IOC Report
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?17ef43f9ed42b031

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\AC\INetCache\39XPZQUY\ab[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json.~tmp
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3e84b3.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3e9378.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3e9397.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3eec46.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3efca2.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3f100b.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json~RF3f102a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_0.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_1.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_2.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_3.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_4.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_5.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_6.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_7.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\Canvas_8.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\EngineConfigId.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder (2)\SceneData.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_0.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_1.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_2.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_3.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_4.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_5.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_6.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_7.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_8.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\EngineConfigId.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\SceneData.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json.~tmp
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json~RF3ee4e4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 06:29:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 06:29:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 06:29:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 06:29:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Mar 28 06:29:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\575231e4-3589-4cf5-8fb0-76bc26471e60.tmp
Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
dropped
C:\Users\user\Downloads\pinrulesstl.cab (copy)
Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
dropped
C:\Users\user\Downloads\pinrulesstl.cab.crdownload (copy)
Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
dropped
Chrome Cache Entry: 130
Unicode text, UTF-8 text, with very long lines (3513)
downloaded
Chrome Cache Entry: 131
ASCII text, with very long lines (5266)
downloaded
Chrome Cache Entry: 132
Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
downloaded
Chrome Cache Entry: 133
ASCII text, with very long lines (5266)
downloaded
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?17ef43f9ed42b031
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,17643291499873608431,12210868481373475866,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
"C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"
C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
"C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"

URLs

Name
IP
Malicious
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?17ef43f9ed42b031
https://aka.ms/paint3dhelp
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=7&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.253.122.105
http://ns.a.0(D
unknown
https://hubble.officeapps.live-int.com
unknown
https://www.remix3d.com
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgRmpTArGJW5lLAGIjBHd_AKJiXvmNxa7QOBoMc3TtwL5hSlYsTpvxIHp6hu5gHUnSeQnMynd2baB1bPi2UyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
172.253.122.105
https://login.windows.local1003
unknown
https://www.preview.remix3d.com/
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmpTArGJW5lLAGIjDEtMeSbdsKTFupmRE7XFYXeyEzxbWbjBGXBv4CRFSB_bWJLa0LrH3ZszpniEBwYgQyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
172.253.122.105
https://www.google.com/async/newtab_promos
172.253.122.105
https://www.remix3d.com/_SSL
unknown
http://ns.adobe.ho
unknown
http://json-schema.org/draft-04/schema
unknown
https://api.remix3d.com/v3/creationse
unknown
https://www.remix3d.com/blends/profile
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.253.122.105
https://api.remix3d.com/
unknown
https://www.preview.remix3d.com
unknown
https://www.preview.remix3d.com/details/
unknown
https://www.remix3d.com/details/
unknown
https://hubblecontent.osi.officeppe.netRESP
unknown
https://www.remix3d.com/
unknown
https://www.google.com/async/ddljson?async=ntp:2
172.253.122.105
https://login.windows.local
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
172.253.122.105
https://hubblecontent.osi.office-int.net
unknown
https://api.remix3d.com/v3/creations/
unknown
https://api.remix3d.com/v3/creations
unknown
https://www.preview.remix3d.com/blends/profile
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
172.253.122.105
http://ns.a.0
unknown
https://aka.ms/paint3dhelpHD
unknown
https://hubble-int.azurewebsites.net
unknown
https://hubble-test.azurewebsites.net
unknown
https://www.preview.r
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmpTArGJW5lLAGIjBi9PQhwvCu8xsidkRQK4-Wu-ijFbl2Tn-IJ6uGgADoaLseDc5qoXZTbhrRHGWYJIQyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
172.253.122.105
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.253.62.103

IPs

IP
Domain
Country
Malicious
172.253.122.105
unknown
United States
192.168.2.16
unknown
unknown
239.255.255.250
unknown
Reserved
172.253.62.103
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TELEMETRY.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.SELECTION.SMARTSELECT.3D.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.FILLBUCKET.FILLTYPES.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
EXPORT.OBJ.STL.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\SessionPersistence
App.ShowWelcomeScreen
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\SessionPersistence
App.CurrentColorHexCode
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\SessionPersistence
App.CurrentMaterialData
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Community
App.Community.Language
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Community
App.Community.Locale
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\AppSettingPersistence
APP.LAST.BOOT.FULLNAME
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Community
App.Community.IsOnline
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
App.LastCloudConfig.Version
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.SELECTION.MAGICFILL.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.IMPORT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.2DTOOLS.LINECURVETOOL.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD64.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.EDITINFREEVIEW.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.DUALLAYER.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TIPS.DEEPLINK
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.CMS.CONFIGENDPOINT
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.USEWEBVIEW
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.CLIENTTYPE
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.REQUEST1PHOST
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.MANIPULATION.SNAPANDALIGNMENT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD32.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.FILEOPERATIONS.IMPORT.SEPARATEOBJECTS.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.IMPORT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.EXPORT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.CMS.MINIMUMAPPVERSION
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.GENERALIZEDDUALLAYER.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.ENVIRONMENT
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.CMS.KILLSWITCHTURNEDON
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.EXPORT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
App.Community.EnvironmentName
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
App.Community.DiscoverUriOverride
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
App.Community.TokenScopeOverride
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\UniversalStore
delaySeed
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\UniversalStore
meetsDelayTimestamp
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\UniversalStore
requestAttempts
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\UniversalStore
lastRequestAppVersion
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\UniversalStore
delayResetCount
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp
clientId
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp
lastRequestTimestamp
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
highqualitycapturec
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
aates121cf
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
empro702
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
j0c1f122
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
b37c6811
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
524ea403
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
i47be178
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
h51f0342
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
hde1g267
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
4jjfb768
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
6afgb651
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
50c79106
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
45hig449
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
abi0g817
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values
dif22219
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\EMMX
Prompt-Ruby-To-Anaheim-Rollout
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDriveOnlineSearch_IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDriveOnlineSearch_IndexWarming_IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
ClipChampPromo_TeachingMomentAlternateText_IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
ClipChampPromo-Download-IsMini
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDrive-NotSignedIn-AlternativeText-Value-Int
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDriveOnlineSearch-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
ClipChampPromo-ButtonAlternateText-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
EditHVC-GenerativeErase-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDriveOnlineSearchFallbackFilter-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
OneDriveOnlineSearch-IndexWarming-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
LocationSearch_IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Values\Evoke
LocationSearch-IsEnabled
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-MSEDGE-CLIENTID
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-PHOTOS-CALLERID
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-APPVERSION
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-CANTAILOR
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-HASADID
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-OSVERSION
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-PLATFORM
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-PUBDEVICEID
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-RING
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Headers
X-WINNEXT-TELEMETRYLEVEL
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Metadata
version
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Metadata
impressionId
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Metadata
eTag
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}\Metadata
timestamp
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}
hasUnreadValues
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp
active
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{5bf61754-768f-78a6-cbdb-b36a14904def}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}
hasUnreadValues
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.SELECTION.SMARTSELECT.3D.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.FILLBUCKET.FILLTYPES.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
EXPORT.OBJ.STL.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\SessionPersistence
App.CurrentColorHexCode
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\SessionPersistence
App.CurrentMaterialData
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\Community
App.Community.Language
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\Community
App.Community.Locale
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\Exp\{20d5de4a-12f4-49a1-ad0d-44501eb84c8d}
hasUnreadValues
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\AppSettingPersistence
APP.LAST.BOOT.FULLNAME
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\Community
App.Community.IsOnline
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
App.LastCloudConfig.Version
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.SELECTION.MAGICFILL.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.IMPORT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.2DTOOLS.LINECURVETOOL.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD64.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.EDITINFREEVIEW.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.DUALLAYER.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.TIPS.DEEPLINK
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.CMS.CONFIGENDPOINT
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.USEWEBVIEW
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.CLIENTTYPE
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.REQUEST1PHOST
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.MANIPULATION.SNAPANDALIGNMENT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD32.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.FILEOPERATIONS.IMPORT.SEPARATEOBJECTS.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.IMPORT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.EXPORT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.CMS.MINIMUMAPPVERSION
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.GENERALIZEDDUALLAYER.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.ENVIRONMENT
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.CMS.KILLSWITCHTURNEDON
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.EXPORT.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
App.Community.EnvironmentName
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{95818dee-a11d-4598-26f3-b4f2e3fe8431}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
There are 140 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2148AECA000
heap
page read and write
21806619000
heap
page read and write
2188808C000
heap
page read and write
21880C00000
heap
page read and write
21881CAE000
heap
page read and write
2148D728000
heap
page read and write
21887260000
trusted library allocation
page read and write
21490CC0000
trusted library allocation
page read and write
21493660000
trusted library allocation
page read and write
2187F5C9000
heap
page read and write
21887680000
trusted library allocation
page read and write
218874B8000
heap
page read and write
21886EBB000
heap
page read and write
218805A2000
heap
page read and write
21493900000
trusted library allocation
page read and write
21CF8870000
heap
page read and write
218871D0000
trusted library allocation
page read and write
21490D30000
trusted library allocation
page read and write
218870C0000
trusted library allocation
page read and write
2187F5D2000
heap
page read and write
2148D293000
heap
page read and write
2148AFD1000
heap
page read and write
21494360000
trusted library allocation
page read and write
21494440000
trusted library allocation
page read and write
21493D80000
trusted library allocation
page read and write
214838DD000
heap
page read and write
21886FAB000
heap
page read and write
21494700000
heap
page read and write
2187FD1D000
heap
page read and write
7DF415860000
trusted library allocation
page readonly
21881E33000
heap
page read and write
21887663000
trusted library allocation
page read and write
2187F5B2000
heap
page read and write
21806C5F000
heap
page read and write
21490B0F000
heap
page read and write
218874C2000
heap
page read and write
2148C973000
heap
page read and write
2148C38D000
heap
page read and write
21806D9D000
heap
page read and write
21888040000
trusted library allocation
page read and write
218875F4000
heap
page read and write
21887040000
trusted library allocation
page read and write
218874C8000
heap
page read and write
21881217000
heap
page read and write
21806E89000
heap
page read and write
21887C80000
trusted library allocation
page read and write
2148E5BC000
heap
page read and write
2148E7F8000
heap
page read and write
21494330000
trusted library allocation
page read and write
2148DE5A000
heap
page read and write
218811F0000
heap
page read and write
2148E00A000
heap
page read and write
21806D4F000
heap
page read and write
2188135E000
heap
page read and write
2188184E000
heap
page read and write
21494069000
heap
page read and write
218808A6000
heap
page read and write
2148ADEA000
heap
page read and write
21887650000
trusted library allocation
page read and write
2148CCF0000
trusted library allocation
page read and write
21806C19000
heap
page read and write
214941CF000
heap
page read and write
21881000000
heap
page read and write
218870F3000
trusted library allocation
page read and write
21880340000
trusted library allocation
page read and write
2148E634000
heap
page read and write
214945D8000
heap
page read and write
21494320000
trusted library allocation
page read and write
214943E0000
trusted library allocation
page read and write
2148AF7C000
heap
page read and write
214944A0000
trusted library allocation
page read and write
21806C39000
heap
page read and write
33649FE000
stack
page read and write
21806AC2000
heap
page read and write
21494573000
heap
page read and write
2148DF31000
heap
page read and write
218818AD000
heap
page read and write
218846C0000
trusted library allocation
page read and write
218812AA000
heap
page read and write
214938A0000
trusted library allocation
page read and write
214944CF000
heap
page read and write
36AA2F9000
stack
page read and write
21887BF0000
trusted library allocation
page read and write
2148E7C0000
heap
page read and write
21490C50000
trusted library allocation
page read and write
21880992000
heap
page read and write
21494136000
heap
page read and write
21880F50000
trusted library allocation
page read and write
218821AB000
heap
page read and write
21806FEE000
heap
page read and write
218843C3000
heap
page read and write
21493B70000
trusted library allocation
page read and write
2148E6D6000
heap
page read and write
21887C40000
trusted library allocation
page read and write
21887680000
trusted library allocation
page read and write
21490DA0000
trusted library allocation
page read and write
2148AFB3000
heap
page read and write
21887B73000
trusted library allocation
page read and write
21490B18000
heap
page read and write
2148C056000
heap
page read and write
21494310000
trusted library allocation
page read and write
2187FDAA000
heap
page read and write
21494560000
trusted library allocation
page read and write
218878C0000
trusted library allocation
page read and write
21806D77000
heap
page read and write
2148C1C7000
heap
page read and write
21887DA0000
trusted library allocation
page read and write
2148C3CD000
heap
page read and write
21887FC6000
heap
page read and write
21881D23000
heap
page read and write
21887CD0000
trusted library allocation
page read and write
2148CA00000
heap
page read and write
2148D7F3000
heap
page read and write
21880CD5000
heap
page read and write
21881FAB000
heap
page read and write
21887EE1000
heap
page read and write
218066ED000
heap
page read and write
21806D00000
heap
page read and write
21494AB0000
trusted library allocation
page read and write
21806AA1000
heap
page read and write
21806DDE000
heap
page read and write
2148E286000
heap
page read and write
2148AB2C000
heap
page read and write
21887200000
trusted library allocation
page read and write
218801AC000
