Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
KPFv8ATDx0.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files\Internet Explorer\en-GB\oqWNZWQNWoNnROlqjKcKhLM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Internet Explorer\en-GB\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Defender\oqWNZWQNWoNnROlqjKcKhLM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Multimedia Platform\oqWNZWQNWoNnROlqjKcKhLM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KPFv8ATDx0.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\4XCyKdTKaY.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\JRGN3N9ZXF.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aehWhM7TGU.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bgR6NVhjy4.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bqMLTwU6O8.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cWXsH5vMZ0.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iHmrx8Dkeu.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\pFxSEGDzP3.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yJr0BespZg.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\ACAUZvYN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\AHwNgZaF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ARClkDgk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\AWvLLWqc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\BXwkEeIS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CGsDyrOn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CKTJbAfr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CnRDnDvx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CqTJEOHT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CvAVSmWD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CyIkUInh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\EZPbybNn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FCcCDjRB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FTyBLKyM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FvOMJVpt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FxClgbOG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GKfLNjlY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GLOjgbXG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GoybbFob.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GxRSZgBO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IHWAbonb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IPEdAXAX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JEwTrooN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KFhcUPbS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KpuBgggp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LWkTXfAf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LcQaEBDP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LljRCdQC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LqfKJGTv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MtmZLckZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NgGUXyfg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NqOhhczU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NvmJyloG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ObZHJZRv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OgVBQDTo.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OkvSnMWj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OqbZUiZT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OwGrvDOt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PAkihvfV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PFIKyDTH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PYmimUsi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PthzQDco.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QYBPfZgq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RONsALFU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RyZipATO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SIxHSvEB.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SeerDZBz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SmOJiIbE.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TraZorfO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TvAqLAiJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UCgheeoa.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UTCgmFWk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UTTISNjC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UYcyJOZf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VcGpvFqH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VggGSNtC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VijSQbQY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VuurXSIi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VxlkbjYv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WQvQoNyx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WhRPvofH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XOEIXFmQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\XaOgexda.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YBagvbJq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YHFyVwyQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YMBsdaAI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YPpRAgYW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YWHQgFFn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\abhXZtjw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\axOHLXft.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cCsjkXAC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cxwpdtyJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dSJhnlvh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eCWwWibS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eulplymD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gHANBhKj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gMZpSqzV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gUKxCZnk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hhWvCZxk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hxXYHhry.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iLUfkInD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ijuwfDOX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iqYOFZDy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jKmGQQAV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jpnvyeqG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jsgdIvVc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lHcvfWDY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lgAYTQQj.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lkpWjeGm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lvRXXeLO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mBLWrFnw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mFCPuWEK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nimHpzUe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nlafNFtr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nyDFtNQJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\olpMFKgz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pafNrbGf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\phiwHSJM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pqhfBjOC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qDdNmCtS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qZdxwwVX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rdSwMKLb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rlBOrtmg.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rsUNXSTy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sSNMOgTF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sbztrXaK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tCqOXkyz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uZZMHXbv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\udSmiqlo.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\unoxMcqb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vPiVwyIZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vfTLbyDe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wbMvdGfr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xMZKLDLb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xhGuwiIZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xtgFehys.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yYBvlMUk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zZntUmUz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zdNKrvXu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zlxdWeyz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ShellExperiences\oqWNZWQNWoNnROlqjKcKhLM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Internet Explorer\en-GB\0b77faa1f189a8
|
ASCII text, with very long lines (804), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Defender\0b77faa1f189a8
|
ASCII text, with very long lines (707), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Defender\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Multimedia Platform\0b77faa1f189a8
|
ASCII text, with very long lines (775), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Multimedia Platform\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\oqWNZWQNWoNnROlqjKcKhLM.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1GlaBTLt9k
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\51yavEShxN
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6973u7blL4
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Eee1q2H6Zy
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\GmrVH2RRtM
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RW8E5HpYwQ
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fdYSUxHhNe
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ki5mgHFA5B
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mzahGM93Su
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\rmWrz5JDk6
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\jones\OneDrive\0b77faa1f189a8
|
ASCII text, with very long lines (901), with no line terminators
|
dropped
|
||
C:\Windows\ShellExperiences\0b77faa1f189a8
|
ASCII text, with very long lines (722), with no line terminators
|
dropped
|
||
C:\Windows\ShellExperiences\oqWNZWQNWoNnROlqjKcKhLM.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 149 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\KPFv8ATDx0.exe
|
"C:\Users\user\Desktop\KPFv8ATDx0.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\iHmrx8Dkeu.bat"
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\JRGN3N9ZXF.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\aehWhM7TGU.bat"
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cWXsH5vMZ0.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\pFxSEGDzP3.bat"
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\yJr0BespZg.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\bgR6NVhjy4.bat"
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\bqMLTwU6O8.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\4XCyKdTKaY.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe
|
"C:\Users\jones\OneDrive\oqWNZWQNWoNnROlqjKcKhLM.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://38.180.228.120
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
38.180.228.120
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\5e4e68aedc554f14148d63aeddf19bf6305b2da8
|
b33c9dc0e47119d66db9d7a755209454d79862f4
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\oqWNZWQNWoNnROlqjKcKhLM_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12961000
|
trusted library allocation
|
page read and write
|
||
3A2000
|
unkown
|
page readonly
|
||
13CB8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD6B000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
13606000
|
trusted library allocation
|
page read and write
|
||
1C0B8000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
F12000
|
unkown
|
page readonly
|
||
1BFDE000
|
stack
|
page read and write
|
||
13598000
|
trusted library allocation
|
page read and write
|
||
7FFAAC492000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD1F000
|
trusted library allocation
|
page read and write
|
||
3924000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
130FF000
|
trusted library allocation
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page read and write
|
||
2985000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
39E3000
|
trusted library allocation
|
page read and write
|
||
12A43000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1855000
|
heap
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
7FFAACB52000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D6000
|
trusted library allocation
|
page read and write
|
||
12B2B000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB47000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC733000
|
trusted library allocation
|
page read and write
|
||
7FFAACD92000
|
trusted library allocation
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
1C9DD000
|
stack
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1B06B000
|
heap
|
page read and write
|
||
348E000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DF000
|
trusted library allocation
|
page read and write
|
||
13115000
|
trusted library allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
2C53000
|
trusted library allocation
|
page read and write
|
||
7FFAAC743000
|
trusted library allocation
|
page read and write
|
||
7FFAACACF000
|
trusted library allocation
|
page read and write
|
||
1B70E000
|
heap
|
page read and write
|
||
1B38B000
|
stack
|
page read and write
|
||
1CA90000
|
heap
|
page read and write
|
||
