocation
page read and write
27A79490000
heap
page read and write
30BE000
trusted library allocation
page read and write
1BBED000
stack
page read and write
1C51000
heap
page read and write
1341C000
trusted library allocation
page read and write
7FFD9C15F000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
7FFD9C061000
trusted library allocation
page read and write
7FFD9BAA2000
trusted library allocation
page read and write
1FCF56F9000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
1C05B000
heap
page read and write
7FFD9BF82000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
7FFD9BE0E000
trusted library allocation
page read and write
1B5E2230000
heap
page read and write
1B4D0000
heap
page read and write
28D34BCA000
heap
page read and write
3A0A000
trusted library allocation
page read and write
20D0B270000
heap
page read and write
1930000
heap
page read and write
7FFD9C1A7000
trusted library allocation
page read and write
13770000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
13651000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
D60000
heap
page read and write
7FFD9C18C000
trusted library allocation
page read and write
133C0000
trusted library allocation
page read and write
1C91A000
heap
page read and write
20D0B2A3000
heap
page read and write
7FFD9BBE7000
trusted library allocation
page read and write
1360E000
trusted library allocation
page read and write
1EF77960000
heap
page read and write
7FFD9B793000
trusted library allocation
page read and write
D90000
heap
page read and write
1BF0E000
stack
page read and write
3096000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
D85000
heap
page read and write
90CD1FF000
stack
page read and write
7FFD9BF2F000
trusted library allocation
page read and write
2F89000
trusted library allocation
page read and write
1105000
heap
page read and write
1395F000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
B6D000
heap
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
7FFD9C2C0000
trusted library allocation
page read and write
1B5D2000
unkown
page readonly
125A000
heap
page read and write
2C8A000
trusted library allocation
page read and write
22E0AEED000
heap
page read and write
3852000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
7FFD9BF90000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1BE7B000
stack
page read and write
1B25DC80000
heap
page read and write
13391000
trusted library allocation
page read and write
1B9FE000
heap
page read and write
10B4000
heap
page read and write
1CA44000
heap
page read and write
1FCF5960000
heap
page read and write
7FFD9C0C0000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
2FBC000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
15461707000
heap
page read and write
7FFD9BFC0000
trusted library allocation
page read and write
2A4AB624000
heap
page read and write
22EBE9E0000
heap
page read and write
3B2C000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
7FFD9BF6B000
trusted library allocation
page read and write
12AD0000
trusted library allocation
page read and write
452000
unkown
page readonly
1DCC18E0000
heap
page read and write
14184000
trusted library allocation
page read and write
1BC0D000
stack
page read and write
1C84E000
heap
page read and write
12C63000
trusted library allocation
page read and write
7FFD9C183000
trusted library allocation
page read and write
D75000
heap
page read and write
1248000
heap
page read and write
7FFD9C129000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
3B32000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page execute and read and write
3117000
trusted library allocation
page read and write
1BF9E000
stack
page read and write
7FFD9C1B7000
trusted library allocation
page read and write
300E000
stack
page read and write
7FFD9BEF2000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
7FFD9BE1D000
trusted library allocation
page read and write
7FFD9BBB4000
trusted library allocation
page read and write
A50000
heap
page read and write
18140297000
heap
page read and write
7FFD9C038000
trusted library allocation
page read and write
35FB000
trusted library allocation
page read and write
7FFD9C276000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
7FF461AD0000
trusted library allocation
page execute and read and write
1446F000
trusted library allocation
page read and write
342E000
trusted library allocation
page read and write
7FFD9C0C2000
trusted library allocation
page read and write
7FFD9C1FE000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1406D000
trusted library allocation
page read and write
1ACAB000
stack
page read and write
2A8B000
trusted library allocation
page read and write
1CB2E000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
7FFD9BE30000
trusted library allocation
page read and write
393A000
trusted library allocation
page read and write
1C23B000
stack
page read and write
3B2B000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BBDE000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
3AE8000
trusted library allocation
page read and write
21E0F930000
heap
page read and write
349F000
trusted library allocation
page read and write
1C327000
heap
page read and write
1B430000
unkown
page readonly
1CB7E000
stack
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
2A4AB61E000
heap
page read and write
A81B1CC000
stack
page read and write
7FFD9BF70000
trusted library allocation
page read and write
1B9E0000
heap
page read and write
2FB8000
trusted library allocation
page read and write
1380D000
trusted library allocation
page read and write
9300BFE000
stack
page read and write
7FFD9BA56000
trusted library allocation
page read and write
1B7EB000
stack
page read and write
5064BFF000
unkown
page read and write
7FFD9C060000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1C517000
heap
page read and write
7FFD9BAA4000
trusted library allocation
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
7FFD9C139000
trusted library allocation
page read and write
BA0000
heap
page read and write
2710000
heap
page read and write
7FFD9BF17000
trusted library allocation
page read and write
13481000
trusted library allocation
page read and write
3B9C000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
7FFD9BB56000
trusted library allocation
page read and write
7FFD9C1F0000
trusted library allocation
page read and write
7FFD9BCF7000
trusted library allocation
page read and write
1CDC7000
heap
page read and write
7FFD9BB21000
trusted library allocation
page read and write
7FFD9BEC9000
trusted library allocation
page execute and read and write
136A2000
trusted library allocation
page read and write
7FFD9C028000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BF85000
trusted library allocation
page read and write
1BAC0000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
3A33000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9C0F0000
trusted library allocation
page read and write
16EE000
stack
page read and write
7FFD9BE97000
trusted library allocation
page execute and read and write
1C02A000
stack
page read and write
283BDFB0000
heap
page read and write
14F0000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
7FFD9C0D2000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
139E6000
trusted library allocation
page read and write
2A5E000
stack
page read and write
2AA2000
trusted library allocation
page read and write
7FFD9C11B000
trusted library allocation
page read and write
F9DE6FF000
stack
page read and write
7FFD9BD1F000
trusted library allocation
page read and write
14001000
trusted library allocation
page read and write
7FFD9C169000
trusted library allocation
page read and write
7FFD9C1E4000
trusted library allocation
page read and write
7FFD9C144000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
9300AFF000
unkown
page read and write
7FFD9C120000
trusted library allocation
page read and write
2A4AB624000
heap
page read and write
1B240000
heap
page read and write
2B7C000
trusted library allocation
page read and write
7FFD9C0B0000
trusted library allocation
page read and write
1C437000
heap
page read and write
1510000
trusted library allocation
page read and write
1CB1A000
heap
page read and write
7FFD9BE60000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9C1A0000
trusted library allocation
page read and write
7FFD9BCB4000
trusted library allocation
page read and write
393A000
trusted library allocation
page read and write
1C74B000
unkown
page read and write
14EE000
stack
page read and write
1CFCE000
stack
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
137B0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
140D4000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
B9096FC000
stack
page read and write
383B000
trusted library allocation
page read and write
1B84A000
stack
page read and write
7FFD9BE50000
trusted library allocation
page read and write
B8FA0FF000
stack
page read and write
35A3000
trusted library allocation
page read and write
1B324000
heap
page read and write
1B4C4000
heap
page read and write
2950000
heap
page execute and read and write
335E000
trusted library allocation
page read and write
7FFD9C050000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
3543000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
33D8000
trusted library allocation
page read and write
7FFD9C1BA000
trusted library allocation
page read and write
7FFD9C170000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page execute and read and write
12A4D000
trusted library allocation
page read and write
7FFD9C05E000
trusted library allocation
page read and write
1F7E000
stack
page read and write
E8E000
stack
page read and write
1B9CE000
stack
page read and write
1B8CD000
stack
page read and write
C70000
trusted library allocation
page read and write
7FFD9BEC0000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
230CF160000
heap
page read and write
3788000
trusted library allocation
page read and write
7FFD9C07E000
trusted library allocation
page read and write
277A000
heap
page read and write
7FFD9C10B000
trusted library allocation
page read and write
7FFD9BF10000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
1B6D4000
heap
page read and write
BE5000
heap
page read and write
3BAE000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1820000
heap
page read and write
330D000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
13FF9000
trusted library allocation
page read and write
410000
unkown
page readonly
1763000
heap
page execute and read and write
3029000
trusted library allocation
page read and write
7FFD9BB68000
trusted library allocation
page read and write
1CE2D000
stack
page read and write
