IOC Report
SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Bound.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_bz2.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_ctypes.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_elementtree.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_hashlib.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_lzma.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_socket.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\_ssl.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\cv2.pyd
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\opencv_videoio_ffmpeg480.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\libcrypto-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\libopenblas.VTYUM5MXKVFE4PZZER3L7PNO6YB4XFF3.gfortran-win32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\libssl-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\netifaces.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\core\_multiarray_tests.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\core\_multiarray_umath.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\fft\_pocketfft_internal.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\linalg\_umath_linalg.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\linalg\lapack_lite.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_bounded_integers.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_common.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_generator.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_mt19937.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_pcg64.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_philox.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_sfc64.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\bit_generator.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\mtrand.cp37-win32.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\psutil\_psutil_windows.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\pyexpat.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\python3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\python37.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\select.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI55002\unicodedata.pyd
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MicrosoftEdgeUpd_46411cde5bccedeb4fba6ef26d99ed487c0dcb3_bdcfae04_e4e00a9a-5fac-44a1-a6fa-0470c51d884c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1FE.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Oct 30 11:25:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF441.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF471.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Bound.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\VCRUNTIME140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-console-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-datetime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-debug-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-errorhandling-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l2-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-handle-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-interlocked-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-libraryloader-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-localization-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-memory-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-namedpipe-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processenvironment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processthreads-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processthreads-l1-1-1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-profile-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-synch-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-synch-l1-2-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-sysinfo-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-timezone-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-util-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-conio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-convert-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-environment-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-filesystem-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-heap-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-locale-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-math-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-process-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-runtime-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-string-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-time-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-utility-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\config-3.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\config.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\data\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\gapi\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\load_config_py3.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\mat_wrapper\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\misc\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\misc\version.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\typing\__init__.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\utils\__init__.py
Python script, ASCII text executable, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\version.py
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI55002\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25mco3kt.xbd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b555o43w.a23.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cgdjwypv.0pt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d4051ixe.cyz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzl40m0q.i50.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_koxaxjrp.cfk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qh5wqzyl.exg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcrpqlw1.m00.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rohkf0xg.d5f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_td1bg2h4.t54.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_thfrhn2p.lkc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wrofhapz.yaf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\selfdelete.bat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8B5F.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 103 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft';Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Internet Explorer'"
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAA-BD9C-FC4F0859F018}" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAA-BD9C-FC4F0859F018}" /f
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /c schtasks /create /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAB-BD9C-FC4F0859F018}" /tr "\"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe\"" /sc onlogon /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAB-BD9C-FC4F0859F018}" /tr "\"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe\"" /sc onlogon /rl HIGHEST /f
malicious
C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe
"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe"
malicious
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
"C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
malicious
C:\ProgramData\Microsoft\Bound.exe
"C:\ProgramData\Microsoft\Bound.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall delete rule name=all dir=in program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe'"
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name=all dir=in "program=C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\selfdelete.bat""
malicious
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
"C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall delete rule name=all dir=out program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe'"
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name=all dir=out "program=C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall add rule name='Allow Internet Explorer Inbound' dir=in action=allow program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe' enable=yes profile=private,public"
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall add rule "name=Allow Internet Explorer Inbound" dir=in action=allow "program=C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe" enable=yes profile=private,public
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall add rule name='Allow Internet Explorer Outbound' dir=out action=allow program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe' enable=yes profile=private,public"
malicious
C:\Windows\System32\netsh.exe
"C:\Windows\system32\netsh.exe" advfirewall firewall add rule "name=Allow Internet Explorer Outbound" dir=out action=allow "program=C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe" enable=yes profile=private,public
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8B5F.tmp.bat""
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 2
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 280 -s 1376
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://onnx.ai/)
unknown
http://caffe.berkeleyvision.org/)
unknown
https://github.com/opencv/opencv/issues/23152.
unknown
https://www.learnopencv.com/convex-hull-using-opencv-in-python-and-c/nativeVectorWidthIntdecode(img
unknown
http://torch.ch/)
unknown
https://contoso.com/License
unknown
http://www.dai.ed.ac.uk/CVonline/LOCAL_COPIES/MANDUCHI1/Bilateral_Filtering.html
unknown
https://gist.github.com/imneme/540829265469e673d045
unknown
http://www.math.sfu.ca/~cbm/aands/page_69.htm
unknown
https://github.com/opencv/opencv/issues/6293
unknown
https://github.com/opencv/opencv/issues/16739
unknown
https://www.tensorflow.org/
unknown
https://static.aminer.org/pdf/PDF/000/317/196/spatio_temporal_wiener_filtering_of_image_sequences_us
unknown
https://github.com/openvinotoolkit/open_model_zoo/blob/master/models/public/yolo-v2-tiny-tf/yolo-v2-
unknown
http://www.pcg-random.org/posts/random-invertible-mapping-statistics.html
unknown
https://numpy.org/doc/stable/user/basics.subclassing.html
unknown
http://pracrand.sourceforge.net/RNG_engines.txt
unknown
https://github.com/torch/nn/blob/master/doc/module.md
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://pjreddie.com/darknet/)
unknown
http://torch.ch
unknown
https://www.tensorflow.org/lite
unknown
http://www.gdal.org/ogr_formats.html).