heap
page read and write
2148C9BA000
heap
page read and write
2148E2E6000
heap
page read and write
2148E2A8000
heap
page read and write
21880BE0000
heap
page read and write
21806C4E000
heap
page read and write
2187FD82000
heap
page read and write
21887D10000
trusted library allocation
page read and write
21887D00000
trusted library allocation
page read and write
2188207A000
heap
page read and write
2148D92F000
heap
page read and write
2148C1F2000
heap
page read and write
214942A0000
trusted library allocation
page read and write
218808BE000
heap
page read and write
36A84FF000
stack
page read and write
21493E80000
trusted library allocation
page read and write
21888043000
heap
page read and write
21490B02000
heap
page read and write
33639FE000
stack
page read and write
21881ADE000
heap
page read and write
2148AF1A000
heap
page read and write
2148E6FB000
heap
page read and write
21490B1C000
heap
page read and write
21493600000
trusted library allocation
page read and write
21494470000
trusted library allocation
page read and write
21887053000
trusted library allocation
page read and write
2148E6E5000
heap
page read and write
21493EA0000
trusted library allocation
page read and write
2148C10A000
heap
page read and write
21886EE5000
heap
page read and write
21493E60000
trusted library allocation
page read and write
2188085C000
heap
page read and write
2148E67E000
heap
page read and write
218891A4000
heap
page read and write
2148CBF4000
heap
page read and write
2148E6EA000
heap
page read and write
21887BA0000
trusted library allocation
page read and write
218811A9000
heap
page read and write
2148E456000
heap
page read and write
36A9DFC000
stack
page read and write
21807D50000
heap
page read and write
21494250000
trusted library allocation
page read and write
21493D00000
trusted library allocation
page read and write
21806BB7000
heap
page read and write
21880049000
heap
page read and write
21495010000
heap
page read and write
2148CA02000
heap
page read and write
2148C23E000
heap
page read and write
21493B90000
trusted library allocation
page read and write
218870E0000
trusted library allocation
page read and write
21880600000
trusted library allocation
page read and write
2148C045000
heap
page read and write
21887BE3000
trusted library allocation
page read and write
2327D2C000
stack
page read and write
21881E27000
heap
page read and write
21494860000
trusted library allocation
page read and write
21494340000
trusted library allocation
page read and write
2148AEC0000
heap
page read and write
21888000000
trusted library allocation
page read and write
2188084C000
heap
page read and write
21887C00000
trusted library allocation
page read and write
21493B80000
trusted library allocation
page read and write
2148AEC6000
heap
page read and write
3363CFC000
stack
page read and write
21806BFD000
heap
page read and write
2148E64C000
heap
page read and write
2148E74B000
heap
page read and write
21493970000
trusted library allocation
page read and write
214943E0000
trusted library allocation
page read and write
21881014000
heap
page read and write
2148C1CD000
heap
page read and write
21881F9F000
heap
page read and write
21493A30000
trusted library allocation
page read and write
2188126F000
heap
page read and write
21881AAD000
heap
page read and write
21887BD0000
trusted library allocation
page read and write
21887A20000
trusted library allocation
page read and write
21887C30000
trusted library allocation
page read and write
21881C5D000
heap
page read and write
21881FFD000
heap
page read and write
21806D50000
heap
page read and write
21494550000
trusted library allocation
page read and write
21880135000
heap
page read and write
21887290000
trusted library allocation
page read and write
21881BE6000
heap
page read and write
2148CBD5000
heap
page read and write
2148CC20000
trusted library allocation
page read and write
7DF4158A0000
trusted library allocation
page readonly
21493880000
trusted library allocation
page read and write
21806DE1000
heap
page read and write
21882000000
heap
page read and write
2148CBF1000
heap
page read and write
21887E60000
trusted library allocation
page read and write
21887670000
trusted library allocation
page read and write
2148ABA4000
heap
page read and write
21493AE0000
trusted library allocation
page read and write
21881138000
heap
page read and write
21882045000
heap
page read and write
214946EE000
heap
page read and write
2148D66B000
heap
page read and write
2148C3EE000
heap
page read and write
21888002000
heap
page read and write
21806BB8000
heap
page read and write
2148E697000
heap
page read and write
21887DF0000
trusted library allocation
page read and write
2149353A000
heap
page read and write
21493930000
trusted library allocation
page read and write
2148DF41000
heap
page read and write
21882171000
heap
page read and write
218874F9000
heap
page read and write
2187F5EB000
heap
page read and write
21490A43000
heap
page read and write
2148E759000
heap
page read and write
2148CF05000
heap
page read and write
21881E2D000
heap
page read and write
2148E6E0000
heap
page read and write
218874CB000
heap
page read and write
2148E435000
heap
page read and write
21886F07000
heap
page read and write
2148C3E0000
heap
page read and write
21806E1B000
heap
page read and write
21806BAE000
heap
page read and write
21490C10000
trusted library allocation
page read and write
2187FD00000
heap
page read and write
21886FA7000
heap
page read and write
21887B70000
trusted library allocation
page read and write
214951F0000
heap
page read and write
21494400000
trusted library allocation
page read and write
21493E40000
trusted library allocation
page read and write
218843BC000
heap
page read and write
21493890000
trusted library allocation
page read and write
21881E00000
heap
page read and write
21887CB0000
trusted library allocation
page read and write
21490D20000
trusted library allocation
page read and write
214940DD000
heap
page read and write
21494449000
heap
page read and write
2148AF69000
heap
page read and write
2187F55E000
heap
page read and write
2148AF15000
heap
page read and write
214940CA000
heap
page read and write
21884660000
trusted library allocation
page read and write
21881A7A000
heap
page read and write
218847A0000
trusted library allocation
page read and write
33640FD000
stack
page read and write
21806BF5000
heap
page read and write
214941A7000
heap
page read and write
21888020000
trusted library allocation
page read and write
214839AE000
heap
page read and write
21887E87000
heap
page read and write
2148C200000
heap
page read and write
21493EF0000
trusted library allocation
page read and write
21806BFA000
heap
page read and write
21806E34000
heap
page read and write
2187F545000
heap
page read and write
21493A40000
trusted library allocation
page read and write
2148E6C0000
heap
page read and write
21880536000
heap
page read and write
2148D7EE000
heap
page read and write
21493830000
trusted library allocation
page read and write
2148AF6F000
heap
page read and write
2188803B000
heap
page read and write
3363AF9000
stack
page read and write
21887110000
trusted library allocation
page read and write
21494A00000
trusted library allocation
page read and write
21887390000
trusted library allocation
page read and write
21881E6A000
heap
page read and write
2148AB40000
heap
page read and write
21880539000
heap
page read and write
21806E88000
heap
page read and write
21493B30000
trusted library allocation
page read and write
21806DDD000
heap
page read and write
2188808E000
heap
page read and write
21881A90000
heap
page read and write
21490960000
trusted library allocation
page read and write
21887E9A000
heap
page read and write
21490A54000
heap
page read and write
33658FC000
stack
page read and write
21490B5C000
heap
page read and write
3366BFE000
stack
page read and write
21884560000
trusted library allocation
page read and write
21886DF0000
trusted library allocation
page read and write
2148D8CA000
heap
page read and write
218808BA000
heap
page read and write
21884470000
trusted library allocation
page read and write
2148BD04000
heap
page read and write
21493F00000
trusted library allocation
page read and write
218843F5000
heap
page read and write
214951B3000
heap
page read and write
21493FC0000
trusted library allocation
page read and write
21880843000
heap
page read and write
2188136F000
heap
page read and write
21806B9F000
heap
page read and write
2148ADA5000
heap
page read and write
218882A0000
trusted library allocation
page read and write
218871B0000
trusted library allocation
page read and write
7DF4158D0000
trusted library allocation
page readonly
2148D7AD000
heap
page read and write
2187F5F3000
heap
page read and write
2148C085000
heap
page read and write
21493950000
trusted library allocation
page read and write
2148D22B000
heap
page read and write
21887690000
trusted library allocation
page read and write
2148E763000
heap
page read and write
2148C05F000
heap
page read and write
21888280000
trusted library allocation
page read and write
2148CCD0000
trusted library allocation
page read and write
21887050000
trusted library allocation
page read and write
21806BDC000
heap
page read and write
21483800000
heap
page read and write
21887E9C000
heap
page read and write
218069EA000
heap
page read and write
7DF415881000
trusted library allocation
page execute read
21887F6F000
heap
page read and write
214945E3000
heap
page read and write
21881E66000
heap
page read and write
2148B8D7000
heap
page read and write
2148E09C000
heap
page read and write
21884750000
trusted library allocation
page read and write
214937B0000
trusted library allocation
page read and write
21886E94000
heap
page read and write
2148C094000
heap
page read and write
21494810000
trusted library allocation
page read and write
214948E0000
trusted library allocation
page read and write
218871E0000
trusted library allocation
page read and write
21887E6D000
heap
page read and write
2148C012000
heap
page read and write
21483874000
heap
page read and write
21490C10000
trusted library allocation
page read and write
2148D9F7000
heap
page read and write
21882163000
heap
page read and write
21880870000
heap
page read and write
2148E2B9000
heap
page read and write
2148E69F000
heap
page read and write
2148AF6F000
heap
page read and write
33656FC000
stack
page read and write
21493C00000
trusted library allocation
page read and write
214938E0000
trusted library allocation
page read and write
21493AA0000
trusted library allocation
page read and write
21887D10000
trusted library allocation
page read and write
2148C139000
heap
page read and write
2148AF68000
heap
page read and write
7DF415910000
trusted library allocation
page readonly
21490A1F000
heap
page read and write
21882180000
heap
page read and write
21806DA0000
heap
page read and write
218811BC000
heap
page read and write
21887DB0000
trusted library allocation
page read and write
218821BB000
heap
page read and write
21887E20000
trusted library allocation
page read and write
21806DE7000
heap
page read and write
21490A39000
heap
page read and write
214934FD000
heap
page read and write
21493BA0000
trusted library allocation
page read and write
214934A0000
heap
page read and write
21880D02000
heap
page read and write
21494A70000
trusted library allocation
page read and write
2149403B000
heap
page read and write
21887BB3000
trusted library allocation
page read and write
2187F5C9000
heap
page read and write
21807C78000
heap
page read and write
21806C2C000
heap
page read and write
21881300000
heap
page read and write
2188001F000
heap
page read and write
218845E3000
trusted library allocation
page read and write
21493524000
heap
page read and write
214938F0000
trusted library allocation
page read and write
214943F0000
trusted library allocation
page read and write
21881ADB000
heap
page read and write
21806C49000
heap
page read and write
21887C20000
trusted library allocation
page read and write
2148E74F000
heap
page read and write
2188215F000
heap
page read and write
21887BB0000
trusted library allocation
page read and write
2148E057000
heap
page read and write
21888061000
heap
page read and write
21493870000
trusted library allocation
page read and write
21493850000
trusted library allocation
page read and write
21887080000
trusted library allocation
page read and write
21881AC5000
heap
page read and write
21494702000
heap
page read and write
218821BD000
heap
page read and write
214934FC000
heap
page read and write
218066C5000
heap
page read and write
21493F70000
trusted library allocation
page read and write
21881A9A000
heap
page read and write
21494AC0000
trusted library allocation
page read and write
21887DC0000
trusted library allocation
page read and write
218810E9000
heap
page read and write
21485D72000
heap
page read and write
21494072000
heap
page read and write
2148C8EA000
heap
page read and write
218870D0000
trusted library allocation
page read and write
2187F5A9000
heap
page read and write
21CF85B0000
heap
page read and write
21490B02000
heap
page read and write
21881E55000
heap
page read and write
21806C1F000
heap
page read and write
21490950000
trusted library allocation
page read and write
214909F3000
trusted library allocation
page read and write
21887BE0000
trusted library allocation
page read and write
218880C5000
heap
page read and write
214941CF000
heap
page read and write
218870B0000
trusted library allocation
page read and write
2188187B000
heap
page read and write
21493AC0000
trusted library allocation
page read and write
21887C00000
trusted library allocation
page read and write
218821E5000
heap
page read and write
21493B70000
trusted library allocation
page read and write
2148CC70000
trusted library allocation
page read and write
21887C30000
trusted library allocation
page read and write
2148D87F000
heap
page read and write
21494380000
trusted library allocation
page read and write
21887F7A000
heap
page read and write
218873E0000
trusted library allocation
page read and write
21806746000
heap
page read and write
21881A72000
heap
page read and write
21888100000
heap
page read and write
21884650000
trusted library allocation
page read and write
36A91FE000
stack
page read and write
21CF88A5000
heap
page read and write
21881E3D000
heap
page read and write
2149353A000
heap
page read and write
21887B70000
trusted library allocation
page read and write
2148AE60000
heap
page read and write
2327DAE000
stack
page read and write
21880310000
trusted library allocation
page read and write
21494840000
trusted library allocation
page read and write
21806702000
heap
page read and write
21887010000
trusted library allocation
page read and write
21881EA4000
heap
page read and write
2148C252000
heap
page read and write
21490C80000
trusted library allocation
page read and write
21806E51000
heap
page read and write
21493990000
trusted library allocation
page read and write
21493D30000
trusted library allocation
page read and write
21887FD0000
heap
page read and write
2187F44A000
heap
page read and write
21806CCD000
heap
page read and write
21887690000
trusted library allocation
page read and write
218821E9000
heap
page read and write
21888370000
trusted library allocation
page read and write
21882184000
heap
page read and write
214933E0000
trusted library allocation
page read and write
21494900000
trusted library allocation
page read and write
21886EE1000
heap
page read and write
214938B0000
trusted library allocation
page read and write
2188746D000
heap
page read and write
2148C1C7000
heap
page read and write
21887C60000
trusted library allocation
page read and write
218821C9000
heap
page read and write
21887D80000
trusted library allocation
page read and write
21880831000
heap
page read and write
21806BB5000
heap
page read and write
214938C0000
trusted library allocation
page read and write
2188808C000
heap
page read and write
2148CC50000
trusted library allocation
page read and write
21887474000
heap
page read and write
2148384F000
heap
page read and write
2148AFBA000
heap
page read and write
21887930000
trusted library allocation
page read and write
21887BD0000
trusted library allocation
page read and write
21886EE1000
heap
page read and write
21886D90000
trusted library allocation
page read and write
21887660000
trusted library allocation
page read and write
21493DD0000
trusted library allocation
page read and write
21884344000
heap
page read and write
21880CA1000
heap
page read and write
2148C1F9000
heap
page read and write
218806B3000
trusted library allocation
page read and write
218846B0000
trusted library allocation
page read and write
2148CF0A000
heap
page read and write
21806C00000
heap
page read and write
2187FDCC000
heap
page read and write
21884300000
heap
page read and write
21494450000
trusted library allocation
page read and write
21493C10000
trusted library allocation
page read and write
21886EE4000
heap
page read and write
21806DE3000
heap
page read and write
2148C25A000
heap
page read and write
21886DD0000
trusted library allocation
page read and write
21880893000
heap
page read and write
2148E699000
heap
page read and write
2148BCC7000
heap
page read and write
2188116D000
heap
page read and write
21884670000
trusted library allocation
page read and write
214945D2000
heap
page read and write
21493390000
trusted library allocation
page read and write
21494220000
trusted library allocation
page read and write
21493600000
trusted library allocation
page read and write
2148E7C2000
heap
page read and write
2148E6A1000
heap
page read and write
21888010000
trusted library allocation
page read and write
2148C390000
heap
page read and write
2148DF69000
heap
page read and write
2148DE8C000
heap
page read and write
21888051000
heap
page read and write
2148E6C0000
heap
page read and write
21493710000
trusted library allocation
page read and write
2149406F000
heap
page read and write
2148E7EE000
heap
page read and write
218820CD000
heap
page read and write
2188743E000
heap
page read and write
2188802A000
heap
page read and write
21493B70000
trusted library allocation
page read and write
214839A7000
heap
page read and write
21490800000
heap
page read and write
214945E6000
heap
page read and write
2187F5DA000
heap
page read and write
218846D0000
trusted library allocation
page read and write
21886F10000
heap
page read and write
2188094D000
heap
page read and write
21887DD0000
trusted library allocation
page read and write
2148AEAC000
heap
page read and write
214933D0000
trusted library allocation
page read and write
21806DBF000
heap
page read and write
2148C354000
heap
page read and write
214942E0000
trusted library allocation
page read and write
218066D1000
heap
page read and write
2187F534000
heap
page read and write
2148E513000
heap
page read and write
2187F57C000
heap
page read and write
2148AC8A000
heap
page read and write
21493930000
trusted library allocation
page read and write
21493790000
trusted library allocation
page read and write
21886E3D000
heap
page read and write
218870C0000
trusted library allocation
page read and write
21886FE8000
heap
page read and write
218873F0000
trusted library allocation
page read and write
21493810000
trusted library allocation
page read and write
214938F0000
trusted library allocation
page read and write
21887BA0000
trusted library allocation
page read and write
2148C1EC000
heap
page read and write
3363EFE000
stack
page read and write
21881DAD000
heap
page read and write
2148E74F000
heap
page read and write
21881A0A000
heap
page read and write
218808C0000
heap
page read and write
2148D5D0000
trusted library allocation
page read and write
21887B90000
trusted library allocation
page read and write
21887C40000
trusted library allocation
page read and write
2148E4CC000
heap
page read and write
21880C51000
heap
page read and write
21887C70000
trusted library allocation
page read and write
21493880000
trusted library allocation
page read and write
21881422000
trusted library allocation
page read and write
21887CB0000
trusted library allocation
page read and write
21493E70000
trusted library allocation
page read and write
21887BA0000
trusted library allocation
page read and write
21886FBB000
heap
page read and write
214938D0000
trusted library allocation
page read and write
21881A75000
heap
page read and write
21887C30000
trusted library allocation
page read and write
2148C2B9000
heap
page read and write
21493DF0000
trusted library allocation
page read and write
21490C23000
trusted library allocation
page read and write
21493900000
trusted library allocation
page read and write
214937A0000
trusted library allocation
page read and write
21494500000
trusted library allocation
page read and write
21493B00000
trusted library allocation