3342000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
7FFD9BE2A000
trusted library allocation
page read and write
7FFD9BE2E000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
C90000
heap
page execute and read and write
2A0E000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
16AE000
stack
page read and write
3B32000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
11C5000
heap
page read and write
F70000
heap
page read and write
1AFEB000
stack
page read and write
90CD0FF000
unkown
page read and write
7FFD9BCA2000
trusted library allocation
page read and write
3924000
trusted library allocation
page read and write
3A84000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
7FFD9BF69000
trusted library allocation
page read and write
14B8000
heap
page read and write
3317000
trusted library allocation
page read and write
143ED000
trusted library allocation
page read and write
1B590000
unkown
page readonly
7FFD9BEE0000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9BF2D000
trusted library allocation
page read and write
77F168C000
stack
page read and write
2BF3000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
7FFD9C295000
trusted library allocation
page read and write
13030000
trusted library allocation
page read and write
181403B0000
heap
page read and write
7FFD9BF20000
trusted library allocation
page read and write
1C04B000
heap
page read and write
10DE000
stack
page read and write
7FFD9C120000
trusted library allocation
page read and write
1413D000
trusted library allocation
page read and write
7FFD9C030000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
7FFD9BBDE000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
2FAC000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
108C000
heap
page read and write
13161000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BCC6000
trusted library allocation
page read and write
EDE000
stack
page read and write
7FFD9C090000
trusted library allocation
page read and write
7FFD9C060000
trusted library allocation
page read and write
14125000
trusted library allocation
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
1BF6F000
stack
page read and write
1330A000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
7FFD9BE3B000
trusted library allocation
page read and write
7FFD9C160000
trusted library allocation
page read and write
1CBAE000
stack
page read and write
790000
heap
page read and write
138E0000
trusted library allocation
page read and write
7FFD9BF39000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
1CDC1000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
12AF8000
trusted library allocation
page read and write
1CB2B000
heap
page read and write
131D4000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
14F7000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
1C461000
heap
page read and write
7FFD9C028000
trusted library allocation
page read and write
7FFD9C204000
trusted library allocation
page execute and read and write
7FFD9C1D0000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
7FFD9C2B0000
trusted library allocation
page execute and read and write
1716000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9C1EB000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1C3EB000
stack
page read and write
71E000
stack
page read and write
1C57582F000
heap
page read and write
2C80000
trusted library allocation
page read and write
13A24000
trusted library allocation
page read and write
201F34D0000
heap
page read and write
143A5000
trusted library allocation
page read and write
7FFD9C20B000
trusted library allocation
page read and write
D90000
heap
page read and write
391B000
trusted library allocation
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
3AD8000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
7FFD9BBD1000
trusted library allocation
page read and write
7FFD9C130000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
7FFD9BC07000
trusted library allocation
page read and write
1431D000
trusted library allocation
page read and write
1418F000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
F75000
heap
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
7FFD9BA82000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
1685000
heap
page read and write
7FFD9BB03000
trusted library allocation
page execute and read and write
7FFD9B9A2000
trusted library allocation
page read and write
139E4000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
1D58F000
stack
page read and write
1935000
heap
page read and write
28F0000
unkown
page readonly
7FFD9BEE8000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9C1A3000
trusted library allocation
page read and write
14071000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
2F94000
trusted library allocation
page read and write
7FFD9C10B000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
13F6B000
trusted library allocation
page read and write
7FFD9BBDB000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
7FFD9BE41000
trusted library allocation
page read and write
B95000
heap
page read and write
28D2000
unkown
page readonly
1BAA9000
heap
page read and write
357E000
trusted library allocation
page read and write
7B0000
heap
page read and write
7FFD9BF70000
trusted library allocation
page read and write
7FFD9C124000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
7FFD9C140000
trusted library allocation
page read and write
3759000
trusted library allocation
page read and write
7FFD9C2A0000
trusted library allocation
page read and write
1B5B0000
unkown
page readonly
2C2E000
trusted library allocation
page read and write
7FFD9C1B1000
trusted library allocation
page read and write
13AF7000
trusted library allocation
page read and write
14135000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
7FFD9C1E4000
trusted library allocation
page read and write
1BDEE000
stack
page read and write
18140425000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BF82000
trusted library allocation
page read and write
1CF6D000
stack
page read and write
3568000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
D78000
heap
page read and write
1310000
heap
page read and write
3AC0000
trusted library allocation
page read and write
7FFD9C1D0000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
D00000
heap
page execute and read and write
3613000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page read and write
10B6000
heap
page read and write
12D01000
trusted library allocation
page read and write
24C62FB000
stack
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9C167000
trusted library allocation
page read and write
1C4D6000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
24C63FF000
unkown
page read and write
990000
heap
page read and write
1C763000
heap
page read and write
7FFD9C1DE000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
FD0000
heap
page read and write
31EA000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
3661000
trusted library allocation
page read and write
FA0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9C28D000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
7FFD9C179000
trusted library allocation
page read and write
7FFD9C060000
trusted library allocation
page read and write
7FFD9BBAD000
trusted library allocation
page read and write
1B25DB40000
heap
page read and write
1CF2E000
stack
page read and write
1B582000
unkown
page readonly
28D34BC0000
heap
page read and write
1206000
heap
page read and write
1439F000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
159A000
heap
page read and write
337B000
trusted library allocation
page read and write
1B5D0000
unkown
page readonly
22EBE9F0000
heap
page read and write
8AF000
heap
page read and write
7FFD9BCA2000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
38EA000
trusted library allocation
page read and write
7FFD9BF4B000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
165D000
heap
page read and write
1C78D000
stack
page read and write
2FAE000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
A75000
heap
page read and write
20D0B190000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1C250000
heap
page read and write
7FFD9BDA2000
trusted library allocation
page read and write
7FFD9BF4B000
trusted library allocation
page read and write
D95000
heap
page read and write
13FC0000
trusted library allocation
page read and write
201F3143000
heap
page read and write
325A000
heap
page read and write
3877000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BF27000
trusted library allocation
page read and write
1430000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
1B5E203F000
heap
page read and write
1C05F000
heap
page read and write
7FFD9BE31000
trusted library allocation
page read and write
1BB71000
heap
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
1BC90000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
35F5000
trusted library allocation
page read and write
1C49D000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
2F40000
heap
page execute and read and write
1BBDD000
heap
page read and write
7FFD9C0B3000
trusted library allocation
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
7FFD9C1FA000
trusted library allocation
page read and write
13F70000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
DB5000
heap
page read and write
3B41000
trusted library allocation
page read and write
1BB9B000
heap
page read and write
283BE0D7000
heap
page read and write
724437C000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
3900000
trusted library allocation
page read and write
1C76D000
heap
page read and write
14F8000
heap
page read and write
7FFD9C05E000
trusted library allocation
page read and write
7FFD9BF65000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
7FFD9C185000
trusted library allocation
page read and write
7FFD9C050000
trusted library allocation
page read and write
2900000
unkown
page readonly
7FFD9BE40000
trusted library allocation
page read and write
7FFD9C190000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
FFE29DC000
stack
page read and write
1B05F0F0000
heap
page read and write
7FFD9BE1B000
trusted library allocation
page read and write
1B5E1FA0000
heap
page read and write
330F000
trusted library allocation
page read and write
1C086000
heap
page read and write
1BB5B000
stack
page read and write
1B8AF000
stack
page read and write
13B57000
trusted library allocation
page read and write
7FFD9BF6D000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
8ED000
heap
page read and write
7FFD9C110000
trusted library allocation
page read and write
1EF77965000
heap
page read and write
7FFD9C1A5000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
