Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Bound.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_bz2.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_ctypes.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_elementtree.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_hashlib.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_lzma.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_socket.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\_ssl.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\cv2.pyd
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\opencv_videoio_ffmpeg480.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\libcrypto-1_1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\libopenblas.VTYUM5MXKVFE4PZZER3L7PNO6YB4XFF3.gfortran-win32.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\libssl-1_1.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\netifaces.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\core\_multiarray_tests.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\core\_multiarray_umath.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\fft\_pocketfft_internal.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\linalg\_umath_linalg.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\linalg\lapack_lite.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_bounded_integers.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_common.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_generator.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_mt19937.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_pcg64.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_philox.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\_sfc64.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\bit_generator.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\numpy\random\mtrand.cp37-win32.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\psutil\_psutil_windows.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\pyexpat.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\python3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\python37.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\select.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\unicodedata.pyd
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MicrosoftEdgeUpd_46411cde5bccedeb4fba6ef26d99ed487c0dcb3_bdcfae04_e4e00a9a-5fac-44a1-a6fa-0470c51d884c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF1FE.tmp.dmp
|
Mini DuMP crash report, 16 streams, Wed Oct 30 11:25:34 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF441.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF471.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Bound.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\VCRUNTIME140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-console-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-datetime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-debug-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-file-l2-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-handle-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-localization-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-memory-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-profile-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-synch-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-synch-l1-2-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-timezone-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-core-util-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-conio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-convert-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-environment-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-heap-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-locale-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-math-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-process-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-string-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-time-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\api-ms-win-crt-utility-l1-1-0.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\__init__.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\config-3.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\config.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\data\__init__.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\gapi\__init__.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\load_config_py3.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\mat_wrapper\__init__.py
|
Python script, ASCII text executable, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\misc\__init__.py
|
Python script, ASCII text executable, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\misc\version.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\typing\__init__.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\utils\__init__.py
|
Python script, ASCII text executable, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\cv2\version.py
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI55002\ucrtbase.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25mco3kt.xbd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b555o43w.a23.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cgdjwypv.0pt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d4051ixe.cyz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzl40m0q.i50.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_koxaxjrp.cfk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qh5wqzyl.exg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rcrpqlw1.m00.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rohkf0xg.d5f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_td1bg2h4.t54.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_thfrhn2p.lkc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wrofhapz.yaf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\selfdelete.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp8B5F.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 103 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.24481.7673.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft';Add-MpPreference
-ExclusionPath 'C:\ProgramData\Microsoft\Internet Explorer'"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAA-BD9C-FC4F0859F018}" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAA-BD9C-FC4F0859F018}" /f
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c schtasks /create /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAB-BD9C-FC4F0859F018}" /tr "\"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe\""
/sc onlogon /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /tn "MicrosoftEdgeUpdateTaskMachineCore{53F2EB3B-2C85-ABAB-BD9C-FC4F0859F018}" /tr "\"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe\""
/sc onlogon /rl HIGHEST /f
|
||
C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe
|
"C:\ProgramData\Microsoft\MicrosoftEdgeUpdate.exe"
|
||
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
|
"C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
|
||
C:\ProgramData\Microsoft\Bound.exe
|
"C:\ProgramData\Microsoft\Bound.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall delete rule name=all dir=in program='C:\ProgramData\Microsoft\Internet
Explorer\iexplore.exe'"
|
||
C:\Windows\System32\netsh.exe
|
"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name=all dir=in "program=C:\ProgramData\Microsoft\Internet
Explorer\iexplore.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\selfdelete.bat""
|
||
C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe
|
"C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall delete rule name=all dir=out program='C:\ProgramData\Microsoft\Internet
Explorer\iexplore.exe'"
|
||
C:\Windows\System32\netsh.exe
|
"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name=all dir=out "program=C:\ProgramData\Microsoft\Internet
Explorer\iexplore.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall add rule name='Allow Internet Explorer
Inbound' dir=in action=allow program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe' enable=yes profile=private,public"
|
||
C:\Windows\System32\netsh.exe
|
"C:\Windows\system32\netsh.exe" advfirewall firewall add rule "name=Allow Internet Explorer Inbound" dir=in action=allow "program=C:\ProgramData\Microsoft\Internet
Explorer\iexplore.exe" enable=yes profile=private,public
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "netsh advfirewall firewall add rule name='Allow Internet Explorer
Outbound' dir=out action=allow program='C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe' enable=yes profile=private,public"
|
||
C:\Windows\System32\netsh.exe
|
"C:\Windows\system32\netsh.exe" advfirewall firewall add rule "name=Allow Internet Explorer Outbound" dir=out action=allow
"program=C:\ProgramData\Microsoft\Internet Explorer\iexplore.exe" enable=yes profile=private,public
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp8B5F.tmp.bat""
|
||
C:\Windows\System32\PING.EXE
|
ping 127.0.0.1 -n 2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 280 -s 1376
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://onnx.ai/)
|
unknown
|
||
http://caffe.berkeleyvision.org/)
|
unknown
|
||
https://github.com/opencv/opencv/issues/23152.