7FFAAC56D000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
13330000
|
trusted library allocation
|
page read and write
|
||
1AF2D060000
|
heap
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF1000
|
trusted library allocation
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page execute and read and write
|
||
2CCD000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
7FFAACB55000
|
trusted library allocation
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
281C000
|
trusted library allocation
|
page read and write
|
||
2912000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
133F4000
|
trusted library allocation
|
page read and write
|
||
7FFAACD57000
|
trusted library allocation
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
7FFAAC554000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
7FFAACB01000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5F6000
|
trusted library allocation
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC69A000
|
trusted library allocation
|
page execute and read and write
|
||
1B67F000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFAAC522000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
heap
|
page read and write
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
23A9CBB8000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
12F3A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC787000
|
trusted library allocation
|
page read and write
|
||
1A627FB6000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
1B8AB000
|
stack
|
page read and write
|
||
7FFAACC59000
|
trusted library allocation
|
page read and write
|
||
131E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD96000
|
trusted library allocation
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B4000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
129B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7BF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC864000
|
trusted library allocation
|
page read and write
|
||
2403325A000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
23D5D967000
|
heap
|
page read and write
|
||
1BD5F000
|
heap
|
page read and write
|
||
7FFAACC59000
|
trusted library allocation
|
page read and write
|
||
1385D000
|
trusted library allocation
|
page read and write
|
||
1386F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC892000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page execute and read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC745000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC606000
|
trusted library allocation
|
page execute and read and write
|
||
1C8ED000
|
stack
|
page read and write
|
||
32DF000
|
trusted library allocation
|
page read and write
|
||
286F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD7D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC80B000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
1AF2CDFA000
|
heap
|
page read and write
|
||
7FFAAC568000
|
trusted library allocation
|
page read and write
|
||
3A5A000
|
trusted library allocation
|
page read and write
|
||
1ACE3000
|
heap
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
7FFAACD37000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
1C091000
|
heap
|
page read and write
|
||
1CA4C000
|
heap
|
page read and write
|
||
2786000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9E000
|
trusted library allocation
|
page read and write
|
||
1BC48000
|
heap
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
7FFAAC7CD000
|
trusted library allocation
|
page read and write
|
||
1C19D000
|
stack
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCBB000
|
trusted library allocation
|
page read and write
|
||
7FFAACC79000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
1B5E6000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
288D000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
7FFAACD1B000
|
trusted library allocation
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
1CA5E000
|
heap
|
page read and write
|
||
1B79C000
|
heap
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1A627FA9000
|
heap
|
page read and write
|
||
7FFAAC558000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page execute and read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAACB69000
|
trusted library allocation
|
page read and write
|
||
164F04B0000
|
heap
|
page read and write
|
||
148D000
|
heap
|
page read and write
|
||
1BBE4000
|
heap
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
7FFAACD74000
|
trusted library allocation
|
page read and write
|
||
7FFAAC493000
|
trusted library allocation
|
page execute and read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1295D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A7000
|
trusted library allocation
|
page read and write
|
||
12A06000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1E000
|
trusted library allocation
|
page read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
1156000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
1B9FF000
|
stack
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
2E58000
|
trusted library allocation
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
28C3000
|
trusted library allocation
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page execute and read and write
|
||
3B40000
|
trusted library allocation
|
page read and write
|
||
14E9000
|
heap
|
page read and write
|
||
1AF2CDF0000
|
heap
|
page read and write
|
||
7FFAACD9E000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page execute and read and write
|
||
7FFAACD24000
|
trusted library allocation
|
page read and write
|
||
130C3000
|
trusted library allocation
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC686000
|
trusted library allocation
|
page execute and read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC3000
|
trusted library allocation
|
page read and write
|
||
1CF7C000
|
stack
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
13741000
|
trusted library allocation
|
page read and write
|
||
1AF20000
|
heap
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
1C9EF000
|
heap
|
page read and write
|
||
1C9FC000
|
heap
|
page read and write
|
||
7FFAAC45D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD7B000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB8000
|
trusted library allocation
|
page read and write
|
||
344A000
|
trusted library allocation
|
page read and write
|
||
1C5CD000
|
stack
|
page read and write
|
||
7FFAAC63F000
|
trusted library allocation
|
page read and write
|
||
2D25E1E0000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
3448000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page execute and read and write
|
||
7FFAAC774000
|
trusted library allocation
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
1C3DD000
|
stack
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
F453C7F000
|
stack
|
page read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA96000
|
heap
|
page read and write
|
||
7FFAACBBF000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
7FFAACC2B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC797000
|
trusted library allocation
|
page read and write
|
||
12D66000
|
trusted library allocation
|
page read and write
|
||
28C3000
|
trusted library allocation
|
page read and write
|
||
1AF2CD00000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC563000
|
trusted library allocation
|
page read and write
|
||
274D000
|
heap
|
page read and write
|
||
7FFAAC747000
|
trusted library allocation
|
page read and write
|
||
1BE20000
|
heap
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page execute and read and write
|
||
1362F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page execute and read and write
|
||
F4539AF000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
231A551A000
|
heap
|
page read and write
|
||
13E32000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page execute and read and write
|
||
132CF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
26F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page execute and read and write
|
||
129EC000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
12D1A000
|
trusted library allocation
|
page read and write
|
||
1B62B000
|
heap
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F6000
|
trusted library allocation
|
page read and write
|
||
1C078000
|
heap
|
page read and write
|
||
1282C000
|
trusted library allocation
|
page read and write
|
||
13ABF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
1CD9E000
|
stack
|
page read and write
|
||
1C1437E0000
|
heap
|
page read and write
|
||
1BBA5000
|
heap
|
page read and write
|
||
1B662000
|
unkown
|
page readonly
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
7FFAACCBF000
|
trusted library allocation
|
page read and write
|
||
7FFAACD59000
|
trusted library allocation
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
104E000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7FFAAC7DE000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
7FFAAC876000
|
trusted library allocation
|
page read and write
|
||
7FFAAC753000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
7FFAAC574000
|
trusted library allocation
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
1358C000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
1BCC4000
|
heap
|
page read and write
|
||
12C75000
|
trusted library allocation
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
133DC000
|
trusted library allocation
|
page read and write
|
||
3A30000
|
trusted library allocation
|
page read and write
|
||
1A680000
|
trusted library allocation
|
page read and write
|
||
137CA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74E000
|
trusted library allocation
|
page read and write
|
||
1BBA4000
|
heap
|
page read and write
|
||
13EB5000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
7FFAACC96000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
13DEB000
|
trusted library allocation
|
page read and write
|
||
23911CBA000
|
heap
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D1000
|
trusted library allocation
|
page read and write
|
||
7FFB226DD000
|
unkown
|
page readonly
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
7FFAACC54000
|
trusted library allocation
|
page read and write
|
||
23D5DC30000
|
heap
|
page read and write
|
||
7FFAACBD9000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF3000
|
trusted library allocation
|
page read and write
|
||
1C11F000
|
stack
|
page read and write
|
||
7FFAACAAE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC666000
|
trusted library allocation
|
page execute and read and write
|
||
129A0000
|
trusted library allocation
|
page read and write
|
||
1B584000
|
heap
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB3000
|
trusted library allocation
|
page read and write
|
||
2967000
|
trusted library allocation
|
page read and write
|
||
129C6000
|
trusted library allocation
|
page read and write
|
||
1BFAB000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
1B0B6000
|
heap
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page execute and read and write
|
||
136CF000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
23A9CDE0000
|
heap
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
1BC3A000
|
heap
|
page read and write
|
||
7FFB1E0F6000
|
unkown
|
page readonly
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
325A000
|
trusted library allocation
|
page read and write
|
||
1B07D000
|
heap
|
page read and write
|
||
1B292000
|
unkown
|
page readonly
|
||
1A780000
|
trusted library allocation
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
7FFAAC798000
|
trusted library allocation
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
A39000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC574000
|
trusted library allocation
|
page read and write
|
||
3625000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC554000
|
trusted library allocation
|
page read and write
|
||
7FFAAC67F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
1293F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1B252000
|
unkown
|
page readonly
|
||
858000
|
heap
|
page read and write
|
||
12C5F000
|
trusted library allocation
|
page read and write
|
||
7FFAACADE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5AC000
|
trusted library allocation
|
page execute and read and write
|
||
2A0C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC626000
|
trusted library allocation
|
page execute and read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC48000
|
trusted library allocation
|
page read and write
|
||
1BCCF000
|
heap
|
page read and write
|
||
1A710000
|
trusted library allocation
|
page read and write
|
||
7FFAAC683000
|
trusted library allocation
|
page read and write
|
||
7FFAAC606000
|
trusted library allocation
|
page read and write
|
||
1B726000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
1C6B4000
|
heap
|
page read and write
|
||
23D5DC35000
|
heap
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB56000
|
trusted library allocation
|
page read and write
|
||
359F000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
3576000
|
trusted library allocation
|
page read and write
|
||
1BD56000
|
heap
|
page read and write
|
||
3403000
|
heap
|
page execute and read and write
|
||
7FFAAC524000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FE000
|