141D7000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
2469D230000
heap
page read and write
11DA000
heap
page read and write
1CD61000
heap
page read and write
1B25DB72000
heap
page read and write
7FFD9C11B000
trusted library allocation
page read and write
3B28000
trusted library allocation
page read and write
27A794FA000
heap
page read and write
7FFD9BEA0000
trusted library allocation
page read and write
13A5A000
trusted library allocation
page read and write
1645000
heap
page read and write
1BE0E000
stack
page read and write
D80000
heap
page read and write
7FFD9BF75000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
1C848000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
21E0F969000
heap
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
13316000
trusted library allocation
page read and write
7FFD9BB97000
trusted library allocation
page read and write
7FFD9BB57000
trusted library allocation
page read and write
1C09E000
stack
page read and write
7FFD9C1EA000
trusted library allocation
page read and write
7FFD9BCC4000
trusted library allocation
page read and write
7FFD9BF19000
trusted library allocation
page read and write
7FFD9C285000
trusted library allocation
page read and write
39F5000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
7FFD9BE5F000
trusted library allocation
page read and write
7FFD9BE0E000
trusted library allocation
page read and write
7FFD9BFD0000
trusted library allocation
page read and write
12C40000
trusted library allocation
page read and write
1B831632000
heap
page read and write
14D5000
heap
page read and write
3311000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7FFD9BB95000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
12721000
trusted library allocation
page read and write
7FFD9BE77000
trusted library allocation
page execute and read and write
181401A0000
heap
page read and write
327B000
trusted library allocation
page read and write
1CCD6000
heap
page read and write
7FFD9BB95000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
7FFD9BF22000
trusted library allocation
page read and write
1B44F000
stack
page read and write
33DB000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page execute and read and write
7FFD9BE5F000
trusted library allocation
page read and write
2D8A000
trusted library allocation
page read and write
2C02000
trusted library allocation
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
7FFD9C050000
trusted library allocation
page read and write
13F49000
trusted library allocation
page read and write
7FFD9BBBB000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
17C5000
heap
page read and write
7FFD9C0A0000
trusted library allocation
page read and write
7FFD9BF1F000
trusted library allocation
page read and write
7FFD9C190000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
2932000
unkown
page readonly
30CF000
trusted library allocation
page read and write
3AD6000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
1C90D000
stack
page read and write
13D73000
trusted library allocation
page read and write
3ACA000
trusted library allocation
page read and write
7FFD9BF83000
trusted library allocation
page read and write
1B34F000
stack
page read and write
1CB01000
heap
page read and write
7FFD9BE58000
trusted library allocation
page read and write
35F0000
trusted library allocation
page read and write
135F1000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
2B80DAB000
stack
page read and write
140B1000
trusted library allocation
page read and write
28F2000
unkown
page readonly
7FFD9BA60000
trusted library allocation
page execute and read and write
7FFD9C296000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
1B4FA000
stack
page read and write
7FFD9BF2D000
trusted library allocation
page read and write
1B295000
heap
page read and write
1284000
heap
page read and write
7FFD9C1A9000
trusted library allocation
page read and write
154616C0000
heap
page read and write
B8FA07F000
stack
page read and write
7FFD9C190000
trusted library allocation
page read and write
1B444000
unkown
page readonly
7FFD9BE0C000
trusted library allocation
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
7FFD9BF80000
trusted library allocation
page read and write
1643000
heap
page read and write
7FFD9BE08000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
F9E000
stack
page read and write
1B831631000
heap
page read and write
DF7000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9C120000
trusted library allocation
page read and write
7FFD9BFA6000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1C072000
heap
page read and write
7FFD9BB7D000
trusted library allocation
page read and write
7FFD9BE1D000
trusted library allocation
page read and write
33DE000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
7FFD9BB7D000
trusted library allocation
page read and write
22EBEA50000
heap
page read and write
7FFD9C053000
trusted library allocation
page read and write
7FFD9BF80000
trusted library allocation
page read and write
1BACF000
stack
page read and write
7FFD9C04E000
trusted library allocation
page read and write
1628000
heap
page read and write
3291000
trusted library allocation
page read and write
1B928000
heap
page read and write
2DC6CBD0000
heap
page read and write
3428000
trusted library allocation
page read and write
7FFD9BF50000
trusted library allocation
page read and write
7FFD9B986000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2F45000
trusted library allocation
page read and write
142EC000
trusted library allocation
page read and write
7FFD9C204000
trusted library allocation
page execute and read and write
7FFD9BFA8000
trusted library allocation
page read and write
7FFD9BBD1000
trusted library allocation
page read and write
FB0000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
387B000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9C144000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9C280000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
7FFD9BCB2000
trusted library allocation
page read and write
EC8496B000
stack
page read and write
1C06A000
heap
page read and write
1CC7D000
stack
page read and write
7FFD9BC18000
trusted library allocation
page read and write
7FFD9C1C4000
trusted library allocation
page read and write
7FFD9BF65000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
7FFD9BD17000
trusted library allocation
page read and write
7FFD9BFA2000
trusted library allocation
page read and write
1381F000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BB48000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
1B6EE000
stack
page read and write
3587000
trusted library allocation
page read and write
1B05E000
heap
page read and write
13FD1000
trusted library allocation
page read and write
7FFD9BEB9000
trusted library allocation
page execute and read and write
142EE000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
7FFD9BF50000
trusted library allocation
page read and write
21D0F4C5000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
7FFD9BFB0000
trusted library allocation
page read and write
3B38000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9C18C000
trusted library allocation
page read and write
929757F000
stack
page read and write
131DA000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page execute and read and write
7FFD9BF4D000
trusted library allocation
page read and write
1CD2D000
stack
page read and write
30E9000
trusted library allocation
page read and write
8A7A18F000
stack
page read and write
1469D000
trusted library allocation
page read and write
7FFD9BE31000
trusted library allocation
page read and write
12C31000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page execute and read and write
7FFD9C0D2000
trusted library allocation
page read and write
CA0000
heap
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9BDBC000
trusted library allocation
page read and write
1B25DDD0000
heap
page read and write
3D7A000
trusted library allocation
page read and write
3B56000
trusted library allocation
page read and write
108A000
heap
page read and write
2B97000
trusted library allocation
page read and write
3AB0000
trusted library allocation
page read and write
2F75000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
1431A000
trusted library allocation
page read and write
7FFD9BFC0000
trusted library allocation
page read and write
7FFD9BFA2000
trusted library allocation
page read and write
37EC000
trusted library allocation
page read and write
7FFD9BF42000
trusted library allocation
page read and write
1FCF5690000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B92C000
trusted library allocation
page read and write
1DCC15C0000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
1B260000
heap
page read and write
133AA000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
1C12B000
stack
page read and write
15461707000
heap
page read and write
13451000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
1CDBF000
heap
page read and write
1CA7E000
stack
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
1C4E5000
heap
page read and write
131E2000
trusted library allocation
page read and write
1B580000
unkown
page readonly
13721000
trusted library allocation
page read and write
13FC1000
trusted library allocation
page read and write
137C3000
trusted library allocation
page read and write
930077C000
stack
page read and write
7FFD9B986000
trusted library allocation
page read and write
7FFD9C1F0000
trusted library allocation
page execute and read and write
1B962000
unkown
page readonly
34A2000
trusted library allocation
page read and write
7FFD9C1B7000
trusted library allocation
page read and write
1C58E000
stack
page read and write
13C0D000
trusted library allocation
page read and write
7FFD9B778000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
1C5CB000
stack
page read and write
201F311A000
heap
page read and write
7FFD9C180000
trusted library allocation
page read and write
3962000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
1D13D000
stack
page read and write
1514000
heap
page read and write
7FFD9C1F0000
trusted library allocation
page execute and read and write
1CDDA000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
7FFD9BF20000
trusted library allocation
page read and write
3240000
heap
page execute and read and write
7FFD9B98A000
trusted library allocation
page read and write
1B572000
unkown
page readonly
1CD5D000
heap
page read and write
7FFD9C170000
trusted library allocation
page read and write
199E4D23000
heap
page read and write
E5BF9FE000
unkown
page read and write
3ACE000
trusted library allocation
page read and write