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising
unknown
https://www.tensorflow.org/)
unknown
http://python.org/dev/peps/pep-0263/
unknown
http://nuget.org/NuGet.exe
unknown
https://github.com/opencv/opencv/issues/16739cv::MatOp_AddEx::assign4g
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.math.sfu.ca/~cbm/aands/
unknown
https://github.com/opencv/opencv/issues/6293u-
unknown
http://ocsp.thawte.com0
unknown
https://contoso.com/Icon
unknown
http://upx.sf.net
unknown
http://www.pcg-random.org/posts/developing-a-seed_seq-alternative.html
unknown
https://arxiv.org/abs/1704.04503
unknown
http://campar.in.tum.de/Chair/HandEyeCalibration).
unknown
https://github.com/Pester/Pester
unknown
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising/
unknown
http://www.gdal.org/formats_list.html)
unknown
https://www.learnopencv.com/convex-hull-using-opencv-in-python-and-c/
unknown
http://www.gdal.org)
unknown
http://homepages.inf.ed.ac.uk/rbf/HIPR2/hough.htm
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://github.com/NVIDIA/caffe.
unknown
https://github.com/opencv/opencv/issues/5412.
unknown
https://onnx.ai/
unknown
https://software.intel.com/openvino-toolkit)
unknown
http://underdestruction.com/2004/02/25/stackblur-2004.
unknown
http://caffe.berkeleyvision.org
unknown
https://aka.ms/pscore68
unknown
http://crl.v
unknown
https://pjreddie.com/darknet/
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
nt89.kro.kr
unknown
nt89s.kro.kr
unknown

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
ProgramId
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
FileId
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
LowerCaseLongPath
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
LongPathHash
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Name
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
OriginalFileName
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Publisher
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Version
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
BinFileVersion
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
BinaryType
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
ProductName
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
ProductVersion
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
LinkDate
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
BinProductVersion
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
AppxPackageFullName
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
AppxPackageRelativeId
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Size
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Language
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23571C76000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5C83000
trusted library allocation
page read and write
FBB79FD000
stack
page read and write
29FBC69A000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9FFDE0000
heap
page read and write
29FBC690000
heap
page read and write
2BF34203000
heap
page read and write
29FBC690000
heap
page read and write
29FBC692000
heap
page read and write
20823CEE000
trusted library allocation
page read and write
212529B7000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
20821240000
heap
page read and write
4FB22FF000
unkown
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8EB9000
stack
page read and write
29FBC695000
heap
page read and write
29FBC695000
heap
page read and write
1C282026000
heap
page read and write
2BF3423A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1D7F4000
trusted library allocation
page read and write
2BF34234000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D9747D000
stack
page read and write
29FBC667000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
1FBD8DDE000
trusted library allocation
page read and write
1FBE8D81000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235721A4000
heap
page read and write
29FBC695000
heap
page read and write
212529C8000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27451560000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBF1142000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF33C8F000
heap
page read and write
29FBC694000
heap
page read and write
29FBC688000
heap
page read and write
2357214F000
heap
page read and write
2745159E000
heap
page read and write
7FFD9BDB0000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
29FBC900000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3210E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE266000
heap
page read and write
2357214C000
heap
page read and write
29FBC692000
heap
page read and write
2BF341EE000
heap
page read and write
29FBC7DF000
heap
page read and write
2746B878000
heap
page read and write
21252950000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC680000
heap
page read and write
7FFD9BD70000
trusted library allocation
page read and write
29FBC691000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
4FB1F2E000
stack
page read and write
FBB7EBF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20823B54000
trusted library allocation
page read and write
23571C73000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC680000
heap
page read and write
19EC632D000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2D96DEF000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
208243A7000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34161000
heap
page read and write
2746B790000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
863393E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA98EF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
2082407F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF32187000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E74B1000
trusted library allocation
page read and write
3D25A7E000
stack
page read and write
29FBC692000
heap
page read and write
1B9E59EC000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BC25000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
212529EE000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F571000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC694000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD6E69000
heap
page read and write
27453095000
heap
page read and write
29FBC69A000
heap
page read and write
1FBF1020000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1C2804D5000
heap
page read and write
1B9E5BD0000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
24ED3FE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA98EA000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
23570134000
heap
page read and write
7DF4739A0000
trusted library allocation
page execute and read and write
29FBC691000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
23572186000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5AC7000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
269AF700000
heap
page read and write
29FBC7DF000
heap
page read and write
2082406A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32117000
heap
page read and write
29FBC69A000
heap
page read and write
1FBD70B0000
heap
page read and write
1FBF0FF7000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3210B000
heap
page read and write
29FBC667000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32163000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
1FBD8870000
heap
page readonly
1FBD7090000
trusted library allocation
page read and write
20823329000
trusted library allocation
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
69C87EF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
29FBC68A000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1EC0F571000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
29FBC680000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
B6AAEED000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
FBB7B7E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
20824EE1000
trusted library allocation
page read and write
1B9FFDEC000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
3D25CBC000
stack
page read and write
29FBC7DF000
heap
page read and write
69C8763000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
29FBC69A000
heap
page read and write
19EC6768000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F4E0000
heap
page read and write
29FBC692000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7EDF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20821130000
trusted library section
page read and write
29FBC695000
heap
page read and write
A41707E000
stack
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
81D2BFE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7EA5000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1D7D0000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
21C1BF30000
heap
page read and write
21C19322000
unkown
page execute and read and write
29FBC7DF000
heap
page read and write
2BF32126000
heap
page read and write
1D6132C0000
trusted library allocation
page read and write
235700BF000
heap
page read and write
29FBC694000
heap
page read and write