|
unknown
|
||
https://www.learnopencv.com/convex-hull-using-opencv-in-python-and-c/nativeVectorWidthIntdecode(img
|
unknown
|
||
http://torch.ch/)
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.dai.ed.ac.uk/CVonline/LOCAL_COPIES/MANDUCHI1/Bilateral_Filtering.html
|
unknown
|
||
https://gist.github.com/imneme/540829265469e673d045
|
unknown
|
||
http://www.math.sfu.ca/~cbm/aands/page_69.htm
|
unknown
|
||
https://github.com/opencv/opencv/issues/6293
|
unknown
|
||
https://github.com/opencv/opencv/issues/16739
|
unknown
|
||
https://www.tensorflow.org/
|
unknown
|
||
https://static.aminer.org/pdf/PDF/000/317/196/spatio_temporal_wiener_filtering_of_image_sequences_us
|
unknown
|
||
https://github.com/openvinotoolkit/open_model_zoo/blob/master/models/public/yolo-v2-tiny-tf/yolo-v2-
|
unknown
|
||
http://www.pcg-random.org/posts/random-invertible-mapping-statistics.html
|
unknown
|
||
https://numpy.org/doc/stable/user/basics.subclassing.html
|
unknown
|
||
http://pracrand.sourceforge.net/RNG_engines.txt
|
unknown
|
||
https://github.com/torch/nn/blob/master/doc/module.md
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://pjreddie.com/darknet/)
|
unknown
|
||
http://torch.ch
|
unknown
|
||
https://www.tensorflow.org/lite
|
unknown
|
||
http://www.gdal.org/ogr_formats.html).
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising
|
unknown
|
||
https://www.tensorflow.org/)
|
unknown
|
||
http://python.org/dev/peps/pep-0263/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://github.com/opencv/opencv/issues/16739cv::MatOp_AddEx::assign4g
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.math.sfu.ca/~cbm/aands/
|
unknown
|
||
https://github.com/opencv/opencv/issues/6293u-
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.pcg-random.org/posts/developing-a-seed_seq-alternative.html
|
unknown
|
||
https://arxiv.org/abs/1704.04503
|
unknown
|
||
http://campar.in.tum.de/Chair/HandEyeCalibration).
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.ipol.im/pub/algo/bcm_non_local_means_denoising/
|
unknown
|
||
http://www.gdal.org/formats_list.html)
|
unknown
|
||
https://www.learnopencv.com/convex-hull-using-opencv-in-python-and-c/
|
unknown
|
||
http://www.gdal.org)
|
unknown
|
||
http://homepages.inf.ed.ac.uk/rbf/HIPR2/hough.htm
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://github.com/NVIDIA/caffe.
|
unknown
|
||
https://github.com/opencv/opencv/issues/5412.
|
unknown
|
||
https://onnx.ai/
|
unknown
|
||
https://software.intel.com/openvino-toolkit)
|
unknown
|
||
http://underdestruction.com/2004/02/25/stackblur-2004.
|
unknown
|
||
http://caffe.berkeleyvision.org
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://pjreddie.com/darknet/
|
unknown
|
There are 48 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nt89.kro.kr
|
unknown
|
||
nt89s.kro.kr
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
ProgramId
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
FileId
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
LowerCaseLongPath
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
LongPathHash
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Name
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
OriginalFileName
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Publisher
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Version
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
BinFileVersion
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
BinaryType
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
ProductName
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
ProductVersion
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
LinkDate
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
BinProductVersion
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
AppxPackageFullName
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Size
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Language
|
||
\REGISTRY\A\{f54f617a-1601-a09d-4200-11c6a39206d0}\Root\InventoryApplicationFile\microsoftedgeupd|816250c8bf7c5232
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23571C76000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5C83000
|
trusted library allocation
|
page read and write
|
||
FBB79FD000
|
stack
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9FFDE0000
|
heap
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
2BF34203000
|
heap
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
20823CEE000
|
trusted library allocation
|
page read and write
|
||
212529B7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
20821240000
|
heap
|
page read and write
|
||
4FB22FF000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8EB9000
|
stack
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1C282026000
|
heap
|
page read and write
|
||
2BF3423A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1D7F4000
|
trusted library allocation
|
page read and write
|
||
2BF34234000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9747D000
|
stack
|
page read and write
|
||
29FBC667000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1FBD8DDE000
|
trusted library allocation
|
page read and write
|
||
1FBE8D81000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235721A4000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
212529C8000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451560000
|
heap
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF1142000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF33C8F000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
2357214F000
|
heap
|
page read and write
|
||
2745159E000
|
heap
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
29FBC900000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3210E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE266000
|
heap
|
page read and write
|
||
2357214C000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
2BF341EE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2746B878000
|
heap
|
page read and write
|
||
21252950000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
4FB1F2E000
|
stack
|
page read and write
|
||
FBB7EBF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20823B54000
|
trusted library allocation
|
page read and write
|
||
23571C73000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
19EC632D000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D96DEF000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208243A7000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34161000
|
heap
|
page read and write
|
||
2746B790000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
863393E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA98EF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2082407F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32187000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E74B1000
|
trusted library allocation
|
page read and write
|
||
3D25A7E000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
1B9E59EC000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BC25000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
212529EE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6E69000
|
heap
|
page read and write
|
||
27453095000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1FBF1020000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1C2804D5000
|
heap
|
page read and write
|
||
1B9E5BD0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
24ED3FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA98EA000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
23570134000
|
heap
|
page read and write
|
||
7DF4739A0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572186000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5AC7000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
269AF700000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2082406A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32117000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1FBD70B0000
|
heap
|
page read and write
|
||
1FBF0FF7000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3210B000
|
heap
|
page read and write
|
||
29FBC667000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32163000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
1FBD8870000
|
heap
|
page readonly
|
||
1FBD7090000
|
trusted library allocation
|
page read and write
|
||
20823329000
|
trusted library allocation
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C87EF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC68A000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9C2000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
B6AAEED000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
7FFD9B9C2000
|
trusted library allocation
|
page read and write
|
||
FBB7B7E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824EE1000
|
trusted library allocation
|