7FFD9C10B000
trusted library allocation
page read and write
1D1CD000
stack
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
13FD0000
trusted library allocation
page read and write
7FFD9BFBC000
trusted library allocation
page read and write
13BB7000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
2B811FE000
stack
page read and write
7FFD9BF88000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
1423F000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
ADE000
stack
page read and write
3B32000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
201F313F000
heap
page read and write
1C575800000
heap
page read and write
201F3110000
heap
page read and write
7FFD9C204000
trusted library allocation
page execute and read and write
300E000
trusted library allocation
page read and write
2930000
unkown
page readonly
1CC2E000
stack
page read and write
7FFD9BF30000
trusted library allocation
page read and write
7FFD9BF17000
trusted library allocation
page read and write
3DBC000
trusted library allocation
page read and write
7FFD9C1E0000
trusted library allocation
page read and write
7FFD9C08B000
trusted library allocation
page read and write
E5BF8FC000
stack
page read and write
323A000
trusted library allocation
page read and write
13B0C000
trusted library allocation
page read and write
133C0000
trusted library allocation
page read and write
7FFD9BF49000
trusted library allocation
page read and write
7FFD9C2B0000
trusted library allocation
page execute and read and write
1CF3E000
stack
page read and write
1C950000
heap
page read and write
38B2000
trusted library allocation
page read and write
7FFD9C28C000
trusted library allocation
page read and write
7FFD9C1A9000
trusted library allocation
page read and write
780000
heap
page read and write
7FFD9BE70000
trusted library allocation
page read and write
22E0AF0F000
heap
page read and write
7FFD9BBBE000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
3ACC000
trusted library allocation
page read and write
7FFD9BF27000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
375B000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
13DA1000
trusted library allocation
page read and write
7FFD9C210000
trusted library allocation
page execute and read and write
1BA0D000
heap
page read and write
3228000
trusted library allocation
page read and write
1C5757E0000
heap
page read and write
7FFD9C1F0000
trusted library allocation
page read and write
387D000
trusted library allocation
page read and write
1860000
heap
page read and write
13A99000
trusted library allocation
page read and write
7FFD9C0B6000
trusted library allocation
page read and write
199E4F70000
heap
page read and write
1331D000
trusted library allocation
page read and write
1CA77000
heap
page read and write
38CB000
trusted library allocation
page read and write
7FFD9BE11000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9BBB2000
trusted library allocation
page read and write
7FFD9BBBD000
trusted library allocation
page read and write
7FFD9C0A0000
trusted library allocation
page read and write
7FFD9BBF7000
trusted library allocation
page read and write
7FFD9C120000
trusted library allocation
page read and write
3937000
trusted library allocation
page read and write
7FFD9C079000
trusted library allocation
page read and write
1B8317E0000
heap
page read and write
1BB2F000
heap
page read and write
7FFD9B9E6000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
3B7EAAC000
stack
page read and write
445000
unkown
page readonly
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1B5E2043000
heap
page read and write
1B831634000
heap
page read and write
16BE000
stack
page read and write
2FBA000
trusted library allocation
page read and write
10EA000
heap
page read and write
1CCD2000
heap
page read and write
130C8000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
38F8000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
1BE90000
heap
page execute and read and write
13355000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
13DC1000
trusted library allocation
page read and write
7FFD9C040000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
8EB000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1B64E000
heap
page read and write
133B1000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
1B960000
unkown
page readonly
3021000
trusted library allocation
page read and write
BC0000
heap
page read and write
11F0000
heap
page read and write
B7E000
stack
page read and write
7FFD9C089000
trusted library allocation
page read and write
1C716000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
14060000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
31BF000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
13B57000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page execute and read and write
3137000
trusted library allocation
page read and write
89D68FE000
stack
page read and write
18DA000
heap
page read and write
7FFD9BE2B000
trusted library allocation
page read and write
1560000
heap
page read and write
7FFD9BE11000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
134D1000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
28D34E85000
heap
page read and write
7FFD9BE20000
trusted library allocation
page read and write
7FFD9BC06000
trusted library allocation
page read and write
3AE8000
trusted library allocation
page read and write
7FFD9C2A0000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
1ACF9000
heap
page read and write
7FFD9C20D000
trusted library allocation
page read and write
7FFD9BC0C000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
7FFD9BED0000
trusted library allocation
page read and write
7FFD9BF22000
trusted library allocation
page read and write
1C4ED000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
38AF000
trusted library allocation
page read and write
7FFD9BE65000
trusted library allocation
page execute and read and write
7FFD9BFA4000
trusted library allocation
page read and write
1BFB0000
heap
page read and write
7FFD9C140000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
181E000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
13C69000
trusted library allocation
page read and write
7FFD9BF50000
trusted library allocation
page read and write
14287000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
7FFD9C1A0000
trusted library allocation
page read and write
18CE000
stack
page read and write
201F30F0000
heap
page read and write
1765000
heap
page read and write
13E66000
trusted library allocation
page read and write
1304B000
trusted library allocation
page read and write
13379000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
7FFD9C290000
trusted library allocation
page read and write
14B0000
heap
page read and write
12E12000
trusted library allocation
page read and write
7FFD9C15B000
trusted library allocation
page read and write
C7E000
stack
page read and write
183E000
stack
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
7FFD9BF84000
trusted library allocation
page read and write
1CA2F000
stack
page read and write
199E4D1F000
heap
page read and write
32F4000
trusted library allocation
page read and write
7FFD9BF82000
trusted library allocation
page read and write
7FFD9BE1D000
trusted library allocation
page read and write
7FFD9BBBE000
trusted library allocation
page read and write
7FFD9C0A0000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9C2A0000
trusted library allocation
page read and write
7FFD9BBB4000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
7FFD9BB56000
trusted library allocation
page read and write
130D3000
trusted library allocation
page read and write
199E4CD0000
heap
page read and write
129C2000
trusted library allocation
page read and write
7FFD9BAA6000
trusted library allocation
page read and write
13151000
trusted library allocation
page read and write
1B5EF000
stack
page read and write
7FFD9C170000
trusted library allocation
page read and write
1BB34000
heap
page read and write
1B831623000
heap
page read and write
7FFD9BE7F000
trusted library allocation
page read and write
1B831621000
heap
page read and write
13CB9000
trusted library allocation
page read and write
9D5000
heap
page read and write
1B831632000
heap
page read and write
1B432000
unkown
page readonly
D13000
heap
page read and write
7FFD9BB35000
trusted library allocation
page read and write
7FFD9BFB4000
trusted library allocation
page read and write
136CA000
trusted library allocation
page read and write
7FFD9C1AC000
trusted library allocation
page read and write
7FFD9C0C2000
trusted library allocation
page read and write
6D13FB000
stack
page read and write
7FFD9BFC0000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9BF1F000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9BF60000
trusted library allocation
page read and write
7FFD9BFC6000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
13ADF000
trusted library allocation
page read and write
7FFD9C169000
trusted library allocation
page read and write
13DA4000
trusted library allocation
page read and write
7FFD9C051000
trusted library allocation
page read and write
6E5A53B000
stack
page read and write
7FFD9C103000
trusted library allocation
page read and write
7FFD9C1F0000
trusted library allocation
page read and write
3B98000
trusted library allocation
page read and write
14715000
trusted library allocation
page read and write
30C3000
heap
page execute and read and write
7FFD9C14B000
trusted library allocation
page read and write
7FFD9C130000
trusted library allocation
page read and write
32E7000
trusted library allocation
page read and write
7FFD9BE11000
trusted library allocation
page read and write
7FFD9C108000
trusted library allocation
page read and write
7FFD9BF1F000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
132B9000
trusted library allocation
page read and write
230CF010000
heap
page read and write
1C916000
heap
page read and write
DDE000
heap
page read and write
31F2000
trusted library allocation
page read and write
13A18000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
13410000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
27A79523000
heap
page read and write
EC849EF000
stack
page read and write
7FFD9C190000
trusted library allocation
page read and write
16F0000
heap
page read and write
7FFD9BE1E000
trusted library allocation
page read and write
7FFD9BE1B000
trusted library allocation
page read and write
21E0F976000
heap
page read and write
7FFD9BB2D000
trusted library allocation
page read and write
7FFD9BFA4000
trusted library allocation
page read and write
7FFD9C2C0000
trusted library allocation
page read and write
3664000
trusted library allocation
page read and write