trusted library allocation
|
page read and write
|
||
13C2A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC747000
|
trusted library allocation
|
page read and write
|
||
1BD61000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8B2000
|
trusted library allocation
|
page read and write
|
||
28C5000
|
trusted library allocation
|
page read and write
|
||
349B000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
12976000
|
trusted library allocation
|
page read and write
|
||
3703000
|
trusted library allocation
|
page read and write
|
||
1B313000
|
heap
|
page execute and read and write
|
||
7FFAACC1F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC763000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
7FFAACC48000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
1C1437E7000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
3B0D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page execute and read and write
|
||
291E000
|
trusted library allocation
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
7FFAACD1B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
7FFAAC675000
|
trusted library allocation
|
page execute and read and write
|
||
14005000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page execute and read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
1C0DE000
|
stack
|
page read and write
|
||
240333C0000
|
heap
|
page read and write
|
||
12A18000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D7000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD34000
|
trusted library allocation
|
page read and write
|
||
7FFAACD24000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
E6B239F000
|
stack
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB8000
|
trusted library allocation
|
page read and write
|
||
1B6D0000
|
heap
|
page read and write
|
||
1BC04000
|
heap
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
32F5000
|
trusted library allocation
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
1C2FE000
|
stack
|
page read and write
|
||
139ED000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
2920000
|
unkown
|
page readonly
|
||
7FFAAC675000
|
trusted library allocation
|
page execute and read and write
|
||
1B710000
|
heap
|
page read and write
|
||
231A5710000
|
heap
|
page read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
1383A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD96000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74A000
|
trusted library allocation
|
page read and write
|
||
289C1AE0000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
164F04BA000
|
heap
|
page read and write
|
||
27F9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
heap
|
page execute and read and write
|
||
7FFAAC448000
|
trusted library allocation
|
page read and write
|
||
7FFAAC744000
|
trusted library allocation
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9F000
|
trusted library allocation
|
page read and write
|
||
1345E000
|
trusted library allocation
|
page read and write
|
||
1BFCF000
|
heap
|
page read and write
|
||
1B2E0000
|
heap
|
page execute and read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
6CDBC7C000
|
stack
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
7FFAACB56000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page execute and read and write
|
||
1AEEA000
|
stack
|
page read and write
|
||
7FFAACD3B000
|
trusted library allocation
|
page read and write
|
||
7FFAACD98000
|
trusted library allocation
|
page read and write
|
||
1C7D0000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page execute and read and write
|
||
341C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A2000
|
trusted library allocation
|
page read and write
|
||
7FFAACB05000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
7FFAACB78000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
1B63E000
|
stack
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
231A54E0000
|
heap
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
7FFAACBEF000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD1000
|
trusted library allocation
|
page read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
1C31D000
|
stack
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC866000
|
trusted library allocation
|
page read and write
|
||
1B13B000
|
stack
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
1A7B5330000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
12DA000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FFAACDB4000
|
trusted library allocation
|
page read and write
|
||
3438000
|
trusted library allocation
|
page read and write
|
||
F52000
|
unkown
|
page readonly
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC73A000
|
trusted library allocation
|
page read and write
|
||
7FFAACB7E000
|
trusted library allocation
|
page read and write
|
||
25D005F0000
|
heap
|
page read and write
|
||
1341C000
|
trusted library allocation
|
page read and write
|
||
28E8000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
1385F000
|
trusted library allocation
|
page read and write
|
||
265F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
25D00600000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page execute and read and write
|
||
1A6280B0000
|
heap
|
page read and write
|
||
13490000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
1BC80000
|
heap
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC616000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC6E7000
|
trusted library allocation
|
page read and write
|
||
1C0DE000
|
stack
|
page read and write
|
||
7FFAACADF000
|
trusted library allocation
|
page read and write
|
||
7FFAACD96000
|
trusted library allocation
|
page read and write
|
||
7FFB226D9000
|
unkown
|
page readonly
|
||
1375C000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
7FFAACA2F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6FF000
|
trusted library allocation
|
page read and write
|
||
1AF2CEF0000
|
heap
|
page read and write
|
||
2775000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9F000
|
trusted library allocation
|
page read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
1AF2CF10000
|
heap
|
page read and write
|
||
12C4A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57B000
|
trusted library allocation
|
page execute and read and write
|
||
1BBC9000
|
heap
|
page read and write
|
||
7FFAACCE3000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
F45392C000
|
stack
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page execute and read and write
|
||
1B16B000
|
heap
|
page read and write
|
||
2893000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC636000
|
trusted library allocation
|
page execute and read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
1756000
|
trusted library allocation
|
page read and write
|
||
13995000
|
trusted library allocation
|
page read and write
|
||
266A000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
24033250000
|
heap
|
page read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
heap
|
page read and write
|
||
7FFAAC79F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD24000
|
trusted library allocation
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE1000
|
trusted library allocation
|
page read and write
|
||
1CE70000
|
heap
|
page read and write
|
||
7FFAACB0A000
|
trusted library allocation
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
36A7000
|
trusted library allocation
|
page read and write
|
||
1C965000
|
heap
|
page read and write
|
||
254D000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
139AF000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
1489000
|
heap
|
page read and write
|
||
2805000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
2DDC000
|
trusted library allocation
|
page read and write
|
||
13C14000
|
trusted library allocation
|
page read and write
|
||
335B000
|
trusted library allocation
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
78B000
|
stack
|
page read and write
|
||
3561000
|
trusted library allocation
|
page read and write
|
||
12FAE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page execute and read and write
|
||
129A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC706000
|
trusted library allocation
|
page read and write
|
||
7FFAACADF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A2000
|
trusted library allocation
|
page read and write
|
||
7FFAACB67000
|
trusted library allocation
|
page read and write
|
||
3AA6000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC443000
|
trusted library allocation
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAACB52000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
1289C000
|
trusted library allocation
|
page read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
7FFAACCF8000
|
trusted library allocation
|
page read and write
|
||
1B290000
|
unkown
|
page readonly
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
1B004000
|
heap
|
page read and write
|
||
7FFAACB89000
|
trusted library allocation
|
page read and write
|
||
286E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC57C000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FFAAC72A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page execute and read and write
|
||
1363A000
|
trusted library allocation
|
page read and write
|
||
7FFAACCEB000
|
trusted library allocation
|
page read and write
|
||
2A73000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
trusted library allocation
|
page read and write
|
||
1BED6000
|
heap
|
page read and write
|
||
13477000
|
trusted library allocation
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
1925000
|
heap
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC645000
|
trusted library allocation
|
page read and write
|
||
7FFAACB49000
|
trusted library allocation
|
page read and write
|
||
2E1A000
|
trusted library allocation
|
page read and write
|
||
7FFAACCCF000
|
trusted library allocation
|
page read and write
|
||
1BFCD000
|
heap
|
page read and write
|
||
12751000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
23911CB0000
|
heap
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA8000
|
trusted library allocation
|
page read and write
|
||
2759000
|
trusted library allocation
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
7FFAACAF2000
|
trusted library allocation
|
page read and write
|
||
292E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
13226000
|
trusted library allocation
|
page read and write
|
||
1B6A2000
|
unkown
|
page readonly
|
||
7FFAACD0B000
|
trusted library allocation
|
page read and write
|
||
7FFAACCFA000
|
trusted library allocation
|
page read and write
|
||
1CC9E000
|
stack
|
page read and write
|
||
1336A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page execute and read and write
|
||
3647000
|
trusted library allocation
|
page read and write
|
||
347F000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
1B57E000
|
stack
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
1BBA2000
|
heap
|
page read and write
|
||
12E0E000
|
trusted library allocation
|
page read and write
|
||
F99310F000
|
stack
|
page read and write
|
||
164F03F0000
|
heap
|
page read and write
|
||
12DE5000
|
trusted library allocation
|
page read and write
|
||
12950000
|
trusted library allocation
|
page read and write
|
||
7FFAAC568000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
1AFB0000
|
heap
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
2D25E2F0000
|
heap
|
page read and write
|
||
164F0310000
|
heap
|
page read and write
|
||
13E8D000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC6000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
3688000
|
trusted library allocation
|
page read and write
|
||
1C8E0000
|
heap
|
page read and write
|
||
7FFAAC725000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9B000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
7FFAACB29000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
1A7B5510000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC538000
|
trusted library allocation
|
page read and write
|
||
7FFAAC616000
|
trusted library allocation
|
page execute and read and write
|
||
1315E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
131BC000
|
trusted library allocation
|
page read and write
|
||
2D25E1E8000
|
heap
|
page read and write
|
||
7FFAAC654000
|
trusted library allocation
|
page read and write
|
||
13C7D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB78000
|
trusted library allocation
|
page read and write
|
||
34D3000
|
trusted library allocation
|
page read and write
|
||
1B98D000
|
stack
|
page read and write
|
||
23911BE0000
|
heap
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
1C143740000
|
heap
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
1B615000
|
heap
|
page read and write
|
||
7FFAACD72000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB3000
|
trusted library allocation
|
page read and write
|
||
12A7A000
|
trusted library allocation
|
page read and write
|
||
12902000
|
trusted library allocation
|
page read and write
|
||
1B148000
|
heap
|
page read and write
|
||
7FFAAC6D6000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
A79000
|
heap
|
page read and write
|
||
CAF67E000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page execute and read and write
|
||
1B250000
|
unkown
|
page readonly
|
||
2DCE000
|
stack
|
