IOC Report
proxy[1].png

loading gif

Files

File Path
Type
Category
Malicious
proxy[1].png
PNG image data, 1230 x 176, 8-bit/color RGBA, non-interlaced
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json.~tmp
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_0.bin
Matlab v4 mat-file (little endian) v\033, text, rows 11, columns 1230, imaginary
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_1.bin
Matlab v4 mat-file (little endian) \202\002, text, rows 11, columns 1230, imaginary
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_2.bin
Matlab v4 mat-file (little endian) \202\002, text, rows 11, columns 1230, imaginary
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_3.bin
Matlab v4 mat-file (little endian) \202\002, text, rows 11, columns 1230, imaginary
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\Canvas_4.bin
Matlab v4 mat-file (little endian) C\002, text, rows 11, columns 1230, imaginary
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\EngineConfigId.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\WorkingFolder\SceneData.bin
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json.~tmp
JSON data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe
"C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://aka.ms/paint3dhelp
unknown
https://api.remix3d.com/v3/creations
unknown
http://ns.adobe.ho
unknown
http://json-schema.org/draft-04/schema
unknown
https://api.remix3d.com/v3/creations/
unknown
https://www.remix3d.com/details/
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TELEMETRY.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.SELECTION.SMARTSELECT.3D.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.FILLBUCKET.FILLTYPES.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
EXPORT.OBJ.STL.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\SessionPersistence
App.ShowWelcomeScreen
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\SessionPersistence
App.CurrentColorHexCode
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\SessionPersistence
App.CurrentMaterialData
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Community
App.Community.Language
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Community
App.Community.Locale
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\AppSettingPersistence
APP.LAST.BOOT.FULLNAME
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Community
App.Community.IsOnline
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
App.LastCloudConfig.Version
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.SELECTION.MAGICFILL.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.IMPORT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.2DTOOLS.LINECURVETOOL.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD64.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.EDITINFREEVIEW.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.DUALLAYER.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TIPS.DEEPLINK
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.CMS.CONFIGENDPOINT
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.USEWEBVIEW
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.CLIENTTYPE
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.REQUEST1PHOST
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.MANIPULATION.SNAPANDALIGNMENT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.OCTEXHD32.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.FILEOPERATIONS.IMPORT.SEPARATEOBJECTS.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.IMPORT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.FILEOPERATIONS.FORMAT.FBX.EXPORT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.CMS.MINIMUMAPPVERSION
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.TEXTURES.CANVAS3D.GENERALIZEDDUALLAYER.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.HUBBLE.ENVIRONMENT
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.CMS.KILLSWITCHTURNEDON
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\CloudConfig
APP.COMMUNITY.GLTF.EXPORT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
App.Community.EnvironmentName
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
App.Community.DiscoverUriOverride
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
App.Community.TokenScopeOverride
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\UniversalStore
delaySeed
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\UniversalStore
meetsDelayTimestamp
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\UniversalStore
requestAttempts
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\UniversalStore
lastRequestAppVersion
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\UniversalStore
delayResetCount
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp
clientId
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp
lastRequestTimestamp
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-MSEDGE-CLIENTID
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-PHOTOS-CALLERID
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-APPVERSION
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-CANTAILOR
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-HASADID
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-OSVERSION
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-PLATFORM
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-PUBDEVICEID
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-RING
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Headers
X-WINNEXT-TELEMETRYLEVEL
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Metadata
version
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}\Metadata
timestamp
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}
hasUnreadValues
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp
active
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.CAST.VIEWINWORLD.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
APP.COMMUNITY.ANONYMOUSBROWSE.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState
TOOLS.SELECTION.SMARTSELECT.ENABLED
\REGISTRY\A\{9c0af0ba-83de-083b-a4fb-624b9a4033c0}\LocalState\Exp\{fbf10e7b-737a-42ef-86f0-42263d5e5721}
hasUnreadValues
There are 67 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A2BF0FD000
stack
page read and write
28A2368D000
heap
page read and write
28A28AB7000
heap
page read and write
28A2C2C0000
trusted library allocation
page read and write
28A292A0000
trusted library allocation
page read and write
28A294B6000
heap
page read and write
28A23BCB000
heap
page read and write
28A204C5000
heap
page read and write
28A2B26D000
heap
page read and write
28A2B058000
heap
page read and write
28A20989000
heap
page read and write
28A23A51000
heap
page read and write
28A18FAB000
heap
page read and write
28A22491000
heap
page read and write
28A2B285000
heap
page read and write
28A18FC9000
heap
page read and write
28A20F2C000
heap
page read and write
28A20729000
heap
page read and write
28A22B70000
heap
page read and write
28A29AA0000
trusted library allocation
page read and write
28A2B088000
heap
page read and write
28A2364E000
heap
page read and write
28A20630000
heap
page read and write
A2BF6FE000
stack
page read and write
28A2B181000
heap
page read and write
28A2B330000
heap
page read and write
28A23692000
heap
page read and write
28A29220000
trusted library allocation
page read and write
28A23657000
heap
page read and write
28A294EC000
heap
page read and write
28A29B10000
trusted library allocation
page read and write
28A28EC0000
trusted library allocation
page read and write
28A20823000
heap
page read and write
28A204B3000
heap
page read and write
28A2B16E000
heap
page read and write
28A21AC3000
heap
page read and write
28A29B30000
trusted library allocation
page read and write
28A28F90000
trusted library allocation
page read and write
28A22D17000
heap
page read and write
28A294BE000
heap
page read and write
28A29BB0000
trusted library allocation
page read and write
28A20287000
heap
page read and write
28A20883000
heap
page read and write
28A20716000
heap
page read and write
28A28ED0000
trusted library allocation
page read and write
28A224FA000
heap
page read and write
28A2C4E0000
trusted library allocation
page read and write
28A28A44000
heap
page read and write
28A23635000
heap
page read and write
28A21914000
heap
page read and write
28A18F7C000
heap
page read and write
28A28F90000
trusted library allocation
page read and write
28A21A55000
heap
page read and write
28A2C300000
trusted library allocation
page read and write
28A2B2CD000
heap
page read and write
28A236A4000
heap
page read and write
28A20E81000
heap
page read and write
28A28F70000
trusted library allocation
page read and write
28A28F23000
trusted library allocation
page read and write
28A28ED0000
trusted library allocation
page read and write
28A29453000
heap
page read and write
28A2C04D000
heap
page read and write
28A21919000
heap
page read and write
28A29E5F000
heap
page read and write
A2BF4FF000
stack
page read and write
28A2947E000
heap
page read and write
28A2028A000
heap