7FFD9BF63000
trusted library allocation
page read and write
7FFD9C05C000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
7FFD9BE24000
trusted library allocation
page read and write
7FFD9C18C000
trusted library allocation
page read and write
2EDE000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1C19E000
stack
page read and write
35D0000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9C1E0000
trusted library allocation
page read and write
1D10B000
stack
page read and write
3191000
trusted library allocation
page read and write
7FFD9C06E000
trusted library allocation
page read and write
12E21000
trusted library allocation
page read and write
7FFD9C20A000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page execute and read and write
17C0000
heap
page read and write
1BB7C000
heap
page read and write
1EF7780A000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9C1C7000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BEF2000
trusted library allocation
page read and write
331D000
trusted library allocation
page read and write
783527C000
stack
page read and write
135F3000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9BF12000
trusted library allocation
page read and write
8C3000
heap
page read and write
7FFD9BF10000
trusted library allocation
page read and write
7FFD9C16F000
trusted library allocation
page read and write
22E0AF12000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
7FFD9BE7F000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
2A4AB500000
heap
page read and write
1B9C2000
unkown
page readonly
3ADC000
trusted library allocation
page read and write
1B99B000
stack
page read and write
30D8000
trusted library allocation
page read and write
7FFD9BB74000
trusted library allocation
page read and write
F2051DF000
stack
page read and write
154615C0000
heap
page read and write
7FFD9C1EF000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
7FFD9BBA4000
trusted library allocation
page read and write
1CDC5000
heap
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
7FFD9C079000
trusted library allocation
page read and write
12DE000
stack
page read and write
21D0F310000
heap
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
132E1000
trusted library allocation
page read and write
13D69000
trusted library allocation
page read and write
1B6AD000
stack
page read and write
13A39000
trusted library allocation
page read and write
7FFD9C0B0000
trusted library allocation
page read and write
3AD2000
trusted library allocation
page read and write
1CCCE000
stack
page read and write
7FFD9BFBC000
trusted library allocation
page read and write
1BB32000
heap
page read and write
1D0CE000
stack
page read and write
201F32E0000
heap
page read and write
7FFD9BBF1000
trusted library allocation
page read and write
7FFD9BB94000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
7FFD9C100000
trusted library allocation
page read and write
7FFD9C10B000
trusted library allocation
page read and write
13267000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9C0E8000
trusted library allocation
page read and write
D8D000
heap
page read and write
7FFD9BAE4000
trusted library allocation
page execute and read and write
135E2000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
1C779000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
35E1000
trusted library allocation
page read and write
15F0000
heap
page read and write
7D0000
heap
page read and write
FD0000
heap
page read and write
331F000
trusted library allocation
page read and write
13986000
trusted library allocation
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
22EBEA10000
heap
page read and write
B38000
heap
page read and write
2BD0000
trusted library allocation
page read and write
1B9C0000
unkown
page readonly
7FFD9B991000
trusted library allocation
page read and write
1CE1B000
unkown
page read and write
1B05F0C0000
heap
page read and write
2D7A000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
13369000
trusted library allocation
page read and write
7FFD9C290000
trusted library allocation
page read and write
1C268000
heap
page read and write
30F3000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
1286000
heap
page read and write
7FFD9BF19000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9C1D0000
trusted library allocation
page read and write
230CF167000
heap
page read and write
7FFD9C0D3000
trusted library allocation
page read and write
3DBA000
trusted library allocation
page read and write
CA6000
heap
page read and write
7FFD9BF70000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1BB00000
heap
page read and write
3885000
trusted library allocation
page read and write
1B5E201B000
heap
page read and write
7FFD9C070000
trusted library allocation
page read and write
21D0F140000
heap
page read and write
2C44000
trusted library allocation
page read and write
3B00000
trusted library allocation
page read and write
7FFD9BF30000
trusted library allocation
page read and write
7FFD9BEC2000
trusted library allocation
page read and write
13296000
trusted library allocation
page read and write
1B25DB6F000
heap
page read and write
1CDE9000
heap
page read and write
1433C000
trusted library allocation
page read and write
1B242000
heap
page read and write
1CD66000
heap
page read and write
1B5A0000
heap
page read and write
3901000
trusted library allocation
page read and write
7FFD9BF17000
trusted library allocation
page read and write
1415D000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page read and write
14087000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
37FE000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7FFD9BC20000
trusted library allocation
page execute and read and write
1C937000
heap
page read and write
1B5E2010000
heap
page read and write
7FFD9C099000
trusted library allocation
page read and write
1CAAB000
unkown
page read and write
7FFD9BE60000
trusted library allocation
page execute and read and write
1C48E000
heap
page read and write
7FFD9BB7D000
trusted library allocation
page read and write
12759000
trusted library allocation
page read and write
7FFD9C1CA000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
7FFD9BB45000
trusted library allocation
page read and write
1C80E000
stack
page read and write
7FFD9BFDC000
trusted library allocation
page read and write
13C6D000
trusted library allocation
page read and write
201F3143000
heap
page read and write
1B85E000
stack
page read and write
7FFD9BB74000
trusted library allocation
page read and write
35C4000
trusted library allocation
page read and write
133E8000
trusted library allocation
page read and write
7FFD9C05E000
trusted library allocation
page read and write
152B000
heap
page read and write
2989000
trusted library allocation
page read and write
132C2000
trusted library allocation
page read and write
1B600000
heap
page execute and read and write
20D0B2A3000
heap
page read and write
850000
heap
page read and write
2D90000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1220000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
7FFD9C1E0000
trusted library allocation
page read and write
3781000
trusted library allocation
page read and write
1535000
heap
page read and write
7FFD9BF2D000
trusted library allocation
page read and write
13CB0000
trusted library allocation
page read and write
A00000
trusted library allocation
page read and write
1401B000
trusted library allocation
page read and write
1C410000
heap
page read and write
1760000
heap
page execute and read and write
390A000
trusted library allocation
page read and write
B8F9DCC000
stack
page read and write
6D167F000
stack
page read and write
13120000
trusted library allocation
page read and write
1B25DB4B000
heap
page read and write
7FFD9C14F000
trusted library allocation
page read and write
47BE4FE000
stack
page read and write
33E2000
trusted library allocation
page read and write
1B9AE000
stack
page read and write
38CC000
trusted library allocation
page read and write
111F000
stack
page read and write
1DCC15F6000
heap
page read and write
7FFD9C224000
trusted library allocation
page execute and read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
1AAC0000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
7FFD9BBA2000
trusted library allocation
page read and write
7FFD9BF20000
trusted library allocation
page read and write
456000
unkown
page readonly
7FFD9BA40000
trusted library allocation
page execute and read and write
3224000
trusted library allocation
page read and write
7FFD9BC02000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
18CF000
stack
page read and write
1B05F110000
heap
page read and write
7FFD9BCB6000
trusted library allocation
page read and write
7FFD9BB47000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1CAB9000
heap
page read and write
13134000
trusted library allocation
page read and write
7FFD9C0E8000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1C844000
heap
page read and write
13E22000
trusted library allocation
page read and write
DBA000
heap
page read and write
1C240000
heap
page read and write
7FFD9C080000
trusted library allocation
page read and write
7FFD9C170000
trusted library allocation
page read and write
7FFD9B908000
trusted library allocation
page read and write
7FFD9C050000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
1B2F0000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
1B8A5000
heap
page read and write
1711000
heap
page read and write
1BB9C000
heap
page read and write
7FFD9BF29000
trusted library allocation
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9BBB9000
trusted library allocation
page read and write
7FFD9BF02000
trusted library allocation
page read and write
1B8318F0000
heap
page read and write
F9DE67F000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1BD33000
heap
page execute and read and write
7FFD9C073000
trusted library allocation
page read and write
1230000
heap
page read and write
7FFD9BF80000
trusted library allocation
page read and write
77F178F000
stack
page read and write
2D5D000
trusted library allocation
page read and write
1B475000
heap
page read and write
1CCE0000
heap
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
7FFD9BBA7000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9C14F000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
31D2000
trusted library allocation
page read and write
1AA90000
trusted library allocation
page read and write
1B8315FB000
heap
page read and write
1B831621000
heap
page read and write
7FFD9C170000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
2B12000
trusted library allocation
page read and write
2948000
unkown
page readonly
335B000