2BF34205000
heap
page read and write
27453650000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2745366F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
27451790000
heap
page read and write
208242DB000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
DBE837B000
stack
page read and write
29FBC7DF000
heap
page read and write
81D2EFF000
stack
page read and write
20824072000
trusted library allocation
page read and write
29FBC695000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27452F50000
heap
page read and write
2BF3423E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BBF0000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
69C8CFE000
stack
page read and write
208333F6000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCEC000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2083B3C1000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5C00000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
19EC6333000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
24ED5FB000
stack
page read and write
2083B129000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
20821140000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF320C7000
heap
page read and write
29FBC69A000
heap
page read and write
274535BE000
trusted library allocation
page read and write
2BF341B0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
269AF600000
heap
page read and write
29FBC7DF000
heap
page read and write
269AF6E0000
heap
page read and write
29FBC7DF000
heap
page read and write
269AF77B000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BB64000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20820EF1000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD88F0000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
1EC0F560000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC680000
heap
page read and write
2083B2CE000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23570087000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FCB000
heap
page read and write
23572171000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572124000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572191000
heap
page read and write
29FBC7DF000
heap
page read and write
1D62B650000
heap
page read and write
29FBC694000
heap
page read and write
29FBC7DF000
heap
page read and write
274536AD000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8890000
heap
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
19EC6220000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23570089000
heap
page read and write
B03A8FF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2125450D000
trusted library allocation
page read and write
1D61377C000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1FBD6EA5000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
19EC42F0000
heap
page readonly
7FFD9BD00000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
274515E7000
heap
page read and write
20833121000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC628D000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
2357218E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B99B000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17A05A40000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7E10000
heap
page read and write
29FBC7DF000
heap
page read and write
2357214C000
heap
page read and write
29FBC695000
heap
page read and write
208241D1000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
B6AAFFE000
unkown
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
7FFD9BB52000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC695000
heap
page read and write
29FBC691000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
863363A000
stack
page read and write
20822BC0000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8C7E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8DBE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17A05E95000
heap
page read and write
29FBC7DF000
heap
page read and write
20821100000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6132E0000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17A05E90000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
23570068000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2357010C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB42000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
23572175000
heap
page read and write
29FBC7DF000
heap
page read and write
81D2744000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA98E4000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27463541000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
17EA7EDB000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
F4E0DFF000
unkown
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
B6AAEF2000
stack
page read and write
1FBF0F3B000
heap
page read and write
1C282020000
heap
page read and write
235700C1000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
19EC41DA000
heap
page read and write
21C19D22000
unkown
page readonly
29FBC7DF000
heap
page read and write
7FFD9BCB3000
trusted library allocation
page read and write
23572189000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC694000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21252B85000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
24ECEFD000
stack
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
212527C0000
unkown
page readonly
21252A80000
heap
page read and write
2746B659000
heap
page read and write
1FBD8D81000
trusted library allocation
page read and write
4FB1F34000
stack
page read and write
A4170FA000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2357015C000
heap
page read and write
676AB86000
stack
page read and write
29FBC688000
heap
page read and write
2746B5C8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6133E9000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2357010E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
2BF32040000
heap
page read and write
21252B35000
heap
page read and write
69C8D79000
stack
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2745364A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
235700D8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
19EC65FD000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
1D61330C000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
21C1BC1B000
heap
page read and write
8632EFE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
20821120000
trusted library section
page read and write
2BF341B0000
heap
page read and write
24ECBFE000
stack
page read and write
29FBC7DF000
heap
page read and write
19EDE315000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC68A000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20824887000
trusted library allocation
page read and write
24ECDFE000
stack
page read and write
27451568000
heap
page read and write
212529C2000
heap
page read and write
29FBC7DF000
heap
page read and write
2357214C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27453672000
trusted library allocation
page read and write
29FBC689000
heap
page read and write
29FBC7DF000
heap
page read and write
8633A3E000
stack
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
212529B1000
heap
page read and write
29FBC7DF000
heap
page read and write
23570158000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C282023000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34230000
heap
page read and write
2D974F7000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F571000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20824066000
trusted library allocation
page read and write
1D613200000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572160000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9F74B7000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
2BF33C88000
heap
page read and write
29FBC694000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
2BF3422E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC689000
heap
page read and write
17EA7EB6000
heap
page read and write
2125298C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
21C1BC65000
heap
page read and write
19EC4280000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F3E0000
heap
page read and write
2746B870000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2D976FE000
stack
page read and write
21C1D7C0000
heap
page execute and read and write
29FBC692000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
863343E000
stack
page read and write
29FBC7DF000
heap
page read and write
235720D4000
heap
page read and write
269AF940000
heap
page read and write
29FBC7DF000
heap
page read and write
20821207000
heap
page execute and read and write
29FBC687000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
1C28050F000
heap
page read and write
2357219A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC680000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FC7000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
20820EC3000
heap
page read and write
29FBC692000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BB50000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