page read and write
28A2B083000
heap
page read and write
28A22535000
heap
page read and write
28A2B203000
heap
page read and write
28A21F10000
heap
page read and write
28A2C250000
trusted library allocation
page read and write
28A28DF0000
trusted library allocation
page read and write
28A2061C000
heap
page read and write
28A29F13000
heap
page read and write
28A20902000
heap
page read and write
28A29F43000
heap
page read and write
28A28AC2000
heap
page read and write
28A206E8000
heap
page read and write
28A29B10000
trusted library allocation
page read and write
28A22D9F000
heap
page read and write
28A20978000
heap
page read and write
28A28E30000
trusted library allocation
page read and write
28A2C530000
trusted library allocation
page read and write
28A2027D000
heap
page read and write
28A20905000
heap
page read and write
28A22DC5000
heap
page read and write
28A29B40000
trusted library allocation
page read and write
28A22D41000
heap
page read and write
28A2B031000
heap
page read and write
28A28F90000
trusted library allocation
page read and write
28A28E90000
trusted library allocation
page read and write
28A28E10000
trusted library allocation
page read and write
28A29F42000
heap
page read and write
28A23639000
heap
page read and write
28A2C0B5000
heap
page read and write
28A221C1000
heap
page read and write
28A22800000
heap
page read and write
28A2893C000
heap
page read and write
28A29270000
trusted library allocation
page read and write
28A23413000
heap
page read and write
28A28F80000
trusted library allocation
page read and write
28A2B0B8000
heap
page read and write
28A2B096000
heap
page read and write
28A25C20000
trusted library allocation
page read and write
A2BDBFF000
stack
page read and write
28A2C320000
trusted library allocation
page read and write
28A29300000
trusted library allocation
page read and write
28A20ECA000
heap
page read and write
28A207C1000
heap
page read and write
28A2064F000
heap
page read and write
28A22D4B000
heap
page read and write
28A29DA0000
heap
page read and write
28A2086D000
heap
page read and write
28A29B80000
trusted library allocation
page read and write
28A23A9E000
heap
page read and write
28A2B1FF000
heap
page read and write
28A29AC0000
trusted library allocation
page read and write
28A204A9000
heap
page read and write
28A292C0000
trusted library allocation
page read and write
28A2375D000
heap
page read and write
28A218D7000
heap
page read and write
28A29B90000
trusted library allocation
page read and write
28A23690000
heap
page read and write
28A204CA000
heap
page read and write
28A2B0C1000
heap
page read and write
28A2282A000
heap
page read and write
28A2C260000
trusted library allocation
page read and write
28A29482000
heap
page read and write
28A2B1A3000
heap
page read and write
28A21D09000
heap
page read and write
28A23923000
heap
page read and write
28A2C0D6000
heap
page read and write
28A224A6000
heap
page read and write
28A2C420000
trusted library allocation
page read and write
28A22509000
heap
page read and write
28A22D9A000
heap
page read and write
28A2B0E3000
heap
page read and write
28A2B2B5000
heap
page read and write
28A22350000
heap
page read and write
28A23624000
heap
page read and write
28A29B20000
trusted library allocation
page read and write
28A20724000
heap
page read and write
28A2C2F0000
trusted library allocation
page read and write
28A22200000
trusted library allocation
page read and write
28A2C490000
trusted library allocation
page read and write
829247C000
stack
page read and write
28A21D13000
heap
page read and write
28A208B9000
heap
page read and write
28A2C290000
trusted library allocation
page read and write
28A28A48000
heap
page read and write
28A20875000
heap
page read and write
28A2254E000
heap
page read and write
28A18F88000
heap
page read and write
28A2B09B000
heap
page read and write
28A29A50000
trusted library allocation
page read and write
28A28ED0000
trusted library allocation
page read and write
28A29E03000
heap
page read and write
28A20FF9000
heap
page read and write
28A23723000
heap
page read and write
28A20782000
heap
page read and write
28A292A0000
trusted library allocation
page read and write
28A21010000
heap
page read and write
28A2007B000
heap
page read and write
A2BCCFE000
stack
page read and write
28A20DE0000
trusted library allocation
page read and write
28A2C0B5000
heap
page read and write
28A23613000
heap
page read and write
28A22459000
heap
page read and write
28A2B156000
heap
page read and write
28A21F57000
heap
page read and write
A2BF9FB000
stack
page read and write
28A2C360000
trusted library allocation
page read and write
28A22290000
trusted library allocation
page read and write
28A2B268000
heap
page read and write
28A294C9000
heap
page read and write
28A29320000
trusted library allocation
page read and write
28A207B7000
heap
page read and write
28A2B1AD000
heap
page read and write
28A28EA0000
trusted library allocation
page read and write
28A2C320000
trusted library allocation
page read and write
28A18FBD000
heap
page read and write
28A29B40000
trusted library allocation
page read and write
A2BF3FC000
stack
page read and write
28A294DE000
heap
page read and write
28A29474000
heap
page read and write
28A292C0000
trusted library allocation
page read and write
28A28E40000
trusted library allocation
page read and write
28A2C520000
trusted library allocation
page read and write
28A23AD8000
heap
page read and write
28A28E70000
trusted library allocation
page read and write
28A29F2C000
heap
page read and write
28A22F3C000
heap
page read and write
28A20224000
heap
page read and write
28A22DEE000
heap
page read and write
28A2B0CB000
heap
page read and write
28A2B1E7000
heap
page read and write
28A238B7000
heap
page read and write
28A218D7000
heap
page read and write
28A29AF0000
trusted library allocation
page read and write
28A29BD0000
trusted library allocation
page read and write
28A20E70000
heap
page read and write
28A20640000
heap
page read and write
28A205AD000
heap
page read and write
28A205DF000
heap
page read and write
28A22DE9000
heap
page read and write
28A21960000
heap
page read and write
28A20FA2000
heap
page read and write
28A2C210000
trusted library allocation
page read and write
28A20F87000
heap
page read and write
28A28E70000
trusted library allocation
page read and write
28A28F20000
trusted library allocation
page read and write
1E418930000
heap
page read and write
28A20DF0000
trusted library allocation
page read and write
28A21F30000
heap
page read and write
28A2B22A000
heap
page read and write
28A21DD9000
heap
page read and write
28A2345F000
heap
page read and write
28A2C290000
trusted library allocation
page read and write
28A22C32000
heap
page read and write
28A28DA0000
trusted library allocation
page read and write
28A23400000
heap
page read and write
28A236A7000
heap
page read and write
28A20235000
heap
page read and write
28A294D3000
heap
page read and write
28A28D40000
trusted library allocation
page read and write
28A23B3B000
heap
page read and write
28A2B21B000
heap
page read and write
28A2C300000
trusted library allocation
page read and write
28A2B23D000
heap
page read and write
28A294D6000
heap
page read and write
28A2C4B0000
trusted library allocation
page read and write
28A22502000
heap
page read and write
28A22270000
trusted library allocation
page read and write
28A206F9000
heap
page read and write
28A28F50000
trusted library allocation
page read and write
28A23B23000
heap
page read and write
28A22513000
heap
page read and write
28A2B03B000
heap
page read and write
28A208CD000
heap
page read and write
28A22280000
trusted library allocation
page read and write
28A23632000
heap
page read and write
28A28BEE000
heap
page read and write
28A2C4D0000
trusted library allocation
page read and write
28A22C1B000
heap
page read and write
28A221CD000
heap
page read and write
28A22FDD000
heap
page read and write
28A21F57000
heap
page read and write
28A18E4F000
heap
page read and write
28A203EA000
heap
page read and write
28A20728000
heap
page read and write
28A292E0000
trusted library allocation
page read and write
28A29F02000
heap
page read and write
28A2062C000
heap
page read and write
28A18F0F000
heap
page read and write
28A2B0BD000
heap
page read and write
28A2893F000
heap
page read and write
28A2B2B0000
heap
page read and write
28A224A6000
heap
page read and write
28A28EF0000
trusted library allocation
page read and write
28A20DE3000
trusted library allocation
page read and write
28A18FD2000
heap
page read and write
28A29443000
heap
page read and write
A2BD2FE000
stack
page read and write
28A2B20D000
heap
page read and write
28A224E2000
heap
page read and write
28A2B18B000
heap
page read and write
28A29230000
trusted library allocation
page read and write
28A201C3000
heap
page read and write
A2BD7FE000
stack
page read and write
28A29300000
trusted library allocation
page read and write
28A28F50000
trusted library allocation
page read and write
28A237A7000
heap
page read and write
28A208CB000
heap
page read and write
28A29F21000
heap
page read and write
28A2B238000
heap
page read and write