page read and write
21887130000
trusted library allocation
page read and write
7DF415960000
trusted library allocation
page readonly
21887FDD000
heap
page read and write
21494340000
trusted library allocation
page read and write
2148C19D000
heap
page read and write
2148BBF7000
heap
page read and write
214941CF000
heap
page read and write
21887455000
heap
page read and write
21887B70000
trusted library allocation
page read and write
21887190000
trusted library allocation
page read and write
21490C60000
trusted library allocation
page read and write
21493AB0000
trusted library allocation
page read and write
21493840000
trusted library allocation
page read and write
21887B60000
trusted library allocation
page read and write
7DF415891000
trusted library allocation
page execute read
214938C0000
trusted library allocation
page read and write
21806AAC000
heap
page read and write
214839B3000
heap
page read and write
218803C0000
trusted library allocation
page read and write
21882161000
heap
page read and write
21490D60000
trusted library allocation
page read and write
21806724000
heap
page read and write
21806AD4000
heap
page read and write
2187F413000
heap
page read and write
2148C33B000
heap
page read and write
21807C34000
heap
page read and write
21880F80000
trusted library allocation
page read and write
36A89FF000
stack
page read and write
21888310000
trusted library allocation
page read and write
2148E671000
heap
page read and write
21880879000
heap
page read and write
21493860000
trusted library allocation
page read and write
21494830000
trusted library allocation
page read and write
36A8CFE000
stack
page read and write
21490C40000
trusted library allocation
page read and write
218801A8000
heap
page read and write
7DF415901000
trusted library allocation
page execute read
21493A10000
trusted library allocation
page read and write
21888085000
heap
page read and write
21887D30000
trusted library allocation
page read and write
21806E97000
heap
page read and write
21493E70000
trusted library allocation
page read and write
7DF4158F1000
trusted library allocation
page execute read
21806DED000
heap
page read and write
21884480000
trusted library allocation
page read and write
21806D3C000
heap
page read and write
21884590000
trusted library allocation
page read and write
214945F6000
heap
page read and write
21493603000
trusted library allocation
page read and write
21806E8A000
heap
page read and write
2148C1E2000
heap
page read and write
21494436000
heap
page read and write
214908B0000
trusted library allocation
page read and write
21490A43000
heap
page read and write
7DF415920000
trusted library allocation
page readonly
21494023000
heap
page read and write
21494831000
heap
page read and write
21887AF0000
trusted library allocation
page read and write
218871A0000
trusted library allocation
page read and write
218801C9000
heap
page read and write
21887E10000
trusted library allocation
page read and write
21806C88000
heap
page read and write
21887EF0000
heap
page read and write
2148E68E000
heap
page read and write
214909C0000
trusted library allocation
page read and write
21493FA0000
trusted library allocation
page read and write
21882165000
heap
page read and write
2148E711000
heap
page read and write
2148E7BD000
heap
page read and write
2148AF29000
heap
page read and write
214938B0000
trusted library allocation
page read and write
2148DFF1000
heap
page read and write
21886EEC000
heap
page read and write
218877E0000
trusted library allocation
page read and write
21881ABF000
heap
page read and write
2148E73C000
heap
page read and write
2148C02C000
heap
page read and write
21886FB7000
heap
page read and write
2148AF32000
heap
page read and write
21887B50000
trusted library allocation
page read and write
218870F0000
trusted library allocation
page read and write
33641FC000
stack
page read and write
2148E113000
heap
page read and write
2148AEE3000
heap
page read and write
36A98FF000
stack
page read and write
2187F4FD000
heap
page read and write
21493DC0000
trusted library allocation
page read and write
21887D00000
trusted library allocation
page read and write
218811B8000
heap
page read and write
21880620000
trusted library allocation
page read and write
21490890000
trusted library allocation
page read and write
21887C60000
trusted library allocation
page read and write
21493900000
trusted library allocation
page read and write
21493890000
trusted library allocation
page read and write
2148C3E4000
heap
page read and write
33655FC000
stack
page read and write
2148C37C000
heap
page read and write
21888220000
trusted library allocation
page read and write
2148CE5D000
heap
page read and write
2148E780000
heap
page read and write
21493C90000
trusted library allocation
page read and write
2148AC49000
heap
page read and write
21490D80000
trusted library allocation
page read and write
21493BE0000
trusted library allocation
page read and write
214938F0000
trusted library allocation
page read and write
2148D580000
trusted library allocation
page read and write
2148E5ED000
heap
page read and write
2148E73B000
heap
page read and write
2148D76A000
heap
page read and write
21485A40000
heap
page read and write
36A88FF000
stack
page read and write
2148DECB000
heap
page read and write
2148E67E000
heap
page read and write
21886FC1000
heap
page read and write
36A82E9000
stack
page read and write
2148C017000
heap
page read and write
21490A4D000
heap
page read and write
214934E1000
heap
page read and write
2148DF29000
heap
page read and write
21880090000
heap
page read and write
36A8BFE000
stack
page read and write
21881062000
heap
page read and write
2148D706000
heap
page read and write
2148C1C4000
heap
page read and write
2148AD78000
heap
page read and write
21881A13000
heap
page read and write
3365EFD000
stack
page read and write
21884730000
trusted library allocation
page read and write
21887D90000
trusted library allocation
page read and write
21807C80000
heap
page read and write
2188194E000
heap
page read and write
21494B50000
trusted library allocation
page read and write
21887BD0000
trusted library allocation
page read and write
21887C40000
trusted library allocation
page read and write
21887F02000
heap
page read and write
21490B1A000
heap
page read and write
214943A0000
trusted library allocation
page read and write
21806E18000
heap
page read and write
2148AF1F000
heap
page read and write
2148BD13000
heap
page read and write
21806837000
heap
page read and write
21806B57000
heap
page read and write
21887D70000
trusted library allocation
page read and write
21806CA9000
heap
page read and write
21887C30000
trusted library allocation
page read and write
214941B4000
heap
page read and write
21806DEB000
heap
page read and write
21881AA0000
heap
page read and write
21806DCE000
heap
page read and write
2148E763000
heap
page read and write
21490C03000
trusted library allocation
page read and write
21881B1B000
heap
page read and write
2148C1CD000
heap
page read and write
21806C77000
heap
page read and write
21886EEC000
heap
page read and write
2188119A000
heap
page read and write
2148E413000
heap
page read and write
21886FA5000
heap
page read and write
214939C0000
trusted library allocation
page read and write
21806C7E000
heap
page read and write
218808B2000
heap
page read and write
2148D713000
heap
page read and write
2148DF83000
heap
page read and write
218808B4000
heap
page read and write
214934B0000
heap
page read and write
21494861000
heap
page read and write
21806D39000
heap
page read and write
214936A0000
trusted library allocation
page read and write
2148DF43000
heap
page read and write
21806BE1000
heap
page read and write
2188192C000
heap
page read and write
214940C9000
heap
page read and write
21806CDE000
heap
page read and write
214909F0000
trusted library allocation
page read and write
21887E9B000
heap
page read and write
2148DF96000
heap
page read and write
21887C50000
trusted library allocation
page read and write
2148C052000
heap
page read and write
2148DEE8000
heap
page read and write
2187F4F7000
heap
page read and write
214838EA000
heap
page read and write
2148C05C000
heap
page read and write
214938A0000
trusted library allocation
page read and write
21490C70000
trusted library allocation
page read and write
21495167000
heap
page read and write
7DF4158C1000
trusted library allocation
page execute read
21881D15000
heap
page read and write
218806C0000
trusted library allocation
page read and write
21881119000
heap
page read and write
21493E60000
trusted library allocation
page read and write
21493393000
trusted library allocation
page read and write
21490880000
trusted library allocation
page read and write
21490B6F000
heap
page read and write
2148C054000
heap
page read and write
21880872000
heap
page read and write
218872D0000
trusted library allocation
page read and write
21490CC0000
trusted library allocation
page read and write
2148A950000
trusted library allocation
page read and write
21494451000
heap
page read and write
21493BB3000
trusted library allocation
page read and write
218882E0000
trusted library allocation
page read and write
2148AE57000
heap
page read and write
2148C020000
heap
page read and write
21880FE0000
trusted library allocation
page read and write
2148CCE0000
trusted library allocation
page read and write
214937A3000
trusted library allocation
page read and write
3364BFF000
stack
page read and write
21494480000
trusted library allocation
page read and write
21887CA0000
trusted library allocation
page read and write
2148E6B1000
heap
page read and write
2187F5AE000
heap
page read and write
2148D22D000
heap
page read and write
2148D8ED000
heap
page read and write
21887670000
trusted library allocation
page read and write
21493890000
trusted library allocation
page read and write
21806DEB000
heap
page read and write
2149485D000
heap
page read and write
21887BE0000
trusted library allocation
page read and write
21886EE1000
heap
page read and write
21493830000
trusted library allocation
page read and write
21494520000
trusted library allocation
page read and write
218846D0000
trusted library allocation
page read and write
21887650000
trusted library allocation
page read and write
2148D5C0000
trusted library allocation
page read and write
21807D04000
heap
page read and write
2148AFEA000
heap
page read and write
21884730000
trusted library allocation
page read and write
218821D3000
heap
page read and write
21887C80000
trusted library allocation
page read and write
2149343D000
heap
page read and write
21806C2A000
heap
page read and write
214938C0000
trusted library allocation
page read and write
21887780000
trusted library allocation
page read and write
21806BC5000
heap
page read and write
21887C20000
trusted library allocation
page read and write
21887E00000
trusted library allocation
page read and write
21887B80000
trusted library allocation
page read and write
218872A0000
trusted library allocation
page read and write
2148AF8A000
heap
page read and write
218874D3000
heap
page read and write
218870A0000
trusted library allocation
page read and write
21888174000
heap
page read and write
21880913000
heap
page read and write
21490A00000
heap
page read and write
2148D303000
heap
page read and write
2148E7C5000
heap
page read and write
33652FC000
stack
page read and write
21887680000
trusted library allocation
page read and write
21881E83000
heap
page read and write
218872B0000
trusted library allocation
page read and write
21887690000
trusted library allocation
page read and write
21887C20000
trusted library allocation
page read and write
21884660000
trusted library allocation
page read and write
36A8FFF000
stack
page read and write
2148CCF0000
trusted library allocation
page read and write
21881313000
heap
page read and write
21886E9E000
heap
page read and write
21493860000
trusted library allocation
page read and write
2148D5F0000
trusted library allocation
page read and write
21887500000
heap
page read and write
21887C90000
trusted library allocation
page read and write
21806A00000
heap
page read and write
21880D13000
heap
page read and write
21490940000
trusted library allocation
page read and write
21887CE0000
trusted library allocation
page read and write
21806C12000
heap
page read and write
2148CCA0000
trusted library allocation
page read and write
214937B0000
trusted library allocation
page read and write
21887BD0000
trusted library allocation
page read and write
2148ABD0000
heap
page read and write
2148E759000
heap
page read and write
2148E67A000
heap
page read and write
218077E9000
heap
page read and write
2187F4E3000
heap
page read and write
214943E0000
trusted library allocation
page read and write
21887436000
heap
page read and write
21887B60000
trusted library allocation
page read and write
2148AB24000
heap
page read and write
214945B0000
trusted library allocation
page read and write
21887A00000
trusted library allocation
page read and write
214945C4000
heap
page read and write
2187F5AC000
heap
page read and write
21493800000
trusted library allocation
page read and write
214944CF000
heap
page read and write
2148CB00000
heap
page read and write
21887A30000
trusted library allocation
page read and write
7DF4158F0000
trusted library allocation
page readonly
21494400000
heap
page read and write
21493940000
trusted library allocation
page read and write
21886FB3000
heap
page read and write
21483913000
heap
page read and write
2148E68B000
heap
page read and write
2148E76C000
heap
page read and write
214938E0000
trusted library allocation
page read and write
2148C04C000
heap
page read and write
21494068000
heap
page read and write
21493760000
trusted library allocation
page read and write
21494A50000
trusted library allocation
page read and write
21884683000
trusted library allocation
page read and write
21880F60000
trusted library allocation
page read and write
2148E3C3000
heap
page read and write
21887CD0000
trusted library allocation
page read and write
21490C20000
trusted library allocation
page read and write
21887F21000
heap
page read and write
21887FCD000
heap
page read and write
2148ACFE000
heap
page read and write
2148AFA2000
heap
page read and write
2148D223000
heap
page read and write
7DF415A61000
trusted library allocation
page execute read
21886EB9000
heap
page read and write
2187F4DD000
heap
page read and write
214937A0000
trusted library allocation
page read and write
21806C4E000
heap
page read and write
21887B90000
trusted library allocation
page read and write
21880F90000
trusted library allocation
page read and write
21880900000
heap
page read and write
2148D590000
trusted library allocation
page read and write
36A83FE000
stack
page read and write
21493A20000
trusted library allocation
page read and write
2149444C000
heap
page read and write
2148E0B9000
heap
page read and write
214934F6000
heap
page read and write
21886FF7000
heap
page read and write
21887C70000
trusted library allocation
page read and write
2148E0AD000
heap
page read and write
21887D30000
trusted library allocation
page read and write
2148E64C000
heap
page read and write
21494460000
trusted library allocation
page read and write
2148CCF3000
trusted library allocation
page read and write
214946DC000
heap
page read and write
214937D0000
trusted library allocation
page read and write
2148C37F000
heap
page read and write
21806600000
heap
page read and write
2148CD00000
trusted library allocation
page read and write
21886D80000
trusted library allocation
page read and write
21493900000
trusted library allocation
page read and write
21807FE0000
heap
page read and write
2148B010000
heap
page read and write
21887523000
heap
page read and write
2148D65C000
heap
page read and write
218819EB000
heap
page read and write
21494061000
heap
page read and write
2187F509000
heap
page read and write
2148E7A9000
heap
page read and write
218805D3000
heap
page read and write
2148C1E1000
heap
page read and write
21806B53000
heap
page read and write
2148C97E000
heap
page read and write
21806B88000
heap
page read and write
2148C253000
heap
page read and write
2148C139000
heap
page read and write
21806AC6000
heap
page read and write
21483934000
heap
page read and write
21887C60000
trusted library allocation
page read and write
21806AD6000
heap
page read and write
21806B16000
heap
page read and write
21494850000
trusted library allocation
page read and write
2148D28C000
heap
page read and write
2148E073000
heap
page read and write
2148C0ED000
heap
page read and write
21887F6C000
heap
page read and write
218846B3000
trusted library allocation
page read and write
7DF415931000
trusted library allocation
page execute read
218805BA000
heap
page read and write
218882F0000
trusted library allocation
page read and write
2148C036000
heap
page read and write
21884650000
trusted library allocation
page read and write
21887730000
trusted library allocation
page read and write
2148E367000
heap
page read and write
21888320000
trusted library allocation
page read and write
2148E6B3000
heap
page read and write
21490C40000
trusted library allocation
page read and write
21806695000
heap
page read and write
21887C40000
trusted library allocation
page read and write
21493E50000
trusted library allocation
page read and write
2148E6C3000
heap
page read and write
21806CEF000
heap
page read and write
2148E6B3000
heap
page read and write
21887C20000
trusted library allocation
page read and write
2148C25D000
heap
page read and write
214938C0000
trusted library allocation
page read and write
218803A0000
trusted library allocation
page read and write
218879D0000
trusted library allocation
page read and write
21887660000
trusted library allocation
page read and write
21494195000
heap
page read and write
2148D570000
heap
page read and write
21881977000
heap
page read and write
218882C0000
trusted library allocation
page read and write
218877B0000
trusted library allocation
page read and write
21887FD9000
heap
page read and write
21887448000
heap
page read and write
2148AFAA000
heap
page read and write
21881AB1000
heap
page read and write
21490C30000
trusted library allocation
page read and write
7DF415871000
trusted library allocation
page execute read
2148E323000
heap
page read and write
21806C45000
heap
page read and write
21887E00000
heap
page read and write
21881DFD000
heap
page read and write
214933B0000
trusted library allocation
page read and write
21887BC0000
trusted library allocation
page read and write
218810BC000
heap
page read and write
218800BA000
heap
page read and write
21887C60000
trusted library allocation
page read and write
21806FB6000
heap
page read and write
21493F50000
trusted library allocation
page read and write
21888210000
trusted library allocation
page read and write
21493F20000
trusted library allocation
page read and write
21493870000
trusted library allocation
page read and write
2148E7BD000
heap
page read and write
2187F4FA000
heap
page read and write
21490C20000
trusted library allocation
page read and write
21887C00000
trusted library allocation
page read and write
2187F370000
heap
page read and write
2148C02A000
heap
page read and write
21880690000
trusted library allocation
page read and write
2148C131000
heap
page read and write
21887ED7000
heap
page read and write
2148E52C000
heap
page read and write
21884410000
heap
page read and write
2187F4DF000
heap
page read and write
2148E75D000
heap
page read and write
214933E0000
trusted library allocation
page read and write
21887D90000
trusted library allocation
page read and write
218873C0000
trusted library allocation
page read and write
21490B02000
heap
page read and write
21493880000
trusted library allocation
page read and write
218844A0000
trusted library allocation
page read and write
36A92FF000
stack
page read and write
2148AF20000
heap
page read and write
2148CF13000
heap
page read and write
21490D10000
trusted library allocation
page read and write
2148D998000
heap
page read and write
21887E7D000
heap
page read and write
21884770000
trusted library allocation
page read and write
21886FE7000
heap
page read and write
21494800000
trusted library allocation
page read and write
218871F0000
trusted library allocation
page read and write
21881114000
heap
page read and write
2148E7BF000
heap
page read and write
21490CE0000
trusted library allocation
page read and write
21490D90000
trusted library allocation
page read and write
2187F400000
heap
page read and write
2148AFE5000
heap
page read and write
2148E644000
heap
page read and write
21887D70000
trusted library allocation
page read and write
2188189C000
heap
page read and write
2187F5B3000
heap
page read and write
21806738000
heap
page read and write
218819A9000
heap
page read and write
2148CD10000
trusted library allocation