page read and write
|
||
1B9FFDEC000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25CBC000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8763000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
19EC6768000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F4E0000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7EDF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821130000
|
trusted library section
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
A41707E000
|
stack
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
81D2BFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7EA5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1D7D0000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BF30000
|
heap
|
page read and write
|
||
21C19322000
|
unkown
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32126000
|
heap
|
page read and write
|
||
1D6132C0000
|
trusted library allocation
|
page read and write
|
||
235700BF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
2BF34205000
|
heap
|
page read and write
|
||
27453650000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2745366F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451790000
|
heap
|
page read and write
|
||
208242DB000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
DBE837B000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
81D2EFF000
|
stack
|
page read and write
|
||
20824072000
|
trusted library allocation
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27452F50000
|
heap
|
page read and write
|
||
2BF3423E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BBF0000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
69C8CFE000
|
stack
|
page read and write
|
||
208333F6000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2083B3C1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5C00000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC6333000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
24ED5FB000
|
stack
|
page read and write
|
||
2083B129000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821140000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320C7000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
274535BE000
|
trusted library allocation
|
page read and write
|
||
2BF341B0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
269AF600000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
269AF6E0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
269AF77B000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EF1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD88F0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F560000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
2083B2CE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570087000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FCB000
|
heap
|
page read and write
|
||
23572171000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572124000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572191000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B650000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
274536AD000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8890000
|
heap
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
19EC6220000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570089000
|
heap
|
page read and write
|
||
B03A8FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2125450D000
|
trusted library allocation
|
page read and write
|
||
1D61377C000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6EA5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
19EC42F0000
|
heap
|
page readonly
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
274515E7000
|
heap
|
page read and write
|
||
20833121000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC628D000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2357218E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17A05A40000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7E10000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357214C000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
208241D1000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B6AAFFE000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
863363A000
|
stack
|
page read and write
|
||
20822BC0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8C7E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8DBE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17A05E95000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821100000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6132E0000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17A05E90000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
23570068000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357010C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572175000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
81D2744000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA98E4000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27463541000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7EDB000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
F4E0DFF000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B6AAEF2000
|
stack
|
page read and write
|
||
1FBF0F3B000
|
heap
|
page read and write
|
||
1C282020000
|
heap
|
page read and write
|
||
235700C1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC41DA000
|
heap
|
page read and write
|
||
21C19D22000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCB3000
|
trusted library allocation
|
page read and write
|
||
23572189000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21252B85000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
24ECEFD000
|
stack
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212527C0000
|
unkown
|
page readonly
|
||
21252A80000
|
heap
|
page read and write
|
||
2746B659000
|
heap
|
page read and write
|
||
1FBD8D81000
|
trusted library allocation
|
page read and write
|
||
4FB1F34000
|
stack
|
page read and write
|
||
A4170FA000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357015C000
|
heap
|
page read and write
|
||
676AB86000
|
stack
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
2746B5C8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6133E9000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357010E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
2BF32040000
|
heap
|
page read and write
|
||
21252B35000
|
heap
|
page read and write
|
||
69C8D79000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2745364A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235700D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
19EC65FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1D61330C000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
21C1BC1B000
|
heap
|
page read and write
|
||
8632EFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821120000
|
trusted library section
|
page read and write
|
||
2BF341B0000
|
heap
|
page read and write
|
||
24ECBFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE315000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC68A000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824887000
|
trusted library allocation
|
page read and write
|
||
24ECDFE000
|
stack
|
page read and write
|
||
27451568000
|
heap
|
page read and write
|
||
212529C2000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357214C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27453672000
|
trusted library allocation
|
page read and write
|
||
29FBC689000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
8633A3E000
|
stack
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212529B1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570158000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C282023000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34230000
|
heap
|
page read and write
|
||
2D974F7000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824066000
|
trusted library allocation
|
page read and write
|
||
1D613200000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572160000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9F74B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
2BF33C88000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
2BF3422E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC689000
|
heap
|
page read and write
|
||
17EA7EB6000
|
heap
|
page read and write
|
||
2125298C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
21C1BC65000
|
heap
|
page read and write
|
||
19EC4280000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F3E0000
|
heap
|
page read and write
|
||
2746B870000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2D976FE000
|
stack
|
page read and write
|
||
21C1D7C0000
|
heap
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
863343E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720D4000
|
heap
|