28A2B1EB000
heap
page read and write
28A204B7000
heap
page read and write
1E4187F8000
heap
page read and write
28A20146000
heap
page read and write
A2BEAFC000
stack
page read and write
28A2084B000
heap
page read and write
28A29E74000
heap
page read and write
28A29BE0000
trusted library allocation
page read and write
28A29F38000
heap
page read and write
28A2C380000
trusted library allocation
page read and write
28A209C3000
heap
page read and write
28A29E41000
heap
page read and write
28A208C8000
heap
page read and write
28A2C310000
trusted library allocation
page read and write
28A23668000
heap
page read and write
28A21D97000
heap
page read and write
28A23734000
heap
page read and write
28A2C450000
trusted library allocation
page read and write
28A2B0AE000
heap
page read and write
28A22000000
heap
page read and write
28A236AC000
heap
page read and write
28A20DB0000
trusted library allocation
page read and write
28A20836000
heap
page read and write
28A28DA0000
trusted library allocation
page read and write
A2BD0F9000
stack
page read and write
28A28EE0000
trusted library allocation
page read and write
28A294CD000
heap
page read and write
28A29AE0000
trusted library allocation
page read and write
28A22470000
heap
page read and write
28A236BF000
heap
page read and write
28A20594000
heap
page read and write
28A29F57000
heap
page read and write
28A2B1BB000
heap
page read and write
28A2B0D5000
heap
page read and write
28A29AB0000
trusted library allocation
page read and write
28A29AB0000
trusted library allocation
page read and write
28A2346C000
heap
page read and write
28A29F02000
heap
page read and write
28A29F02000
heap
page read and write
28A22340000
trusted library allocation
page read and write
28A2386F000
heap
page read and write
28A28D80000
trusted library allocation
page read and write
28A22491000
heap
page read and write
28A21E30000
heap
page read and write
28A28D90000
trusted library allocation
page read and write
28A22EB6000
heap
page read and write
28A2191C000
heap
page read and write
28A1B3AE000
heap
page read and write
A2BE7FF000
stack
page read and write
28A22111000
heap
page read and write
28A22E00000
heap
page read and write
28A2953C000
heap
page read and write
28A29A60000
trusted library allocation
page read and write
28A22D62000
heap
page read and write
28A29A30000
trusted library allocation
page read and write
28A23786000
heap
page read and write
28A2944D000
heap
page read and write
28A2244F000
heap
page read and write
28A2B1F0000
heap
page read and write
28A22187000
heap
page read and write
A2BF1F5000
stack
page read and write
28A2B2C8000
heap
page read and write
28A20F1B000
heap
page read and write
28A2C2B0000
trusted library allocation
page read and write
28A294DD000
heap
page read and write
A2BD3FF000
stack
page read and write
28A2B0E8000
heap
page read and write
28A29443000
heap
page read and write
A2BFAF6000
stack
page read and write
28A28DB0000
trusted library allocation
page read and write
28A2C410000
trusted library allocation
page read and write
28A225EF000
heap
page read and write
28A21A28000
heap
page read and write
28A23ABF000
heap
page read and write
28A209AC000
heap
page read and write
28A28EB0000
trusted library allocation
page read and write
28A28823000
heap
page read and write
28A294D1000
heap
page read and write
28A28EF0000
trusted library allocation
page read and write
28A28F10000
trusted library allocation
page read and write
28A2282E000
heap
page read and write
28A22511000
heap
page read and write
28A288C6000
heap
page read and write
28A2C07D000
heap
page read and write
28A29A90000
trusted library allocation
page read and write
28A21890000
heap
page read and write
28A208C5000
heap
page read and write
28A294E6000
heap
page read and write
28A21923000
heap
page read and write
28A2C0EA000
heap
page read and write
28A22D12000
heap
page read and write
28A2B135000
heap
page read and write
28A20ED2000
heap
page read and write
28A22459000
heap
page read and write
28A18ED6000
heap
page read and write
28A29A80000
trusted library allocation
page read and write
28A21AB9000
heap
page read and write
28A2285F000
heap
page read and write
28A2C092000
heap
page read and write
28A28DA0000
trusted library allocation
page read and write
28A2B075000
heap
page read and write
28A20913000
heap
page read and write
28A20902000
heap
page read and write
28A208F6000
heap
page read and write
28A20794000
heap
page read and write
28A2B010000
heap
page read and write
28A28D40000
trusted library allocation
page read and write
28A28D40000
trusted library allocation
page read and write
28A208BE000
heap
page read and write
28A236B4000
heap
page read and write
28A28DC0000
trusted library allocation
page read and write
28A29AC0000
trusted library allocation
page read and write
28A29E93000
heap
page read and write
28A20000000
heap
page read and write
A2BFBFB000
stack
page read and write
28A207CE000
heap
page read and write
28A29B00000
trusted library allocation
page read and write
28A28F20000
trusted library allocation
page read and write
28A18FDE000
heap
page read and write
28A28F60000
trusted library allocation
page read and write
28A2C270000
trusted library allocation
page read and write
28A29B20000
trusted library allocation
page read and write
28A22333000
trusted library allocation
page read and write
28A2C3B0000
trusted library allocation
page read and write
28A2C0B5000
heap
page read and write
28A2C4A0000
trusted library allocation
page read and write
28A20692000
heap
page read and write
A2BEDF9000
stack
page read and write
28A208C5000
heap
page read and write
28A236C1000
heap
page read and write
28A22544000
heap
page read and write
28A29F34000
heap
page read and write
28A22BB0000
trusted library allocation
page read and write
28A28E10000
trusted library allocation
page read and write
28A20877000
heap
page read and write
28A28D80000
trusted library allocation
page read and write
28A294CD000
heap
page read and write
28A22DA5000
heap
page read and write
28A1B316000
heap
page read and write
28A21AF8000
heap
page read and write
28A22867000
heap
page read and write
28A236A8000
heap
page read and write
28A224DC000
heap
page read and write
28A29AE0000
trusted library allocation
page read and write
28A2065E000
heap
page read and write
28A22D6D000
heap
page read and write
28A2C480000
trusted library allocation
page read and write
28A294AD000
heap
page read and write
28A20457000
heap
page read and write
28A28F90000
trusted library allocation
page read and write
28A20F4B000
heap
page read and write
28A204DF000
heap
page read and write
28A236BD000
heap
page read and write
28A236BD000
heap
page read and write
28A29A40000
trusted library allocation
page read and write
28A224F6000
heap
page read and write
28A2C103000
heap
page read and write
28A29A93000
trusted library allocation
page read and write
28A221A5000
heap
page read and write
28A208CB000
heap
page read and write
28A29478000
heap
page read and write
28A1B170000
heap
page readonly
28A22220000
trusted library allocation
page read and write
28A29B50000
trusted library allocation
page read and write
28A2C220000
trusted library allocation
page read and write
28A292C0000
trusted library allocation
page read and write
28A29B40000
trusted library allocation
page read and write
28A20113000
heap
page read and write
28A1B1E0000
trusted library allocation
page read and write
28A2083A000
heap
page read and write
28A23600000
heap
page read and write
28A29A20000
trusted library allocation
page read and write
28A20822000
heap
page read and write
28A29B50000
trusted library allocation
page read and write
28A2C450000
trusted library allocation
page read and write
28A28D00000
trusted library allocation
page read and write
28A2953C000
heap
page read and write
1E418650000
heap
page read and write
A2BDAFE000
stack
page read and write
28A29F36000
heap
page read and write
28A208C2000
heap
page read and write
28A28D40000
trusted library allocation
page read and write
28A21000000
heap
page read and write
28A20967000
heap
page read and write
28A18EAB000
heap
page read and write
28A28DC0000
trusted library allocation
page read and write
28A20598000
heap
page read and write
28A239CC000
heap
page read and write
28A2947C000
heap
page read and write
28A18E00000
heap
page read and write
28A2C0B5000
heap
page read and write
28A224F3000
heap
page read and write
28A224E5000
heap
page read and write
28A20573000
heap
page read and write
28A2B1C5000
heap
page read and write
28A21FD8000
heap
page read and write
28A28EE0000
trusted library allocation
page read and write
28A29BC0000
trusted library allocation
page read and write
28A28BE8000
heap
page read and write
28A22D67000
heap
page read and write
28A29A70000
trusted library allocation
page read and write
28A29F36000
heap
page read and write
28A204C7000
heap
page read and write
28A22843000
heap
page read and write
28A18FCD000
heap
page read and write
28A28DA3000
trusted library allocation
page read and write
28A21D48000
heap
page read and write
28A2B0D9000
heap
page read and write
28A29AC0000
trusted library allocation
page read and write