676B3FE000
stack
page read and write
1B9F74B1000
trusted library allocation
page read and write
20824A54000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
2357214C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235720B5000
heap
page read and write
29FBC695000
heap
page read and write
2D970FD000
stack
page read and write
29FBC692000
heap
page read and write
3D25B7F000
stack
page read and write
274515A2000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC6A3000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
1B9E5940000
unkown
page readonly
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC692000
heap
page read and write
2083B354000
heap
page read and write
2BF321A6000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
23572152000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2357217E000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC65B000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
19ED629E000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF3215D000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
FBB7FBB000
stack
page read and write
29FBC691000
heap
page read and write
DBE87FF000
stack
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC44000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21252986000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
1D62B556000
heap
page read and write
2083B12E000
heap
page read and write
29FBC694000
heap
page read and write
21C1BDC0000
heap
page read and write
1B9E5BD5000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
20824F26000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
19EC66C0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1FBD7050000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34202000
heap
page read and write
29FBC7DF000
heap
page read and write
86327EE000
stack
page read and write
1FBD9168000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF3423E000
heap
page read and write
29FBC7DF000
heap
page read and write
2357214C000
heap
page read and write
29FBC7DF000
heap
page read and write
81D2AFF000
unkown
page read and write
20822B80000
heap
page execute and read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
208244C4000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235720B1000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
2083316F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD6E28000
heap
page read and write
1C28050D000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC692000
heap
page read and write
B03A7FE000
unkown
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C280724000
heap
page read and write
29FBC694000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6116C5000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341FB000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
17A05C0B000
heap
page read and write
17EA98E6000
heap
page read and write
2746B5C6000
heap
page read and write
29FBC69A000
heap
page read and write
1D6114D0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
274515BC000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235720FC000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
20824408000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2D9737F000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
2D9777E000
stack
page read and write
20822B90000
heap
page execute and read and write
86330FE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B37E000
heap
page read and write
2BF34240000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
23572186000
heap
page read and write
29FBC7DF000
heap
page read and write
23571C78000
heap
page read and write
27452FC0000
heap
page readonly
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27451660000
heap
page read and write
29FBC7DF000
heap
page read and write
212529F3000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B251000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
19EC626C000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE243000
heap
page read and write
21C1BCB0000
heap
page read and write
2BF32020000
heap
page read and write
235700A9000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20821200000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5A50000
heap
page read and write
29FBC7DF000
heap
page read and write
1D611715000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D97679000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7DF414A10000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
2746B6F0000
heap
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1FBD6E10000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8A7F000
stack
page read and write
A416FF7000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C2FFE9000
trusted library allocation
page read and write
2D9727E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC690000
heap
page read and write
2BF34223000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC6197000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2356FFB0000
heap
page read and write
29FBC7DF000
heap
page read and write
27451740000
heap
page read and write
29FBC7DF000
heap
page read and write
1C280720000
heap
page read and write
1D613384000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1D62B49F000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
1C282010000
heap
page read and write
19EC62B4000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF320D8000
heap
page read and write
29FBC692000
heap
page read and write
29FBC692000
heap
page read and write
235721AE000
heap
page read and write
2BF341B0000
heap
page read and write
29FBC7DF000
heap
page read and write
B03A6FB000
stack
page read and write
21C1BE8A000
heap
page read and write
21252A23000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BE00000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC4120000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341EE000
heap
page read and write
27453541000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
212544FE000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B972000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
B6AB0FE000
stack
page read and write
FBB7E3E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34224000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34222000
heap
page read and write
2BF341F9000
heap
page read and write
29FBC7DF000
heap
page read and write
1C280450000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341E0000
heap
page read and write
21C2D7E1000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1C280460000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572171000
heap
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC694000
heap
page read and write
20820F35000
heap
page read and write
1D613240000
heap
page readonly
29FBC7DF000
heap
page read and write
1B9E5C50000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
1C2804E6000
heap
page read and write
29FBC693000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23571C60000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9FFF90000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE2D4000
heap
page read and write
20833406000
trusted library allocation
page read and write
20833131000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1FBE8D91000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
3D258FF000
stack
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF321AE000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34234000
heap
page read and write
21C2D7E7000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
1D6133F9000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
2BF34169000
heap
page read and write
29FBC693000
heap
page read and write
29FBC692000
heap
page read and write
FBB78FF000
stack
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB31000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
676AFFF000
stack
page read and write
29FBC7DF000
heap
page read and write
17EA9AA0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D984CC000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
1D6114D8000
heap
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
1FBD6EA7000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341D8000
heap
page read and write
1B9E59E0000
heap
page read and write
17A05B40000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
FBB7CB7000
stack
page read and write
29FBC7DF000
heap
page read and write
19EC633A000
trusted library allocation
page read and write
29FBC690000
heap
page read and write
1FBD6E20000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
8632BFE000
stack
page read and write
7FFD9BC70000
trusted library allocation
page read and write
A4169AE000
stack
page read and write
1B9E5A54000
heap
page read and write
1FBD8E7F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341E5000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBF1100000
heap
page read and write
8632CFE000
stack
page read and write
29FBC7DF000
heap
page read and write
23570158000
heap
page read and write
1D613374000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23570040000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7E98000