page read and write
|
||
135DE000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
1C8DF000
|
stack
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
1BCC6000
|
heap
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB3000
|
trusted library allocation
|
page read and write
|
||
10D7000
|
heap
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
7FFAACD39000
|
trusted library allocation
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
7FFAACC93000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC59C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC43D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC694000
|
trusted library allocation
|
page execute and read and write
|
||
299C000
|
trusted library allocation
|
page read and write
|
||
12A8F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
1309B000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
307E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
heap
|
page read and write
|
||
129FC000
|
trusted library allocation
|
page read and write
|
||
1389C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
13431000
|
trusted library allocation
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB9000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
12C9F000
|
trusted library allocation
|
page read and write
|
||
28C9000
|
trusted library allocation
|
page read and write
|
||
36EC000
|
trusted library allocation
|
page read and write
|
||
3ADB000
|
trusted library allocation
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
1C67C000
|
heap
|
page read and write
|
||
26B5000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
1BEC1000
|
heap
|
page read and write
|
||
7FFAACC5B000
|
trusted library allocation
|
page read and write
|
||
2743000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
1BBA7000
|
heap
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC798000
|
trusted library allocation
|
page read and write
|
||
1289C000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
7FFAAC827000
|
trusted library allocation
|
page execute and read and write
|
||
1B73E000
|
stack
|
page read and write
|
||
7FFAACD54000
|
trusted library allocation
|
page read and write
|
||
3A4D000
|
trusted library allocation
|
page read and write
|
||
278A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC777000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FB000
|
trusted library allocation
|
page read and write
|
||
1CD7D000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
F62000
|
unkown
|
page readonly
|
||
1370F000
|
trusted library allocation
|
page read and write
|
||
1C5AB000
|
stack
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
133F6000
|
trusted library allocation
|
page read and write
|
||
1357C000
|
trusted library allocation
|
page read and write
|
||
7FFAACC84000
|
trusted library allocation
|
page read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
130D4000
|
trusted library allocation
|
page read and write
|
||
1A7B5410000
|
heap
|
page read and write
|
||
12FFA000
|
trusted library allocation
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
7FFAACD14000
|
trusted library allocation
|
page read and write
|
||
12A16000
|
trusted library allocation
|
page read and write
|
||
12E2D000
|
trusted library allocation
|
page read and write
|
||
1B8F0000
|
heap
|
page execute and read and write
|
||
12ACC000
|
trusted library allocation
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
1C943000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
1B070000
|
heap
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
25AD000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page execute and read and write
|
||
23911AE0000
|
heap
|
page read and write
|
||
7FFAAC7BD000
|
trusted library allocation
|
page read and write
|
||
12651000
|
trusted library allocation
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
7FFAACB98000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC653000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD9000
|
trusted library allocation
|
page read and write
|
||
7FFAACD84000
|
trusted library allocation
|
page read and write
|
||
1BB29000
|
heap
|
page read and write
|
||
7FFAAC72C000
|
trusted library allocation
|
page read and write
|
||
25D00630000
|
heap
|
page read and write
|
||
7FFAACD4B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC554000
|
trusted library allocation
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
1B248000
|
unkown
|
page readonly
|
||
12F34000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
1360C000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
7FFB226D6000
|
unkown
|
page readonly
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAACD76000
|
trusted library allocation
|
page read and write
|
||
1AA66000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
130EA000
|
trusted library allocation
|
page read and write
|
||
1311A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC63C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
129AC000
|
trusted library allocation
|
page read and write
|
||
1BB60000
|
heap
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
F99318F000
|
stack
|
page read and write
|
||
1B594000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
DCB000
|
stack
|
page read and write
|
||
1C4CD000
|
stack
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
23911C05000
|
heap
|
page read and write
|
||
7FFAACBB7000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
1BEED000
|
stack
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
unkown
|
page readonly
|
||
13421000
|
trusted library allocation
|
page read and write
|
||
1C65B000
|
stack
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1B0B0000
|
heap
|
page read and write
|
||
7FFAACD54000
|
trusted library allocation
|
page read and write
|
||
7FFB1E105000
|
unkown
|
page readonly
|
||
7FFAACB01000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB5000
|
trusted library allocation
|
page read and write
|
||
288C000
|
trusted library allocation
|
page read and write
|
||
13A0B000
|
trusted library allocation
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
2875000
|
trusted library allocation
|
page read and write
|
||
7FFAACD72000
|
trusted library allocation
|
page read and write
|
||
289C1B86000
|
heap
|
page read and write
|
||
7FFAAC6B4000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAACCDF000
|
trusted library allocation
|
page read and write
|
||
1B36F000
|
heap
|
page read and write
|
||
7FFAACB08000
|
trusted library allocation
|
page read and write
|
||
348E000
|
trusted library allocation
|
page read and write
|
||
3A8B000
|
trusted library allocation
|
page read and write
|
||
7FFAACB7E000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC706000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
36D1000
|
trusted library allocation
|
page read and write
|
||
1A2E000
|
stack
|
page read and write
|
||
1BBCD000
|
heap
|
page read and write
|
||
7FFAACD03000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC534000
|
trusted library allocation
|
page read and write
|
||
7FFAAC494000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4A8000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
24033370000
|
heap
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
128B6000
|
trusted library allocation
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
1BB47000
|
heap
|
page read and write
|
||
7FFAAC563000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD2000
|
trusted library allocation
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
7FFAAC554000
|
trusted library allocation
|
page read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
1BFD0000
|
heap
|
page read and write
|
||
7FFAACD92000
|
trusted library allocation
|
page read and write
|
||
1BE7D000
|
stack
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
1B232000
|
unkown
|
page readonly
|
||
1283D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB5B000
|
trusted library allocation
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
34A8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD9D000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page execute and read and write
|
||
1C450000
|
heap
|
page read and write
|
||
136CB000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
2A78000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
38A5000
|
trusted library allocation
|
page read and write
|
||
28B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
2549000
|
heap
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
EDA000
|
stack
|
page read and write
|
||
3483000
|
trusted library allocation
|
page read and write
|
||
126E1000
|
trusted library allocation
|
page read and write
|
||
12CBA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
1B065000
|
heap
|
page read and write
|
||
139C5000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page read and write
|
||
371D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC454000
|
trusted library allocation
|
page read and write
|
||
2E75000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
1BECD000
|
stack
|
page read and write
|
||
7FFAACDBA000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
7FFAAC819000
|
trusted library allocation
|
page execute and read and write
|
||
6CDBCFF000
|
stack
|
page read and write
|
||
7FFAACAF5000
|
trusted library allocation
|
page read and write
|
||
7FFAACC65000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
240333C5000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page execute and read and write
|
||
D9E000
|
stack
|
page read and write
|
||
1CE7B000
|
stack
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC60C000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
7FFAACB46000
|
trusted library allocation
|
page read and write
|
||
7FFAAC615000
|
trusted library allocation
|
page read and write
|
||
1CA51000
|
heap
|
page read and write
|
||
127DE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
290C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page execute and read and write
|
||
12E34000
|
trusted library allocation
|
page read and write
|
||
1B783000
|
heap
|
page execute and read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC56D000
|
trusted library allocation
|
page execute and read and write
|
||
13505000
|
trusted library allocation
|
page read and write
|
||
3A2000
|
unkown
|
page readonly
|
||
7FFAACC96000
|
trusted library allocation
|
page read and write
|
||
1B659000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
7FFAAC57D000
|
trusted library allocation
|
page execute and read and write
|
||
354E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE1000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
2839000
|
trusted library allocation
|
page read and write
|
||
1BE3F000
|
stack
|
page read and write
|
||
25A9000
|
heap
|
page read and write
|
||
7FFAAC54C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page execute and read and write
|
||
2556000
|
trusted library allocation
|
page read and write
|
||
12D56000
|
trusted library allocation
|
page read and write
|
||
1C143B55000
|
heap
|
page read and write
|
||
1ABE6000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
12AD9000
|
trusted library allocation
|
page read and write
|
||
357D000
|
trusted library allocation
|
page read and write
|
||
7FFAACD1C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E6000
|
trusted library allocation
|
page read and write
|
||
1B32D000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
2A99000
|
trusted library allocation
|
page read and write
|
||
7FFAACB24000
|
trusted library allocation
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
1BD3F000
|
stack
|
page read and write
|
||
7FFAAC45B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB24000
|
trusted library allocation
|
page read and write
|
||
12CE4000
|
trusted library allocation
|
page read and write
|
||
1C980000
|
heap
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
1383F000
|
trusted library allocation
|
page read and write
|
||
13D33000
|
trusted library allocation
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC839000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACABF000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF6000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
12F3E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB85000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D4000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
trusted library allocation
|
page read and write
|
||
3CFB000
|
trusted library allocation
|
page read and write
|
||
13583000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E6000
|
trusted library allocation
|
page read and write
|
||
F99308C000
|
stack
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E7000
|
trusted library allocation
|
page read and write
|
||
3A36000
|
trusted library allocation
|
page read and write
|
||
1BBAB000
|
heap
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF3000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B7000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
1B58C000
|
heap
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
7FFAACB2E000
|
trusted library allocation
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
289C1AC0000
|
heap
|
page read and write
|
||
7FFAAC763000
|
trusted library allocation
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