28A21ABC000
heap
page read and write
28A22470000
heap
page read and write
28A22330000
trusted library allocation
page read and write
28A29263000
trusted library allocation
page read and write
28A20DE3000
trusted library allocation
page read and write
28A21FD8000
heap
page read and write
28A29476000
heap
page read and write
28A2219B000
heap
page read and write
28A28EE0000
trusted library allocation
page read and write
28A2C350000
trusted library allocation
page read and write
28A221A8000
heap
page read and write
28A21F10000
heap
page read and write
28A29A60000
trusted library allocation
page read and write
28A28833000
heap
page read and write
28A2B27B000
heap
page read and write
28A22BE0000
trusted library allocation
page read and write
28A18EAF000
heap
page read and write
28A18E8D000
heap
page read and write
28A28E60000
trusted library allocation
page read and write
28A22878000
heap
page read and write
28A23B92000
heap
page read and write
A2BFCF6000
stack
page read and write
28A20DD0000
trusted library allocation
page read and write
28A18F47000
heap
page read and write
28A205FB000
heap
page read and write
28A23022000
trusted library allocation
page read and write
28A288B1000
heap
page read and write
28A28D03000
trusted library allocation
page read and write
28A204E3000
heap
page read and write
28A22350000
trusted library allocation
page read and write
28A2C0EE000
heap
page read and write
28A2B148000
heap
page read and write
28A28864000
heap
page read and write
28A2244D000
heap
page read and write
28A21A30000
heap
page read and write
28A28AC1000
heap
page read and write
28A18D20000
heap
page read and write
28A29BE0000
trusted library allocation
page read and write
28A29452000
heap
page read and write
28A2B3F8000
heap
page read and write
28A28F80000
trusted library allocation
page read and write
28A207C5000
heap
page read and write
28A1FFF0000
trusted library allocation
page read and write
28A236BF000
heap
page read and write
28A29452000
heap
page read and write
28A29220000
trusted library allocation
page read and write
28A22E74000
heap
page read and write
28A29B60000
trusted library allocation
page read and write
A2BDCFF000
stack
page read and write
28A20845000
heap
page read and write
28A20883000
heap
page read and write
28A2C0E1000
heap
page read and write
28A28BEC000
heap
page read and write
28A2C250000
trusted library allocation
page read and write
28A2B066000
heap
page read and write
28A221C7000
heap
page read and write
A2BF8FB000
stack
page read and write
28A236C7000
heap
page read and write
28A28DA0000
trusted library allocation
page read and write
28A20400000
heap
page read and write
28A29AA0000
trusted library allocation
page read and write
28A28E03000
trusted library allocation
page read and write
28A21CC7000
heap
page read and write
28A20902000
heap
page read and write
28A28EA0000
trusted library allocation
page read and write
28A2368A000
heap
page read and write
28A2C240000
trusted library allocation
page read and write
28A2B079000
heap
page read and write
28A237ED000
heap
page read and write
28A23679000
heap
page read and write
28A21AB9000
heap
page read and write
28A21F57000
heap
page read and write
28A29A20000
trusted library allocation
page read and write
28A2C480000
trusted library allocation
page read and write
28A22ECB000
heap
page read and write
28A207B6000
heap
page read and write
28A2C360000
trusted library allocation
page read and write
A2BE0FF000
stack
page read and write
28A23517000
heap
page read and write
28A2357F000
heap
page read and write
28A209D4000
heap
page read and write
28A18FB2000
heap
page read and write
28A22D25000
heap
page read and write
28A22502000
heap
page read and write
28A29A70000
trusted library allocation
page read and write
28A29B00000
trusted library allocation
page read and write
28A22340000
trusted library allocation
page read and write
28A20705000
heap
page read and write
28A2B02D000
heap
page read and write
28A2B2AB000
heap
page read and write
28A2342C000
heap
page read and write
28A2896D000
heap
page read and write
28A20530000
heap
page read and write
28A295F8000
heap
page read and write
28A29AC0000
trusted library allocation
page read and write
28A2B040000
heap
page read and write
28A22E42000
heap
page read and write
28A2953C000
heap
page read and write
28A2B212000
heap
page read and write
28A1FFA0000
heap
page read and write
28A2C102000
heap
page read and write
28A2B3C3000
heap
page read and write
28A238D8000
heap
page read and write
28A28E80000
trusted library allocation
page read and write
28A224E2000
heap
page read and write
28A1B31C000
heap
page read and write
28A2C043000
heap
page read and write
28A2C420000
trusted library allocation
page read and write
28A20842000
heap
page read and write
28A20ECF000
heap
page read and write
28A22D7A000
heap
page read and write
28A22872000
heap
page read and write
28A2C370000
trusted library allocation
page read and write
28A25C10000
trusted library allocation
page read and write
28A208CB000
heap
page read and write
28A2250B000
heap
page read and write
28A29AC0000
trusted library allocation
page read and write
28A1B160000
trusted library allocation
page read and write
28A2B199000
heap
page read and write
28A28F20000
trusted library allocation
page read and write
28A219A7000
heap
page read and write
28A22BF0000
trusted library allocation
page read and write
28A23545000
heap
page read and write
28A22913000
heap
page read and write
28A2C2A0000
trusted library allocation
page read and write
28A20281000
heap
page read and write
28A23A34000
heap
page read and write
28A21D50000
heap
page read and write
28A221A5000
heap
page read and write
28A29AA0000
trusted library allocation
page read and write
28A2C3D0000
trusted library allocation
page read and write
28A20DF0000
trusted library allocation
page read and write
28A236D0000
heap
page read and write
28A22419000
heap
page read and write
28A20E72000
heap
page read and write
28A2C440000
trusted library allocation
page read and write
28A28E63000
trusted library allocation
page read and write
28A28DC0000
trusted library allocation
page read and write
28A2054C000
heap
page read and write
28A206C6000
heap
page read and write
28A28F60000
trusted library allocation
page read and write
28A29280000
trusted library allocation
page read and write
28A29F38000
heap
page read and write
28A29E21000
heap
page read and write
28A2B246000
heap
page read and write
28A29E11000
heap
page read and write
28A234F5000
heap
page read and write
28A2B0DE000
heap
page read and write
28A2B10E000
heap
page read and write
A2BE8FC000
stack
page read and write
28A202E1000
heap
page read and write
28A29B10000
trusted library allocation
page read and write
28A2286E000
heap
page read and write
28A22D54000
heap
page read and write
28A18E25000
heap
page read and write
28A18F09000
heap
page read and write
28A29230000
trusted library allocation
page read and write
28A18EB1000
heap
page read and write
28A18F45000
heap
page read and write
28A29290000
trusted library allocation
page read and write
28A2C2F0000
trusted library allocation
page read and write
28A29AF0000
trusted library allocation
page read and write
28A20760000
heap
page read and write
28A2B178000
heap
page read and write
28A2C143000
heap
page read and write
28A29B00000
trusted library allocation
page read and write
28A2C2C0000
trusted library allocation
page read and write
28A2C400000
trusted library allocation
page read and write
28A29A20000
trusted library allocation
page read and write
28A29482000
heap
page read and write
28A22524000
heap
page read and write
28A1B3CC000
heap
page read and write
28A292A0000
trusted library allocation
page read and write
28A28A68000
heap
page read and write
28A28F80000
trusted library allocation
page read and write
28A2C4E0000
trusted library allocation
page read and write
28A28E60000
trusted library allocation
page read and write
28A20E8B000
heap
page read and write
28A234D4000
heap
page read and write
28A224DC000
heap
page read and write
1E418750000
heap
page read and write
28A29300000
trusted library allocation
page read and write
28A2B160000
heap
page read and write
28A28F10000
trusted library allocation
page read and write
28A28ED0000
trusted library allocation
page read and write
28A22199000
heap
page read and write
28A2C0B5000
heap
page read and write
28A2B190000
heap
page read and write
28A28E00000
trusted library allocation
page read and write
28A28D90000
trusted library allocation
page read and write
28A22B90000
trusted library allocation
page read and write
28A21F70000
heap
page read and write
28A22E13000
heap
page read and write
A2BDDFF000
stack
page read and write
28A224F2000
heap
page read and write
28A28DC0000
trusted library allocation
page read and write
28A2B121000
heap
page read and write
28A2379F000
heap
page read and write
28A21F20000
heap
page read and write
28A2C470000
trusted library allocation
page read and write
28A1B070000
heap
page read and write
28A29E7E000
heap
page read and write
28A18F61000
heap
page read and write
28A207EB000
heap
page read and write
28A2C490000