page read and write
2148C842000
heap
page read and write
218821EB000
heap
page read and write
21887B30000
trusted library allocation
page read and write
21806DAF000
heap
page read and write
21881125000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
2148E6B9000
heap
page read and write
2148BC78000
heap
page read and write
2148AA00000
heap
page read and write
21806D62000
heap
page read and write
21806FF5000
heap
page read and write
2148E0B5000
heap
page read and write
2187F588000
heap
page read and write
21886ED6000
heap
page read and write
218874E0000
heap
page read and write
2188193D000
heap
page read and write
2148C026000
heap
page read and write
21887B60000
trusted library allocation
page read and write
21888400000
heap
page read and write
7DF4158A1000
trusted library allocation
page execute read
21494A20000
trusted library allocation
page read and write
214945EC000
heap
page read and write
21887690000
trusted library allocation
page read and write
21887AB0000
trusted library allocation
page read and write
2187F523000
heap
page read and write
21485D16000
heap
page read and write
21887B63000
trusted library allocation
page read and write
21881A46000
heap
page read and write
21806B1C000
heap
page read and write
2148C1D9000
heap
page read and write
2187FD17000
heap
page read and write
21888019000
heap
page read and write
2148C19A000
heap
page read and write
2148E676000
heap
page read and write
214938A0000
trusted library allocation
page read and write
21887E90000
heap
page read and write
21806B30000
heap
page read and write
21806BD9000
heap
page read and write
21880828000
heap
page read and write
21483892000
heap
page read and write
21490CA0000
trusted library allocation
page read and write
2148AEB8000
heap
page read and write
21493820000
trusted library allocation
page read and write
21886E85000
heap
page read and write
21887B90000
trusted library allocation
page read and write
21494540000
trusted library allocation
page read and write
218821AC000
heap
page read and write
21886E12000
heap
page read and write
21887C70000
trusted library allocation
page read and write
218878F0000
trusted library allocation
page read and write
21493A60000
trusted library allocation
page read and write
2148E33C000
heap
page read and write
214939D0000
trusted library allocation
page read and write
21806DCD000
heap
page read and write
21490C90000
trusted library allocation
page read and write
214948D0000
trusted library allocation
page read and write
21887B60000
trusted library allocation
page read and write
21887690000
trusted library allocation
page read and write
214941D8000
heap
page read and write
218811E3000
heap
page read and write
2148CF9C000
heap
page read and write
21806DF4000
heap
page read and write
21882050000
heap
page read and write
21887BC0000
trusted library allocation
page read and write
2187F4DB000
heap
page read and write
21493EA0000
trusted library allocation
page read and write
2148BD50000
heap
page read and write
21493B70000
trusted library allocation
page read and write
21806BC9000
heap
page read and write
2148E755000
heap
page read and write
21494370000
trusted library allocation
page read and write
21490CE0000
trusted library allocation
page read and write
2188081C000
heap
page read and write
2148AFFB000
heap
page read and write
21888069000
heap
page read and write
21485D1D000
heap
page read and write
21888300000
trusted library allocation
page read and write
21493750000
trusted library allocation
page read and write
214951AC000
heap
page read and write
218808B6000
heap
page read and write
21493EA0000
trusted library allocation
page read and write
21887BF0000
trusted library allocation
page read and write
2148BBB0000
heap
page read and write
21493930000
trusted library allocation
page read and write
21887CB0000
trusted library allocation
page read and write
2148E039000
heap
page read and write
214933E0000
trusted library allocation
page read and write
2187F4BE000
heap
page read and write
21887DA0000
trusted library allocation
page read and write
21887EA0000
trusted library allocation
page read and write
21881AB9000
heap
page read and write
21887B70000
trusted library allocation
page read and write
21881B4C000
heap
page read and write
36A9FFE000
stack
page read and write
21887C30000
trusted library allocation
page read and write
21886FA5000
heap
page read and write
2148C125000
heap
page read and write
2148C264000
heap
page read and write
21806DEF000
heap
page read and write
21493B90000
trusted library allocation
page read and write
21887060000
trusted library allocation
page read and write
21493EE0000
trusted library allocation
page read and write
2188805D000
heap
page read and write
21494057000
heap
page read and write
21886F0E000
heap
page read and write
21806BEB000
heap
page read and write
21882038000
heap
page read and write
214940F9000
heap
page read and write
218820F6000
heap
page read and write
2148E100000
heap
page read and write
21887DA0000
trusted library allocation
page read and write
21806E83000
heap
page read and write
214938A0000
trusted library allocation
page read and write
21493920000
trusted library allocation
page read and write
2148CB82000
heap
page read and write
2148C151000
heap
page read and write
21494280000
trusted library allocation
page read and write
214940EF000
heap
page read and write
21881ACD000
heap
page read and write
218877A0000
trusted library allocation
page read and write
2148AF1B000
heap
page read and write
2148E553000
heap
page read and write
21485D5A000
heap
page read and write
21888065000
heap
page read and write
2148E400000
heap
page read and write
21887D90000
trusted library allocation
page read and write
2148AF64000
heap
page read and write
21494A40000
trusted library allocation
page read and write
2148DEFD000
heap
page read and write
218079A0000
heap
page read and write
2187F5A9000
heap
page read and write
21888059000
heap
page read and write
21493880000
trusted library allocation
page read and write
21880FF0000
trusted library allocation
page read and write
21493E20000
trusted library allocation
page read and write
214944E7000
heap
page read and write
2148E0A4000
heap
page read and write
21493D90000
trusted library allocation
page read and write
21490860000
trusted library allocation
page read and write
21887680000
trusted library allocation
page read and write
21490D70000
trusted library allocation
page read and write
21887B60000
trusted library allocation
page read and write
21887170000
trusted library allocation
page read and write
2148AFBA000
heap
page read and write
21887C30000
trusted library allocation
page read and write
21887CB0000
trusted library allocation
page read and write
2148D634000
heap
page read and write
21887BA0000
trusted library allocation
page read and write
21493610000
trusted library allocation
page read and write
21887444000
heap
page read and write
214934CD000
heap
page read and write
2188119F000
heap
page read and write
218818F8000
heap
page read and write
21493B40000
trusted library allocation
page read and write
21490B65000
heap
page read and write
21887720000
trusted library allocation
page read and write
21887BC0000
trusted library allocation
page read and write
218066FD000
heap
page read and write
21494A80000
trusted library allocation
page read and write
214946B5000
heap
page read and write
218812A5000
heap
page read and write
2148CD40000
trusted library allocation
page read and write
21806DC4000
heap
page read and write
2148CF7F000
heap
page read and write
21490BFE000
heap
page read and write
2148CCB0000
trusted library allocation
page read and write
21887B80000
trusted library allocation
page read and write
218806C0000
trusted library allocation
page read and write
21490930000
trusted library allocation
page read and write
21881A98000
heap
page read and write
2148E4F9000
heap
page read and write
21490CA0000
trusted library allocation
page read and write
21493870000
trusted library allocation
page read and write
21490D80000
trusted library allocation
page read and write
21886E24000
heap
page read and write
21490D40000
trusted library allocation
page read and write
214945E5000
heap
page read and write
21887C70000
trusted library allocation
page read and write
214934FC000
heap
page read and write
2188804B000
heap
page read and write
21494350000
trusted library allocation
page read and write
2148C1D6000
heap
page read and write
33644FF000
stack
page read and write
218844D0000
trusted library allocation
page read and write
21887D40000
trusted library allocation
page read and write
21494065000
heap
page read and write
218846F0000
trusted library allocation
page read and write
21884420000
trusted library allocation
page read and write
2148D7BB000
heap
page read and write
21494A60000
trusted library allocation
page read and write
21887C10000
trusted library allocation
page read and write
21881A35000
heap
page read and write
21887CC0000
trusted library allocation
page read and write
33660FF000
stack
page read and write
2188101B000
heap
page read and write
218821F2000
heap
page read and write
21887160000
trusted library allocation
page read and write
218805F7000
heap
page read and write
21493840000
trusted library allocation
page read and write
21887280000
trusted library allocation
page read and write
21490A6F000
heap
page read and write
214941CA000
heap
page read and write
218880A2000
heap
page read and write
21887D70000
trusted library allocation
page read and write
214909E0000
trusted library allocation
page read and write
21888053000
heap
page read and write
2148E795000
heap
page read and write
21490A02000
heap
page read and write
21493393000
trusted library allocation
page read and write
21494B30000
trusted library allocation
page read and write
2148D7B6000
heap
page read and write
2148AFF7000
heap
page read and write
214944E0000
trusted library allocation
page read and write
2148CE22000
heap
page read and write
2148AB13000
heap
page read and write
214839A9000
heap
page read and write
21494360000
trusted library allocation
page read and write
2148AEB5000
heap
page read and write
21490C40000
trusted library allocation
page read and write
2148AC83000
heap
page read and write
21493390000
trusted library allocation
page read and write
21887C50000
trusted library allocation
page read and write
21887BC0000
trusted library allocation
page read and write
21887AD0000
trusted library allocation
page read and write
214839B2000
heap
page read and write
21494380000
trusted library allocation
page read and write
2148D64B000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
21493870000
trusted library allocation
page read and write
218872F0000
trusted library allocation
page read and write
2148C2CA000
heap
page read and write
21886EBB000
heap
page read and write
21887A40000
trusted library allocation
page read and write
21806ACA000
heap
page read and write
214946BE000
heap
page read and write
21493C20000
trusted library allocation
page read and write
21881AD7000
heap
page read and write
21887D10000
trusted library allocation
page read and write
21887F71000
heap
page read and write
2148C120000
heap
page read and write
21490C70000
trusted library allocation
page read and write
21494A30000
trusted library allocation
page read and write
21806978000
heap
page read and write
21888002000
heap
page read and write
21887FE7000
heap
page read and write
21493890000
trusted library allocation
page read and write
218845F0000
trusted library allocation
page read and write
21806DC8000
heap
page read and write
2148C0F3000
heap
page read and write
21490C00000
trusted library allocation
page read and write
2148D746000
heap
page read and write
2148C03F000
heap
page read and write
214946BC000
heap
page read and write
21493E80000
heap
page read and write
2148CB7C000
heap
page read and write
2180669C000
heap
page read and write
21806B49000
heap
page read and write
21494865000
heap
page read and write
214940C6000
heap
page read and write
21806DFA000
heap
page read and write
214941E7000
heap
page read and write
2148DE7B000
heap
page read and write
21884640000
trusted library allocation
page read and write
21881800000
heap
page read and write
21806FAB000
heap
page read and write
2148D22F000
heap
page read and write
21887660000
trusted library allocation
page read and write
21493390000
trusted library allocation
page read and write
2148A9D0000
trusted library allocation
page read and write
21490C10000
trusted library allocation
page read and write
21884620000
trusted library allocation
page read and write
2148E753000
heap
page read and write
2148C100000
heap
page read and write
21493E60000
trusted library allocation
page read and write
21493790000
trusted library allocation
page read and write
214909B0000
trusted library allocation
page read and write
21493390000
trusted library allocation
page read and write
2148CE97000
heap
page read and write
218844E0000
trusted library allocation
page read and write
218821D8000
heap
page read and write
21494350000
trusted library allocation
page read and write
21807010000
heap
page read and write
2188185A000
heap
page read and write
21490D60000
trusted library allocation
page read and write
214838D2000
heap
page read and write
218069FB000
heap
page read and write
21806C9F000
heap
page read and write
2148D7E6000
heap
page read and write
2148E046000
heap
page read and write
2148E7DF000
heap
page read and write
214935F2000
heap
page read and write
2148AF2E000
heap
page read and write
21494390000
trusted library allocation
page read and write
2148D70A000
heap
page read and write
218874F7000
heap
page read and write
21887070000
trusted library allocation
page read and write
21806E5A000
heap
page read and write
21887870000
trusted library allocation
page read and write
214934C5000
heap
page read and write
7DF415971000
trusted library allocation
page execute read
21881241000
heap
page read and write
2148CF34000
heap
page read and write
21886EA1000
heap
page read and write
21888240000
trusted library allocation
page read and write
21882147000
heap
page read and write
21887BF0000
trusted library allocation
page read and write
21806B96000
heap
page read and write
36A81F9000
stack
page read and write
21806C82000
heap
page read and write
232807F000
stack
page read and write
214943B0000
trusted library allocation
page read and write
21483813000
heap
page read and write
2180669E000
heap
page read and write
21886EA5000
heap
page read and write
214943D0000
trusted library allocation
page read and write
21887ED0000
heap
page read and write
218066C0000
heap
page read and write
214839DE000
heap
page read and write
21887CF0000
trusted library allocation
page read and write
21494454000
heap
page read and write
214942F0000
trusted library allocation
page read and write
214943A0000
trusted library allocation
page read and write
21880193000
heap
page read and write
218069B3000
heap
page read and write
21881184000
heap
page read and write
21490C70000
trusted library allocation
page read and write
2148E006000
heap
page read and write
21886FFC000
heap
page read and write
21490CF0000
trusted library allocation
page read and write
21807C39000
heap
page read and write
21887C10000
trusted library allocation
page read and write
21887D60000
trusted library allocation
page read and write
21806BF5000
heap
page read and write
2148E244000
heap
page read and write
2148AF8A000
heap
page read and write
21880010000
heap
page read and write
21493CA0000
trusted library allocation
page read and write
2148CC90000
trusted library allocation
page read and write
21880710000
trusted library allocation
page read and write
218876F0000
trusted library allocation
page read and write
2148E1D9000
heap
page read and write
21483898000
heap
page read and write
36AA5FF000
stack
page read and write
2148E7D1000
heap
page read and write
21886E26000
heap
page read and write
2148AF71000
heap
page read and write
21887F5D000
heap
page read and write
218874BA000
heap
page read and write
21880178000
heap
page read and write
21490C30000
trusted library allocation
page read and write
21493A70000
trusted library allocation
page read and write
21493501000
heap
page read and write
3363FFF000
stack
page read and write
218870F0000
trusted library allocation
page read and write
2148D72C000
heap
page read and write
218821D6000
heap
page read and write
21887100000
trusted library allocation
page read and write
2148CB13000
heap
page read and write
214938B0000
trusted library allocation
page read and write
21494B60000
trusted library allocation
page read and write
21888000000
heap
page read and write
21887DF0000
trusted library allocation
page read and write
2148E75F000
heap
page read and write
21884530000
trusted library allocation
page read and write
21493F40000
trusted library allocation
page read and write
2148D693000
heap
page read and write
21806C54000
heap
page read and write
21887CC0000
trusted library allocation
page read and write
218821AA000
heap
page read and write
21806DBD000
heap
page read and write
21490850000
trusted library allocation
page read and write
214938D0000
trusted library allocation
page read and write
2148E74B000
heap
page read and write
21493E60000
trusted library allocation
page read and write
21887330000
trusted library allocation
page read and write
2148E223000
heap
page read and write
21494438000
heap
page read and write
21887E70000
trusted library allocation
page read and write
21886EFA000
heap
page read and write
21493630000
trusted library allocation
page read and write
2148AEFC000
heap
page read and write
21806BDC000
heap
page read and write
218808B2000
heap
page read and write
2148CD20000
trusted library allocation
page read and write
21483911000
heap
page read and write
2148E75F000
heap
page read and write
2148D2F2000
heap
page read and write
21887E90000
heap
page read and write
2148AFA5000
heap
page read and write
214836F0000
heap
page read and write
218820F2000
heap
page read and write
21493400000
heap
page read and write
21887670000
trusted library allocation
page read and write
36A97FC000
stack
page read and write
218809A3000
heap
page read and write
21806E91000
heap
page read and write
2148E751000
heap
page read and write
21493840000
trusted library allocation
page read and write
214839AC000
heap
page read and write
21881ACA000
heap
page read and write
3364AFF000
stack
page read and write
2148C88E000
heap
page read and write
21887650000
trusted library allocation
page read and write
21493E10000
trusted library allocation
page read and write
218845E0000
trusted library allocation
page read and write
2148CBBC000
heap
page read and write
36A7FFC000
stack
page read and write
2148E34C000
heap
page read and write
21888330000
trusted library allocation
page read and write
21887A10000
trusted library allocation
page read and write
2148C3C3000
heap
page read and write
21887A50000
trusted library allocation
page read and write
21806F9E000
heap
page read and write
21493B60000
trusted library allocation
page read and write
21494330000
trusted library allocation
page read and write
2148CFC5000
heap
page read and write
7DF415961000
trusted library allocation
page execute read
21493B90000
trusted library allocation
page read and write
2148E5CC000
heap
page read and write
21887FE0000
heap
page read and write
21490D50000
trusted library allocation
page read and write
218809E5000
heap
page read and write
21806E83000
heap
page read and write
214944C0000
trusted library allocation
page read and write
21493EA0000
trusted library allocation
page read and write
2148E000000
heap
page read and write
21887BA0000
trusted library allocation
page read and write
218821F6000
heap
page read and write
21806BBF000
heap
page read and write
218880F9000
heap
page read and write
2148C162000
heap
page read and write
21887B40000
trusted library allocation
page read and write
218891F0000
heap
page read and write
214943B0000
trusted library allocation
page read and write
2148C0D1000
heap
page read and write
218069B6000
heap
page read and write
2148E6D6000
heap
page read and write
21884790000
trusted library allocation
page read and write
21887BF0000
trusted library allocation
page read and write
2148D6CE000
heap
page read and write
2148CE27000
heap
page read and write
21806BA0000
heap
page read and write
21887C60000
trusted library allocation
page read and write
21806AE6000
heap
page read and write
21490D20000
trusted library allocation
page read and write
21490D10000
trusted library allocation
page read and write
2148CCF3000
trusted library allocation
page read and write
2188117A000
heap
page read and write
21485D2E000
heap
page read and write
23280FE000
stack
page read and write
2148E094000
heap
page read and write
2148ADB1000
heap
page read and write
218809A7000
heap