page read and write
|
||
269AF940000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821207000
|
heap
|
page execute and read and write
|
||
29FBC687000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
1C28050F000
|
heap
|
page read and write
|
||
2357219A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FC7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
20820EC3000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
676B3FE000
|
stack
|
page read and write
|
||
1B9F74B1000
|
trusted library allocation
|
page read and write
|
||
20824A54000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
2357214C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720B5000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2D970FD000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
3D25B7F000
|
stack
|
page read and write
|
||
274515A2000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC6A3000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1B9E5940000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
2083B354000
|
heap
|
page read and write
|
||
2BF321A6000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
23572152000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357217E000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC65B000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19ED629E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3215D000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
FBB7FBB000
|
stack
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
DBE87FF000
|
stack
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC44000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21252986000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B556000
|
heap
|
page read and write
|
||
2083B12E000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
21C1BDC0000
|
heap
|
page read and write
|
||
1B9E5BD5000
|
heap
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
20824F26000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
19EC66C0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
1FBD7050000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34202000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
86327EE000
|
stack
|
page read and write
|
||
1FBD9168000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3423E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357214C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
81D2AFF000
|
unkown
|
page read and write
|
||
20822B80000
|
heap
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208244C4000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720B1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
2083316F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6E28000
|
heap
|
page read and write
|
||
1C28050D000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
B03A7FE000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C280724000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6116C5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341FB000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
17A05C0B000
|
heap
|
page read and write
|
||
17EA98E6000
|
heap
|
page read and write
|
||
2746B5C6000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1D6114D0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
274515BC000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720FC000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824408000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9737F000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
2D9777E000
|
stack
|
page read and write
|
||
20822B90000
|
heap
|
page execute and read and write
|
||
86330FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B37E000
|
heap
|
page read and write
|
||
2BF34240000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
23572186000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23571C78000
|
heap
|
page read and write
|
||
27452FC0000
|
heap
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451660000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212529F3000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B251000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
19EC626C000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE243000
|
heap
|
page read and write
|
||
21C1BCB0000
|
heap
|
page read and write
|
||
2BF32020000
|
heap
|
page read and write
|
||
235700A9000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821200000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5A50000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D611715000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D97679000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7DF414A10000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B973000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2746B6F0000
|
heap
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6E10000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8A7F000
|
stack
|
page read and write
|
||
A416FF7000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C2FFE9000
|
trusted library allocation
|
page read and write
|
||
2D9727E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
2BF34223000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC6197000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2356FFB0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451740000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C280720000
|
heap
|
page read and write
|
||
1D613384000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B49F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
1C282010000
|
heap
|
page read and write
|
||
19EC62B4000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320D8000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
235721AE000
|
heap
|
page read and write
|
||
2BF341B0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B03A6FB000
|
stack
|
page read and write
|
||
21C1BE8A000
|
heap
|
page read and write
|
||
21252A23000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC4120000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341EE000
|
heap
|
page read and write
|
||
27453541000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212544FE000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B6AB0FE000
|
stack
|
page read and write
|
||
FBB7E3E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34224000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34222000
|
heap
|
page read and write
|
||
2BF341F9000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C280450000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341E0000
|
heap
|
page read and write
|
||
21C2D7E1000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1C280460000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572171000
|
heap
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
20820F35000
|
heap
|
page read and write
|
||
1D613240000
|
heap
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5C50000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
1C2804E6000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23571C60000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9FFF90000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE2D4000
|
heap
|
page read and write
|
||
20833406000
|
trusted library allocation
|
page read and write
|
||
20833131000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBE8D91000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
3D258FF000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF321AE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34234000
|
heap
|
page read and write
|
||
21C2D7E7000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1D6133F9000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34169000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
FBB78FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
676AFFF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA9AA0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D984CC000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
1D6114D8000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
1FBD6EA7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341D8000
|
heap
|
page read and write
|
||
1B9E59E0000
|
heap
|
page read and write
|
||
17A05B40000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
FBB7CB7000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC633A000
|
trusted library allocation
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
1FBD6E20000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
8632BFE000
|
stack
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
A4169AE000
|
stack
|
page read and write
|
||
1B9E5A54000
|
heap
|
page read and write
|
||
1FBD8E7F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341E5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF1100000
|
heap
|
page read and write
|
||