trusted library allocation
page read and write
28A2345B000
heap
page read and write
28A2C4B0000
trusted library allocation
page read and write
A2BE9FC000
stack
page read and write
28A22551000
heap
page read and write
28A28EF0000
trusted library allocation
page read and write
28A29260000
trusted library allocation
page read and write
28A2B22E000
heap
page read and write
A2BE6FC000
stack
page read and write
28A22D0A000
heap
page read and write
28A203A5000
heap
page read and write
28A21E18000
heap
page read and write
28A206D5000
heap
page read and write
28A22DE1000
heap
page read and write
28A20764000
heap
page read and write
28A28F20000
trusted library allocation
page read and write
28A29B90000
trusted library allocation
page read and write
28A22193000
heap
page read and write
28A28EA0000
trusted library allocation
page read and write
28A29270000
trusted library allocation
page read and write
28A2C102000
heap
page read and write
28A2B225000
heap
page read and write
28A2B05D000
heap
page read and write
28A204C3000
heap
page read and write
28A205B3000
heap
page read and write
28A23BF8000
heap
page read and write
28A29E43000
heap
page read and write
28A22FF2000
heap
page read and write
28A23A24000
heap
page read and write
28A29A40000
trusted library allocation
page read and write
28A22C96000
heap
page read and write
28A21C34000
heap
page read and write
28A21C39000
heap
page read and write
28A22230000
trusted library allocation
page read and write
28A219EC000
heap
page read and write
28A29F43000
heap
page read and write
28A28E90000
trusted library allocation
page read and write
28A207E1000
heap
page read and write
28A29B20000
trusted library allocation
page read and write
28A22460000
heap
page read and write
28A22380000
trusted library allocation
page read and write
28A22BC0000
trusted library allocation
page read and write
28A236A4000
heap
page read and write
28A29A50000
trusted library allocation
page read and write
28A29E02000
heap
page read and write
28A2B19E000
heap
page read and write
28A2B0F6000
heap
page read and write
28A29280000
trusted library allocation
page read and write
28A20739000
heap
page read and write
28A2B1DD000
heap
page read and write
28A221A2000
heap
page read and write
28A23B71000
heap
page read and write
28A22F1B000
heap
page read and write
28A2C470000
trusted library allocation
page read and write
28A20863000
heap
page read and write
A2BCEFC000
stack
page read and write
28A1B385000
heap
page read and write
28A204D1000
heap
page read and write
28A2C4D0000
trusted library allocation
page read and write
28A2090A000
heap
page read and write
28A18FF3000
heap
page read and write
28A28D93000
trusted library allocation
page read and write
28A23B9A000
heap
page read and write
28A28E30000
trusted library allocation
page read and write
28A29B00000
trusted library allocation
page read and write
A2BFFFE000
stack
page read and write
28A28D00000
trusted library allocation
page read and write
28A29A93000
trusted library allocation
page read and write
28A2B061000
heap
page read and write
28A292A0000
trusted library allocation
page read and write
28A207D2000
heap
page read and write
28A2C270000
trusted library allocation
page read and write
28A21C3C000
heap
page read and write
28A2083E000
heap
page read and write
28A28F80000
trusted library allocation
page read and write
28A23A4D000
heap
page read and write
28A28902000
heap
page read and write
28A29454000
heap
page read and write
28A207AD000
heap
page read and write
28A2B12B000
heap
page read and write
28A23B95000
heap
page read and write
28A28D90000
trusted library allocation
page read and write
28A29AD0000
trusted library allocation
page read and write
28A1B372000
heap
page read and write
28A29BE3000
trusted library allocation
page read and write
28A208B9000
heap
page read and write
28A2367E000
heap
page read and write
28A1B300000
heap
page read and write
28A22E63000
heap
page read and write
28A20817000
heap
page read and write
28A22E24000
heap
page read and write
28A2882B000
heap
page read and write
28A23673000
heap
page read and write
28A28E70000
trusted library allocation
page read and write
28A29464000
heap
page read and write
28A2C230000
trusted library allocation
page read and write
28A2C0E9000
heap
page read and write
28A235D3000
heap
page read and write
28A20779000
heap
page read and write
28A28ED0000
trusted library allocation
page read and write
28A294D2000
heap
page read and write
28A2948A000
heap
page read and write
28A29B20000
trusted library allocation
page read and write
28A29F0C000
heap
page read and write
28A2881A000
heap
page read and write
28A28D90000
trusted library allocation
page read and write
28A22250000
trusted library allocation
page read and write
28A28F50000
trusted library allocation
page read and write
28A224F8000
heap
page read and write
28A23500000
heap
page read and write
28A22F83000
heap
page read and write
28A28F10000
trusted library allocation
page read and write
28A20E2C000
heap
page read and write
28A22F9C000
heap
page read and write
28A224D6000
heap
page read and write
28A22C4B000
heap
page read and write
28A239B3000
heap
page read and write
A2BDEFE000
stack
page read and write
28A29443000
heap
page read and write
28A28D03000
trusted library allocation
page read and write
28A21D04000
heap
page read and write
A2BF7F6000
stack
page read and write
28A29B60000
trusted library allocation
page read and write
A2BE5FE000
stack
page read and write
28A2B049000
heap
page read and write
28A18FEA000
heap
page read and write
28A2B29D000
heap
page read and write
28A206D7000
heap
page read and write
28A292B0000
trusted library allocation
page read and write
28A28D70000
trusted library allocation
page read and write
28A2B13E000
heap
page read and write
28A235C2000
heap
page read and write
28A20FF2000
heap
page read and write
28A28EC0000
trusted library allocation
page read and write
28A2B08D000
heap
page read and write
28A2B109000
heap
page read and write
28A29B10000
trusted library allocation
page read and write
28A28D80000
trusted library allocation
page read and write
28A222C0000
trusted library allocation
page read and write
28A23BDB000
heap
page read and write
28A22DD2000
heap
page read and write
28A20851000
heap
page read and write
28A22DB2000
heap
page read and write
28A29AE0000
trusted library allocation
page read and write
28A29B30000
trusted library allocation
page read and write
28A22EA5000
heap
page read and write
28A20841000
heap
page read and write
28A221C9000
heap
page read and write
28A2360A000
heap
page read and write
28A29280000
trusted library allocation
page read and write
28A238F5000
heap
page read and write
28A2B2BA000
heap
page read and write
28A2244D000
heap
page read and write
28A2C184000
heap
page read and write
28A22E8D000
heap
page read and write
A2BEEF9000
stack
page read and write
28A2B0A5000
heap
page read and write
28A2C440000
trusted library allocation
page read and write
28A18DD0000
trusted library allocation
page read and write
28A22260000
trusted library allocation
page read and write
28A20904000
heap
page read and write
28A207D7000
heap
page read and write
28A2B2A2000
heap
page read and write
28A2B151000
heap
page read and write
28A205E2000
heap
page read and write
28A29F77000
heap
page read and write
28A205BA000
heap
page read and write
28A2C540000
trusted library allocation
page read and write
28A228DB000
heap
page read and write
28A18FE6000
heap
page read and write
28A2C0B5000
heap
page read and write
28A21BF7000
heap
page read and write
28A28D90000
trusted library allocation
page read and write
28A29AB0000
trusted library allocation
page read and write
28A21A30000
heap
page read and write
28A22D2E000
heap
page read and write
28A28F90000
trusted library allocation
page read and write
28A29280000
trusted library allocation
page read and write
28A235B1000
heap
page read and write
28A207F8000
heap
page read and write
28A2B118000
heap
page read and write
28A2C152000
heap
page read and write
28A22A80000
heap
page read and write
28A2C106000
heap
page read and write
28A29550000
heap
page read and write
28A2C2E0000
trusted library allocation
page read and write
28A219F3000
heap
page read and write
28A2B24B000
heap
page read and write
28A29290000
trusted library allocation
page read and write
28A29B40000
trusted library allocation
page read and write
28A219E9000
heap
page read and write
28A21F80000
heap
page read and write
28A20200000
heap
page read and write
28A20723000
heap
page read and write
28A29B20000
trusted library allocation
page read and write
28A21F10000
heap
page read and write
28A28DA0000
trusted library allocation
page read and write
28A2C2A0000
trusted library allocation
page read and write
28A294DC000
heap
page read and write
28A18FC1000
heap
page read and write
28A29CFD000
heap
page read and write
28A294DF000
heap
page read and write
28A20E88000
heap
page read and write
28A29290000
trusted library allocation
page read and write
28A208F9000
heap
page read and write
28A2029B000
heap
page read and write
28A20667000
heap
page read and write
28A224A4000
heap
page read and write
28A2953F000