trusted library allocation
page read and write
1BCEE000
stack
page read and write
7FFD9C185000
trusted library allocation
page read and write
7FFD9BFBC000
trusted library allocation
page read and write
7FFD9C1D0000
trusted library allocation
page read and write
7FFD9BAD4000
trusted library allocation
page execute and read and write
7FFD9B993000
trusted library allocation
page read and write
2469D060000
heap
page read and write
1DCC17D0000
heap
page read and write
1C2E3000
heap
page read and write
7FFD9BD70000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
13C91000
trusted library allocation
page read and write
1BD60000
heap
page read and write
1110000
trusted library allocation
page read and write
7FFD9BE3D000
trusted library allocation
page read and write
140B3000
trusted library allocation
page read and write
7FFD9C1B1000
trusted library allocation
page read and write
1B7AA000
heap
page read and write
3944000
trusted library allocation
page read and write
22E0AE70000
heap
page read and write
2DB0000
trusted library allocation
page read and write
7FFD9B9AA000
trusted library allocation
page read and write
742000
stack
page read and write
356C000
trusted library allocation
page read and write
154616F0000
heap
page read and write
B97000
heap
page read and write
31D0000
trusted library allocation
page read and write
1C924000
heap
page read and write
32B2000
trusted library allocation
page read and write
F00000
heap
page read and write
13F16000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BF4B000
trusted library allocation
page read and write
7FFD9C134000
trusted library allocation
page read and write
7FFD9C180000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
7FFD9BBC4000
trusted library allocation
page read and write
22E0AE40000
heap
page read and write
374B000
trusted library allocation
page read and write
2DC6CC35000
heap
page read and write
1D0DF000
stack
page read and write
D2E000
stack
page read and write
14476000
trusted library allocation
page read and write
1814029A000
heap
page read and write
68B22FE000
unkown
page read and write
3954000
trusted library allocation
page read and write
7FFD9C1B9000
trusted library allocation
page read and write
7FFD9BE41000
trusted library allocation
page read and write
7FFD9BE60000
trusted library allocation
page read and write
2A4AB6F0000
heap
page read and write
13A8F000
trusted library allocation
page read and write
7FFD9C134000
trusted library allocation
page read and write
1B5C2000
unkown
page readonly
2A69000
trusted library allocation
page read and write
1C4CB000
stack
page read and write
1235000
heap
page read and write
7FFD9C0C3000
trusted library allocation
page read and write
9D0000
heap
page read and write
1B05F375000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
130AF000
trusted library allocation
page read and write
7FFD9C09B000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1A750000
trusted library allocation
page read and write
13FE6000
trusted library allocation
page read and write
7FFD9BE51000
trusted library allocation
page read and write
13926000
trusted library allocation
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
3DB6000
trusted library allocation
page read and write
13642000
trusted library allocation
page read and write
7FFD9BE85000
trusted library allocation
page execute and read and write
3412000
trusted library allocation
page read and write
7FFD9C1D0000
trusted library allocation
page read and write
13FF7000
trusted library allocation
page read and write
7FFD9BC12000
trusted library allocation
page read and write
14DE000
stack
page read and write
1470000
heap
page execute and read and write
7FFD9BB3D000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9C283000
trusted library allocation
page read and write
2469D067000
heap
page read and write
1C42C000
stack
page read and write
386F000
trusted library allocation
page read and write
109E000
stack
page read and write
7FFD9C103000
trusted library allocation
page read and write
1B9CC000
heap
page read and write
2A4AB530000
heap
page read and write
7FFD9C053000
trusted library allocation
page read and write
7FFD9C0B3000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
14045000
trusted library allocation
page read and write
1B460000
heap
page read and write
1B831631000
heap
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
B90000
heap
page read and write
1C47D000
heap
page read and write
13EC6000
trusted library allocation
page read and write
1FCF56F0000
heap
page read and write
12FE0000
trusted library allocation
page read and write
7FFD9C1C4000
trusted library allocation
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
1B05F11A000
heap
page read and write
7FFD9C1F8000
trusted library allocation
page read and write
1D03D000
stack
page read and write
7FFD9BFD0000
trusted library allocation
page read and write
7FFD9C123000
trusted library allocation
page read and write
9A0000
heap
page read and write
3BBA000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
142BF000
trusted library allocation
page read and write
7FFD9BF90000
trusted library allocation
page read and write
410000
unkown
page readonly
7FFD9BF10000
trusted library allocation
page read and write
BE0000
heap
page read and write
230CF0F0000
heap
page read and write
15A0000
heap
page read and write
7FFD9C1B0000
trusted library allocation
page read and write
1B7B2000
heap
page read and write
7FFD9BF10000
trusted library allocation
page read and write
1C85E000
stack
page read and write
1B3B3000
heap
page execute and read and write
13299000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9C169000
trusted library allocation
page read and write
20D0B440000
heap
page read and write
1058000
heap
page read and write
7FFD9BFE0000
trusted library allocation
page read and write
1890000
trusted library allocation
page read and write
16D2000
heap
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
1B120000
trusted library allocation
page read and write
D03000
heap
page execute and read and write
324F000
trusted library allocation
page read and write
13402000
trusted library allocation
page read and write
3958000
trusted library allocation
page read and write
13398000
trusted library allocation
page read and write
2A4AB624000
heap
page read and write
27A797E0000
heap
page read and write
3281000
trusted library allocation
page read and write
1B25DC40000
heap
page read and write
7FFD9BB36000
trusted library allocation
page read and write
13D41000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
7FFD9BBA2000
trusted library allocation
page read and write
14245000
trusted library allocation
page read and write
7FFD9BF65000
trusted library allocation
page read and write
283BE0C9000
heap
page read and write
1BE6D000
stack
page read and write
7FFD9BF00000
trusted library allocation
page read and write
14177000
trusted library allocation
page read and write
7FFD9C280000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page execute and read and write
7FFD9C14F000
trusted library allocation
page read and write
1BB96000
heap
page read and write
7FFD9C190000
trusted library allocation
page read and write
17C0000
heap
page read and write
283BE0D6000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
1C767000
heap
page read and write
3B58000
trusted library allocation
page read and write
11A8000
heap
page read and write
7FF40E460000
trusted library allocation
page execute and read and write
28D34B50000
heap
page read and write
13838000
trusted library allocation
page read and write
7FFD9C080000
trusted library allocation
page read and write
199E4D34000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
1B7EE000
stack
page read and write
7FFD9BB94000
trusted library allocation
page read and write
7FFD9C1A9000
trusted library allocation
page read and write
283BE0E7000
heap
page read and write
152D000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BBA5000
trusted library allocation
page read and write
1B2FE000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
1B9F6000
heap
page read and write
7FFD9C1A0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
14EB000
heap
page read and write
7FFD9BB53000
trusted library allocation
page read and write
2A4AB520000
heap
page read and write
20D0B390000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
368D000
trusted library allocation
page read and write
3B24000
trusted library allocation
page read and write
7FFD9C0A0000
trusted library allocation
page read and write
1530000
heap
page read and write
15D0000
heap
page read and write
1BBCE000
stack
page read and write
7FFD9BF50000
trusted library allocation
page read and write
7FFD9C275000
trusted library allocation
page read and write
7FFD9BFA4000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
1B25DB72000
heap
page read and write
1B290000
trusted library allocation
page read and write
13F95000
trusted library allocation
page read and write
1C06E000
stack
page read and write
7FFD9BB50000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
1C92B000
stack
page read and write
342B000
trusted library allocation
page read and write
12E1E000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1B25DB72000
heap
page read and write
1BE93000
heap
page execute and read and write
386C000
trusted library allocation
page read and write
7FFD9C210000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
13CF1000
trusted library allocation
page read and write
16C0000
heap
page execute and read and write
22E0AF23000
heap
page read and write
1D3DF000
stack
page read and write
7FFD9B9A6000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
14113000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1DCC15E0000
heap
page read and write
13FBD000
trusted library allocation
page read and write
D0E000
heap
page read and write
14F0000
heap
page read and write
130B1000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
142F3000
trusted library allocation
page read and write
7FFD9C1C0000
trusted library allocation
page read and write
1B24D000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BD63000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
7FFD9C0C2000
trusted library allocation
page read and write
7FFD9C290000
trusted library allocation
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
CDF000
heap
page read and write
1D21E000
stack
page read and write
106F000
heap
page read and write
7FFD9BEF0000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
6E5A8FF000
unkown
page read and write
3AC6000
trusted library allocation
page read and write
14E9000
heap
page read and write
68B23FF000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page execute and read and write