heap
page read and write
29FBC688000
heap
page read and write
7FFD9BB22000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
81D274E000
stack
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC650000
heap
page read and write
29FBC7DF000
heap
page read and write
208333E8000
trusted library allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
A416EFF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9BB32000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
8633535000
stack
page read and write
7DF473990000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
1FBF0F21000
heap
page read and write
274539D0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
212544FB000
trusted library allocation
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
274515A6000
heap
page read and write
FBB797E000
stack
page read and write
29FBC7DF000
heap
page read and write
2BF320C4000
heap
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
1D611490000
heap
page read and write
27453666000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
19EDE301000
heap
page read and write
1C2804E6000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F560000
heap
page read and write
27453090000
heap
page read and write
2BF3420F000
heap
page read and write
1FBD928A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
2BF341FF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341F1000
heap
page read and write
29FBC7DF000
heap
page read and write
1D611552000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FCF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23571C74000
heap
page read and write
29FBC689000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
1B9E5942000
unkown
page readonly
2D98449000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC68A000
heap
page read and write
1FBF0E90000
heap
page read and write
29FBC693000
heap
page read and write
2BF32137000
heap
page read and write
29FBC7DF000
heap
page read and write
81D273E000
stack
page read and write
29FBC7DF000
heap
page read and write
1B9FFDE9000
heap
page read and write
2083B217000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE230000
heap
page read and write
21252B80000
heap
page read and write
20820FC0000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
29FBC69A000
heap
page read and write
86332FE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
2BF32010000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
21254515000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7EB6000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6133E7000
trusted library allocation
page read and write
2083B341000
heap
page read and write
3D25EBF000
stack
page read and write
235721B2000
heap
page read and write
2BF320F7000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC41D5000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB51000
trusted library allocation
page read and write
F4E0EFF000
stack
page read and write
21254503000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
B6AAEFE000
stack
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
24ECCFE000
stack
page read and write
29FBC7DF000
heap
page read and write
1B9E5A0C000
heap
page read and write
FBB7DB9000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
208211F0000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
21C2D7E3000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
2BF34140000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
21C19320000
unkown
page readonly
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BC95000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
29FBC680000
heap
page read and write
235721A2000
heap
page read and write
29FBC695000
heap
page read and write
1FBD6EAA000
heap
page read and write
29FBC7DF000
heap
page read and write
269AF950000
heap
page read and write
212527C2000
unkown
page readonly
7FFD9BBF0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF320B0000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
1D62B4A4000
heap
page read and write
FBB7BF9000
stack
page read and write
17EA7D30000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3215E000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5A22000
heap
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
20820F33000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCD4000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1B122000
unkown
page readonly
29FBC7DF000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1B9E751E000
trusted library allocation
page read and write
274539F2000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
208210A0000
heap
page read and write
29FBC7DF000
heap
page read and write
2082417B000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8E82000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF3421D000
heap
page read and write
274535DC000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
20823188000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBF0F2F000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB21000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
1B9E5ABD000
heap
page read and write
29FBC7DF000
heap
page read and write
269AF794000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5BB0000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC667000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC750000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
27453530000
heap
page read and write
2745364D000
trusted library allocation
page read and write
2083B376000
heap
page read and write
19EC4370000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8BFE000
stack
page read and write
A416CFE000
stack
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
19EC4158000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
23572180000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C28202F000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
3D2597E000
stack
page read and write
2BF34224000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5A95000
heap
page read and write
269AF770000
heap
page read and write
29FBC7DF000
heap
page read and write
2745365E000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
A416D7D000
stack
page read and write
29FBC7DF000
heap
page read and write
1FBD92B4000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1EC0F6D0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
212529AC000
heap
page read and write
20824993000
trusted library allocation
page read and write
2BF33C84000
heap
page read and write
1FBD8E7C000
trusted library allocation
page read and write
69C913B000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235700D8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
2BF34188000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE304000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
27453A4C000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
19EC4250000
heap
page read and write
21C19320000
unkown
page execute and read and write
29FBC693000
heap
page read and write
21C1BE80000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BF35000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8E37000
stack
page read and write
29FBC7DF000
heap
page read and write
2745359C000
trusted library allocation
page read and write
23572124000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2746B63E000
heap
page read and write
2D978FC000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC42E0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC02000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341E8000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572191000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC690000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D975F9000
stack
page read and write
29FBC7DF000
heap
page read and write
19EC5D10000
heap
page read and write
1EC0F4C0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC4197000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34234000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
208235CE000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF34188000
heap
page read and write
19EC6378000
trusted library allocation
page read and write
235720D4000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32470000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
8633B3B000
stack
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC694000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21254512000
trusted library allocation
page read and write
3D259FD000
stack
page read and write
29FBC7DF000
heap
page read and write
4FB26FE000
stack
page read and write
29FBC7DF000
heap
page read and write
2D97073000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
1FBD8A30000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B3B8000
heap
page read and write
7FFD9BA26000
trusted library allocation
page read and write
1FBF1108000
heap
page read and write
2BF32122000
heap
page read and write
212544E0000
heap
page read and write