heap
page read and write
28A2C0B5000
heap
page read and write
28A22D34000
heap
page read and write
28A2C0E9000
heap
page read and write
28A18F13000
heap
page read and write
28A29480000
heap
page read and write
28A292C0000
trusted library allocation
page read and write
28A28BDA000
heap
page read and write
28A2B1F5000
heap
page read and write
28A2367F000
heap
page read and write
28A29220000
trusted library allocation
page read and write
28A18EED000
heap
page read and write
28A228FE000
heap
page read and write
28A2C390000
trusted library allocation
page read and write
28A239A2000
heap
page read and write
28A2245C000
heap
page read and write
28A20594000
heap
page read and write
28A1A870000
trusted library allocation
page read and write
1E418730000
heap
page read and write
28A23A61000
heap
page read and write
28A21F72000
heap
page read and write
28A28BEA000
heap
page read and write
28A2B2A7000
heap
page read and write
28A20642000
heap
page read and write
28A28E90000
trusted library allocation
page read and write
28A20681000
heap
page read and write
28A29BB0000
trusted library allocation
page read and write
28A28BA0000
heap
page read and write
28A22F72000
heap
page read and write
28A2001D000
heap
page read and write
28A2C280000
trusted library allocation
page read and write
A2BFBFD000
stack
page read and write
28A28D80000
trusted library allocation
page read and write
28A29F02000
heap
page read and write
28A204FC000
heap
page read and write
28A22BA0000
trusted library allocation
page read and write
28A234AF000
heap
page read and write
28A2083D000
heap
page read and write
28A2C3C0000
trusted library allocation
page read and write
28A1B1D0000
heap
page read and write
28A28A22000
heap
page read and write
28A236C7000
heap
page read and write
28A2B233000
heap
page read and write
28A2B3BC000
heap
page read and write
28A21AB4000
heap
page read and write
28A29A30000
trusted library allocation
page read and write
28A2214F000
heap
page read and write
28A2C350000
trusted library allocation
page read and write
28A28E90000
trusted library allocation
page read and write
28A28A38000
heap
page read and write
28A23606000
heap
page read and write
28A2C430000
trusted library allocation
page read and write
28A20121000
heap
page read and write
A2BCDFF000
stack
page read and write
28A224FA000
heap
page read and write
28A2355A000
heap
page read and write
28A28EB0000
trusted library allocation
page read and write
28A22F00000
heap
page read and write
28A28840000
heap
page read and write
28A28F50000
trusted library allocation
page read and write
28A18F23000
heap
page read and write
28A23890000
heap
page read and write
28A261B3000
trusted library allocation
page read and write
28A2073C000
heap
page read and write
28A21A77000
heap
page read and write
28A28DC0000
trusted library allocation
page read and write
28A21914000
heap
page read and write
28A2C460000
trusted library allocation
page read and write
28A2B242000
heap
page read and write
28A29F4B000
heap
page read and write
28A29A80000
trusted library allocation
page read and write
28A237CC000
heap
page read and write
28A20874000
heap
page read and write
28A28EF0000
trusted library allocation
page read and write
28A28EA0000
trusted library allocation
page read and write
28A23469000
heap
page read and write
28A28F00000
trusted library allocation
page read and write
28A28E40000
trusted library allocation
page read and write
28A20EC8000
heap
page read and write
28A1B173000
heap
page readonly
28A2C330000
trusted library allocation
page read and write
28A2244F000
heap
page read and write
28A21D50000
heap
page read and write
28A23835000
heap
page read and write
28A28F10000
trusted library allocation
page read and write
28A2B3B4000
heap
page read and write
28A28ABA000
heap
page read and write
28A204BF000
heap
page read and write
28A28F00000
trusted library allocation
page read and write
A2BCBFB000
stack
page read and write
28A28D93000
trusted library allocation
page read and write
28A29480000
heap
page read and write
28A206B1000
heap
page read and write
28A21890000
heap
page read and write
28A20DE0000
trusted library allocation
page read and write
28A20875000
heap
page read and write
28A28EE0000
trusted library allocation
page read and write
28A21958000
heap
page read and write
28A20863000
heap
page read and write
A2BEFFE000
stack
page read and write
28A292B0000
trusted library allocation
page read and write
28A20FD8000
heap
page read and write
28A20E51000
heap
page read and write
28A28EE0000
trusted library allocation
page read and write
A2BFEFD000
stack
page read and write
28A28F70000
trusted library allocation
page read and write
28A20E00000
heap
page read and write
28A23969000
heap
page read and write
28A2B105000
heap
page read and write
28A2069C000
heap
page read and write
28A20378000
heap
page read and write
28A217E9000
heap
page read and write
28A29A10000
trusted library allocation
page read and write
28A28D90000
trusted library allocation
page read and write
28A2B045000
heap
page read and write
28A2C2D0000
trusted library allocation
page read and write
28A23800000
heap
page read and write
28A207FD000
heap
page read and write
28A18E7A000
heap
page read and write
28A29AE0000
trusted library allocation
page read and write
28A22C6C000
heap
page read and write
28A2C0D4000
heap
page read and write
28A28EC0000
trusted library allocation
page read and write
28A23913000
heap
page read and write
28A28E40000
trusted library allocation
page read and write
28A2C260000
trusted library allocation
page read and write
28A20E77000
heap
page read and write
28A18EBA000
heap
page read and write
28A29A60000
trusted library allocation
page read and write
28A29D84000
heap
page read and write
28A28E60000
trusted library allocation
page read and write
28A2C280000
trusted library allocation
page read and write
28A29E02000
heap
page read and write
28A22D38000
heap
page read and write
28A205E2000
heap
page read and write
28A23900000
heap
page read and write
28A29230000
trusted library allocation
page read and write
28A18FC5000
heap
page read and write
28A29F42000
heap
page read and write
28A2B0C6000
heap
page read and write
28A29E4F000
heap
page read and write
28A23646000
heap
page read and write
28A207ED000
heap
page read and write
28A28BFB000
heap
page read and write
28A28D80000
trusted library allocation
page read and write
28A21FA3000
heap
page read and write
28A29270000
trusted library allocation
page read and write
28A18EF3000
heap
page read and write
28A29220000
trusted library allocation
page read and write
28A21890000
heap
page read and write
28A22482000
heap
page read and write
28A18FC9000
heap
page read and write
28A28D00000
trusted library allocation
page read and write
1E4187F0000
heap
page read and write
28A2B036000
heap
page read and write
28A28A79000
heap
page read and write
28A221A0000
heap
page read and write
28A2B1D8000
heap
page read and write
28A20886000
heap
page read and write
28A20FC7000
heap
page read and write
28A23A13000
heap
page read and write
28A22E46000
heap
page read and write
28A20956000
heap
page read and write
28A18EB8000
heap
page read and write
28A29AE0000
trusted library allocation
page read and write
28A2C510000
trusted library allocation
page read and write
28A28E80000
trusted library allocation
page read and write
28A2C2D0000
trusted library allocation
page read and write
28A28D03000
trusted library allocation
page read and write
28A2C050000
heap
page read and write
28A2945C000
heap
page read and write
28A2C4C0000
trusted library allocation
page read and write
28A2084F000
heap
page read and write
28A22002000
heap
page read and write
28A208EF000
heap
page read and write
28A2B173000
heap
page read and write
28A22240000
trusted library allocation
page read and write
28A2B0FB000
heap
page read and write
28A29F36000
heap
page read and write
28A2191C000
heap
page read and write
A2BF5FB000
stack
page read and write
28A22903000
heap
page read and write
28A221D2000
heap
page read and write
28A236C5000
heap
page read and write
28A29A70000
trusted library allocation
page read and write
28A221E3000
heap
page read and write
28A29B23000
trusted library allocation
page read and write
28A28E80000
trusted library allocation
page read and write
28A20565000
heap
page read and write
28A21F94000
heap
page read and write
28A29260000
trusted library allocation
page read and write
28A236FE000
heap
page read and write
28A2B028000
heap
page read and write
28A18E62000
heap
page read and write
28A2087C000
heap
page read and write
28A2B263000
heap
page read and write
28A20E7A000
heap
page read and write
28A203B3000
heap
page read and write
28A29A40000
trusted library allocation
page read and write
28A201CD000
heap
page read and write
A2BD9FE000
stack
page read and write
28A29A80000
trusted library allocation
page read and write
28A21AC3000
heap
page read and write
28A208B9000
heap
page read and write
28A2211B000
heap
page read and write
28A22506000
heap
page read and write
28A28E00000
trusted library allocation
page read and write
28A18EAD000
heap
page read and write
28A236C1000
heap