1ACDB000
|
stack
|
page read and write
|
||
12A56000
|
trusted library allocation
|
page read and write
|
||
13C55000
|
trusted library allocation
|
page read and write
|
||
13545000
|
trusted library allocation
|
page read and write
|
||
2B97000
|
trusted library allocation
|
page read and write
|
||
7FFAAC743000
|
trusted library allocation
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
12CFC000
|
trusted library allocation
|
page read and write
|
||
EE8DCFF000
|
stack
|
page read and write
|
||
1BB10000
|
heap
|
page read and write
|
||
295B000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
7FFAACD44000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
1BCD8000
|
heap
|
page read and write
|
||
7FFAAC554000
|
trusted library allocation
|
page read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FFAAC7BB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB5F000
|
trusted library allocation
|
page read and write
|
||
1CA7F000
|
heap
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7EE000
|
trusted library allocation
|
page read and write
|
||
1C634000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FFAACE56000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BD000
|
trusted library allocation
|
page execute and read and write
|
||
7E0000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
231A5715000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4EC000
|
trusted library allocation
|
page execute and read and write
|
||
129F7000
|
trusted library allocation
|
page read and write
|
||
13887000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
369E000
|
trusted library allocation
|
page read and write
|
||
1B2B0000
|
unkown
|
page readonly
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
1C5F3000
|
heap
|
page read and write
|
||
7FFAAC548000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
52EC6DC000
|
stack
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC463000
|
trusted library allocation
|
page execute and read and write
|
||
37BF000
|
trusted library allocation
|
page read and write
|
||
3E2000
|
unkown
|
page readonly
|
||
1AF3A000
|
heap
|
page read and write
|
||
13855000
|
trusted library allocation
|
page read and write
|
||
12B1F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page execute and read and write
|
||
23911CB7000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FFAACB26000
|
trusted library allocation
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
7FFAACC55000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
7FFAAC44D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
7FFAACA47000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FF41D470000
|
trusted library allocation
|
page execute and read and write
|
||
132AF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC548000
|
trusted library allocation
|
page read and write
|
||
1C29D000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
137E3000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB5000
|
trusted library allocation
|
page read and write
|
||
1A7B57A0000
|
heap
|
page read and write
|
||
1303C000
|
trusted library allocation
|
page read and write
|
||
129DC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC743000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAACB0D000
|
trusted library allocation
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
1C0FE000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
7FFAACD13000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4B4000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
28A9000
|
trusted library allocation
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
7FFAAC559000
|
trusted library allocation
|
page read and write
|
||
2875000
|
trusted library allocation
|
page read and write
|
||
1A627FC8000
|
heap
|
page read and write
|
||
14A6000
|
heap
|
page read and write
|
||
1B187000
|
heap
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
7FFAACC93000
|
trusted library allocation
|
page read and write
|
||
13B35000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB3000
|
trusted library allocation
|
page read and write
|
||
B56000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
127F7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC552000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1B182000
|
heap
|
page read and write
|
||
231A5517000
|
heap
|
page read and write
|
||
2942000
|
unkown
|
page readonly
|
||
7FFAACAD2000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
1AE30000
|
trusted library allocation
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC789000
|
trusted library allocation
|
page read and write
|
||
12D24000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
7FFAACCDA000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
7FFAACCF3000
|
trusted library allocation
|
page read and write
|
||
3D5000
|
unkown
|
page readonly
|
||
25D00930000
|
heap
|
page read and write
|
||
12806000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B7000
|
trusted library allocation
|
page read and write
|
||
1C9E6000
|
heap
|
page read and write
|
||
52EC7DF000
|
stack
|
page read and write
|
||
12968000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
135AD000
|
trusted library allocation
|
page read and write
|
||
D86000
|
trusted library allocation
|
page read and write
|
||
276A000
|
trusted library allocation
|
page read and write
|
||
12B05000
|
trusted library allocation
|
page read and write
|
||
372E000
|
trusted library allocation
|
page read and write
|
||
7FFAACDBD000
|
trusted library allocation
|
page read and write
|
||
1366B000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
1B910000
|
heap
|
page execute and read and write
|
||
7FFAAC553000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3BD000
|
unkown
|
page readonly
|
||
9C0000
|
heap
|
page read and write
|
||
276E000
|
trusted library allocation
|
page read and write
|
||
3493000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F1000
|
trusted library allocation
|
page read and write
|
||
7FFAACC38000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
1A627FA0000
|
heap
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
1C2CE000
|
stack
|
page read and write
|
||
7FFAAC78F000
|
trusted library allocation
|
page read and write
|
||
1BA1D000
|
stack
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
1ABE0000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
356C000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC4000
|
trusted library allocation
|
page read and write
|
||
13A06000
|
trusted library allocation
|
page read and write
|
||
7FFAACA41000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
1AF2D065000
|
heap
|
page read and write
|
||
13864000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7FFAACD1F000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page execute and read and write
|
||
8B6000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
1284C000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5D000
|
trusted library allocation
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
7FFAAC794000
|
trusted library allocation
|
page read and write
|
||
7FFAACC81000
|
trusted library allocation
|
page read and write
|
||
7FFAACABE000
|
trusted library allocation
|
page read and write
|
||
1334D000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
3882000
|
trusted library allocation
|
page read and write
|
||
7FFAACD96000
|
trusted library allocation
|
page read and write
|
||
289C1AB0000
|
heap
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
2F37000
|
trusted library allocation
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
7FFAAC78D000
|
trusted library allocation
|
page read and write
|
||
7FFAACC69000
|
trusted library allocation
|
page read and write
|
||
7FFAACD7E000
|
trusted library allocation
|
page read and write
|
||
1B7A5000
|
heap
|
page read and write
|
||
13057000
|
trusted library allocation
|
page read and write
|
||
1C030000
|
heap
|
page read and write
|
||
7FFAAC767000
|
trusted library allocation
|
page read and write
|
||
7FFAACC59000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
1347E000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
EE8D9BC000
|
stack
|
page read and write
|
||
38F6000
|
trusted library allocation
|
page read and write
|
||
7FFAACADF000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page execute and read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FFAACB72000
|
trusted library allocation
|
page read and write
|
||
7FF408210000
|
trusted library allocation
|
page execute and read and write
|
||
13EAC000
|
trusted library allocation
|
page read and write
|
||
1BBBA000
|
heap
|
page read and write
|
||
7FFAACB44000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A3000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
12861000
|
trusted library allocation
|
page read and write
|
||
7FFAACB4D000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
36A3000
|
trusted library allocation
|
page read and write
|
||
129B8000
|
trusted library allocation
|
page read and write
|
||
3495000
|
trusted library allocation
|
page read and write
|
||
7FFAAC542000
|
trusted library allocation
|
page read and write
|
||
1C3CE000
|
stack
|
page read and write
|
||
1B5DD000
|
heap
|
page read and write
|
||
139D8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7BF000
|
trusted library allocation
|
page read and write
|
||
12D16000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
134E0000
|
trusted library allocation
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
13829000
|
trusted library allocation
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
2A7C000
|
trusted library allocation
|
page read and write
|
||
23A9CC90000
|
heap
|
page read and write
|
||
EED478F000
|
stack
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
130AD000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE26000
|
trusted library allocation
|
page read and write
|
||
7FFAACACE000
|
trusted library allocation
|
page read and write
|
||
1B170000
|
heap
|
page read and write
|
||
12F7F000
|
trusted library allocation
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
7FFAACB96000
|
trusted library allocation
|
page read and write
|
||
13D18000
|
trusted library allocation
|
page read and write
|
||
7FFAAC576000
|
trusted library allocation
|
page execute and read and write
|
||
33D3000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
2969000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page execute and read and write
|
||
1B92F000
|
stack
|
page read and write
|
||
7FFAACB7A000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE4000
|
trusted library allocation
|
page read and write
|
||
7FFAACCFB000
|
trusted library allocation
|
page read and write
|
||
23D5D8D0000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page execute and read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page execute and read and write
|
||
1C7E0000
|
heap
|
page read and write
|
||
7FFAAC65F000
|
trusted library allocation
|
page execute and read and write
|
||
2523000
|
heap
|
page execute and read and write
|
||
3825000
|
trusted library allocation
|
page read and write
|
||
12A2E000
|
trusted library allocation
|
page read and write
|
||
3A57000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
3573000
|
trusted library allocation
|
page read and write
|
||
7FFAAC80E000
|
trusted library allocation
|
page read and write
|
||
54FF3FB000
|
stack
|
page read and write
|
||
1C5E0000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5AC000
|
trusted library allocation
|
page execute and read and write
|
||
1C440000
|
heap
|
page read and write
|
||
7FFAAC6E6000
|
trusted library allocation
|
page read and write
|
||
128B2000
|
trusted library allocation
|
page read and write
|
||
13C5F000
|
trusted library allocation
|
page read and write
|
||
1A990000
|
trusted library allocation
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
13436000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
3266000
|
trusted library allocation
|
page read and write
|
||
F50000
|
unkown
|
page readonly
|
||
1A7B5536000
|
heap
|
page read and write
|
||
1C7EE000
|
stack
|
page read and write
|
||
7FFAACB52000
|
trusted library allocation
|
page read and write
|
||
1448000
|
heap
|
page read and write
|
||
7FFAAC6BA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7A4000
|
trusted library allocation
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC764000
|
trusted library allocation
|
page read and write
|
||
7FFAACD7A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC636000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC606000
|
trusted library allocation
|
page read and write
|
||
13448000
|
trusted library allocation
|
page read and write
|
||
BAC000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
127F4000
|
trusted library allocation
|
page read and write
|
||
12AEF000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA6000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
7FFAACC93000
|
trusted library allocation
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
7FFAACAED000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
7FFAACD51000
|
trusted library allocation
|
page read and write
|
||
CAF34B000
|
stack
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
trusted library allocation
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