7FFD9BF0B000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
18140290000
heap
page read and write
368F000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1B56D000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1557000
heap
page read and write
13292000
trusted library allocation
page read and write
2B810FF000
unkown
page read and write
7FFD9C1A7000
trusted library allocation
page read and write
283BE090000
heap
page read and write
1BA9B000
stack
page read and write
27A79460000
heap
page read and write
13680000
trusted library allocation
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
7FFD9B9A8000
trusted library allocation
page read and write
376F000
trusted library allocation
page read and write
7FFD9BBBE000
trusted library allocation
page read and write
7FFD9BF00000
trusted library allocation
page read and write
7FFD9BEB0000
trusted library allocation
page read and write
386D000
trusted library allocation
page read and write
7FFD9C1C0000
trusted library allocation
page read and write
1B4B0000
heap
page read and write
7FFD9C189000
trusted library allocation
page read and write
783537F000
stack
page read and write
140A7000
trusted library allocation
page read and write
7FFD9BF80000
trusted library allocation
page read and write
6E5A9FF000
stack
page read and write
3657000
trusted library allocation
page read and write
14020000
trusted library allocation
page read and write
1B5E2000
heap
page read and write
337B000
trusted library allocation
page read and write
7FFD9C200000
trusted library allocation
page execute and read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
3066000
trusted library allocation
page read and write
1B05F117000
heap
page read and write
1BACB000
heap
page read and write
2BA4000
trusted library allocation
page read and write
39EE000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
7FFD9C1B0000
trusted library allocation
page read and write
283BE0C0000
heap
page read and write
1B831632000
heap
page read and write
32BE000
stack
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9BBDE000
trusted library allocation
page read and write
1B01B000
stack
page read and write
34CA000
trusted library allocation
page read and write
7FFD9C0F0000
trusted library allocation
page read and write
7FFD9BBE7000
trusted library allocation
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
1CBCE000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7FFD9BFB0000
trusted library allocation
page read and write
139BE000
trusted library allocation
page read and write
3AD4000
trusted library allocation
page read and write
27A79523000
heap
page read and write
D0C000
heap
page read and write
1B330000
heap
page read and write
154616F9000
heap
page read and write
35B1000
trusted library allocation
page read and write
3596000
trusted library allocation
page read and write
7FFD9C2A0000
trusted library allocation
page execute and read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BE80000
trusted library allocation
page read and write
1B4ED000
stack
page read and write
3306000
trusted library allocation
page read and write
7FFD9C0F8000
trusted library allocation
page read and write
15461950000
heap
page read and write
1B05C000
heap
page read and write
18D0000
heap
page read and write
1CECD000
stack
page read and write
7FFD9BE99000
trusted library allocation
page execute and read and write
17CA000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
271A000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
1C486000
heap
page read and write
35F0000
trusted library allocation
page read and write
13448000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
1BB94000
heap
page read and write
1333D000
trusted library allocation
page read and write
7FFD9C180000
trusted library allocation
page read and write
7FFD9C14B000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2F97000
trusted library allocation
page read and write
133A1000
trusted library allocation
page read and write
22EBEAAA000
heap
page read and write
38A0000
trusted library allocation
page read and write
136D0000
trusted library allocation
page read and write
1C575A10000
heap
page read and write
20D0B2B4000
heap
page read and write
7FFD9BF60000
trusted library allocation
page read and write
7FFD9BF70000
trusted library allocation
page read and write
1C472000
heap
page read and write
7FFD9BF40000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
7FFD9C1FB000
trusted library allocation
page execute and read and write
12AA8000
trusted library allocation
page read and write
7FFD9C276000
trusted library allocation
page read and write
2F6A000
heap
page read and write
D70000
heap
page execute and read and write
1EF777D0000
heap
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
12F71000
trusted library allocation
page read and write
136E7000
trusted library allocation
page read and write
7FFD9C063000
trusted library allocation
page read and write
3948000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
7FFD9C0E8000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9C270000
trusted library allocation
page read and write
14016000
trusted library allocation
page read and write
A70000
heap
page read and write
22E0AF0F000
heap
page read and write
30E7000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
7FFD9C167000
trusted library allocation
page read and write
1B25DB83000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
7FFD9BEA9000
trusted library allocation
page execute and read and write
7FFD9C1B1000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BB97000
trusted library allocation
page read and write
13F7B000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
BD0000
heap
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
12AB1000
trusted library allocation
page read and write
3816000
trusted library allocation
page read and write
7FFD9BE70000
trusted library allocation
page read and write
7FFD9BFBC000
trusted library allocation
page read and write
31DE000
stack
page read and write
3269000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
1314B000
trusted library allocation
page read and write
10E0000
heap
page read and write
3520000
trusted library allocation
page read and write
93E000
stack
page read and write
7FFD9BD9C000
trusted library allocation
page read and write
1B860000
heap
page read and write
1C333000
heap
page read and write
3952000
trusted library allocation
page read and write
130DE000
trusted library allocation
page read and write
14075000
trusted library allocation
page read and write
21E0FAE0000
heap
page read and write
7FFD9B993000
trusted library allocation
page read and write
141EA000
trusted library allocation
page read and write
1B831800000
heap
page read and write
283BE1E0000
heap
page read and write
1BC5E000
stack
page read and write
13C12000
trusted library allocation
page read and write
7FFD9BE50000
trusted library allocation
page read and write
7FFD9C160000
trusted library allocation
page read and write
10C0000
heap
page read and write
F80000
heap
page read and write
1C68E000
stack
page read and write
7FFD9C170000
trusted library allocation
page read and write
129ED000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
3747000
trusted library allocation
page read and write
24C64FF000
stack
page read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9C16B000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
1B25DC60000
heap
page read and write
2FBE000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
199E4CF0000
heap
page read and write
326B000
trusted library allocation
page read and write
141E3000
trusted library allocation
page read and write
7FFD9BFA0000
trusted library allocation
page read and write
7FFD9C195000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
1C2EB000
stack
page read and write
2AA9000
trusted library allocation
page read and write
1C13A000
stack
page read and write
1C575833000
heap
page read and write
1150000
heap
page read and write
12B12000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
7FFD9C1E8000
trusted library allocation
page read and write
7FFD9C1C0000
trusted library allocation
page read and write
2AA7000
trusted library allocation
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
1075000
heap
page read and write
27A7951F000
heap
page read and write
3ADF000
trusted library allocation
page read and write
89D658C000
stack
page read and write
2FA0000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
1310A000
trusted library allocation
page read and write
1BD0F000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
7FFD9C124000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
7FFD9C160000
trusted library allocation
page read and write
7FFD9C028000
trusted library allocation
page read and write
328F000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1E5B000
stack
page read and write
7FFD9C100000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
31DE000
trusted library allocation
page read and write
1B05F370000
heap
page read and write
31E6000
trusted library allocation
page read and write
1B90E000
stack
page read and write
3D96000
trusted library allocation
page read and write
1CB39000
heap
page read and write
1C2AE000
stack
page read and write
2D43000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
7FFD9C19C000
trusted library allocation
page read and write
7FFD9C048000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
13A0F000
trusted library allocation
page read and write
7FFD9BE80000
trusted library allocation
page execute and read and write
78352FF000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7E0000
heap
page read and write
12971000
trusted library allocation
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
7FFD9C160000
trusted library allocation
page read and write
7FFD9BE3B000
trusted library allocation
page read and write
1BB89000
heap
page read and write
7FFD9BE1C000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
7FFD9BFD0000
trusted library allocation
page read and write
7FFD9C0F8000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
7FFD9BF40000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
12B20000
trusted library allocation
page read and write
1339D000
trusted library allocation
page read and write
1C481000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9BF88000
trusted library allocation
page read and write
7D0000
heap
page read and write
7FFD9BE77000
trusted library allocation
page execute and read and write
7FFD9BE30000
trusted library allocation
page read and write
7FFD9B984000
trusted library allocation
page read and write