7FFD9BB62000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20820EED000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1EC0F571000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D9854C000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
DBE86FF000
unkown
page read and write
29FBC7DF000
heap
page read and write
17A05C24000
heap
page read and write
1B9E59D0000
heap
page read and write
23572178000
heap
page read and write
2BF32183000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2356FFA0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC4240000
heap
page read and write
21C1B122000
unkown
page execute and read and write
29FBC7DF000
heap
page read and write
1D6115B3000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
235720B0000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20820EB0000
heap
page read and write
2BF341F3000
heap
page read and write
29FBC69A000
heap
page read and write
1FBD8DC2000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE2FF000
heap
page read and write
29FBC695000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
21C1BE85000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
17EA8144000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
F4E0CFE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
21C19322000
unkown
page readonly
7FFD9BCE0000
trusted library allocation
page read and write
208211B0000
trusted library allocation
page read and write
19EC4040000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C2E1E9000
trusted library allocation
page read and write
1EC0F571000
heap
page read and write
29FBC7DF000
heap
page read and write
1D61379E000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1FBD70B5000
heap
page read and write
20823101000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
212529C4000
heap
page read and write
86327A6000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF33C80000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
23570115000
heap
page read and write
19EC6190000
heap
page execute and read and write
7FFD9B992000
trusted library allocation
page read and write
20824225000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
2746B672000
heap
page read and write
24ED1FE000
stack
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
B6AB1FD000
stack
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
20821160000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
21252930000
heap
page read and write
235700D4000
heap
page read and write
1FBF0FA0000
heap
page execute and read and write
29FBC692000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
23572105000
heap
page read and write
29FBC695000
heap
page read and write
2083B200000
heap
page read and write
23572161000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C2D7E9000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D613230000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC42C0000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D9787F000
stack
page read and write
1FBD6E5E000
heap
page read and write
F4E11FF000
stack
page read and write
29FBC7DF000
heap
page read and write
2BF320D6000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F560000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD6FF0000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
A4172FB000
stack
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3421A000
heap
page read and write
2746B6F7000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572158000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
19EDE272000
heap
page read and write
19EC5D15000
heap
page read and write
1EC0F570000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD6E34000
heap
page read and write
2BF34160000
heap
page read and write
23571C7A000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
235700ED000
heap
page read and write
1FBF0F63000
heap
page read and write
29FBC7DF000
heap
page read and write
4FB23FF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
A416E7F000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
29FBC690000
heap
page read and write
7FFD9BB31000
trusted library allocation
page read and write
27453040000
trusted library allocation
page read and write
B6AB4FF000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC696000
heap
page read and write
212529AF000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
1FBD6E61000
heap
page read and write
1FBF0F76000
heap
page read and write
1FBD6EFD000
heap
page read and write
2357216F000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF320FC000
heap
page read and write
29FBC7DF000
heap
page read and write
3D2587F000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
19EC6330000
trusted library allocation
page read and write
4FB1F3E000
stack
page read and write
19EDE2D0000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D611710000
heap
page read and write
29FBC7DF000
heap
page read and write
23572171000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
FBB7A7F000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D61343F000
trusted library allocation
page read and write
17EA98E8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341EE000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
208230B0000
trusted library allocation
page read and write
21C1D872000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
235720D4000
heap
page read and write
2D97576000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC696000
heap
page read and write
20821245000
heap
page read and write
1D62B4B1000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
29FBC692000
heap
page read and write
29FBC69A000
heap
page read and write
2083B382000
heap
page read and write
7FFD9BB12000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32474000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
863373D000
stack
page read and write
29FBC692000
heap
page read and write
29FBC695000
heap
page read and write
2357010F000
heap
page read and write
19ED6241000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9FFD70000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
21C1BE70000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BB72000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5944000
unkown
page readonly
7FFD9BB60000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
A416923000
stack
page read and write
29FBC7DF000
heap
page read and write
2D973FB000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32110000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
19EC6241000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
19EC6386000
trusted library allocation
page read and write
2083B36A000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
17EA7EB6000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
20824F2B000
trusted library allocation
page read and write
375CF8C000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34226000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
27452FB0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
1B9E5C70000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
21252B30000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
2082406E000
trusted library allocation
page read and write
235700D8000
heap
page read and write
2BF34224000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1EC0F53A000
heap
page read and write
29FBC696000
heap
page read and write
17EA7E30000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B33F000
heap
page read and write
23571B90000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
676B2FE000
stack
page read and write
29FBC7DF000
heap
page read and write
19EC6336000
trusted library allocation
page read and write
29FBC696000
heap
page read and write
29FBC7DF000
heap
page read and write
3D25AFE000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2D9717E000
stack
page read and write
1D6116C0000
heap
page read and write
20820F0D000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BC33000
heap
page read and write
1D62B730000
heap
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
2746B690000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
21C1BB22000
unkown
page readonly
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
2083B147000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6136AA000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
A416C7E000
stack
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
1D62B820000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FDB000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
17EA8140000
heap
page read and write
1B9F74B9000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
19EC6600000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3211F000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
212529B5000
heap
page read and write
1D62B4B3000
heap
page read and write
27453551000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572124000
heap
page read and write
29FBC7DF000
heap
page read and write
FBB75C3000
stack
page read and write
2BF321AE000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
ADC66FC000
stack
page read and write
2BF341D8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D62B5B6000
heap
page execute and read and write