8632CFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570158000
|
heap
|
page read and write
|
||
1D613374000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570040000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7E98000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
7FFD9BB22000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
81D274E000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC650000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208333E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
A416EFF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
8633535000
|
stack
|
page read and write
|
||
7DF473990000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF0F21000
|
heap
|
page read and write
|
||
274539D0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
212544FB000
|
trusted library allocation
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
274515A6000
|
heap
|
page read and write
|
||
FBB797E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320C4000
|
heap
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
1D611490000
|
heap
|
page read and write
|
||
27453666000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE301000
|
heap
|
page read and write
|
||
1C2804E6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F560000
|
heap
|
page read and write
|
||
27453090000
|
heap
|
page read and write
|
||
2BF3420F000
|
heap
|
page read and write
|
||
1FBD928A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
2BF341FF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341F1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D611552000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FCF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23571C74000
|
heap
|
page read and write
|
||
29FBC689000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1B9E5942000
|
unkown
|
page readonly
|
||
2D98449000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC68A000
|
heap
|
page read and write
|
||
1FBF0E90000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
2BF32137000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
81D273E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9FFDE9000
|
heap
|
page read and write
|
||
2083B217000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE230000
|
heap
|
page read and write
|
||
21252B80000
|
heap
|
page read and write
|
||
20820FC0000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
86332FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2BF32010000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21254515000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7EB6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6133E7000
|
trusted library allocation
|
page read and write
|
||
2083B341000
|
heap
|
page read and write
|
||
3D25EBF000
|
stack
|
page read and write
|
||
235721B2000
|
heap
|
page read and write
|
||
2BF320F7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC41D5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
F4E0EFF000
|
stack
|
page read and write
|
||
21254503000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B6AAEFE000
|
stack
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
24ECCFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5A0C000
|
heap
|
page read and write
|
||
FBB7DB9000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208211F0000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C2D7E3000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2BF34140000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
21C19320000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BC95000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
235721A2000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1FBD6EAA000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
269AF950000
|
heap
|
page read and write
|
||
212527C2000
|
unkown
|
page readonly
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320B0000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B4A4000
|
heap
|
page read and write
|
||
FBB7BF9000
|
stack
|
page read and write
|
||
17EA7D30000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3215E000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5A22000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820F33000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCD4000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1B122000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1B9E751E000
|
trusted library allocation
|
page read and write
|
||
274539F2000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208210A0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2082417B000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8E82000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3421D000
|
heap
|
page read and write
|
||
274535DC000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20823188000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF0F2F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB21000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1B9E5ABD000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
269AF794000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5BB0000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC667000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC750000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27453530000
|
heap
|
page read and write
|
||
2745364D000
|
trusted library allocation
|
page read and write
|
||
2083B376000
|
heap
|
page read and write
|
||
19EC4370000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8BFE000
|
stack
|
page read and write
|
||
A416CFE000
|
stack
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
19EC4158000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
23572180000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C28202F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D2597E000
|
stack
|
page read and write
|
||
2BF34224000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5A95000
|
heap
|
page read and write
|
||
269AF770000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2745365E000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A416D7D000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD92B4000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F6D0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
212529AC000
|
heap
|
page read and write
|
||
20824993000
|
trusted library allocation
|
page read and write
|
||
2BF33C84000
|
heap
|
page read and write
|
||
1FBD8E7C000
|
trusted library allocation
|
page read and write
|
||
69C913B000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235700D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2BF34188000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE304000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
27453A4C000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC4250000
|
heap
|
page read and write
|
||
21C19320000
|
unkown
|
page execute and read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
21C1BE80000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BF35000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8E37000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2745359C000
|
trusted library allocation
|
page read and write
|
||
23572124000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2746B63E000
|
heap
|
page read and write
|
||
2D978FC000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC42E0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC02000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341E8000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572191000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D975F9000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC5D10000
|
heap
|
page read and write
|
||
1EC0F4C0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC4197000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34234000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208235CE000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34188000
|
heap
|
page read and write
|
||
19EC6378000
|
trusted library allocation
|
page read and write
|
||
235720D4000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32470000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
8633B3B000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21254512000
|
trusted library allocation
|
page read and write
|
||
3D259FD000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
4FB26FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D97073000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1FBD8A30000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B3B8000
|
heap
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page read and write
|
||
1FBF1108000
|
heap
|
page read and write
|
||
2BF32122000
|
heap
|
page read and write
|
||