page read and write
21806CBC000
heap
page read and write
218808A8000
heap
page read and write
2148AFC5000
heap
page read and write
21886EE8000
heap
page read and write
21880038000
heap
page read and write
2148C01F000
heap
page read and write
21494061000
heap
page read and write
21881CC9000
heap
page read and write
2148E477000
heap
page read and write
21887900000
trusted library allocation
page read and write
214941C7000
heap
page read and write
21493A80000
trusted library allocation
page read and write
21485D00000
heap
page read and write
21887653000
trusted library allocation
page read and write
2148E6AF000
heap
page read and write
218808AB000
heap
page read and write
2148D269000
heap
page read and write
21887140000
trusted library allocation
page read and write
2148CF23000
heap
page read and write
2148C00E000
heap
page read and write
21CF8580000
heap
page read and write
21495010000
heap
page read and write
214943F0000
trusted library allocation
page read and write
214943A0000
trusted library allocation
page read and write
33645FE000
stack
page read and write
21887000000
trusted library allocation
page read and write
214838BF000
heap
page read and write
2188809D000
heap
page read and write
21485240000
trusted library allocation
page read and write
21483867000
heap
page read and write
21806A43000
heap
page read and write
21880571000
heap
page read and write
21887C00000
trusted library allocation
page read and write
21490920000
trusted library allocation
page read and write
21887B20000
trusted library allocation
page read and write
218808A8000
heap
page read and write
2148AFF2000
heap
page read and write
218821B8000
heap
page read and write
21806BBD000
heap
page read and write
21806F7F000
heap
page read and write
21887496000
heap
page read and write
214944E9000
heap
page read and write
21887850000
trusted library allocation
page read and write
21485D35000
heap
page read and write
2187F47B000
heap
page read and write
21887673000
trusted library allocation
page read and write
21806C9C000
heap
page read and write
214945A0000
trusted library allocation
page read and write
218875F2000
heap
page read and write
21887DE0000
trusted library allocation
page read and write
214944D0000
trusted library allocation
page read and write
2148AF92000
heap
page read and write
2148E6B5000
heap
page read and write
21887050000
trusted library allocation
page read and write
218876A0000
trusted library allocation
page read and write
21806E42000
heap
page read and write
218820D2000
heap
page read and write
2148E7F4000
heap
page read and write
2148D977000
heap
page read and write
214938B0000
trusted library allocation
page read and write
2148B958000
heap
page read and write
2148D225000
heap
page read and write
214934B4000
heap
page read and write
21485D10000
heap
page read and write
21887BF0000
trusted library allocation
page read and write
21806E63000
heap
page read and write
218806D0000
trusted library allocation
page read and write
7DF415890000
trusted library allocation
page readonly
21490A84000
heap
page read and write
2148E6D3000
heap
page read and write
21886DC0000
trusted library allocation
page read and write
21887B70000
trusted library allocation
page read and write
2187F50F000
heap
page read and write
21806DCD000
heap
page read and write
214939B0000
trusted library allocation
page read and write
2148AF57000
heap
page read and write
2148CCC0000
trusted library allocation
page read and write
21888260000
trusted library allocation
page read and write
21490B43000
heap
page read and write
21806DD1000
heap
page read and write
2148C0E2000
heap
page read and write
21493830000
trusted library allocation
page read and write
2148C054000
heap
page read and write
21887770000
trusted library allocation
page read and write
214839D2000
heap
page read and write
214933F0000
trusted library allocation
page read and write
214944FB000
heap
page read and write
2187FDB6000
heap
page read and write
2188800D000
heap
page read and write
214838D8000
heap
page read and write
21888100000
heap
page read and write
21806DCF000
heap
page read and write
21493640000
trusted library allocation
page read and write
21494843000
heap
page read and write
21886FAB000
heap
page read and write
21887C60000
trusted library allocation
page read and write
214937F0000
trusted library allocation
page read and write
21483947000
heap
page read and write
21494B10000
trusted library allocation
page read and write
21887442000
heap
page read and write
21887FCA000
heap
page read and write
2188186D000
heap
page read and write
21490C80000
trusted library allocation
page read and write
214934A8000
heap
page read and write
21886EE1000
heap
page read and write
2148C9EB000
heap
page read and write
21490DB0000
trusted library allocation
page read and write
21887FC6000
heap
page read and write
214937D0000
trusted library allocation
page read and write
21493930000
trusted library allocation
page read and write
21494500000
heap
page read and write
2148D717000
heap
page read and write
21887070000
trusted library allocation
page read and write
21888055000
heap
page read and write
21490C80000
trusted library allocation
page read and write
21887760000
trusted library allocation
page read and write
2187FD30000
heap
page read and write
21490A47000
heap
page read and write
218875F6000
heap
page read and write
21493780000
trusted library allocation
page read and write
218821B3000
heap
page read and write
2148AED6000
heap
page read and write
218808AA000
heap
page read and write
214948B0000
trusted library allocation
page read and write
214938F0000
trusted library allocation
page read and write
21887FC6000
heap
page read and write
2148D2E1000
heap
page read and write
21490D00000
trusted library allocation
page read and write
214944F0000
heap
page read and write
218808A8000
heap
page read and write
21806D5C000
heap
page read and write
21881C30000
heap
page read and write
2148C0EB000
heap
page read and write
21494340000
trusted library allocation
page read and write
2148E753000
heap
page read and write
2148C081000
heap
page read and write
21886E36000
heap
page read and write
21880CC4000
heap
page read and write
21490C30000
trusted library allocation
page read and write
2148CA13000
heap
page read and write
2148ABC4000
heap
page read and write
21881C00000
heap
page read and write
2148E6B8000
heap
page read and write
2148B7E9000
heap
page read and write
21881A00000
heap
page read and write
21880879000
heap
page read and write
214936E0000
trusted library allocation
page read and write
21887CE0000
trusted library allocation
page read and write
218808BC000
heap
page read and write
21887C60000
trusted library allocation
page read and write
2148E780000
heap
page read and write
2148C0AB000
heap
page read and write
214944CF000
heap
page read and write
21886FED000
heap
page read and write
21490B6A000
heap
page read and write
2148A980000
trusted library allocation
page read and write
2148CC60000
trusted library allocation
page read and write
21886EF2000
heap
page read and write
21493740000
trusted library allocation
page read and write
218846A0000
trusted library allocation
page read and write
21493501000
heap
page read and write
218882B0000
trusted library allocation
page read and write
21494370000
trusted library allocation
page read and write
21806D4C000
heap
page read and write
2148CBB1000
heap
page read and write
218821C0000
heap
page read and write
218845B0000
trusted library allocation
page read and write
2148D8DD000
heap
page read and write
21881154000
heap
page read and write
21887670000
trusted library allocation
page read and write
21881E35000
heap
page read and write
2148AC00000
heap
page read and write
21493800000
trusted library allocation
page read and write
2148A9F0000
trusted library allocation
page read and write
2148D894000
heap
page read and write
2188804F000
heap
page read and write
21494101000
heap
page read and write
21887220000
trusted library allocation
page read and write
21494B40000
trusted library allocation
page read and write
218874D8000
heap
page read and write
2148E55D000
heap
page read and write
21881A82000
heap
page read and write
2148E769000
heap
page read and write
2148C865000
heap
page read and write
21887673000
trusted library allocation
page read and write
2148E784000
heap
page read and write
214909D0000
trusted library allocation
page read and write
2180670F000
heap
page read and write
21884780000
trusted library allocation
page read and write
21806B28000
heap
page read and write
21490D00000
trusted library allocation
page read and write
2187FDBC000
heap
page read and write
2148E3F8000
heap
page read and write
21494083000
heap
page read and write
21887020000
trusted library allocation
page read and write
21806C3F000
heap
page read and write
214938B0000
trusted library allocation
page read and write
218874C5000
heap
page read and write
21884200000
heap
page read and write
214940EA000
heap
page read and write
21886FC3000
heap
page read and write
2148B923000
heap
page read and write
21887402000
heap
page read and write
21493700000
trusted library allocation
page read and write
21806BDC000
heap
page read and write
2188807B000
heap
page read and write
21884690000
trusted library allocation
page read and write
2148D788000
heap
page read and write
21490A92000
heap
page read and write
2148C8C8000
heap
page read and write
214940E7000
heap
page read and write
21483977000
heap
page read and write
21880F70000
trusted library allocation
page read and write
2148CC00000
trusted library allocation
page read and write
214937C0000
trusted library allocation
page read and write
21884613000
trusted library allocation
page read and write
21490910000
trusted library allocation
page read and write
7DF4158C0000
trusted library allocation
page readonly
2148E124000
heap
page read and write
21889010000
heap
page read and write
218821C2000
heap
page read and write
21806E8D000
heap
page read and write
2148D600000
heap
page read and write
21490C00000
trusted library allocation
page read and write
21483961000
heap
page read and write
21881EDE000
heap
page read and write
214948C0000
trusted library allocation
page read and write
21806C84000
heap
page read and write
21493900000
trusted library allocation
page read and write
33647FF000
stack
page read and write
21880360000
trusted library allocation
page read and write
21882169000
heap
page read and write
21881228000
heap
page read and write
21887650000
trusted library allocation
page read and write
2148C1E9000
heap
page read and write
214951A4000
heap
page read and write
2187FBA0000
trusted library allocation
page read and write
21887588000
heap
page read and write
21881141000
heap
page read and write
2148AFF9000
heap
page read and write
2187F5C5000
heap
page read and write
21886EED000
heap
page read and write
21887B90000
trusted library allocation
page read and write
21887653000
trusted library allocation
page read and write
2148C8D9000
heap
page read and write
33657FC000
stack
page read and write
2148AFAD000
heap
page read and write
21493860000
trusted library allocation
page read and write
21493533000
heap
page read and write
21887C40000
trusted library allocation
page read and write
21884720000
trusted library allocation
page read and write
21493FF0000
trusted library allocation
page read and write
2148D673000
heap
page read and write
2148C2C0000
heap
page read and write
2148C242000
heap
page read and write
2187F4CF000
heap
page read and write
21887680000
trusted library allocation
page read and write
2148E57E000
heap
page read and write
21493EC0000
trusted library allocation
page read and write
21806BA7000
heap
page read and write
2148D9A9000
heap
page read and write
218873D0000
trusted library allocation
page read and write
21886FAD000
heap
page read and write
21887A80000
trusted library allocation
page read and write
21887B90000
trusted library allocation
page read and write
2148CC80000
trusted library allocation
page read and write
2148E0BD000
heap
page read and write
2148382F000
heap
page read and write
33653FF000
stack
page read and write
2148CC30000
trusted library allocation
page read and write
2148ADFB000
heap
page read and write
21889167000
heap
page read and write
2148A9E0000
heap
page read and write
21494580000
trusted library allocation
page read and write
21887C80000
trusted library allocation
page read and write
2148AC7F000
heap
page read and write
21886E00000
heap
page read and write
21806DF6000
heap
page read and write
21882093000
heap
page read and write
21887BB0000
trusted library allocation
page read and write
21887D20000
trusted library allocation
page read and write
21887970000
trusted library allocation
page read and write
218808B4000
heap
page read and write
21887B70000
trusted library allocation
page read and write
2148C106000
heap
page read and write
218820E7000
heap
page read and write
2148C1BD000
heap
page read and write
2148AA6F000
heap
page read and write
21806C84000
heap
page read and write
21494320000
trusted library allocation
page read and write
21493900000
trusted library allocation
page read and write
218821B8000
heap
page read and write
21806BB3000
heap
page read and write
2187F380000
heap
page read and write
2148C1BD000
heap
page read and write
21494AD0000
trusted library allocation
page read and write
218813D7000
heap
page read and write
2148E7C7000
heap
page read and write
21493B90000
trusted library allocation
page read and write
21887AC0000
trusted library allocation
page read and write
21880872000
heap
page read and write
21806D9E000
heap
page read and write
21887683000
trusted library allocation
page read and write
21806E8F000
heap
page read and write
2187FBB0000
heap
page readonly
3364CFF000
stack
page read and write
21CF85F9000
heap
page read and write
21887BB0000
trusted library allocation
page read and write
214944F3000
heap
page read and write
214943C0000
trusted library allocation
page read and write
21806C90000
heap
page read and write
21886EA6000
heap
page read and write
21494910000
trusted library allocation
page read and write
2148E7A2000
heap
page read and write
21806C8C000
heap
page read and write
21493893000
trusted library allocation
page read and write
21494018000
heap
page read and write
21806E95000
heap
page read and write
21493380000
trusted library allocation
page read and write
21880413000
heap
page read and write
2148E767000
heap
page read and write
21493850000
trusted library allocation
page read and write
214942C0000
trusted library allocation
page read and write
218879C0000
trusted library allocation
page read and write
2188807F000
heap
page read and write
214945DE000
heap
page read and write
21887BD0000
trusted library allocation
page read and write
21886E8A000
heap
page read and write
21887C10000
trusted library allocation
page read and write
2188217B000
heap
page read and write
21887E87000
heap
page read and write
21887C70000
trusted library allocation
page read and write
2148CBB7000
heap
page read and write
21884202000
heap
page read and write
21485DA7000
heap
page read and write
21490A48000
heap
page read and write
21884780000
trusted library allocation
page read and write
2148E088000
heap
page read and write
21806735000
heap
page read and write
2148E084000
heap
page read and write
218876C0000
trusted library allocation
page read and write
7DF415900000
trusted library allocation
page readonly
2148C0A1000
heap
page read and write
21493525000
heap
page read and write
21807D09000
heap
page read and write
21888250000
trusted library allocation
page read and write
214934F8000
heap
page read and write
214945C4000
heap
page read and write
21494880000
trusted library allocation
page read and write
21490B44000
heap
page read and write
21490CF0000
trusted library allocation
page read and write
21483923000
heap
page read and write
21493600000
trusted library allocation
page read and write
21880300000
trusted library allocation
page read and write
21807F60000
heap
page read and write
21490C20000
trusted library allocation
page read and write
218808AA000
heap
page read and write
21887680000
trusted library allocation
page read and write
214908E0000
trusted library allocation
page read and write
218847B0000
trusted library allocation
page read and write
21887D50000
trusted library allocation
page read and write
21493D70000
trusted library allocation
page read and write
21887AA0000
trusted library allocation
page read and write
218878D0000
trusted library allocation
page read and write
21887D60000
trusted library allocation
page read and write
218845F3000
trusted library allocation
page read and write
2188118D000
heap
page read and write
2148D739000
heap
page read and write
214941CD000
heap
page read and write
2148E01F000
heap
page read and write
2148D213000
heap
page read and write
2148E6CA000
heap
page read and write
21493E90000
trusted library allocation
page read and write
2148C2B9000
heap
page read and write
21494200000
trusted library allocation
page read and write
2148397C000
heap
page read and write
214945D8000
heap
page read and write
21886F2D000
heap
page read and write
21887BB0000
trusted library allocation
page read and write
2148C131000
heap
page read and write
21881E44000
heap
page read and write
21886FA5000
heap
page read and write
21CF8590000
heap
page read and write
21806BC3000
heap
page read and write
36A80FE000
stack
page read and write
2148E74B000
heap
page read and write
21494570000
trusted library allocation
page read and write
2148C99F000
heap
page read and write
2148B914000
heap
page read and write
21806DD4000
heap
page read and write
214936C0000
trusted library allocation
page read and write
2148E74D000
heap
page read and write
2148CE1E000
heap
page read and write
21887D00000
trusted library allocation
page read and write
2148B890000
heap
page read and write
21888030000
trusted library allocation
page read and write
21886FAD000
heap
page read and write
21493880000
trusted library allocation
page read and write
214937F0000
trusted library allocation
page read and write
21493DA0000
trusted library allocation
page read and write
21887B80000
trusted library allocation
page read and write
2148E6B0000
heap
page read and write
21887CF0000
trusted library allocation
page read and write
2148CE00000
heap
page read and write
2148C123000
heap
page read and write
214940D5000
heap
page read and write
218843BD000
heap
page read and write
7DF415911000
trusted library allocation
page execute read
21887910000
trusted library allocation
page read and write
21887F74000
heap
page read and write
21887960000
trusted library allocation
page read and write
21889010000
heap
page read and write
21493B10000
trusted library allocation
page read and write
214945C4000
heap
page read and write
21882179000
heap
page read and write
7DF415970000
trusted library allocation
page readonly
2148E696000
heap
page read and write
2148C04E000
heap
page read and write
21494061000
heap
page read and write
21886FAB000
heap
page read and write
21887C10000
trusted library allocation
page read and write
2148BD50000
heap
page read and write
21887D80000
trusted library allocation
page read and write
2148E7BE000
heap
page read and write
2148C283000
heap
page read and write
21882191000
heap
page read and write
21886F39000
heap
page read and write
21880CFA000
heap
page read and write
21887810000
trusted library allocation
page read and write
2148DF33000
heap
page read and write
214939A0000
trusted library allocation
page read and write
21886EAD000
heap
page read and write
21493730000
trusted library allocation
page read and write
21493AD0000
trusted library allocation
page read and write
21807000000
heap
page read and write
2148D74E000
heap
page read and write
2148E7CF000
heap
page read and write
21490D70000
trusted library allocation
page read and write
21490C60000
trusted library allocation
page read and write
21493820000
trusted library allocation
page read and write
214938F0000
trusted library allocation
page read and write
2148CC40000
trusted library allocation
page read and write
3365DFF000
stack
page read and write
2148E7B5000
heap
page read and write
21887180000
trusted library allocation
page read and write
2188806D000
heap
page read and write
2148C15B000
heap
page read and write
2148C039000
heap
page read and write
21880C8C000
heap
page read and write
218874C6000
heap
page read and write
21485D24000
heap
page read and write
21494230000
trusted library allocation
page read and write
214938C0000
trusted library allocation
page read and write
21881A57000
heap
page read and write
21887E40000
trusted library allocation
page read and write
21887D40000
trusted library allocation
page read and write
21886FBD000
heap
page read and write
21881F97000
heap
page read and write
218067C7000
heap
page read and write