129F1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74B000
|
trusted library allocation
|
page read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
372A000
|
trusted library allocation
|
page read and write
|
||
7FFAACE36000
|
trusted library allocation
|
page read and write
|
||
7FFAACD92000
|
trusted library allocation
|
page read and write
|
||
7FFAACC58000
|
trusted library allocation
|
page read and write
|
||
1378B000
|
trusted library allocation
|
page read and write
|
||
7FFAACB78000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
7FFAACC23000
|
trusted library allocation
|
page read and write
|
||
7FFAAC434000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page read and write
|
||
7FFAACAFF000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB9000
|
trusted library allocation
|
page read and write
|
||
129E2000
|
trusted library allocation
|
page read and write
|
||
7FFB1E0E1000
|
unkown
|
page execute read
|
||
7FFAACABF000
|
trusted library allocation
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
3022000
|
trusted library allocation
|
page read and write
|
||
3333000
|
trusted library allocation
|
page read and write
|
||
7FFAACD51000
|
trusted library allocation
|
page read and write
|
||
135E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
7FFB226C0000
|
unkown
|
page readonly
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
826000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
23D5D96A000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
E6B229C000
|
stack
|
page read and write
|
||
13291000
|
trusted library allocation
|
page read and write
|
||
7FFAAC754000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB25000
|
trusted library allocation
|
page read and write
|
||
1B614000
|
heap
|
page read and write
|
||
7FFAACB47000
|
trusted library allocation
|
page read and write
|
||
13542000
|
trusted library allocation
|
page read and write
|
||
1B264000
|
unkown
|
page readonly
|
||
1385A000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
12FB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page execute and read and write
|
||
25D0000
|
heap
|
page execute and read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
7FFAAC65A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
1B7D0000
|
heap
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
13038000
|
trusted library allocation
|
page read and write
|
||
105A000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
113A000
|
stack
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC56B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C8DB000
|
stack
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
1CEDD000
|
stack
|
page read and write
|
||
2EF3000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
7FFAACD13000
|
trusted library allocation
|
page read and write
|
||
26E9000
|
trusted library allocation
|
page read and write
|
||
23D5D8A0000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
1B36D000
|
stack
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D8000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7FFAACAD5000
|
trusted library allocation
|
page read and write
|
||
6CDBD7F000
|
stack
|
page read and write
|
||
13756000
|
trusted library allocation
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5B5000
|
trusted library allocation
|
page execute and read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
7FFAACBB6000
|
trusted library allocation
|
page read and write
|
||
1BCE8000
|
heap
|
page read and write
|
||
7FFAAC6A5000
|
trusted library allocation
|
page execute and read and write
|
||
1C0C3000
|
heap
|
page read and write
|
||
7FFAAC695000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB5D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
7FFAACD35000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
1AF2CDF7000
|
heap
|
page read and write
|
||
7FFAACC48000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5FC000
|
trusted library allocation
|
page execute and read and write
|
||
1372C000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
1AF7F000
|
heap
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
7FFAACB49000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
25D00637000
|
heap
|
page read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
1B1FE000
|
heap
|
page read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
1C999000
|
heap
|
page read and write
|
||
12A02000
|
trusted library allocation
|
page read and write
|
||
7FFAAC49D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB6E000
|
trusted library allocation
|
page read and write
|
||
29B3000
|
trusted library allocation
|
page read and write
|
||
1B0A3000
|
heap
|
page read and write
|
||
1CA47000
|
heap
|
page read and write
|
||
7FFAACA77000
|
trusted library allocation
|
page read and write
|
||
1BCDA000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
2CB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACB37000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
1BC73000
|
heap
|
page execute and read and write
|
||
7FFAACB96000
|
trusted library allocation
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
2D25E1EA000
|
heap
|
page read and write
|
||
34C1000
|
trusted library allocation
|
page read and write
|
||
1B130000
|
heap
|
page read and write
|
||
1B3FE000
|
stack
|
page read and write
|
||
2CD5000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
2D25E3D0000
|
heap
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
128F6000
|
trusted library allocation
|
page read and write
|
||
1C1437EA000
|
heap
|
page read and write
|
||
133CC000
|
trusted library allocation
|
page read and write
|
||
3878000
|
trusted library allocation
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
137FA000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FFAAC666000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
1C9C0000
|
heap
|
page read and write
|
||
27C9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD7000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page execute and read and write
|
||
1B1B3000
|
heap
|
page execute and read and write
|
||
7FFB226E0000
|
unkown
|
page read and write
|
||
2949000
|
trusted library allocation
|
page read and write
|
||
1C1FE000
|
stack
|
page read and write
|
||
4892D7F000
|
stack
|
page read and write
|
||
2739000
|
trusted library allocation
|
page read and write
|
||
1BB44000
|
heap
|
page read and write
|
||
13BEC000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
DCD288C000
|
stack
|
page read and write
|
||
8CA847C000
|
stack
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
2E55000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
36D8000
|
trusted library allocation
|
page read and write
|
||
13BBB000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3B9000
|
unkown
|
page readonly
|
||
EE8DC7F000
|
stack
|
page read and write
|
||
27AE000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
1436000
|
trusted library allocation
|
page read and write
|
||
1CBDE000
|
stack
|
page read and write
|
||
1B310000
|
heap
|
page execute and read and write
|
||
7FFAAC6CF000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
54FF6FE000
|
stack
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
12CBB000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD9A000
|
trusted library allocation
|
page read and write
|
||
1B351000
|
heap
|
page read and write
|
||
12E55000
|
trusted library allocation
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
2903000
|
trusted library allocation
|
page read and write
|
||
27F3000
|
trusted library allocation
|
page read and write
|
||
358E000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
134B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FFAACE46000
|
trusted library allocation
|
page read and write
|
||
129CD000
|
trusted library allocation
|
page read and write
|
||
7FFAACA11000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
12BBA000
|
trusted library allocation
|
page read and write
|
||
2758000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
164F04B7000
|
heap
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
176D000
|
heap
|
page read and write
|
||
7FFAACBB9000
|
trusted library allocation
|
page read and write
|
||
1316000
|
trusted library allocation
|
page read and write
|
||
13474000
|
trusted library allocation
|
page read and write
|
||
12F65000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
1B2A2000
|
unkown
|
page readonly
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
132D1000
|
trusted library allocation
|
page read and write
|
||
7FFAACABF000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
1A627E90000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC779000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A9000
|
trusted library allocation
|
page read and write
|
||
1C672000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FFAACBBB000
|
trusted library allocation
|
page read and write
|
||
13C9C000
|
trusted library allocation
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
1D2BC000
|
stack
|
page read and write
|
||
135A4000
|
trusted library allocation
|
page read and write
|
||
12F3B000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACB7F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F3000
|
trusted library allocation
|
page read and write
|
||
1BBFE000
|
heap
|
page read and write
|
||
1323F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC723000
|
trusted library allocation
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD94000
|
trusted library allocation
|
page read and write
|
||
23911C00000
|
heap
|
page read and write
|
||
2800000
|
heap
|
page execute and read and write
|
||
7FFAAC7E7000
|
trusted library allocation
|
page read and write
|
||
54FF67E000
|
stack
|
page read and write
|
||
1C9EE000
|
stack
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
1B2C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page execute and read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
12DCA000
|
trusted library allocation
|
page read and write
|
||
7FFAACCAF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC725000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7AF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC743000
|
trusted library allocation
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
32CF000
|
stack
|
page read and write
|
||
12A82000
|
trusted library allocation
|
page read and write
|
||
1B3F0000
|
heap
|
page read and write
|
||
1A890000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAACD39000
|
trusted library allocation
|
page read and write
|
||
12C9D000
|
trusted library allocation
|
page read and write
|
||
13486000
|
trusted library allocation
|
page read and write
|
||
1B611000
|
heap
|
page read and write
|
||
1CA28000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
1340C000
|
trusted library allocation
|
page read and write
|
||
147B000
|
heap
|
page read and write
|
||
1B83E000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
7FFAAC733000
|
trusted library allocation
|
page read and write
|
||
12D2C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF3000
|
trusted library allocation
|
page read and write
|
||
277F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC789000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC794000
|
trusted library allocation
|
page read and write
|
||
7FFAACB93000
|
trusted library allocation
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFB1E102000
|
unkown
|
page readonly
|
||
7FFAAC543000
|
trusted library allocation
|
page read and write
|
||
1C143B50000
|
heap
|
page read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
7FFAAC478000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC433000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
heap
|
page read and write
|
||
1C98C000
|
stack
|
page read and write
|
||
13558000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1336E000
|
trusted library allocation
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
12D41000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48D000
|
trusted library allocation
|
page execute and read and write
|
||
AB6000
|
heap
|
page read and write
|
||
7FFAACAA7000
|
trusted library allocation
|
page read and write
|
||
289C1ED0000
|
heap
|
page read and write
|
||
32F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
7FFAAC71B000
|
trusted library allocation
|
page read and write
|
||
289C1B70000
|
heap
|
page read and write
|
||
23A9CAA0000
|
heap
|
page read and write
|
||
7FFAACC49000
|
trusted library allocation
|
page read and write
|
||
1352C000
|
trusted library allocation
|
page read and write
|
||
7FFAACB26000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
373F000
|
trusted library allocation
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
1B063000
|
heap
|
page execute and read and write
|
||
7FFAAC473000
|
trusted library allocation
|
page read and write
|
||
7FFAAC52D000
|
trusted library allocation
|
page execute and read and write
|
||
1B0CE000
|
heap
|
page read and write
|
||
12981000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
26EF000
|
trusted library allocation
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
7FFAACC55000
|
trusted library allocation
|
page read and write
|
||
7FFAACAA0000
|
trusted library allocation
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