212544E0000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EED000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9854C000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
DBE86FF000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17A05C24000
|
heap
|
page read and write
|
||
1B9E59D0000
|
heap
|
page read and write
|
||
23572178000
|
heap
|
page read and write
|
||
2BF32183000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2356FFA0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC4240000
|
heap
|
page read and write
|
||
21C1B122000
|
unkown
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6115B3000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720B0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EB0000
|
heap
|
page read and write
|
||
2BF341F3000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1FBD8DC2000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE2FF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BE85000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
17EA8144000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
F4E0CFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C19322000
|
unkown
|
page readonly
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
208211B0000
|
trusted library allocation
|
page read and write
|
||
19EC4040000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C2E1E9000
|
trusted library allocation
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D61379E000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1FBD70B5000
|
heap
|
page read and write
|
||
20823101000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212529C4000
|
heap
|
page read and write
|
||
86327A6000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF33C80000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570115000
|
heap
|
page read and write
|
||
19EC6190000
|
heap
|
page execute and read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
20824225000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
2746B672000
|
heap
|
page read and write
|
||
24ED1FE000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
B6AB1FD000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20821160000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
21252930000
|
heap
|
page read and write
|
||
235700D4000
|
heap
|
page read and write
|
||
1FBF0FA0000
|
heap
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572105000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2083B200000
|
heap
|
page read and write
|
||
23572161000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C2D7E9000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D613230000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC42C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9787F000
|
stack
|
page read and write
|
||
1FBD6E5E000
|
heap
|
page read and write
|
||
F4E11FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320D6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F560000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6FF0000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
A4172FB000
|
stack
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3421A000
|
heap
|
page read and write
|
||
2746B6F7000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572158000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
19EDE272000
|
heap
|
page read and write
|
||
19EC5D15000
|
heap
|
page read and write
|
||
1EC0F570000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD6E34000
|
heap
|
page read and write
|
||
2BF34160000
|
heap
|
page read and write
|
||
23571C7A000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
235700ED000
|
heap
|
page read and write
|
||
1FBF0F63000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
4FB23FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
A416E7F000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
29FBC690000
|
heap
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
27453040000
|
trusted library allocation
|
page read and write
|
||
B6AB4FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
212529AF000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
1FBD6E61000
|
heap
|
page read and write
|
||
1FBF0F76000
|
heap
|
page read and write
|
||
1FBD6EFD000
|
heap
|
page read and write
|
||
2357216F000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320FC000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D2587F000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
19EC6330000
|
trusted library allocation
|
page read and write
|
||
4FB1F3E000
|
stack
|
page read and write
|
||
19EDE2D0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D611710000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572171000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
FBB7A7F000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D61343F000
|
trusted library allocation
|
page read and write
|
||
17EA98E8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341EE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
208230B0000
|
trusted library allocation
|
page read and write
|
||
21C1D872000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720D4000
|
heap
|
page read and write
|
||
2D97576000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
20821245000
|
heap
|
page read and write
|
||
1D62B4B1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
2083B382000
|
heap
|
page read and write
|
||
7FFD9BB12000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32474000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
863373D000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2357010F000
|
heap
|
page read and write
|
||
19ED6241000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9FFD70000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
21C1BE70000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5944000
|
unkown
|
page readonly
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A416923000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D973FB000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32110000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC6241000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
19EC6386000
|
trusted library allocation
|
page read and write
|
||
2083B36A000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
17EA7EB6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA2C000
|
trusted library allocation
|
page execute and read and write
|
||
20824F2B000
|
trusted library allocation
|
page read and write
|
||
375CF8C000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34226000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27452FB0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1B9E5C70000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
21252B30000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
2082406E000
|
trusted library allocation
|
page read and write
|
||
235700D8000
|
heap
|
page read and write
|
||
2BF34224000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1EC0F53A000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
17EA7E30000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B33F000
|
heap
|
page read and write
|
||
23571B90000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
676B2FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC6336000
|
trusted library allocation
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25AFE000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9717E000
|
stack
|
page read and write
|
||
1D6116C0000
|
heap
|
page read and write
|
||
20820F0D000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BC33000
|
heap
|
page read and write
|
||
1D62B730000
|
heap
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
2746B690000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
21C1BB22000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
2083B147000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6136AA000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A416C7E000
|
stack
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B820000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FDB000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
17EA8140000
|
heap
|
page read and write
|
||
1B9F74B9000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
19EC6600000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3211F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
212529B5000
|
heap
|
page read and write
|
||
1D62B4B3000
|
heap
|
page read and write
|
||
27453551000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572124000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
FBB75C3000
|
stack
|
page read and write
|
||
2BF321AE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
ADC66FC000
|
stack
|
page read and write
|
||
2BF341D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D62B5B6000
|
heap
|
page execute and read and write
|
||
1D623301000
|
trusted library allocation