21884520000
trusted library allocation
page read and write
21887BF0000
trusted library allocation
page read and write
2148D68A000
heap
page read and write
218872B0000
trusted library allocation
page read and write
21880124000
heap
page read and write
2188084A000
heap
page read and write
21887240000
trusted library allocation
page read and write
21493B90000
trusted library allocation
page read and write
218872E0000
trusted library allocation
page read and write
21880FB0000
trusted library allocation
page read and write
21887F45000
heap
page read and write
21493933000
trusted library allocation
page read and write
21882061000
heap
page read and write
21887DF0000
trusted library allocation
page read and write
21494260000
trusted library allocation
page read and write
21483720000
heap
page read and write
21882059000
heap
page read and write
2180666B000
heap
page read and write
21884740000
trusted library allocation
page read and write
2148DE24000
heap
page read and write
21887320000
trusted library allocation
page read and write
21887BE0000
trusted library allocation
page read and write
21887C50000
trusted library allocation
page read and write
2148B890000
heap
page read and write
214940A5000
heap
page read and write
2148AF5E000
heap
page read and write
218875EC000
heap
page read and write
21806E94000
heap
page read and write
218805A9000
heap
page read and write
2187F45F000
heap
page read and write
21880113000
heap
page read and write
21493F10000
trusted library allocation
page read and write
21887840000
trusted library allocation
page read and write
21880693000
trusted library allocation
page read and write
21806E83000
heap
page read and write
21884700000
trusted library allocation
page read and write
21493517000
heap
page read and write
21887C10000
trusted library allocation
page read and write
21887340000
trusted library allocation
page read and write
214908A0000
trusted library allocation
page read and write
21881A6A000
heap
page read and write
214946CF000
heap
page read and write
21494390000
trusted library allocation
page read and write
21886FA7000
heap
page read and write
2188805C000
heap
page read and write
2148E2F7000
heap
page read and write
2148C0E6000
heap
page read and write
214934C9000
heap
page read and write
2148CFD6000
heap
page read and write
21886F1C000
heap
page read and write
218874DC000
heap
page read and write
21887C80000
trusted library allocation
page read and write
21881F3C000
heap
page read and write
218875EC000
heap
page read and write
2148E38C000
heap
page read and write
218843C7000
heap
page read and write
214938D0000
trusted library allocation
page read and write
21887660000
trusted library allocation
page read and write
21887BD0000
trusted library allocation
page read and write
21887B90000
trusted library allocation
page read and write
21494320000
trusted library allocation
page read and write
2148D7A9000
heap
page read and write
21806877000
heap
page read and write
21886E0E000
heap
page read and write
21884670000
trusted library allocation
page read and write
214934B0000
heap
page read and write
2148C0C0000
heap
page read and write
2148DE13000
heap
page read and write
2188803B000
heap
page read and write
218803B0000
trusted library allocation
page read and write
21887E50000
trusted library allocation
page read and write
21807D0C000
heap
page read and write
2148E7F1000
heap
page read and write
21806B60000
heap
page read and write
21880C6B000
heap
page read and write
2148CED5000
heap
page read and write
21490CD0000
trusted library allocation
page read and write
218845F0000
trusted library allocation
page read and write
2149440E000
heap
page read and write
2188804D000
heap
page read and write
21887670000
trusted library allocation
page read and write
21884710000
trusted library allocation
page read and write
21483A70000
trusted library allocation
page read and write
21887270000
trusted library allocation
page read and write
21494B20000
trusted library allocation
page read and write
21880F40000
trusted library allocation
page read and write
2148E69E000
heap
page read and write
21888360000
trusted library allocation
page read and write
2148D757000
heap
page read and write
2148E743000
heap
page read and write
218846E0000
trusted library allocation
page read and write
2148E6A5000
heap
page read and write
21493910000
trusted library allocation
page read and write
21490C00000
trusted library allocation
page read and write
21887EBF000
heap
page read and write
21886FBB000
heap
page read and write
21887EDE000
heap
page read and write
21880370000
trusted library allocation
page read and write
21490C50000
trusted library allocation
page read and write
21494714000
heap
page read and write
21887FDD000
heap
page read and write
2148AF54000
heap
page read and write
2148C9A7000
heap
page read and write
2148E774000
heap
page read and write
2148D666000
heap
page read and write
2148C2C5000
heap
page read and write
2188110C000
heap
page read and write
21881CE3000
heap
page read and write
21490C00000
trusted library allocation
page read and write
33636FB000
stack
page read and write
2148C023000
heap
page read and write
218066DE000
heap
page read and write
21493F30000
trusted library allocation
page read and write
214933B0000
trusted library allocation
page read and write
21887380000
trusted library allocation
page read and write
2148D243000
heap
page read and write
21490C30000
trusted library allocation
page read and write
218874D8000
heap
page read and write
21887BC0000
trusted library allocation
page read and write
214944D2000
heap
page read and write
214938E0000
trusted library allocation
page read and write
2148E080000
heap
page read and write
21887DE0000
trusted library allocation
page read and write
214945C4000
heap
page read and write
21887FE4000
heap
page read and write
21494390000
trusted library allocation
page read and write
2188751C000
heap
page read and write
21886FCA000
heap
page read and write
21493680000
trusted library allocation
page read and write
218809E7000
heap
page read and write
21881200000
heap
page read and write
21887660000
trusted library allocation
page read and write
214944D4000
heap
page read and write
214940F8000
heap
page read and write
2148AEF9000
heap
page read and write
2187F4C2000
heap
page read and write
21887CF0000
trusted library allocation
page read and write
21880630000
heap
page read and write
2148C07B000
heap
page read and write
21806DF4000
heap
page read and write
214944B0000
trusted library allocation
page read and write
2148AEA1000
heap
page read and write
21806BD9000
heap
page read and write
21881162000
heap
page read and write
21880690000
trusted library allocation
page read and write
21485D13000
heap
page read and write
21887030000
trusted library allocation
page read and write
7DF4158E1000
trusted library allocation
page execute read
21493C50000
trusted library allocation
page read and write
2148A970000
heap
page read and write
2148D82B000
heap
page read and write
21887B60000
trusted library allocation
page read and write
21806DE8000
heap
page read and write
21887FDF000
heap
page read and write
214909F0000
trusted library allocation
page read and write
21887650000
trusted library allocation
page read and write
21887B80000
trusted library allocation
page read and write
21886E2C000
heap
page read and write
21887CC0000
trusted library allocation
page read and write
21881998000
heap
page read and write
21884440000
trusted library allocation
page read and write
21493BA0000
trusted library allocation
page read and write
21880390000
trusted library allocation
page read and write
218808A4000
heap
page read and write
21806890000
heap
page read and write
2148E75B000
heap
page read and write
2148C2FF000
heap
page read and write
21881824000
heap
page read and write
2148D5E0000
trusted library allocation
page read and write
2148D480000
heap
page read and write
21880877000
heap
page read and write
218873B0000
trusted library allocation
page read and write
2148E7BD000
heap
page read and write
21881F4D000
heap
page read and write
21887C80000
trusted library allocation
page read and write
21887FD8000
heap
page read and write
21887AE0000
trusted library allocation
page read and write
214933C0000
trusted library allocation
page read and write
2148C256000
heap
page read and write
21887C70000
trusted library allocation
page read and write
2148E7AD000
heap
page read and write
21494890000
trusted library allocation
page read and write
2148CBB5000
heap
page read and write
3363BFE000
stack
page read and write
21887EAA000
heap
page read and write
2148DF00000
heap
page read and write
7DF415870000
trusted library allocation
page readonly
21887610000
trusted library allocation
page read and write
21806BB1000
heap
page read and write
2148D233000
heap
page read and write
21493B90000
trusted library allocation
page read and write
21887F73000
heap
page read and write
214945CE000
heap
page read and write
21880856000
heap
page read and write
21806800000
heap
page read and write
2188053D000
heap
page read and write
21887640000
trusted library allocation
page read and write
2188112E000
heap
page read and write
2148C1BD000
heap
page read and write
21884610000
trusted library allocation
page read and write
2187F49A000
heap
page read and write
21493850000
trusted library allocation
page read and write
21494350000
trusted library allocation
page read and write
2148C01B000
heap
page read and write
218879B0000
trusted library allocation
page read and write
21494380000
trusted library allocation
page read and write
21490B0D000
heap
page read and write
2148DE00000
heap
page read and write
21881F23000
heap
page read and write
21490D50000
trusted library allocation
page read and write
21881182000
heap
page read and write
21887630000
trusted library allocation
page read and write
21887160000
trusted library allocation
page read and write
2148C02A000
heap
page read and write
214941C3000
heap
page read and write
21485B40000
heap
page readonly
21887D20000
trusted library allocation
page read and write
21880C5A000
heap
page read and write
21884740000
trusted library allocation
page read and write
2148AF98000
heap
page read and write
218067AF000
heap
page read and write
2148C800000
heap
page read and write
218872C0000
trusted library allocation
page read and write
21806D51000
heap
page read and write
2148C1D8000
heap
page read and write
2187F5B7000
heap
page read and write
2148AF94000
heap
page read and write
2148CE5B000
heap
page read and write
21881DC3000
heap
page read and write
2188750C000
heap
page read and write
2148D79D000
heap
page read and write
21888070000
heap
page read and write
2148E035000
heap
page read and write
21881392000
heap
page read and write
2148C061000
heap
page read and write
21884640000
trusted library allocation
page read and write
218844C0000
trusted library allocation
page read and write
214908D0000
trusted library allocation
page read and write
36A99FC000
stack
page read and write
3364DFE000
stack
page read and write
21490D30000
trusted library allocation
page read and write
21887C20000
trusted library allocation
page read and write
21886E84000
heap
page read and write
21887CE0000
trusted library allocation
page read and write
21880000000
heap
page read and write
21881C9D000
heap
page read and write
2148AFEA000
heap
page read and write
218821A2000
heap
page read and write
21887438000
heap
page read and write
21493D60000
trusted library allocation
page read and write
36A9BFC000
stack
page read and write
21886DB0000
trusted library allocation
page read and write
21887C10000
trusted library allocation
page read and write
214938D0000
trusted library allocation
page read and write
21880402000
heap
page read and write
21881E2F000
heap
page read and write
21493810000
trusted library allocation
page read and write
2148D7D5000
heap
page read and write
214943F0000
trusted library allocation
page read and write
2149353D000
heap
page read and write
218870F0000
trusted library allocation
page read and write
21887653000
trusted library allocation
page read and write
21490C50000
trusted library allocation
page read and write
21493EC0000
trusted library allocation
page read and write
214938E0000
trusted library allocation
page read and write
21807C3C000
heap
page read and write
2187F5EF000
heap
page read and write
21806E9B000
heap
page read and write
21887DD0000
trusted library allocation
page read and write
21887C40000
trusted library allocation
page read and write
2148D765000
heap
page read and write
21806713000
heap
page read and write
2148D700000
heap
page read and write
214945D7000
heap
page read and write
21493BF0000
trusted library allocation
page read and write
218876B0000
trusted library allocation
page read and write
21494510000
trusted library allocation
page read and write
2148E193000
heap
page read and write
21888024000
heap
page read and write
21886EA4000
heap
page read and write
2148AE43000
heap
page read and write
21881ECE000
heap
page read and write
21887FE1000
heap
page read and write
21493A00000
trusted library allocation
page read and write
21887FF8000
heap
page read and write
21886EEF000
heap
page read and write
21887940000
trusted library allocation
page read and write
21493860000
trusted library allocation
page read and write
21887800000
trusted library allocation
page read and write
21887C20000
trusted library allocation
page read and write
21886EE1000
heap
page read and write
2148E7C0000
heap
page read and write
2149481A000
heap
page read and write
2148C9FC000
heap
page read and write
21806E9F000
heap
page read and write
2149353F000
heap
page read and write
21806DE8000
heap
page read and write
2188801B000
heap
page read and write
2148AF16000
heap
page read and write
2187F513000
heap
page read and write
2188803D000
heap
page read and write
21887FC6000
heap
page read and write
2148E74D000
heap
page read and write
2148D229000
heap
page read and write
21881AEF000
heap
page read and write
21887670000
trusted library allocation
page read and write
21887F35000
heap
page read and write
21493860000
trusted library allocation
page read and write
2148E500000
heap
page read and write
2148E300000
heap
page read and write
21806DC4000
heap
page read and write
21888044000
heap
page read and write
21881A90000
heap
page read and write
2148AF94000
heap
page read and write
2148C1D0000
heap
page read and write
21490A87000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
21884430000
trusted library allocation
page read and write
21884710000
trusted library allocation
page read and write
21884450000
trusted library allocation
page read and write
2148E068000
heap
page read and write
2148AFB4000
heap
page read and write
2148AA7C000
heap
page read and write
214938C0000
trusted library allocation
page read and write
21490CD0000
trusted library allocation
page read and write
21887BB0000
trusted library allocation
page read and write
21493890000
trusted library allocation
page read and write
21483807000
heap
page read and write
21493820000
trusted library allocation
page read and write
218846F0000
trusted library allocation
page read and write
36A95FC000
stack
page read and write
214945C5000
heap
page read and write
2148E663000
heap
page read and write
21888143000
heap
page read and write
21887A90000
trusted library allocation
page read and write
2180688E000
heap
page read and write
214937E0000
trusted library allocation
page read and write
21493B90000
trusted library allocation
page read and write
2148D7BF000
heap
page read and write
214941E2000
heap
page read and write
21806EAE000
heap
page read and write
21888402000
heap
page read and write
21806DDE000
heap
page read and write
21886EE5000
heap
page read and write
2148D26F000
heap
page read and write
214941F8000
heap
page read and write
36A7EFE000
stack
page read and write
36A86FB000
stack
page read and write
21887C30000
trusted library allocation
page read and write
21880928000
heap
page read and write
21806EC4000
heap
page read and write
21806E8E000
heap
page read and write
21887F14000
heap
page read and write
21886E07000
heap
page read and write
21887C90000
trusted library allocation
page read and write
218845A0000
trusted library allocation
page read and write
218821E0000
heap
page read and write
21807C43000
heap
page read and write
36A8EFE000
stack
page read and write
218818DB000
heap
page read and write
21485D85000
heap
page read and write
21494600000
heap
page read and write
214945CF000
heap
page read and write
2148C1F4000
heap
page read and write
218811EB000
heap
page read and write
218067CE000
heap
page read and write
218870B0000
trusted library allocation
page read and write
2188103D000
heap
page read and write
21881192000
heap
page read and write
21887C60000
trusted library allocation
page read and write
2148CE9F000
heap
page read and write
218819FB000
heap
page read and write
2148CC10000
trusted library allocation
page read and write
21887120000
trusted library allocation
page read and write
2187F4E5000
heap
page read and write
214945E1000
heap
page read and write
21886FC1000
heap
page read and write
218843F9000
heap
page read and write
2148E78D000
heap
page read and write
21887C43000
trusted library allocation
page read and write
218846B0000
trusted library allocation
page read and write
21884630000
heap
page read and write
21887360000
trusted library allocation
page read and write
2148C02E000
heap
page read and write
21887830000
trusted library allocation
page read and write
214944ED000
heap
page read and write
21806B7A000
heap
page read and write
21806E62000
heap
page read and write
21806DD5000
heap
page read and write
36A87FC000
stack
page read and write
214839E3000
heap
page read and write
33654FC000
stack
page read and write
218808AD000
heap
page read and write
21493C60000
trusted library allocation
page read and write
2148C25A000
heap
page read and write
21884700000
trusted library allocation
page read and write
21887FE7000
heap
page read and write
2148DF2B000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
2148E755000
heap
page read and write
218066E8000
heap
page read and write
2148AFA8000
heap
page read and write
2148C213000
heap
page read and write
21493CC0000
trusted library allocation
page read and write
21887B80000
trusted library allocation
page read and write
2148AF85000
heap
page read and write
214940C6000
heap
page read and write
21493C70000
trusted library allocation
page read and write
2148BC80000
heap
page read and write
21881100000
heap
page read and write
21886EF9000
heap
page read and write
21493D40000
trusted library allocation
page read and write
21887283000
trusted library allocation
page read and write
2148CF00000
heap
page read and write
214940D2000
heap
page read and write
21494A90000
trusted library allocation
page read and write
21887D50000
trusted library allocation
page read and write
21887E90000
trusted library allocation
page read and write
2148C2C0000
heap
page read and write
218806E0000
trusted library allocation
page read and write
21881AA9000
heap
page read and write
21887740000
trusted library allocation
page read and write
21887CD0000
trusted library allocation
page read and write
214935BE000
heap
page read and write
2149450B000
heap
page read and write
2148D5A0000
trusted library allocation
page read and write
21493390000
trusted library allocation
page read and write
2148C255000
heap
page read and write
2148D623000
heap
page read and write
214945E5000
heap
page read and write
2148E7B5000
heap
page read and write
2148AFC5000
heap
page read and write
214936F0000
trusted library allocation
page read and write
21881B7B000
heap
page read and write
2187F5A7000
heap
page read and write
21886EE4000
heap
page read and write
2187FD6F000
heap
page read and write
21887F4F000
heap
page read and write
21881345000
heap
page read and write
2187F3A0000
heap
page read and write
2148AFE3000
heap
page read and write
2148A9C0000
heap
page read and write
21880610000
trusted library allocation
page read and write
2148BFE0000
heap
page read and write
3365FFB000
stack
page read and write
21493C80000
trusted library allocation
page read and write
21887517000
heap
page read and write
21888103000
heap
page read and write
36AB4FE000
stack
page read and write
218876D0000
trusted library allocation
page read and write
21493BB0000
trusted library allocation
page read and write
21806DC1000
heap
page read and write
21493B90000
trusted library allocation
page read and write
21483985000
heap
page read and write
2148E350000
heap
page read and write
21880F30000
heap
page read and write
2148C13C000
heap
page read and write
218872E0000
trusted library allocation
page read and write
2148E255000
heap
page read and write
2148E3B1000
heap
page read and write
21806F13000
heap
page read and write