25D00800000
|
heap
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55B000
|
trusted library allocation
|
page execute and read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
282C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC702000
|
trusted library allocation
|
page read and write
|
||
1BC50000
|
heap
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
13716000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
13D8C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC708000
|
trusted library allocation
|
page read and write
|
||
1356E000
|
trusted library allocation
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
1356000
|
heap
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
135BE000
|
trusted library allocation
|
page read and write
|
||
7FFAACA70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC543000
|
trusted library allocation
|
page execute and read and write
|
||
128CC000
|
trusted library allocation
|
page read and write
|
||
1B7FF000
|
stack
|
page read and write
|
||
1AFF0000
|
heap
|
page execute and read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
1C066000
|
heap
|
page read and write
|
||
2922000
|
unkown
|
page readonly
|
||
7FFAAC743000
|
trusted library allocation
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
7FFAAC808000
|
trusted library allocation
|
page execute and read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
1B2B2000
|
unkown
|
page readonly
|
||
23A9CBA6000
|
heap
|
page read and write
|
||
26C8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7EB000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
13CF0000
|
trusted library allocation
|
page read and write
|
||
1B173000
|
heap
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
129BA000
|
trusted library allocation
|
page read and write
|
||
1CAED000
|
stack
|
page read and write
|
||
2D25E3F0000
|
heap
|
page read and write
|
||
1A7B5526000
|
heap
|
page read and write
|
||
7FFAAC484000
|
trusted library allocation
|
page read and write
|
||
7FF497990000
|
trusted library allocation
|
page execute and read and write
|
||
12F9A000
|
trusted library allocation
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page execute and read and write
|
||
DE5000
|
heap
|
page read and write
|
||
7FFAACAD9000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
1B272000
|
unkown
|
page readonly
|
||
7FFAACAEF000
|
trusted library allocation
|
page read and write
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
13513000
|
trusted library allocation
|
page read and write
|
||
7FFAACD76000
|
trusted library allocation
|
page read and write
|
||
371A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD7E000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
1769000
|
heap
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
1B7A1000
|
heap
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6EA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
1A9D5000
|
heap
|
page read and write
|
||
3C10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
7FFAAC490000
|
trusted library allocation
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
7FFAAC7A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC534000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
7FFAACACF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCF4000
|
trusted library allocation
|
page read and write
|
||
1BCDD000
|
heap
|
page read and write
|
||
1BF89000
|
heap
|
page read and write
|
||
7FFAAC534000
|
trusted library allocation
|
page read and write
|
||
1B1C0000
|
heap
|
page read and write
|
||
1C9A0000
|
heap
|
page read and write
|
||
CAF3CE000
|
stack
|
page read and write
|
||
7FFAACD44000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page execute and read and write
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
7FFAAC713000
|
trusted library allocation
|
page read and write
|
||
DCD290F000
|
stack
|
page read and write
|
||
7FFAACB47000
|
trusted library allocation
|
page read and write
|
||
136D1000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
1CDDD000
|
stack
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
136B8000
|
trusted library allocation
|
page read and write
|
||
1525000
|
heap
|
page read and write
|
||
F10000
|
unkown
|
page readonly
|
||
24033170000
|
heap
|
page read and write
|
||
4892CFF000
|
stack
|
page read and write
|
||
294E000
|
trusted library allocation
|
page read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
7FFAAC553000
|
trusted library allocation
|
page read and write
|
||
7FFAAC807000
|
trusted library allocation
|
page read and write
|
||
1BCC0000
|
heap
|
page execute and read and write
|
||
130AC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FE000
|
trusted library allocation
|
page read and write
|
||
1BE9B000
|
heap
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
23D5D8B0000
|
heap
|
page read and write
|
||
7FFAAC532000
|
trusted library allocation
|
page read and write
|
||
2D25E505000
|
heap
|
page read and write
|
||
7FFAACDAD000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
stack
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC464000
|
trusted library allocation
|
page read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1C690000
|
heap
|
page read and write
|
||
986000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA3000
|
trusted library allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
7FFAACD3F000
|
trusted library allocation
|
page read and write
|
||
12E01000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page execute and read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
1BBA0000
|
heap
|
page read and write
|
||
7FFAACBD5000
|
trusted library allocation
|
page read and write
|
||
292B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B2000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
289C1B79000
|
heap
|
page read and write
|
||
36FC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
heap
|
page read and write
|
||
2FB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACC75000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E6000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
272F000
|
trusted library allocation
|
page read and write
|
||
1D17B000
|
stack
|
page read and write
|
||
231A5510000
|
heap
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page execute and read and write
|
||
12D1D000
|
trusted library allocation
|
page read and write
|
||
7FFAACCBF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72A000
|
trusted library allocation
|
page read and write
|
||
1BB33000
|
heap
|
page read and write
|
||
7FFAAC553000
|
trusted library allocation
|
page execute and read and write
|
||
12F0F000
|
trusted library allocation
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACACF000
|
trusted library allocation
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
7FFAACC75000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
135D7000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
12E2A000
|
trusted library allocation
|
page read and write
|
||
1C700000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
12917000
|
trusted library allocation
|
page read and write
|
||
1C3A0000
|
heap
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1B2BE000
|
unkown
|
page readonly
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
heap
|
page execute and read and write
|
||
13446000
|
trusted library allocation
|
page read and write
|
||
7FFAACCDA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
12A6C000
|
trusted library allocation
|
page read and write
|
||
7FFAACB76000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
7FFAACD37000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page execute and read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC539000
|
trusted library allocation
|
page read and write
|
||
1ABDA000
|
stack
|
page read and write
|
||
1313D000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
1B230000
|
unkown
|
page readonly
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
7FFAACB7A000
|
trusted library allocation
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
1D1B0000
|
heap
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC564000
|
trusted library allocation
|
page read and write
|
||
EED468B000
|
stack
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
23911BC0000
|
heap
|
page read and write
|
||
7FFAACCBF000
|
trusted library allocation
|
page read and write
|
||
7FFAACC55000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
7FFAACB98000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page execute and read and write
|
||
1BF63000
|
heap
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC81000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
1BD21000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page execute and read and write
|
||
C4E000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page execute and read and write
|
||
7FFAACB98000
|
trusted library allocation
|
page read and write
|
||
127FE000
|
trusted library allocation
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
12846000
|
trusted library allocation
|
page read and write
|
||
271B000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
1B2E3000
|
heap
|
page execute and read and write
|
||
EED470E000
|
stack
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
1CCD0000
|
heap
|
page read and write
|
||
1B21D000
|
stack
|
page read and write
|
||
36E5000
|
trusted library allocation
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
F42000
|
unkown
|
page readonly
|
||
2991000
|
trusted library allocation
|
page read and write
|
||
1AF22000
|
heap
|
page read and write
|
||
130E2000
|
trusted library allocation
|
page read and write
|
||
13C3F000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
1028000
|
heap
|
page read and write
|
||
7FFAACE36000
|
trusted library allocation
|
page read and write
|
||
26FA000
|
trusted library allocation
|
page read and write
|
||
1C69B000
|
heap
|
page read and write
|
||
1AC6B000
|
stack
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1B660000
|
unkown
|
page readonly
|
||
34E8000
|
trusted library allocation
|
page read and write
|
||
2FBC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9EE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC694000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD88000
|
trusted library allocation
|
page read and write
|
||
7FFAAC556000
|
trusted library allocation
|
page read and write
|
||
231A54F0000
|
heap
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
28F2000
|
trusted library allocation
|
page read and write
|
||
1BBF0000
|
heap
|
page read and write
|
||
7FFAACC8B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48C000
|
trusted library allocation
|
page execute and read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
299C000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
2943000
|
trusted library allocation
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
BBF26FF000
|
stack
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
1298C000
|
trusted library allocation
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
164F0410000
|
heap
|
page read and write
|
||
7FFAAC892000
|
trusted library allocation
|
page read and write
|
||
1CF9D000
|
stack
|
page read and write
|
||
1BBB0000
|
heap
|
page read and write
|
||
1B51D000
|
stack
|
page read and write
|
||
7FFAAC7A9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1386B000
|
trusted library allocation
|
page read and write
|
||
1299A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E8000
|
trusted library allocation
|
page read and write
|
||
28F9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
7FFAACB48000
|
trusted library allocation
|
page read and write
|
||
1CF7D000
|
stack
|
page read and write
|
||
7FFB1E0E0000
|
unkown
|
page readonly
|
||
118A000
|
stack
|
page read and write
|
||
1B3BD000
|
stack
|
page read and write
|
||
1BCF0000
|
heap
|
page read and write
|
||
34A7000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC79000
|
trusted library allocation
|
page read and write
|
||
7FFAAC60C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
13E13000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC45000
|
trusted library allocation
|
page read and write
|
||
12A58000
|
trusted library allocation
|
page read and write
|
||
1C09E000
|
stack
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
1B2F0000
|
heap
|
page read and write
|
||
1C80B000
|
stack
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
7FFAACD35000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
52EC75F000
|
stack
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DB000
|
trusted library allocation
|
page read and write
|
||
231A56E0000
|
heap
|
page read and write
|
||
7FFAACB9B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
1C143730000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
131B8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5D000
|
trusted library allocation
|
page read and write
|
||
1B78A000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
12FA7000
|
trusted library allocation
|
page read and write
|
||
7FFB1E100000
|
unkown
|
page read and write
|
||
1C143760000
|
heap
|
page read and write
|
||
1308F000
|
trusted library allocation
|
page read and write
|
||
3A42000
|
trusted library allocation
|
page read and write
|
||
1B21D000
|
heap
|