|
page read and write
|
||
17EA7EA8000
|
heap
|
page read and write
|
||
19EC4390000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
21C1A722000
|
unkown
|
page readonly
|
||
29FBC69A000
|
heap
|
page read and write
|
||
269AF945000
|
heap
|
page read and write
|
||
1FBD8E07000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1FBD9138000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
20823D04000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824314000
|
trusted library allocation
|
page read and write
|
||
235720DD000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2746B590000
|
heap
|
page read and write
|
||
1FBD8E86000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
212527C0000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
20822BC5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A4171FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3213A000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC43C5000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357215D000
|
heap
|
page read and write
|
||
19EC41AE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8B7D000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D611519000
|
heap
|
page read and write
|
||
2BF321A7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BEC0000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
208230F0000
|
heap
|
page read and write
|
||
1B9E5C90000
|
heap
|
page execute and read and write
|
||
2BF33DF0000
|
heap
|
page read and write
|
||
2082492D000
|
trusted library allocation
|
page read and write
|
||
20822FC3000
|
heap
|
page read and write
|
||
1D611556000
|
heap
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208229F5000
|
heap
|
page read and write
|
||
1FBD922F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC60D0000
|
heap
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1D6232F1000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA98D0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8A35000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6137F8000
|
trusted library allocation
|
page read and write
|
||
2746B5B7000
|
heap
|
page read and write
|
||
FBB7F3E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
235700C8000
|
heap
|
page read and write
|
||
7DF473980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FD7000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2BF32186000
|
heap
|
page read and write
|
||
21C1BB52000
|
unkown
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27453050000
|
heap
|
page execute and read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235720FC000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EF7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341EE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D982CE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23570044000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
21252850000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C2EBE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
375D2FE000
|
unkown
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E59E6000
|
heap
|
page read and write
|
||
A416F78000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D971FE000
|
stack
|
page read and write
|
||
21C1BBE0000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
3D25D38000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A4169EE000
|
stack
|
page read and write
|
||
19EDE4C0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BBF6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA7E90000
|
heap
|
page read and write
|
||
1B9E5940000
|
unkown
|
page readonly
|
||
1D61381A000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC4A0000
|
heap
|
page read and write
|
||
274515E2000
|
heap
|
page read and write
|
||
1D61334D000
|
trusted library allocation
|
page read and write
|
||
235721AB000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
2BF34236000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BD73000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5D00000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1EC0F530000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EF9000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
20823CFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
208210C0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23571C7F000
|
heap
|
page read and write
|
||
20820F38000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC580000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C280480000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D9834E000
|
stack
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6116D0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
208333ED000
|
trusted library allocation
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
2BF33C8A000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
FBB7D38000
|
stack
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FD3000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D613220000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BB22000
|
unkown
|
page execute and read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B120000
|
heap
|
page read and write
|
||
20824F06000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D61150B000
|
heap
|
page read and write
|
||
2082496C000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822F10000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235700AE000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8F3E000
|
stack
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
235700E9000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D611511000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6133F6000
|
trusted library allocation
|
page read and write
|
||
21C1BE00000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2357219C000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8E89000
|
trusted library allocation
|
page read and write
|
||
1B9E5A14000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC673D000
|
trusted library allocation
|
page read and write
|
||
23570060000
|
heap
|
page read and write
|
||
20823001000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC633D000
|
trusted library allocation
|
page read and write
|
||
1FBE8DEB000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3215B000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BCE8000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235700D1000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
19EC41D7000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C8AFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D61152B000
|
heap
|
page read and write
|
||
F4E0CF2000
|
stack
|
page read and write
|
||
1C2804D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341B0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A416DFF000
|
stack
|
page read and write
|
||
8632FFA000
|
stack
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
FBB7C3F000
|
stack
|
page read and write
|
||
17A05C00000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235721A9000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C28202A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B21C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB2A000
|
trusted library allocation
|
page read and write
|
||
FBB7AFE000
|
stack
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBB3000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF33C86000
|
heap
|
page read and write
|
||
2D972F9000
|
stack
|
page read and write
|
||
2BF34241000
|
heap
|
page read and write
|
||
21C1A722000
|
unkown
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8DA5000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
2BF341F0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34213000
|
heap
|
page read and write
|
||
1B9E5D05000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF33C70000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF320B8000
|
heap
|
page read and write
|
||
3D25F3F000
|
stack
|
page read and write
|
||
1C282120000
|
heap
|
page read and write
|
||
1EC0F571000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC5A0000
|
heap
|
page read and write
|
||
F4E0CED000
|
stack
|
page read and write
|
||
1FBD8EC6000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EB9000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34222000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572192000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
8632DFC000
|
stack
|
page read and write
|
||
19EC6270000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572124000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
8632AFE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
24ED0FD000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34213000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BCD6000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF32126000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C2804C9000