218809D8000
heap
page read and write
218066F1000
heap
page read and write
21807890000
heap
page read and write
21493900000
trusted library allocation
page read and write
21888003000
heap
page read and write
21881AD3000
heap
page read and write
214935C3000
heap
page read and write
21886ED8000
heap
page read and write
21887C40000
trusted library allocation
page read and write
214909F3000
trusted library allocation
page read and write
21806ABA000
heap
page read and write
21887650000
trusted library allocation
page read and write
2148AF2A000
heap
page read and write
214908C0000
trusted library allocation
page read and write
2148D724000
heap
page read and write
218821A2000
heap
page read and write
21881AEC000
heap
page read and write
21887750000
trusted library allocation
page read and write
2148D711000
heap
page read and write
21881E37000
heap
page read and write
218808B7000
heap
page read and write
21493EB0000
trusted library allocation
page read and write
2148E75D000
heap
page read and write
21887D50000
trusted library allocation
page read and write
218809B3000
heap
page read and write
2148E6D2000
heap
page read and write
21884760000
trusted library allocation
page read and write
21881167000
heap
page read and write
214944EB000
heap
page read and write
21881D44000
heap
page read and write
218819BA000
heap
page read and write
2148E751000
heap
page read and write
21494310000
trusted library allocation
page read and write
21881E31000
heap
page read and write
218872C0000
trusted library allocation
page read and write
2148CD70000
trusted library allocation
page read and write
2148CB7E000
heap
page read and write
21490C10000
trusted library allocation
page read and write
2148D800000
heap
page read and write
214938F3000
trusted library allocation
page read and write
21494420000
trusted library allocation
page read and write
2148E7AE000
heap
page read and write
21490990000
trusted library allocation
page read and write
33642FC000
stack
page read and write
21887150000
trusted library allocation
page read and write
2148CB8A000
heap
page read and write
2148C381000
heap
page read and write
33648FF000
stack
page read and write
21887650000
trusted library allocation
page read and write
21806EA9000
heap
page read and write
2188216F000
heap
page read and write
2188102C000
heap
page read and write
21807D50000
heap
page read and write
218066B4000
heap
page read and write
21806FA5000
heap
page read and write
21493650000
trusted library allocation
page read and write
2148C0F3000
heap
page read and write
2148C3CA000
heap
page read and write
218872D0000
trusted library allocation
page read and write
21493C30000
trusted library allocation
page read and write
214942D0000
trusted library allocation
page read and write
2187FAB0000
heap
page read and write
2148E7B6000
heap
page read and write
21881860000
heap
page read and write
2187FBB3000
heap
page readonly
214933E0000
trusted library allocation
page read and write
21887FDE000
heap
page read and write
21806E59000
heap
page read and write
218871C0000
trusted library allocation
page read and write
214838CA000
heap
page read and write
21881134000
heap
page read and write
21886E05000
heap
page read and write
21886FAB000
heap
page read and write
21494820000
trusted library allocation
page read and write
214945CC000
heap
page read and write
21886EE8000
heap
page read and write
21887C60000
trusted library allocation
page read and write
21887BB0000
trusted library allocation
page read and write
21888084000
heap
page read and write
214944D0000
heap
page read and write
21490B3B000
heap
page read and write
21493ED0000
trusted library allocation
page read and write
21494560000
heap
page read and write
21493840000
trusted library allocation
page read and write
21494AE0000
trusted library allocation
page read and write
21881A24000
heap
page read and write
21887C70000
trusted library allocation
page read and write
2148E780000
heap
page read and write
21490970000
trusted library allocation
page read and write
2148C1F3000
heap
page read and write
2148D77D000
heap
page read and write
2148E765000
heap
page read and write
21806AF4000
heap
page read and write
33650FC000
stack
page read and write
21490CB0000
trusted library allocation
page read and write
2188108D000
heap
page read and write
21494240000
trusted library allocation
page read and write
2148E78D000
heap
page read and write
21887310000
trusted library allocation
page read and write
2148ABC9000
heap
page read and write
2148AF8F000
heap
page read and write
21806E63000
heap
page read and write
21887CD0000
trusted library allocation
page read and write
2148D774000
heap
page read and write
2148390A000
heap
page read and write
21880C55000
heap
page read and write
21493FD0000
trusted library allocation
page read and write
21880500000
heap
page read and write
2148AD95000
heap
page read and write
21490C20000
trusted library allocation
page read and write
214909F0000
trusted library allocation
page read and write
21886FBD000
heap
page read and write
218873A0000
trusted library allocation
page read and write
214941B6000
heap
page read and write
21494402000
heap
page read and write
21490BFE000
heap
page read and write
218878E0000
trusted library allocation
page read and write
218808D5000
heap
page read and write
21493DE0000
trusted library allocation
page read and write
21806AD8000
heap
page read and write
21806FA8000
heap
page read and write
218806C0000
trusted library allocation
page read and write
218845E0000
trusted library allocation
page read and write
21881B9C000
heap
page read and write
21494330000
trusted library allocation
page read and write
21493E30000
trusted library allocation
page read and write
214838BB000
heap
page read and write
21494064000
heap
page read and write
2148C95F000
heap
page read and write
2187F5CC000
heap
page read and write
21886FDD000
heap
page read and write
21493BC0000
trusted library allocation
page read and write
21880850000
heap
page read and write
2148C97B000
heap
page read and write
21887050000
trusted library allocation
page read and write
21887CE0000
trusted library allocation
page read and write
21881404000
trusted library allocation
page read and write
21806BAD000
heap
page read and write
21880C13000
heap
page read and write
2148C08C000
heap
page read and write
7DF4158E0000
trusted library allocation
page readonly
21494583000
trusted library allocation
page read and write
2148ABB5000
heap
page read and write
21887BA0000
trusted library allocation
page read and write
218821EB000
heap
page read and write
21887DB0000
trusted library allocation
page read and write
21887350000
trusted library allocation
page read and write
21887476000
heap
page read and write
2148D313000
heap
page read and write
21494530000
trusted library allocation
page read and write
2148D770000
heap
page read and write
2148E297000
heap
page read and write
2148E767000
heap
page read and write
21493920000
trusted library allocation
page read and write
21494300000
trusted library allocation
page read and write
2148D987000
heap
page read and write
21494802000
heap
page read and write
21494290000
trusted library allocation
page read and write
218805D0000
heap
page read and write
2149454B000
heap
page read and write
21887680000
trusted library allocation
page read and write
218876A0000
trusted library allocation
page read and write
21493FB0000
trusted library allocation
page read and write
21493930000
trusted library allocation
page read and write
214940E4000
heap
page read and write
2149406F000
heap
page read and write
21880524000
heap
page read and write
214933A0000
trusted library allocation
page read and write
21493A50000
trusted library allocation
page read and write
218843F6000
heap
page read and write
2148C156000
heap
page read and write
21884750000
trusted library allocation
page read and write
21806A57000
heap
page read and write
21806C5C000
heap
page read and write
218806B0000
trusted library allocation
page read and write
21888011000
heap
page read and write
2148C384000
heap
page read and write
21881B00000
heap
page read and write
2148CEFB000
heap
page read and write
2148E700000
heap
page read and write
214940D9000
heap
page read and write
2148C127000
heap
page read and write
21493D50000
trusted library allocation
page read and write
21887BA0000
trusted library allocation
page read and write
218845E3000
trusted library allocation
page read and write
21886E41000
heap
page read and write
214838E8000
heap
page read and write
214945DF000
heap
page read and write
214933A0000
trusted library allocation
page read and write
214948A0000
trusted library allocation
page read and write
21886EFE000
heap
page read and write
7DF4158D1000
trusted library allocation
page execute read
2187FD11000
heap
page read and write
2188802C000
heap
page read and write
21493600000
trusted library allocation
page read and write
2188134D000
heap
page read and write
21884490000
trusted library allocation
page read and write
218820AE000
heap
page read and write
7DF4158B1000
trusted library allocation
page execute read
21887B10000
trusted library allocation
page read and write
21888057000
heap
page read and write
21806ADF000
heap
page read and write
21887C20000
trusted library allocation
page read and write
218809D1000
heap
page read and write
21887820000
trusted library allocation
page read and write
2148CD30000
trusted library allocation
page read and write
21494AF0000
trusted library allocation
page read and write
21806DE2000
heap
page read and write
21887C50000
trusted library allocation
page read and write
2148AF84000
heap
page read and write
21806BF1000
heap
page read and write
21887EE0000
trusted library allocation
page read and write
21493960000
trusted library allocation
page read and write
21887653000
trusted library allocation
page read and write
2148ACE4000
heap
page read and write
21493910000
trusted library allocation
page read and write
21887C20000
trusted library allocation
page read and write
21887DE0000
trusted library allocation
page read and write
21806BB6000
heap
page read and write
21886EAD000
heap
page read and write
2188209B000
heap
page read and write
21490B00000
heap
page read and write
21888043000
heap
page read and write
21494508000
heap
page read and write
21806EFA000
heap
page read and write
21806DFA000
heap
page read and write
21806B26000
heap
page read and write
21887DC0000
trusted library allocation
page read and write
21493CD0000
trusted library allocation
page read and write
214938F0000
trusted library allocation
page read and write
21880380000
trusted library allocation
page read and write
21881DA2000
heap
page read and write
21886FED000
heap
page read and write
2148D231000
heap
page read and write
214839C5000
heap
page read and write
2188082B000
heap
page read and write
21887090000
trusted library allocation
page read and write
21493393000
trusted library allocation
page read and write
21881C13000
heap
page read and write
21886FA5000
heap
page read and write
21888173000
heap
page read and write
214941DC000
heap
page read and write
21887210000
trusted library allocation
page read and write
214939F0000
trusted library allocation
page read and write
218811A5000
heap
page read and write
2148E077000
heap
page read and write
214940EB000
heap
page read and write
21887C90000
heap
page read and write
21493C40000
trusted library allocation
page read and write
21881CFA000
heap
page read and write
21881AA0000
heap
page read and write
2148E1C8000
heap
page read and write
218805D6000
heap
page read and write
21806B5E000
heap
page read and write
2148C94E000
heap
page read and write
21493B20000
trusted library allocation
page read and write
214838E1000
heap
page read and write
2148AF7F000
heap
page read and write
21887300000
trusted library allocation
page read and write
218805F1000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
218843E3000
heap
page read and write
21887FD2000
heap
page read and write
218821F9000
heap
page read and write
21887D00000
trusted library allocation
page read and write
21880330000
trusted library allocation
page read and write
218846E0000
trusted library allocation
page read and write
21806E00000
heap
page read and write
21880350000
trusted library allocation
page read and write
21884790000
trusted library allocation
page read and write
2148E200000
heap
page read and write
218882D0000
trusted library allocation
page read and write
2148E7E2000
heap
page read and write
21886F23000
heap
page read and write
214942B0000
trusted library allocation
page read and write
2148DFC8000
heap
page read and write
21494410000
trusted library allocation
page read and write
2148D85D000
heap
page read and write
2148AF91000
heap
page read and write
2148390F000
heap
page read and write
2148C1F2000
heap
page read and write
2148C212000
heap
page read and write
2148D8C5000
heap
page read and write
2148AB46000
heap
page read and write
21887EB0000
trusted library allocation
page read and write
2148AF53000
heap
page read and write
2148E76C000
heap
page read and write
21806E1A000
heap
page read and write
218811C5000
heap
page read and write
21887C00000
trusted library allocation
page read and write
21887653000
trusted library allocation
page read and write
21493670000
trusted library allocation
page read and write
2187F6F0000
trusted library allocation
page read and write
214933E3000
trusted library allocation
page read and write
2148C813000
heap
page read and write
21887ED0000
trusted library allocation
page read and write
218808B4000
heap
page read and write
21490D90000
trusted library allocation
page read and write
214933D0000
trusted library allocation
page read and write
21806FF8000
heap
page read and write
2148CD20000
trusted library allocation
page read and write
21886FB3000
heap
page read and write
2148D237000
heap
page read and write
2148AF5E000
heap
page read and write
21806711000
heap
page read and write
21884580000
trusted library allocation
page read and write
21CF88A0000
heap
page read and write
218820F5000
heap
page read and write
21880845000
heap
page read and write
21886E2C000
heap
page read and write
2148397B000
heap
page read and write
2148AEC4000
heap
page read and write
36A8AFE000
stack
page read and write
2148E6AD000
heap
page read and write
2148AC9B000
heap
page read and write
21881A1F000
heap
page read and write
21886EB9000
heap
page read and write
218891B3000
heap
page read and write
2148E6C1000
heap
page read and write
21888270000
trusted library allocation
page read and write
218066E6000
heap
page read and write
2180681E000
heap
page read and write
214943C0000
trusted library allocation
page read and write
21887C50000
trusted library allocation
page read and write
21881A17000
heap
page read and write
2148CEE8000
heap
page read and write
218872A0000
trusted library allocation
page read and write
36AA1FD000
stack
page read and write
21887BE0000
trusted library allocation
page read and write
21887B00000
trusted library allocation
page read and write
218808AF000
heap
page read and write
2187FD57000
heap
page read and write
218812BD000
heap
page read and write
218069A5000
heap
page read and write
21490B0D000
heap
page read and write
21493870000
trusted library allocation
page read and write
214941F8000
heap
page read and write
21494490000
trusted library allocation
page read and write
2188216D000
heap
page read and write
21493F80000
trusted library allocation
page read and write
21887C50000
trusted library allocation
page read and write
21806B81000
heap
page read and write
214909F3000
trusted library allocation
page read and write
21493930000
trusted library allocation
page read and write
2180687C000
heap
page read and write
2187F4CB000
heap
page read and write
21806BA3000
heap
page read and write
21884760000
trusted library allocation
page read and write
218821B1000
heap
page read and write
2148AF32000
heap
page read and write
21884550000
trusted library allocation
page read and write
21887890000
trusted library allocation
page read and write
214839DA000
heap
page read and write
21806C7B000
heap
page read and write
21887C80000
trusted library allocation
page read and write
21888230000
trusted library allocation
page read and write
2149484E000
heap
page read and write
2148D71F000
heap
page read and write
218877C0000
trusted library allocation
page read and write
7DF415A31000
trusted library allocation
page execute read
2148E7EC000
heap
page read and write
21884610000
trusted library allocation
page read and write
2148DF1C000
heap
page read and write
2148AE00000
heap
page read and write
21887F6A000
heap
page read and write
2148387D000
heap
page read and write
21493890000
trusted library allocation
page read and write
21886E13000
heap
page read and write
33643FE000
stack
page read and write
21493880000
trusted library allocation
page read and write
2188801A000
heap
page read and write
2148B000000
heap
page read and write
21806BC3000
heap
page read and write
218877D0000
trusted library allocation
page read and write
21882002000
heap
page read and write
21806EA5000
heap
page read and write
21490DA0000
trusted library allocation
page read and write
218870E0000
trusted library allocation
page read and write
21806AA9000
heap
page read and write
21880400000
heap
page read and write
2187F42B000
heap
page read and write
2148D7A2000
heap
page read and write
21494712000
heap
page read and write
21887660000
trusted library allocation
page read and write
21881027000
heap
page read and write
2148D200000
heap
page read and write
21887C10000
trusted library allocation
page read and write
2148DFAF000
heap
page read and write
21490A8D000
heap
page read and write
21886DA0000
trusted library allocation
page read and write
2148E6AC000
heap
page read and write
214838DB000
heap
page read and write
21806F58000
heap
page read and write
2148E645000
heap
page read and write
36A85FD000
stack
page read and write
21887280000
trusted library allocation
page read and write
21884680000
trusted library allocation
page read and write
21483700000
heap
page read and write
218818BE000
heap
page read and write
21888340000
trusted library allocation
page read and write
214936D0000
trusted library allocation
page read and write
218877F0000
trusted library allocation
page read and write
21807D13000
heap
page read and write
2148AA1D000
heap
page read and write
2148AC31000
heap
page read and write
21494010000
heap
page read and write
214938F0000
trusted library allocation
page read and write
21887170000
trusted library allocation
page read and write
2148E777000
heap
page read and write
21485DD2000
heap
page read and write
218800A9000
heap
page read and write
214935EF000
heap
page read and write
2148C210000
heap
page read and write
2148E586000
heap
page read and write
2148C283000
heap
page read and write
2148E7C5000
heap
page read and write
21887BB0000
trusted library allocation
page read and write
21495120000
heap
page read and write
214940D9000
heap
page read and write
218800F4000
heap
page read and write
2148C111000
heap
page read and write
36A9CFC000
stack
page read and write
218874F2000
heap
page read and write
21490DB0000
trusted library allocation
page read and write
21887650000
trusted library allocation
page read and write
21887920000
trusted library allocation
page read and write
2148ADB5000
heap
page read and write
2148E16E000
heap
page read and write
218802F0000
trusted library allocation
page read and write
21887EC0000
trusted library allocation
page read and write
2149444E000
heap
page read and write
21493930000
trusted library allocation
page read and write
2148E080000
heap
page read and write
218874B2000
heap
page read and write
218811DB000
heap
page read and write
214945E1000
heap
page read and write
2148AF0A000
heap
page read and write
21887C00000
trusted library allocation
page read and write
2148AF60000
heap
page read and write
21493519000
heap
page read and write
21881D5D000
heap
page read and write
21493DB0000
trusted library allocation
page read and write
21887690000
trusted library allocation
page read and write
218843D5000
heap
page read and write
21887EA4000
heap
page read and write
21887990000
trusted library allocation
page read and write
21494870000
trusted library allocation
page read and write
2148E623000
heap
page read and write
21884690000
trusted library allocation
page read and write
21884570000
trusted library allocation
page read and write
21494210000
trusted library allocation
page read and write
21493930000
trusted library allocation
page read and write
21886FF7000
heap
page read and write
21886E8E000
heap
page read and write
21884620000
trusted library allocation
page read and write
2188114B000
heap
page read and write
214838C8000
heap
page read and write
218066E3000
heap
page read and write
21886EEF000
heap