1D623301000
trusted library allocation
page read and write
17EA7EA8000
heap
page read and write
19EC4390000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC694000
heap
page read and write
21C1A722000
unkown
page readonly
29FBC69A000
heap
page read and write
269AF945000
heap
page read and write
1FBD8E07000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
1FBD9138000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
29FBC696000
heap
page read and write
20823D04000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
20824314000
trusted library allocation
page read and write
235720DD000
heap
page read and write
29FBC7DF000
heap
page read and write
2746B590000
heap
page read and write
1FBD8E86000
trusted library allocation
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
212527C0000
unkown
page readonly
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
20822BC5000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
A4171FE000
stack
page read and write
29FBC7DF000
heap
page read and write
2BF3213A000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC43C5000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
2357215D000
heap
page read and write
19EC41AE000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8B7D000
stack
page read and write
29FBC7DF000
heap
page read and write
1D611519000
heap
page read and write
2BF321A7000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BEC0000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
208230F0000
heap
page read and write
1B9E5C90000
heap
page execute and read and write
2BF33DF0000
heap
page read and write
2082492D000
trusted library allocation
page read and write
20822FC3000
heap
page read and write
1D611556000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
208229F5000
heap
page read and write
1FBD922F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
19EC60D0000
heap
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
1D6232F1000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
17EA98D0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8A35000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6137F8000
trusted library allocation
page read and write
2746B5B7000
heap
page read and write
FBB7F3E000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
235700C8000
heap
page read and write
7DF473980000
trusted library allocation
page execute and read and write
7FFD9BC10000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FD7000
heap
page read and write
29FBC695000
heap
page read and write
2BF32186000
heap
page read and write
21C1BB52000
unkown
page readonly
29FBC7DF000
heap
page read and write
27453050000
heap
page execute and read and write
7FFD9BC70000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235720FC000
heap
page read and write
29FBC7DF000
heap
page read and write
20820EF7000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341EE000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D982CE000
stack
page read and write
29FBC7DF000
heap
page read and write
23570044000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
21252850000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
21C2EBE9000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
375D2FE000
unkown
page read and write
29FBC7DF000
heap
page read and write
1B9E59E6000
heap
page read and write
A416F78000
stack
page read and write
29FBC7DF000
heap
page read and write
2D971FE000
stack
page read and write
21C1BBE0000
heap
page read and write
29FBC693000
heap
page read and write
3D25D38000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
A4169EE000
stack
page read and write
19EDE4C0000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BBF6000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA7E90000
heap
page read and write
1B9E5940000
unkown
page readonly
1D61381A000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC4A0000
heap
page read and write
274515E2000
heap
page read and write
1D61334D000
trusted library allocation
page read and write
235721AB000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
2BF34236000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BD73000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1B9E5D00000
heap
page read and write
29FBC69A000
heap
page read and write
1EC0F530000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20820EF9000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
20823CFA000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
29FBC695000
heap
page read and write
208210C0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
23571C7F000
heap
page read and write
20820F38000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
29FBC580000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C280480000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2D9834E000
stack
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6116D0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
208333ED000
trusted library allocation
page read and write
29FBC691000
heap
page read and write
2BF33C8A000
heap
page read and write
29FBC69A000
heap
page read and write
FBB7D38000
stack
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
20822FD3000
heap
page read and write
29FBC7DF000
heap
page read and write
1D613220000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BB22000
unkown
page execute and read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B120000
heap
page read and write
20824F06000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1D61150B000
heap
page read and write
2082496C000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
20822F10000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
235700AE000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8F3E000
stack
page read and write
29FBC69A000
heap
page read and write
235700E9000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
1D611511000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6133F6000
trusted library allocation
page read and write
21C1BE00000
heap
page read and write
29FBC7DF000
heap
page read and write
2357219C000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC696000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8E89000
trusted library allocation
page read and write
1B9E5A14000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC673D000
trusted library allocation
page read and write
23570060000
heap
page read and write
20823001000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC633D000
trusted library allocation
page read and write
1FBE8DEB000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3215B000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BCE8000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235700D1000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
19EC41D7000
heap
page read and write
29FBC7DF000
heap
page read and write
69C8AFE000
stack
page read and write
29FBC7DF000
heap
page read and write
1D61152B000
heap
page read and write
F4E0CF2000
stack
page read and write
1C2804D8000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341B0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
A416DFF000
stack
page read and write
8632FFA000
stack
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
FBB7C3F000
stack
page read and write
17A05C00000
heap
page read and write
29FBC7DF000
heap
page read and write
235721A9000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
1C28202A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B21C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB2A000
trusted library allocation
page read and write
FBB7AFE000
stack
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBB3000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF33C86000
heap
page read and write
2D972F9000
stack
page read and write
2BF34241000
heap
page read and write
21C1A722000
unkown
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8DA5000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
2BF341F0000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34213000
heap
page read and write
1B9E5D05000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF33C70000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF320B8000
heap
page read and write
3D25F3F000
stack
page read and write
1C282120000
heap
page read and write
1EC0F571000
heap
page read and write
29FBC695000
heap
page read and write
29FBC5A0000
heap
page read and write
F4E0CED000
stack
page read and write
1FBD8EC6000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
20820EB9000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34222000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572192000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
8632DFC000
stack
page read and write
19EC6270000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
23572124000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
8632AFE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
24ED0FD000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34213000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BCD6000
heap
page read and write