|
heap
|
page read and write
|
||
1B9E5CC0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2082407B000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8D9F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8E8C000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D613434000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C282024000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17EA98E3000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB68000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1C2804E6000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212644F3000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
FBB787F000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8880000
|
trusted library allocation
|
page read and write
|
||
676B1FD000
|
stack
|
page read and write
|
||
2746BBC0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
1B9E5A24000
|
heap
|
page read and write
|
||
235721A2000
|
heap
|
page read and write
|
||
375D3FF000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20824076000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25E3E000
|
stack
|
page read and write
|
||
1D62B470000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572171000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
1D613339000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6133EC000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A41717E000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19ED6231000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD8860000
|
trusted library allocation
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451760000
|
heap
|
page read and write
|
||
21252AC0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572186000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25BF9000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
676AEFF000
|
stack
|
page read and write
|
||
27452F90000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC4150000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1FBF0ED0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC6231000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25FBB000
|
stack
|
page read and write
|
||
21C1BC5F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EC43C0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
23572124000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
19EC423D000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21252980000
|
heap
|
page read and write
|
||
2BF341E3000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3210C000
|
heap
|
page read and write
|
||
2746B770000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
69C90BE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D623360000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20822FAF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D6114B0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
86333FA000
|
stack
|
page read and write
|
||
17A05D00000
|
heap
|
page read and write
|
||
1B9E5BE0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BBB6000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235700D1000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2746B61D000
|
heap
|
page read and write
|
||
212644F7000
|
trusted library allocation
|
page read and write
|
||
19EC66E3000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
20820EF3000
|
heap
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBD7010000
|
heap
|
page read and write
|
||
69C903F000
|
stack
|
page read and write
|
||
23570139000
|
heap
|
page read and write
|
||
23571C70000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
21C1BDE0000
|
heap
|
page read and write
|
||
1FBD6E7F000
|
heap
|
page read and write
|
||
3D25C3E000
|
stack
|
page read and write
|
||
1EC0F6C0000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
235700D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21252AE0000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF0FF0000
|
heap
|
page execute and read and write
|
||
1D613313000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
274635B0000
|
trusted library allocation
|
page read and write
|
||
19EC419D000
|
heap
|
page read and write
|
||
2125450A000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27451795000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1D7E1000
|
trusted library allocation
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
21C1BE50000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
69C8FBE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC696000
|
heap
|
page read and write
|
||
29FBC680000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC691000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
212544F1000
|
trusted library allocation
|
page read and write
|
||
1D62B4F2000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
2745356F000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
20820FA9000
|
heap
|
page read and write
|
||
2745159C000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1FBF14B0000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34191000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
21C1D7FA000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
20821170000
|
heap
|
page readonly
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
24ED4FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5A11000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
235721B0000
|
heap
|
page read and write
|
||
1D62B5B0000
|
heap
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF33C83000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C1BCEB000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1D61150D000
|
heap
|
page read and write
|
||
17EA98E0000
|
heap
|
page read and write
|
||
21C2F5E9000
|
trusted library allocation
|
page read and write
|
||
1D6132F1000
|
trusted library allocation
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF3211F000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
17A05B20000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
212644F1000
|
trusted library allocation
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
19EDE350000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D255F2000
|
stack
|
page read and write
|
||
21254506000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2356FFD0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC69A000
|
heap
|
page read and write
|
||
208230C0000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
1B9E5C80000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21254390000
|
heap
|
page execute and read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
19EC418E000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
29FBC689000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF341DA000
|
heap
|
page read and write
|
||
2D977FC000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
86331FE000
|
stack
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC693000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2745366D000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
1C282028000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
274536A7000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2BF34233000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B97D000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
27463550000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC692000
|
heap
|
page read and write
|
||
24ED2FE000
|
stack
|
page read and write
|
||
21C1D86E000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
21C19D22000
|
unkown
|
page execute and read and write
|
||
2357217C000
|
heap
|
page read and write
|
||
2BF341D8000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
24ECAF4000
|
stack
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
21C1BC31000
|
heap
|
page read and write
|
||
23572198000
|
heap
|
page read and write
|
||
1D611480000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC694000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2083B138000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
A41727F000
|
stack
|
page read and write
|
||
7FFD9BCD9000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
2D983C7000
|
stack
|
page read and write
|
||
1C2804C0000
|
heap
|
page read and write
|
||
20833101000
|
trusted library allocation
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC695000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
19EDE317000
|
heap
|
page read and write
|
||
676B0FF000
|
stack
|
page read and write
|
||
1D6133EF000
|
trusted library allocation
|
page read and write
|
||
29FBC688000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
29FBC7DF000
|
heap
|
page read and write
|
||
3D25DB9000
|
stack
|
page read and write
|
||
21C1BC1F000
|
heap
|
page read and write
|
There are 3187 hidden memdumps, click here to show them.