page read and write
28A28D40000
trusted library allocation
page read and write
28A2349E000
heap
page read and write
28A20EF3000
heap
page read and write
28A1B3D5000
heap
page read and write
28A225BA000
heap
page read and write
28A22C9D000
heap
page read and write
28A207DA000
heap
page read and write
28A221CB000
heap
page read and write
28A29F50000
heap
page read and write
28A28D00000
trusted library allocation
page read and write
28A29E30000
heap
page read and write
28A2347D000
heap
page read and write
28A22DBC000
heap
page read and write
28A29AF0000
trusted library allocation
page read and write
28A2C500000
trusted library allocation
page read and write
28A2C4C0000
trusted library allocation
page read and write
28A23ABA000
heap
page read and write
28A29BF0000
trusted library allocation
page read and write
28A2B165000
heap
page read and write
28A205F2000
heap
page read and write
28A21FA3000
heap
page read and write
28A29300000
trusted library allocation
page read and write
28A18FAE000
heap
page read and write
28A20614000
heap
page read and write
28A22210000
trusted library allocation
page read and write
28A20598000
heap
page read and write
28A29495000
heap
page read and write
28A29BA0000
trusted library allocation
page read and write
28A2250B000
heap
page read and write
28A2B143000
heap
page read and write
1E4189B5000
heap
page read and write
28A20800000
heap
page read and write
A2BECFC000
stack
page read and write
28A20FF6000
heap
page read and write
28A29F71000
heap
page read and write
28A22D84000
heap
page read and write
28A22100000
heap
page read and write
28A1B337000
heap
page read and write
28A29F36000
heap
page read and write
28A29A90000
trusted library allocation
page read and write
28A208F1000
heap
page read and write
28A29AD0000
trusted library allocation
page read and write
28A23004000
trusted library allocation
page read and write
28A18F34000
heap
page read and write
28A23852000
heap
page read and write
28A2B1C0000
heap
page read and write
28A2B06B000
heap
page read and write
28A28BF2000
heap
page read and write
A2BCAFB000
stack
page read and write
28A205E7000
heap
page read and write
28A288C3000
heap
page read and write
A2BD8FF000
stack
page read and write
28A2B1B2000
heap
page read and write
28A22837000
heap
page read and write
28A29AD0000
trusted library allocation
page read and write
28A2C0E9000
heap
page read and write
28A209B2000
heap
page read and write
28A2B25A000
heap
page read and write
28A28F00000
trusted library allocation
page read and write
28A22CAE000
heap
page read and write
28A2B272000
heap
page read and write
28A2B169000
heap
page read and write
28A29B80000
trusted library allocation
page read and write
28A219E4000
heap
page read and write
28A2888F000
heap
page read and write
829257F000
stack
page read and write
28A29478000
heap
page read and write
28A294E4000
heap
page read and write
28A224DC000
heap
page read and write
28A21ABC000
heap
page read and write
28A20124000
heap
page read and write
28A2C3A0000
trusted library allocation
page read and write
28A2C07B000
heap
page read and write
28A1B30F000
heap
page read and write
28A23534000
heap
page read and write
28A2C0C9000
heap
page read and write
28A21F48000
heap
page read and write
28A21C80000
heap
page read and write
28A28E10000
trusted library allocation
page read and write
28A203FB000
heap
page read and write
28A21F7A000
heap
page read and write
28A2C4F0000
trusted library allocation
page read and write
28A23651000
heap
page read and write
28A2C240000
trusted library allocation
page read and write
28A23BFC000
heap
page read and write
28A21F9C000
heap
page read and write
28A21FD8000
heap
page read and write
28A2280C000
heap
page read and write
28A23B00000
heap
page read and write
28A28A54000
heap
page read and write
28A21F9C000
heap
page read and write
28A29F23000
heap
page read and write
28A28BDC000
heap
page read and write
28A28BD3000
heap
page read and write
28A288DA000
heap
page read and write
28A261B0000
trusted library allocation
page read and write
28A2C330000
trusted library allocation
page read and write
28A28E60000
trusted library allocation
page read and write
28A20443000
heap
page read and write
28A18EE3000
heap
page read and write
28A2B298000
heap
page read and write
28A22D82000
heap
page read and write
28A20F5E000
heap
page read and write
28A28A7E000
heap
page read and write
28A29452000
heap
page read and write
28A29AD0000
trusted library allocation
page read and write
28A2C2E0000
trusted library allocation
page read and write
28A20DC0000
heap
page read and write
28A29E81000
heap
page read and write
28A208EF000
heap
page read and write
28A201A5000
heap
page read and write
28A21F10000
heap
page read and write
28A22DDB000
heap
page read and write
28A294EC000
heap
page read and write
28A20568000
heap
page read and write
28A2C340000
trusted library allocation
page read and write
28A2C04C000
heap
page read and write
28A22874000
heap
page read and write
28A2C1C1000
heap
page read and write
28A22181000
heap
page read and write
28A21DD4000
heap
page read and write
28A28BE2000
heap
page read and write
28A29BF0000
trusted library allocation
page read and write
28A224DA000
heap
page read and write
28A2C400000
trusted library allocation
page read and write
28A21BB0000
heap
page read and write
28A20665000
heap
page read and write
28A18F5E000
heap
page read and write
28A29A10000
trusted library allocation
page read and write
28A22F61000
heap
page read and write
28A222D0000
trusted library allocation
page read and write
28A2B139000
heap
page read and write
28A21AB4000
heap
page read and write
28A28ABA000
heap
page read and write
28A29230000
trusted library allocation
page read and write
28A28D50000
trusted library allocation
page read and write
28A1B35C000
heap
page read and write
28A28E00000
trusted library allocation
page read and write
28A28EC0000
trusted library allocation
page read and write
28A2B208000
heap
page read and write
28A23813000
heap
page read and write
28A204D4000
heap
page read and write
28A29DD4000
heap
page read and write
28A2B070000
heap
page read and write
28A21F94000
heap
page read and write
28A22BD0000
trusted library allocation
page read and write
28A22D71000
heap
page read and write
28A21F9C000
heap
page read and write
28A29F3D000
heap
page read and write
28A29B70000
trusted library allocation
page read and write
28A224E5000
heap
page read and write
28A20533000
heap
page read and write
28A2B3B9000
heap
page read and write
28A294E0000
heap
page read and write
28A29E6D000
heap
page read and write
28A18E89000
heap
page read and write
28A20623000
heap
page read and write
28A2B277000
heap
page read and write
28A23A00000
heap
page read and write
28A2B07E000
heap
page read and write
28A294F1000
heap
page read and write
28A21923000
heap
page read and write
28A29A90000
trusted library allocation
page read and write
28A22E92000
heap
page read and write
28A2B1E2000
heap
page read and write
28A28E20000
trusted library allocation
page read and write
A2BF2FB000
stack
page read and write
28A1B202000
heap
page read and write
28A21D0C000
heap
page read and write
A2BE4FB000
stack
page read and write
28A236B8000
heap
page read and write
28A294CB000
heap
page read and write
28A295FB000
heap
page read and write
28A2006E000
heap
page read and write
28A208C0000
heap
page read and write
28A1B341000
heap
page read and write
28A20870000
heap
page read and write
28A29F43000
heap
page read and write
28A2B126000
heap
page read and write
28A222A0000
trusted library allocation
page read and write
A2C00FE000
stack
page read and write
28A21AF8000
heap
page read and write
28A29AF0000
trusted library allocation
page read and write
28A2C460000
trusted library allocation
page read and write
28A22D92000
heap
page read and write
28A23A5F000
heap
page read and write
28A22511000
heap
page read and write
28A28F20000
trusted library allocation
page read and write
28A29F02000
heap
page read and write
28A2B217000
heap
page read and write
28A2B0B3000
heap
page read and write
28A292E0000
trusted library allocation
page read and write
28A2283C000
heap
page read and write
28A207F6000
heap
page read and write
28A29A50000
trusted library allocation
page read and write
28A2253E000
heap
page read and write
28A28EB0000
trusted library allocation
page read and write
28A2C3E0000
trusted library allocation
page read and write
28A2C05F000
heap
page read and write
28A2C410000
trusted library allocation
page read and write
28A20649000
heap
page read and write
28A22F51000
heap
page read and write
A2BD1E9000
stack
page read and write
28A29B30000
trusted library allocation
page read and write
28A2B113000
heap
page read and write
28A28BE6000
heap
page read and write
28A28F50000
trusted library allocation
page read and write
28A2C4A0000
trusted library allocation
page read and write
28A224EE000
heap
page read and write
28A2C200000
trusted library allocation
page read and write
28A21F94000
heap
page read and write
28A22D8D000
heap
page read and write
28A29B30000
trusted library allocation
page read and write
28A29AA0000
trusted library allocation
page read and write