29FBC692000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF32126000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C2804C9000
heap
page read and write
1B9E5CC0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2082407B000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8D9F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8E8C000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D613434000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C282024000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17EA98E3000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB68000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1C2804E6000
heap
page read and write
29FBC7DF000
heap
page read and write
212644F3000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2BF341D8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
FBB787F000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
1FBD8880000
trusted library allocation
page read and write
676B1FD000
stack
page read and write
2746BBC0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
1B9E5A24000
heap
page read and write
235721A2000
heap
page read and write
375D3FF000
stack
page read and write
29FBC7DF000
heap
page read and write
20824076000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
3D25E3E000
stack
page read and write
1D62B470000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572171000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
1D613339000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6133EC000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
A41717E000
stack
page read and write
29FBC7DF000
heap
page read and write
19ED6231000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD8860000
trusted library allocation
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27451760000
heap
page read and write
21252AC0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
23572186000
heap
page read and write
29FBC7DF000
heap
page read and write
3D25BF9000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
676AEFF000
stack
page read and write
27452F90000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC4150000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1FBF0ED0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC6231000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
3D25FBB000
stack
page read and write
21C1BC5F000
heap
page read and write
29FBC7DF000
heap
page read and write
19EC43C0000
heap
page read and write
29FBC7DF000
heap
page read and write
23572124000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
19EC423D000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21252980000
heap
page read and write
2BF341E3000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3210C000
heap
page read and write
2746B770000
heap
page read and write
29FBC7DF000
heap
page read and write
69C90BE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D623360000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
20822FAF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1D6114B0000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BD80000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
86333FA000
stack
page read and write
17A05D00000
heap
page read and write
1B9E5BE0000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
7FFD9BBB6000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
235700D1000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2746B61D000
heap
page read and write
212644F7000
trusted library allocation
page read and write
19EC66E3000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
20820EF3000
heap
page read and write
7FFD9BB62000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC691000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBD7010000
heap
page read and write
69C903F000
stack
page read and write
23570139000
heap
page read and write
23571C70000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
21C1BDE0000
heap
page read and write
1FBD6E7F000
heap
page read and write
3D25C3E000
stack
page read and write
1EC0F6C0000
heap
page read and write
29FBC692000
heap
page read and write
235700D8000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21252AE0000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBF0FF0000
heap
page execute and read and write
1D613313000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
274635B0000
trusted library allocation
page read and write
19EC419D000
heap
page read and write
2125450A000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27451795000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1D7E1000
trusted library allocation
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
21C1BE50000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
69C8FBE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC696000
heap
page read and write
29FBC680000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
29FBC692000
heap
page read and write
29FBC691000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC692000
heap
page read and write
212544F1000
trusted library allocation
page read and write
1D62B4F2000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BA56000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
2745356F000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
20820FA9000
heap
page read and write
2745159C000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
1FBF14B0000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34191000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
21C1D7FA000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
20821170000
heap
page readonly
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
24ED4FE000
stack
page read and write
29FBC7DF000
heap
page read and write
1B9E5A11000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
235721B0000
heap
page read and write
1D62B5B0000
heap
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF33C83000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
21C1BCEB000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
1D61150D000
heap
page read and write
17EA98E0000
heap
page read and write
21C2F5E9000
trusted library allocation
page read and write
1D6132F1000
trusted library allocation
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF3211F000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
17A05B20000
heap
page read and write
29FBC7DF000
heap
page read and write
212644F1000
trusted library allocation
page read and write
29FBC693000
heap
page read and write
19EDE350000
heap
page read and write
29FBC7DF000
heap
page read and write
3D255F2000
stack
page read and write
21254506000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2356FFD0000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC69A000
heap
page read and write
208230C0000
heap
page read and write
29FBC7DF000
heap
page read and write
1B9E5C80000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
21254390000
heap
page execute and read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
19EC418E000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
29FBC689000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF341DA000
heap
page read and write
2D977FC000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
86331FE000
stack
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC693000
heap
page read and write
29FBC7DF000
heap
page read and write
2745366D000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
1C282028000
heap
page read and write
29FBC7DF000
heap
page read and write
274536A7000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2BF34233000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
27463550000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC692000
heap
page read and write
24ED2FE000
stack
page read and write
21C1D86E000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
21C19D22000
unkown
page execute and read and write
2357217C000
heap
page read and write
2BF341D8000
heap
page read and write
29FBC7DF000
heap
page read and write
24ECAF4000
stack
page read and write
7FFD9BC30000
trusted library allocation
page read and write
21C1BC31000
heap
page read and write
23572198000
heap
page read and write
1D611480000
heap
page read and write
29FBC7DF000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC694000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
2083B138000
heap
page read and write
29FBC7DF000
heap
page read and write
A41727F000
stack
page read and write
7FFD9BCD9000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
2D983C7000
stack
page read and write
1C2804C0000
heap
page read and write
20833101000
trusted library allocation
page read and write
29FBC7DF000
heap
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC695000
heap
page read and write
29FBC7DF000
heap
page read and write
19EDE317000
heap
page read and write
676B0FF000
stack
page read and write
1D6133EF000
trusted library allocation
page read and write
29FBC688000
heap
page read and write
29FBC7DF000
heap
page read and write
29FBC7DF000
heap
page read and write
3D25DB9000
stack
page read and write
21C1BC1F000
heap
page read and write
There are 3187 hidden memdumps, click here to show them.