page read and write
21806C75000
heap
page read and write
2148AEA8000
heap
page read and write
2148E6BC000
heap
page read and write
2148AF54000
heap
page read and write
2148D86E000
heap
page read and write
2148E7EE000
heap
page read and write
21490D40000
trusted library allocation
page read and write
21490840000
trusted library allocation
page read and write
21887544000
heap
page read and write
21490870000
trusted library allocation
page read and write
2148D7DE000
heap
page read and write
214938D0000
trusted library allocation
page read and write
21887DB0000
trusted library allocation
page read and write
21887DC0000
trusted library allocation
page read and write
21493407000
heap
page read and write
2148C10E000
heap
page read and write
21494B00000
trusted library allocation
page read and write
21889120000
heap
page read and write
21490B65000
heap
page read and write
218876B0000
trusted library allocation
page read and write
21493E60000
trusted library allocation
page read and write
218847B0000
trusted library allocation
page read and write
2187FDD2000
heap
page read and write
218878B0000
trusted library allocation
page read and write
2148DE45000
heap
page read and write
21493AF0000
trusted library allocation
page read and write
2148D9D2000
heap
page read and write
21490CA0000
trusted library allocation
page read and write
2148AF5E000
heap
page read and write
21887BD0000
trusted library allocation
page read and write
214935CE000
heap
page read and write
21888350000
trusted library allocation
page read and write
21493FE0000
trusted library allocation
page read and write
21881BCD000
heap
page read and write
21881121000
heap
page read and write
21490C90000
trusted library allocation
page read and write
21886E51000
heap
page read and write
21886FA7000
heap
page read and write
218879A0000
trusted library allocation
page read and write
21493B70000
trusted library allocation
page read and write
21887D60000
trusted library allocation
page read and write
218874BA000
heap
page read and write
21494577000
heap
page read and write
214937D3000
trusted library allocation
page read and write
21887FED000
heap
page read and write
218068E2000
heap
page read and write
2148E600000
heap
page read and write
214951A9000
heap
page read and write
21886EE1000
heap
page read and write
2148395E000
heap
page read and write
21880800000
heap
page read and write
21807BF7000
heap
page read and write
21493410000
heap
page read and write
21887370000
trusted library allocation
page read and write
218820C7000
heap
page read and write
2148C17C000
heap
page read and write
21493EB0000
trusted library allocation
page read and write
2148E64C000
heap
page read and write
218870E0000
trusted library allocation
page read and write
218879E0000
trusted library allocation
page read and write
2148E69D000
heap
page read and write
21881813000
heap
page read and write
2148D735000
heap
page read and write
2148E266000
heap
page read and write
21887FE7000
heap
page read and write
2187FFE0000
trusted library allocation
page read and write
21887950000
trusted library allocation
page read and write
7DF415861000
trusted library allocation
page execute read
21882175000
heap
page read and write
2148D6A0000
heap
page read and write
2188747E000
heap
page read and write
21887573000
heap
page read and write
21485C02000
heap
page read and write
21887C50000
trusted library allocation
page read and write
21881C40000
heap
page read and write
2148C118000
heap
page read and write
2148C89F000
heap
page read and write
2148AB35000
heap
page read and write
21887670000
trusted library allocation
page read and write
21881E3B000
heap
page read and write
21887790000
trusted library allocation
page read and write
21884510000
trusted library allocation
page read and write
21887D40000
trusted library allocation
page read and write
21CF85F0000
heap
page read and write
7DF415880000
trusted library allocation
page readonly
21887CF0000
trusted library allocation
page read and write
21884770000
trusted library allocation
page read and write
218844F0000
trusted library allocation
page read and write
21493E90000
trusted library allocation
page read and write
21886FAD000
heap
page read and write
218811D2000
heap
page read and write
21485B43000
heap
page readonly
2148C177000
heap
page read and write
21493BB3000
trusted library allocation
page read and write
21493980000
trusted library allocation
page read and write
218805FB000
heap
page read and write
2148C05D000
heap
page read and write
21887E9A000
heap
page read and write
2148DF58000
heap
page read and write
21886FA7000
heap
page read and write
21493CB0000
trusted library allocation
page read and write
21493E00000
trusted library allocation
page read and write
21880FD0000
trusted library allocation
page read and write
21887BF0000
trusted library allocation
page read and write
218066CE000
heap
page read and write
33646FF000
stack
page read and write
7DF415A01000
trusted library allocation
page execute read
218845E3000
trusted library allocation
page read and write
21494059000
heap
page read and write
218874E1000
heap
page read and write
21881DE4000
heap
page read and write
21880513000
heap
page read and write
218808AF000
heap
page read and write
21887C00000
trusted library allocation
page read and write
21493E80000
trusted library allocation
page read and write
21887CC0000
trusted library allocation
page read and write
218820DA000
heap
page read and write
21887600000
trusted library allocation
page read and write
21887BE0000
trusted library allocation
page read and write
2148E79A000
heap
page read and write
218820E4000
heap
page read and write
2148C9A3000
heap
page read and write
21806DBD000
heap
page read and write
21494360000
trusted library allocation
page read and write
2187F4D7000
heap
page read and write
21886EE7000
heap
page read and write
21887C80000
trusted library allocation
page read and write
21490C60000
trusted library allocation
page read and write
21493690000
trusted library allocation
page read and write
2148E424000
heap
page read and write
21880320000
trusted library allocation
page read and write
21887559000
heap
page read and write
21806DC8000
heap
page read and write
21806678000
heap
page read and write
2148AFE5000
heap
page read and write
21806CB9000
heap
page read and write
218821A4000
heap
page read and write
21887980000
trusted library allocation
page read and write
214938B0000
trusted library allocation
page read and write
218800CB000
heap
page read and write
2188191B000
heap
page read and write
21888380000
trusted library allocation
page read and write
214940FA000
heap
page read and write
214935AE000
heap
page read and write
218847A0000
trusted library allocation
page read and write
218821EB000
heap
page read and write
21493620000
trusted library allocation
page read and write
21493850000
trusted library allocation
page read and write
2148E024000
heap
page read and write
2148E4B0000
heap
page read and write
2148D7C8000
heap
page read and write
21887E80000
trusted library allocation
page read and write
218845D0000
trusted library allocation
page read and write
21807CC7000
heap
page read and write
2188085E000
heap
page read and write
21493D10000
trusted library allocation
page read and write
21881A8B000
heap
page read and write
21884620000
trusted library allocation
page read and write
2149351C000
heap
page read and write
218846C0000
trusted library allocation
page read and write
2148E08F000
heap
page read and write
21494370000
trusted library allocation
page read and write
2148D84C000
heap
page read and write
2148CE1C000
heap
page read and write
2148D795000
heap
page read and write
218809CF000
heap
page read and write
21887660000
trusted library allocation
page read and write
21483988000
heap
page read and write
21494000000
heap
page read and write
2148E013000
heap
page read and write
2180679E000
heap
page read and write
21806FB9000
heap
page read and write
214944DC000
heap
page read and write
2148AF49000
heap
page read and write
21806E74000
heap
page read and write
21887053000
trusted library allocation
page read and write
36A795B000
stack
page read and write
21881A7F000
heap
page read and write
218813EC000
heap
page read and write
21887B80000
trusted library allocation
page read and write
2148D791000
heap
page read and write
21493F90000
trusted library allocation
page read and write
21887150000
trusted library allocation
page read and write
214946CD000
heap
page read and write
21806C94000
heap
page read and write
2148C253000
heap
page read and write
21485D08000
heap
page read and write
21884680000
trusted library allocation
page read and write
2148D23E000
heap
page read and write
21494AA0000
trusted library allocation
page read and write
21806DFA000
heap
page read and write
21887A60000
trusted library allocation
page read and write
21887620000
trusted library allocation
page read and write
21887860000
trusted library allocation
page read and write
21807BB0000
heap
page read and write
7DF415930000
trusted library allocation
page readonly
214937C0000
trusted library allocation
page read and write
21494270000
trusted library allocation
page read and write
21490820000
heap
page read and write
21806AB6000
heap
page read and write
214943C0000
trusted library allocation
page read and write
21887EE3000
heap
page read and write
21886E43000
heap
page read and write
21882142000
heap
page read and write
218802E0000
heap
page read and write
2148CBAD000
heap
page read and write
2148E582000
heap
page read and write
21493E70000
trusted library allocation
page read and write
2148C1DC000
heap
page read and write
21493F60000
trusted library allocation
page read and write
21881E29000
heap
page read and write
21493810000
trusted library allocation
page read and write
2187F577000
heap
page read and write
21886E6E000
heap
page read and write
21880874000
heap
page read and write
21887EAE000
heap
page read and write
21886FB7000
heap
page read and write
21494310000
trusted library allocation
page read and write
21493820000
trusted library allocation
page read and write
2148E017000
heap
page read and write
36A7CFF000
stack
page read and write
21806C7E000
heap
page read and write
21494430000
trusted library allocation
page read and write
2148AED4000
heap
page read and write
2187F4A0000
heap
page read and write
21880FA0000
trusted library allocation
page read and write
21887880000
trusted library allocation
page read and write
21887EBD000
heap
page read and write
21886E42000
heap
page read and write
21881A06000
heap
page read and write
218845C0000
trusted library allocation
page read and write
36A90FE000
stack
page read and write
214909A0000
trusted library allocation
page read and write
21806BD1000
heap
page read and write
2148E7C1000
heap
page read and write
214935E6000
heap
page read and write
2148C000000
heap
page read and write
218879F0000
trusted library allocation
page read and write
218806A0000
trusted library allocation
page read and write
2148E135000
heap
page read and write
36A8DFF000
stack
page read and write
218820E0000
heap
page read and write
21887B90000
trusted library allocation
page read and write
21490830000
trusted library allocation
page read and write
21490A02000
heap
page read and write
21493770000
trusted library allocation
page read and write
2148E0C2000
heap
page read and write
21490C90000
trusted library allocation
page read and write
21881C70000
heap
page read and write
214908F0000
trusted library allocation
page read and write
21887BC0000
trusted library allocation
page read and write
21881A39000
heap
page read and write
214934D5000
heap
page read and write
21806C67000
heap
page read and write
214943D0000
trusted library allocation
page read and write
21490B51000
heap
page read and write
21887FF8000
heap
page read and write
21884460000
trusted library allocation
page read and write
21881A9A000
heap
page read and write
7DF415981000
trusted library allocation
page execute read
218845E0000
trusted library allocation
page read and write
2148BF60000
heap
page read and write
2148CB8C000
heap
page read and write
21806D7F000
heap
page read and write
7DF415921000
trusted library allocation
page execute read
21887FD1000
heap
page read and write
2148E77C000
heap
page read and write
21887070000
trusted library allocation
page read and write
21801410000
trusted library allocation
page read and write
21490C13000
trusted library allocation
page read and write
214938A0000
trusted library allocation
page read and write
214941B5000
heap
page read and write
2148E69F000
heap
page read and write
21887230000
trusted library allocation
page read and write
214940E0000
heap
page read and write
21806DBD000
heap
page read and write
2148D5B0000
trusted library allocation
page read and write
218844B0000
trusted library allocation
page read and write
21806B8B000
heap
page read and write
21881F7E000
heap
page read and write
21493B70000
trusted library allocation
page read and write
2148C92B000
heap
page read and write
3363DE9000
stack
page read and write
214936B0000
trusted library allocation
page read and write
218846A0000
trusted library allocation
page read and write
21887A70000
trusted library allocation
page read and write
214937E0000
trusted library allocation
page read and write
21880693000
trusted library allocation
page read and write
21887D10000
trusted library allocation
page read and write
214938A0000
trusted library allocation
page read and write
21887690000
trusted library allocation
page read and write
21881869000
heap
page read and write
214940AA000
heap
page read and write
214948F0000
trusted library allocation
page read and write
218870B0000
trusted library allocation
page read and write
21494644000
heap
page read and write
2148AF34000
heap
page read and write
21493E70000
trusted library allocation
page read and write
21886DE0000
trusted library allocation
page read and write
2148CD33000
trusted library allocation
page read and write
21887710000
trusted library allocation
page read and write
21881330000
heap
page read and write
218878A0000
trusted library allocation
page read and write
21887250000
trusted library allocation
page read and write
214938E0000
trusted library allocation
page read and write
214909F0000
trusted library allocation
page read and write
2187F4E7000
heap
page read and write
21884540000
trusted library allocation
page read and write
21884600000
trusted library allocation
page read and write
21493810000
trusted library allocation
page read and write
21887680000
trusted library allocation
page read and write
21493600000
trusted library allocation
page read and write
21806C1B000
heap
page read and write
218808A8000
heap
page read and write
21881850000
heap
page read and write
21884600000
trusted library allocation
page read and write
21494A10000
trusted library allocation
page read and write
2148E6F2000
heap
page read and write
218066BC000
heap
page read and write
21887690000
trusted library allocation
page read and write
21493BD0000
trusted library allocation
page read and write
218843BD000
heap
page read and write
2148E7A8000
heap
page read and write
21886F3A000
heap
page read and write
2148E7A8000
heap
page read and write
21887F28000
heap
page read and write
214943D0000
trusted library allocation
page read and write
21495000000
heap
page read and write
21493A90000
trusted library allocation
page read and write
21887700000
trusted library allocation
page read and write
2187FC02000
heap
page read and write
2188802F000
heap
page read and write
21887C50000
trusted library allocation
page read and write
2148C854000
heap
page read and write
218876C0000
trusted library allocation
page read and write
21483945000
heap
page read and write
21887D20000
trusted library allocation
page read and write
2188215F000
heap
page read and write
21888290000
trusted library allocation
page read and write
21886E0A000
heap
page read and write
21881141000
heap
page read and write
2148C14E000
heap
page read and write
21490900000
trusted library allocation
page read and write
2148E65D000
heap
page read and write
21888200000
trusted library allocation
page read and write
21494590000
trusted library allocation
page read and write
21494800000
heap
page read and write
21887BE0000
trusted library allocation
page read and write
21881D4C000
heap
page read and write
214935CA000
heap
page read and write
21881FAF000
heap
page read and write
2187F561000
heap
page read and write
21887B80000
trusted library allocation
page read and write
21493E70000
trusted library allocation
page read and write
21887400000
heap
page read and write
21806DED000
heap
page read and write
21887670000
trusted library allocation
page read and write
2148BC34000
heap
page read and write
21880FC0000
trusted library allocation
page read and write
2148AF5A000
heap
page read and write
21881E39000
heap
page read and write
21887E30000
trusted library allocation
page read and write
2148BC43000
heap
page read and write
21806B92000
heap
page read and write
2148E765000
heap
page read and write
214909F3000
trusted library allocation
page read and write
2188100F000
heap
page read and write
218821D3000
heap
page read and write
21887D80000
trusted library allocation
page read and write
218811B2000
heap
page read and write
21887F00000
heap
page read and write
21887C30000
trusted library allocation
page read and write
2187F547000
heap
page read and write
2149353D000
heap
page read and write
214943B0000
trusted library allocation
page read and write
2188129C000
heap
page read and write
21493B50000
trusted library allocation
page read and write
21493830000
trusted library allocation
page read and write
21806DBD000
heap
page read and write
2148BC3A000
heap
page read and write
2149471A000
heap
page read and write
21887D30000
trusted library allocation
page read and write
36AA6FE000
stack
page read and write
21880840000
heap
page read and write
21490980000
trusted library allocation
page read and write
214939E0000
trusted library allocation
page read and write
218876E0000
trusted library allocation
page read and write
2148D6E7000
heap
page read and write
2148BD0C000
heap
page read and write
2148D950000
heap
page read and write
21887BC0000
trusted library allocation
page read and write
21493CF0000
trusted library allocation
page read and write
21882193000
heap
page read and write
214944F0000
trusted library allocation
page read and write
2188083E000
heap
page read and write
21887D20000
trusted library allocation
page read and write
21806DD1000
heap
page read and write
21493720000
trusted library allocation
page read and write
214938E0000
trusted library allocation
page read and write
21494543000
heap
page read and write
2188125E000
heap
page read and write
21889000000
heap
page read and write
21485DB5000
heap
page read and write
218066B0000
heap
page read and write
214838DF000
heap
page read and write
2148D900000
heap
page read and write
21887ED0000
heap
page read and write
21887B60000
trusted library allocation
page read and write
21485B30000
trusted library allocation
page read and write
2187F4E1000
heap
page read and write
218806B0000
heap
page read and write
21806DC8000
heap
page read and write
2148C1C4000
heap
page read and write
21887DD0000
trusted library allocation
page read and write
21881171000
heap
page read and write
2148AEE1000
heap
page read and write
21886EAF000
heap
page read and write
21493D20000
trusted library allocation
page read and write
2148B9A0000
heap
page read and write
214839D6000
heap
page read and write
21493390000
trusted library allocation
page read and write
2148E72D000
heap
page read and write
2148D73D000
heap
page read and write
2148E75B000
heap
page read and write
2187F5D0000
heap
page read and write
21884500000
trusted library allocation
page read and write
21881FE5000
heap
page read and write
218821C4000
heap
page read and write
21886ED6000
heap
page read and write
214933E0000
trusted library allocation
page read and write
21887690000
trusted library allocation
page read and write
214934A9000
heap
page read and write
2148D2C6000
heap
page read and write
21493BB0000
trusted library allocation
page read and write
21887446000
heap
page read and write
21490B1A000
heap
page read and write
218845F0000
trusted library allocation
page read and write
21490CB0000
trusted library allocation
page read and write
21493CE0000
trusted library allocation
page read and write
21490B6D000
heap
page read and write
21884610000
trusted library allocation
page read and write
21884600000
trusted library allocation
page read and write
21882191000
heap
page read and write
21887670000
trusted library allocation
page read and write
21884720000
trusted library allocation
page read and write
2187F5C1000
heap
page read and write
There are 3302 hidden memdumps, click here to show them.