28A2B2C3000
heap
page read and write
28A224EA000
heap
page read and write
28A29BA0000
trusted library allocation
page read and write
28A2B1FA000
heap
page read and write
28A23617000
heap
page read and write
28A23944000
heap
page read and write
28A2361F000
heap
page read and write
28A224A2000
heap
page read and write
28A2B1D3000
heap
page read and write
28A29BC0000
trusted library allocation
page read and write
28A22400000
heap
page read and write
28A18FE2000
heap
page read and write
28A292B0000
trusted library allocation
page read and write
28A20524000
heap
page read and write
28A18EDA000
heap
page read and write
28A21DE3000
heap
page read and write
28A2B255000
heap
page read and write
28A205F8000
heap
page read and write
28A2B053000
heap
page read and write
28A21FA3000
heap
page read and write
28A22E35000
heap
page read and write
28A1B307000
heap
page read and write
28A28D83000
trusted library allocation
page read and write
28A2C090000
heap
page read and write
28A29B10000
trusted library allocation
page read and write
28A2B0A0000
heap
page read and write
28A29B40000
trusted library allocation
page read and write
A2BE3FE000
stack
page read and write
28A20600000
heap
page read and write
28A18E95000
heap
page read and write
28A29E02000
heap
page read and write
28A2344F000
heap
page read and write
28A29B30000
trusted library allocation
page read and write
28A2B11D000
heap
page read and write
28A29AA0000
trusted library allocation
page read and write
28A28ABD000
heap
page read and write
28A29B00000
trusted library allocation
page read and write
28A2B186000
heap
page read and write
28A2C126000
heap
page read and write
28A18FCD000
heap
page read and write
28A29AB0000
trusted library allocation
page read and write
28A21958000
heap
page read and write
28A28D80000
trusted library allocation
page read and write
28A2B0ED000
heap
page read and write
28A236BD000
heap
page read and write
28A20910000
heap
page read and write
28A2B220000
heap
page read and write
A2BD6FC000
stack
page read and write
A2BDFFF000
stack
page read and write
28A208C1000
heap
page read and write
28A239F1000
heap
page read and write
28A2B17D000
heap
page read and write
28A2B250000
heap
page read and write
28A22013000
heap
page read and write
28A2B0F1000
heap
page read and write
28A288B3000
heap
page read and write
28A2B25F000
heap
page read and write
28A29E1E000
heap
page read and write
28A20563000
heap
page read and write
28A224FE000
heap
page read and write
28A23824000
heap
page read and write
28A2B195000
heap
page read and write
28A205A8000
heap
page read and write
28A2057C000
heap
page read and write
28A22C00000
heap
page read and write
28A29AD0000
trusted library allocation
page read and write
28A2B1CA000
heap
page read and write
28A2C2B0000
trusted library allocation
page read and write
28A20157000
heap
page read and write
28A2B04E000
heap
page read and write
28A2B293000
heap
page read and write
28A25C00000
trusted library allocation
page read and write
28A224DF000
heap
page read and write
28A205D9000
heap
page read and write
28A29A90000
trusted library allocation
page read and write
28A1B324000
heap
page read and write
28A207F3000
heap
page read and write
28A20772000
heap
page read and write
28A22DA9000
heap
page read and write
28A29AA3000
trusted library allocation
page read and write
28A2B377000
heap
page read and write
A2BCFFE000
stack
page read and write
28A2C0A3000
heap
page read and write
28A2B15B000
heap
page read and write
28A2948A000
heap
page read and write
28A2B091000
heap
page read and write
28A2C340000
trusted library allocation
page read and write
28A205D1000
heap
page read and write
28A2947E000
heap
page read and write
28A2B14D000
heap
page read and write
28A2B28A000
heap
page read and write
28A29F77000
heap
page read and write
28A2947C000
heap
page read and write
28A21F99000
heap
page read and write
28A28E80000
trusted library allocation
page read and write
28A2B280000
heap
page read and write
28A20794000
heap
page read and write
28A20E13000
heap
page read and write
28A18EF1000
heap
page read and write
28A28E70000
trusted library allocation
page read and write
28A29E0C000
heap
page read and write
A2BD4FD000
stack
page read and write
28A21DDC000
heap
page read and write
28A2247A000
heap
page read and write
28A2051D000
heap
page read and write
28A22D21000
heap
page read and write
28A28D43000
trusted library allocation
page read and write
28A18FAC000
heap
page read and write
28A205C5000
heap
page read and write
28A28F20000
trusted library allocation
page read and write
28A21F99000
heap
page read and write
28A2B0A9000
heap
page read and write
28A18FF1000
heap
page read and write
28A2B1A8000
heap
page read and write
28A28D00000
trusted library allocation
page read and write
28A18FB7000
heap
page read and write
28A206FF000
heap
page read and write
28A2C3F0000
trusted library allocation
page read and write
28A208B9000
heap
page read and write
28A28D60000
trusted library allocation
page read and write
28A23590000
heap
page read and write
28A2C067000
heap
page read and write
28A29A90000
trusted library allocation
page read and write
28A2C430000
trusted library allocation
page read and write
28A21F6A000
heap
page read and write
28A29BC0000
trusted library allocation
page read and write
28A292E0000
trusted library allocation
page read and write
28A2B1B6000
heap
page read and write
28A292B0000
trusted library allocation
page read and write
28A228C8000
heap
page read and write
28A21C78000
heap
page read and write
28A29A10000
trusted library allocation
page read and write
28A204A1000
heap
page read and write
28A2C084000
heap
page read and write
28A29A30000
trusted library allocation
page read and write
28A2C071000
heap
page read and write
28A18D50000
heap
page read and write
A2BE2FE000
stack
page read and write
28A29AB0000
trusted library allocation
page read and write
28A204A5000
heap
page read and write
28A205D2000
heap
page read and write
28A18E13000
heap
page read and write
28A2B28F000
heap
page read and write
28A205A5000
heap
page read and write
28A201B6000
heap
page read and write
28A29476000
heap
page read and write
28A22419000
heap
page read and write
A2BE1FF000
stack
page read and write
28A2B2BF000
heap
page read and write
28A29270000
trusted library allocation
page read and write
28A2B0D0000
heap
page read and write
28A28F00000
trusted library allocation
page read and write
28A22506000
heap
page read and write
28A1FFD0000
trusted library allocation
page read and write
28A21C43000
heap
page read and write
28A292E0000
trusted library allocation
page read and write
28A28E20000
trusted library allocation
page read and write
28A23641000
heap
page read and write
28A23671000
heap
page read and write
1E4189B0000
heap
page read and write
28A2C0CD000
heap
page read and write
28A2070E000
heap
page read and write
28A20629000
heap
page read and write
28A18D30000
heap
page read and write
28A29E69000
heap
page read and write
28A28EB0000
trusted library allocation
page read and write
28A205C5000
heap
page read and write
28A29B50000
trusted library allocation
page read and write
28A28E20000
trusted library allocation
page read and write
28A29AC3000
trusted library allocation
page read and write
28A2244F000
heap
page read and write
28A2B100000
heap
page read and write
28A2C413000
trusted library allocation
page read and write
28A18F77000
heap
page read and write
28A23AE9000
heap
page read and write
28A29B60000
trusted library allocation
page read and write
28A22DB8000
heap
page read and write
28A21919000
heap
page read and write
28A22419000
heap
page read and write
28A208C8000
heap
page read and write
28A236CA000
heap
page read and write
28A2B1CE000
heap
page read and write
A2BEBFC000
stack
page read and write
28A29E14000
heap
page read and write
28A28E43000
trusted library allocation
page read and write
28A23BEB000
heap
page read and write
28A29290000
trusted library allocation
page read and write
28A29E02000
heap
page read and write
28A1B313000
heap
page read and write
28A222B0000
trusted library allocation
page read and write
28A20689000
heap
page read and write
28A208BB000
heap
page read and write
A2BFDFF000
stack
page read and write
28A18EE5000
heap
page read and write
28A29260000
trusted library allocation
page read and write
28A225A5000
heap
page read and write
28A28F10000
trusted library allocation
page read and write
28A2C310000
trusted library allocation
page read and write
28A29AF0000
trusted library allocation
page read and write
28A294D5000
heap
page read and write
28A21F99000
heap
page read and write
28A2C370000
trusted library allocation
page read and write
28A2B130000
heap
page read and write
28A20F23000
heap
page read and write
28A207C5000
heap
page read and write
28A2289F000
heap
page read and write
28A1B356000
heap
page read and write
28A28E50000
trusted library allocation
page read and write
28A28E30000
trusted library allocation
page read and write
82924FE000
stack
page read and write
28A20841000
heap
page read and write
28A28A64000
heap
page read and write
There are 1522 hidden memdumps, click here to show them.