page read and write
|
||
1BBE0000
|
heap
|
page read and write
|
||
129D3000
|
trusted library allocation
|
page read and write
|
||
1C55E000
|
stack
|
page read and write
|
||
7FFAAC543000
|
trusted library allocation
|
page read and write
|
||
1C41D000
|
stack
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
7FFAACB57000
|
trusted library allocation
|
page read and write
|
||
1CE9D000
|
stack
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
2AA9000
|
trusted library allocation
|
page read and write
|
||
13244000
|
trusted library allocation
|
page read and write
|
||
7FFAAC71E000
|
trusted library allocation
|
page read and write
|
||
1BB89000
|
heap
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
7FFAACB5F000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
13D5B000
|
trusted library allocation
|
page read and write
|
||
7FFAACCFC000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page execute and read and write
|
||
3252000
|
trusted library allocation
|
page read and write
|
||
2520000
|
heap
|
page execute and read and write
|
||
1D2DB000
|
stack
|
page read and write
|
||
1BF0E000
|
stack
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
7FFAACB4E000
|
trusted library allocation
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9A000
|
trusted library allocation
|
page read and write
|
||
7FFAACD7B000
|
trusted library allocation
|
page read and write
|
||
390E000
|
trusted library allocation
|
page read and write
|
||
12B8F000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
13136000
|
trusted library allocation
|
page read and write
|
||
7FFAACE21000
|
trusted library allocation
|
page read and write
|
||
7FFAAC789000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E6000
|
trusted library allocation
|
page read and write
|
||
134FA000
|
trusted library allocation
|
page read and write
|
||
12978000
|
trusted library allocation
|
page read and write
|
||
7FFAACD1B000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
7FFAACB2C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
1349B000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
12906000
|
trusted library allocation
|
page read and write
|
||
7FFAAC65F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
12944000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
29BE000
|
trusted library allocation
|
page read and write
|
||
1B320000
|
heap
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
1B270000
|
unkown
|
page readonly
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC713000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
164F06B0000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page execute and read and write
|
||
13010000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
164F06B5000
|
heap
|
page read and write
|
||
7FFAAC5E5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
12A6D000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
130D5000
|
trusted library allocation
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
7FFAAC723000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9FF000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
1B81B000
|
stack
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC723000
|
trusted library allocation
|
page read and write
|
||
1279C000
|
trusted library allocation
|
page read and write
|
||
12F2D000
|
trusted library allocation
|
page read and write
|
||
1B5ED000
|
stack
|
page read and write
|
||
1B85A000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1ADEB000
|
stack
|
page read and write
|
||
7FFAACC53000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
3308000
|
trusted library allocation
|
page read and write
|
||
12B8B000
|
trusted library allocation
|
page read and write
|
||
3E6000
|
unkown
|
page readonly
|
||
7FFAACCDF000
|
trusted library allocation
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
28D8000
|
trusted library allocation
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1BE34000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
3400000
|
heap
|
page execute and read and write
|
||
3623000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1A6280C0000
|
heap
|
page read and write
|
||
7FFAAC874000
|
trusted library allocation
|
page read and write
|
||
7FFAACB5D000
|
trusted library allocation
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
1A7B5519000
|
heap
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
1BB7F000
|
heap
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page execute and read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
heap
|
page execute and read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
2A9C000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
heap
|
page read and write
|
||
103C000
|
heap
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE56000
|
trusted library allocation
|
page read and write
|
||
7FFAACD5B000
|
trusted library allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
1353000
|
heap
|
page read and write
|
||
7FFAACB05000
|
trusted library allocation
|
page read and write
|
||
7FFAAC792000
|
trusted library allocation
|
page read and write
|
||
7FFAACC83000
|
trusted library allocation
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
BBF239C000
|
stack
|
page read and write
|
||
13E69000
|
trusted library allocation
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
7FFAAC774000
|
trusted library allocation
|
page read and write
|
||
DCD298F000
|
stack
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
32AA000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
7FFAACD7A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC55D000
|
trusted library allocation
|
page execute and read and write
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
1C39E000
|
stack
|
page read and write
|
||
24033350000
|
heap
|
page read and write
|
||
1360C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
25D0063A000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE36000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
297E000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC539000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1805000
|
heap
|
page read and write
|
||
7FFAAC686000
|
trusted library allocation
|
page execute and read and write
|
||
291E000
|
stack
|
page read and write
|
||
7FFAAC4A3000
|
trusted library allocation
|
page read and write
|
||
135D4000
|
trusted library allocation
|
page read and write
|
||
1BCC3000
|
heap
|
page execute and read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
23D5D960000
|
heap
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
1BC78000
|
heap
|
page read and write
|
||
7FFAAC799000
|
trusted library allocation
|
page read and write
|
||
7FFAACA70000
|
trusted library allocation
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2D6C000
|
trusted library allocation
|
page read and write
|
||
7FFAACB93000
|
trusted library allocation
|
page read and write
|
||
1B209000
|
heap
|
page read and write
|
||
1A7B5430000
|
heap
|
page read and write
|
||
7FFAACAEF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC884000
|
trusted library allocation
|
page read and write
|
||
6DB000
|
stack
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page execute and read and write
|
||
132F7000
|
trusted library allocation
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page execute and read and write
|
||
12FEF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page read and write
|
||
7FFAAC543000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
1B787000
|
heap
|
page read and write
|
||
7FFAAC685000
|
trusted library allocation
|
page execute and read and write
|
||
23A9CB90000
|
heap
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC71A000
|
trusted library allocation
|
page read and write
|
||
1B913000
|
heap
|
page execute and read and write
|
||
1BE27000
|
heap
|
page read and write
|
||
7FFAACD9A000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB96000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB6000
|
trusted library allocation
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBA8000
|
trusted library allocation
|
page read and write
|
||
23A9CCB0000
|
heap
|
page read and write
|
||
1BCA0000
|
heap
|
page read and write
|
||
7FFAAC523000
|
trusted library allocation
|
page execute and read and write
|
||
1368F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
1BF3E000
|
stack
|
page read and write
|
||
2938000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
25D00935000
|
heap
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
7FFAACAA0000
|
trusted library allocation
|
page read and write
|
||
1B5C2000
|
heap
|
page read and write
|
||
7FFAACC68000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAACB86000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page execute and read and write
|
||
1CBDD000
|
stack
|
page read and write
|
||
7FFAACE41000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
1B060000
|
heap
|
page execute and read and write
|
||
3220000
|
heap
|
page read and write
|
||
1C5AE000
|
stack
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
7FFAAC7DE000
|
trusted library allocation
|
page read and write
|
||
12B1B000
|
trusted library allocation
|
page read and write
|
||
BBF267F000
|
stack
|
page read and write
|
||
3809000
|
trusted library allocation
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
1CCDE000
|
stack
|
page read and write
|
||
1292B000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7DE000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC819000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC616000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
2659000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
7FFAAC78D000
|
trusted library allocation
|
page read and write
|
||
1CADE000
|
stack
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
1325C000
|
trusted library allocation
|
page read and write
|
||
31F5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC686000
|
trusted library allocation
|
page execute and read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
1CA3A000
|
heap
|
page read and write
|
||
1376B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7AD000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
1399A000
|
trusted library allocation
|
page read and write
|
||
128DA000
|
trusted library allocation
|
page read and write
|
||
2899000
|
trusted library allocation
|
page read and write
|
||
28C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
unkown
|
page readonly
|
||
1AAD9000
|
heap
|
page read and write
|
||
7FFAAC7AD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC894000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
289C1B98000
|
heap
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACADF000
|
trusted library allocation
|
page read and write
|
||
132BC000
|
trusted library allocation
|
page read and write
|
||
1C4DE000
|
stack
|
page read and write
|
||
7FFAAC56D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD72000
|
trusted library allocation
|
page read and write
|
||
7FFAAC774000
|
trusted library allocation
|
page read and write
|
||
7FFAACC68000
|
trusted library allocation
|
page read and write
|
||
24033257000
|
heap
|
page read and write
|
||
7FFAAC685000
|
trusted library allocation
|
page execute and read and write
|
||
17F5000
|
heap
|
page read and write
|
||
12A1B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAAC896000
|
trusted library allocation
|
page read and write
|
||
35F8000
|
trusted library allocation
|
page read and write
|
||
13667000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC74A000
|
trusted library allocation
|
page read and write
|
||
2D25E500000
|
heap
|
page read and write
|
||
12DE7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B9000
|
trusted library allocation
|
page read and write
|
||
127C4000
|
trusted library allocation
|
page read and write
|
||
4892C7C000
|
stack
|
page read and write
|
||
1A627F70000
|
heap
|
page read and write
|
||
13444000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB7D000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
12F4C000
|
trusted library allocation
|
page read and write
|
||
1315C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A6000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
1B580000
|
heap
|
page read and write
|
||
7FFAAC548000
|
trusted library allocation
|
page read and write
|
||
12CB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
2BCA000
|
trusted library allocation
|
page read and write
|
||
2AB8000
|
trusted library allocation
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
1B57E000
|
stack
|
page read and write
|
||
13700000
|
trusted library allocation
|
page read and write
|
||
7FFAACCFC000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
7FFAAC58C000
|
trusted library allocation
|
page execute and read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
136EA000
|
trusted library allocation
|
page read and write
|
||
7FFAACB67000
|
trusted library allocation
|
page read and write
|
||
1BC70000
|
heap
|
page execute and read and write
|
||
23A9CB99000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
E6B231F000
|
stack
|
page read and write
|
||
2988000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
1BC62000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
There are 2558 hidden memdumps, click here to show them.