359F000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page execute and read and write
7FFD9BB35000
trusted library allocation
page read and write
7FFD9BF60000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
130F4000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
7FFD9B97C000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
1B75A000
stack
page read and write
1B248000
heap
page read and write
1D2DB000
unkown
page read and write
356D000
trusted library allocation
page read and write
7FFD9C139000
trusted library allocation
page read and write
7FFD9C270000
trusted library allocation
page read and write
1426D000
trusted library allocation
page read and write
1CB50000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
130C6000
trusted library allocation
page read and write
1B042000
heap
page read and write
7FFD9BF17000
trusted library allocation
page read and write
7FFD9C0E2000
trusted library allocation
page read and write
1B6DC000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
2D2D000
trusted library allocation
page read and write
36BD000
trusted library allocation
page read and write
155B000
heap
page read and write
7FFD9BF50000
trusted library allocation
page read and write
1B450000
unkown
page readonly
1B433000
heap
page execute and read and write
7FFD9C27B000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
1687000
heap
page read and write
1EF776D0000
heap
page read and write
22E0AF12000
heap
page read and write
7FFD9BEA0000
trusted library allocation
page read and write
21D0F147000
heap
page read and write
1CB25000
heap
page read and write
2DC6CBB0000
heap
page read and write
7FFD9BFB0000
trusted library allocation
page read and write
22EBEA55000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
7FFD9BFCC000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
283BE1D0000
heap
page read and write
7FFD9C0E0000
trusted library allocation
page read and write
7FFD9BF63000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
1DCC1609000
heap
page read and write
7FFD9BB48000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
7FFD9BFA7000
trusted library allocation
page read and write
1BA72000
unkown
page readonly
13602000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
8A7A10B000
stack
page read and write
1B91A000
heap
page read and write
3DA6000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
199E4CA0000
heap
page read and write
2DC6CC30000
heap
page read and write
CE2000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
1C4AE000
stack
page read and write
1BEEE000
stack
page read and write
13640000
trusted library allocation
page read and write
7FFD9BE40000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
139FF000
trusted library allocation
page read and write
7FFD9C090000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
7FFD9BB4C000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
7FFD9C150000
trusted library allocation
page read and write
7FFD9C12B000
trusted library allocation
page read and write
113B000
heap
page read and write
1B8D7000
heap
page read and write
DB0000
heap
page read and write
339F000
trusted library allocation
page read and write
201F3300000
heap
page read and write
7FFD9C190000
trusted library allocation
page read and write
1B9C0000
heap
page read and write
31DA000
trusted library allocation
page read and write
7FFD9C1BA000
trusted library allocation
page read and write
7FFD9BF82000
trusted library allocation
page read and write
297F000
trusted library allocation
page read and write
13BBC000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
3250000
heap
page read and write
3B62000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
2DC6CC97000
heap
page read and write
7FFD9BB5C000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
1010000
heap
page read and write
1BB50000
heap
page read and write
1B570000
unkown
page readonly
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BBF6000
trusted library allocation
page read and write
1B140000
heap
page read and write
2469D030000
heap
page read and write
3313000
trusted library allocation
page read and write
2A4AB624000
heap
page read and write
7FFD9C129000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
13423000
trusted library allocation
page read and write
2A99000
trusted library allocation
page read and write
7FFD9C1D0000
trusted library allocation
page read and write
7FFD9BE51000
trusted library allocation
page read and write
30A8000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
13FD7000
trusted library allocation
page read and write
1015000
heap
page read and write
30BB000
trusted library allocation
page read and write
13BB2000
trusted library allocation
page read and write
7FFD9C1EB000
trusted library allocation
page read and write
7FFD9C1E0000
trusted library allocation
page read and write
7FFD9BF83000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
7FFD9C110000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
1311F000
trusted library allocation
page read and write
1078000
heap
page read and write
FD5000
heap
page read and write
7FFD9BFCC000
trusted library allocation
page read and write
7FFD9BE21000
trusted library allocation
page read and write
7FFD9C130000
trusted library allocation
page read and write
1B069000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BD50000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page execute and read and write
34A7000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
7FFD9BF32000
trusted library allocation
page read and write
7FFD9C0C0000
trusted library allocation
page read and write
28D34E80000
heap
page read and write
7FFD9C110000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page execute and read and write
13207000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page execute and read and write
7FFD9B9A4000
trusted library allocation
page read and write
1865000
heap
page read and write
1D16D000
stack
page read and write
2BAB000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
7FFD9C1C0000
trusted library allocation
page read and write
7FFD9BEE0000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
3622000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
1D47B000
unkown
page read and write
7FFD9BE0E000
trusted library allocation
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
412000
unkown
page readonly
7FFD9BA36000
trusted library allocation
page read and write
11C0000
heap
page execute and read and write
2A4AB420000
heap
page read and write
1516000
heap
page read and write
30F9000
trusted library allocation
page read and write
7FFD9BF73000
trusted library allocation
page read and write
22EBEAA0000
heap
page read and write
7FFD9C1F0000
trusted library allocation
page execute and read and write
7FFD9BE5F000
trusted library allocation
page read and write
1C83A000
heap
page read and write
1BA10000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
38F4000
trusted library allocation
page read and write
FD0000
heap
page execute and read and write
1B050000
trusted library allocation
page read and write
1D30B000
unkown
page read and write
125E000
heap
page read and write
1DCC17B0000
heap
page read and write
1C75E000
stack
page read and write
2DC6CC9A000
heap
page read and write
3B3F000
trusted library allocation
page read and write
1050000
heap
page read and write
7FFD9BF49000
trusted library allocation
page read and write
310B000
trusted library allocation
page read and write
1CCD0000
heap
page read and write
131D0000
trusted library allocation
page read and write
BF5000
heap
page read and write
1B972000
unkown
page readonly
7FFD9BB43000
trusted library allocation
page read and write
28D34B30000
heap
page read and write
31B9000
trusted library allocation
page read and write
1333D000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
7FFD9C182000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
7FFD9BFF0000
trusted library allocation
page execute and read and write
1CDCD000
stack
page read and write
366F000
trusted library allocation
page read and write
7FFD9C280000
trusted library allocation
page read and write
7FFD9BB45000
trusted library allocation
page read and write
7FFD9C0C2000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
7FFD9BCB2000
trusted library allocation
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
36A3000
trusted library allocation
page read and write
21E0F830000
heap
page read and write
7FFD9C1A0000
trusted library allocation
page read and write
7FFD9C070000
trusted library allocation
page read and write
7FFD9BE31000
trusted library allocation
page read and write
7FFD9BBC9000
trusted library allocation
page read and write
3A88000
trusted library allocation
page read and write
7FFD9BBB7000
trusted library allocation
page read and write
1410000
heap
page read and write
3158000
trusted library allocation
page read and write
13A6F000
trusted library allocation
page read and write
EC84C7E000
stack
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
142F5000
trusted library allocation
page read and write
1CDD4000
heap
page read and write
1B3B0000
heap
page execute and read and write
3B3A000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
1436A000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1B452000
unkown
page readonly
1B4A0000
heap
page read and write
7FFD9BE20000
trusted library allocation
page read and write
1228000
heap
page read and write
7FFD9BF47000
trusted library allocation
page read and write
7FFD9B798000
trusted library allocation
page read and write
92974FE000
stack
page read and write
2F4F000
stack
page read and write
27A794F0000
heap
page read and write
2BC6000
trusted library allocation
page read and write
7FFD9BB9D000
trusted library allocation
page read and write
F2E000
stack
page read and write
F9DE3CC000
stack
page read and write
3B35000
trusted library allocation
page read and write
7FFD9C1C9000
trusted library allocation
page read and write
1C575A00000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
7FFD9BFB2000
trusted library allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
1CE3E000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
7FFD9C20F000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
13A44000
trusted library allocation
page read and write
30E0000
heap
page execute and read and write
1BD30000
heap
page execute and read and write
8C1000
heap
page read and write
72447FF000
stack
page read and write
F05000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page execute and read and write
15B0000
heap
page read and write
1C057000
heap
page read and write
35DA000
trusted library allocation
page read and write
There are 3048 hidden memdumps, click here to show them.