IOC Report
SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\40cb8e6c-55e7-4f64-9302-50475c1a318f.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1219696
modified
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\01242091-cba0-40ee-b922-93b82916d3dd.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\0204d1f9-91b6-49e1-a57d-1c06696f9c46.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\79a8676f-615e-493f-bb3a-87fc1e15891f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\8e57af8d-8650-4054-94c6-4bd0fd06fb19.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\952a6b4c-413b-476d-9df7-3b70f4218868.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\BrowserMetrics\BrowserMetrics-66D30A79-1E18.pma
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\1ae02bad-75db-493d-aba8-d313357c372f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\4f66b902-3445-4dfa-8159-6b79c16b468c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\9e9b14bc-510b-4561-b344-29a97c81fdd4.tmp
JSON data
modified
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\AssistanceHome\AssistanceHomeSQLite
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Cache\Cache_Data\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\js\427b152a762aef29_0
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF57fe4e.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DIPS
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\EdgeEDrop\EdgeEDropSQLite.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension State\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension State\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\ExtensionActivityComp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\ExtensionActivityEdge
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\History-journal
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 21, cookie 0xc, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network Action Predictor
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\7c9cf9ed-4d64-4a36-ae85-892888b43e59.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Network Persistent State~RF58cc9a.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\SCT Auditing Pending Reports~RF57a5ce.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\c7ad462e-200f-4f88-ba51-71de0bf1a8c3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\d092329e-afca-4715-8e6f-4716b6b57dee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\d134ec83-0560-42ca-ba9c-44ab9edfc843.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Network\ffc46605-2d05-4e63-a4e1-d2f02f0ce946.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Preferences~RF583fcc.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Preferences~RF58b4cd.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Session Storage\000003.log
data
modified
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\f53f90bc-50fa-4c10-8a61-ade3edb672a3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\heavy_ad_intervention_opt_out.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State~RF57a292.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State~RF57a2b1.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State~RF57c934.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State~RF58b346.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Local State~RF5924fb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\f5ba9b99-1764-4816-8dcb-21c57a247ed8.tmp
JSON data
dropped
There are 131 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe"
malicious
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe --webview-exe-version=0.1.0 --user-data-dir="C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=MojoIpcz --lang=en-GB --mojo-named-platform-channel-pipe=7544.7668.17675517513217638666
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7ffdfb1c8e88,0x7ffdfb1c8e98,0x7ffdfb1c8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView" --webview-exe-name=SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1768 --field-trial-handle=1772,i,11401663883599953160,14768806848800428662,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView" --webview-exe-name=SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --mojo-platform-channel-handle=2608 --field-trial-handle=1772,i,11401663883599953160,14768806848800428662,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView" --webview-exe-name=SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --mojo-platform-channel-handle=2652 --field-trial-handle=1772,i,11401663883599953160,14768806848800428662,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\com.nmt.ecosystem\EBWebView" --webview-exe-name=SecuriteInfo.com.Trojan.Win64.Krypt.13435.32435.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --edge-webview-custom-scheme --disable-nacl --first-renderer-process --autoplay-policy=no-user-gesture-required --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1725101066859934 --launch-time-ticks=5743702722 --mojo-platform-channel-handle=3400 --field-trial-handle=1772,i,11401663883599953160,14768806848800428662,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1

URLs

Name
IP
Malicious
http://web.503188.com/?
unknown
https://hao.360.com/?installer
unknown
http://www.4399.com/flash/32979.htm
unknown
https://vuejs.org/error-reference/#runtime-$
unknown
http://hao123.di178.com/?r916
unknown
https://www.4399.com/flash/180977_3.htm
unknown
https://tg.602.com
unknown
https://www.4399.com/flash/127539_4.htm
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://www.4399.com/flash/205462_4.htm
unknown
https://www.4399.com/flash/145991_4.htm
unknown
https://www.4399.com/flash/203215_3.htmhttps://www.4399.com/flash/203178_3.htm
unknown
http://nmt.localhost/(
unknown
http://www.chambersign.org1
unknown
https://ntp.msn.cn/edge/ntp
unknown
https://www.4399.com/flash/39379_2.htm
unknown
http://nmt.localhost.R
unknown
https://www.4399.com/flash/55146_4.htm
unknown
https://www.4399.com/flash/195673_4.htm
unknown
http://nmt.localhostt
unknown
https://kf.07073.com
unknown
https://www.4399.com/flash/18012.htm
unknown
http://nmt.localhost/d
unknown
http://bd.gy912.com
unknown
https://www.91duba.com/?f=
unknown
http://anglebug.com/6929
unknown
https://www.4399.com/flash/217926_2.htm
unknown
https://www.4399.com/flash/218860_1.htm
unknown
https://anglebug.com/7246
unknown
https://www.4399.com/flash/27924_2.htm
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://www.4399.com/flash/18012_4.htm
unknown
https://www.newduba.cn/?
unknown
https://www.4399.com/flash/48504.htm
unknown
http://nmt.localhostgRefererx.http://nmt.localhost/assets/index-BUegJusl.cssjUser-Agentx
unknown
http://df.edge.qhkj.baicana.com
unknown
https://issuetracker.google.com/161903006
unknown
https://www.office.com/OfficeeEATE
unknown
https://tp.9377s.com
unknown
http://anglebug.com/4722
unknown
http://nmt.localhost/
unknown
http://nmt.localhost/assets/index-BUegJusl.cssNR
unknown
http://r.emsoso.cn
unknown
https://www.4399.com/flash/zmhj.htm
unknown
https://www.4399.com/flash/69156_1.htm
unknown
https://www.4399.com/flash/776_1.htm
unknown
http://129fy.ie.chalai.net
unknown
https://www.4399.com/flash/198637_4.htm
unknown
https://www.4399.com/flash/133630_4.htm
unknown
http://e6.i.lencr.org/0A
unknown
http://nmt.localhost/fonts/JetBrainsMono-Medium.ttf.8
unknown
http://html4/loose.dtd
unknown
http://sgcs.edge.ker58.com
unknown
https://www.4399.com/flash/218717_2.htm
unknown
https://www.4399.com/flash/136516_3.htm
unknown
https://www.4399.com/flash/203215_3.htm
unknown
https://www.4399.com/flash/207195_4.htm
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://discovery.lenovo.com.cn/home062291
unknown
https://www.newduba.cn/?f=
unknown
https://hao.360.com/?src=jsqth
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://www.4399.com/flash/217855_4.htm
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://yxtg.taojike.com.cn/tg/ttfc.html?sc=
unknown
http://nmt.localhost/fonts/JetBrainsMono-Medium.ttf
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.4399.com/flash/21674_3.htm
unknown
https://www.4399.com/flash/204650_1.htm
unknown
https://sts.windows.net/
unknown
https://www.4399.com/flash/115339_1.htm
unknown
https://www.4399.com/flash/203369_3.htm
unknown
https://www.jiegeng.com
unknown
https://www.office.com/w
unknown
https://internet-start.net/?
unknown
https://www.4399.com/flash/35538.htm
unknown
https://www.4399.com/flash/218066_3.htm
unknown
https://www.4399.com/flash/6232_3.htm
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://www.4399.com/flash/195990_1.htm
unknown
https://www.4399.com/flash/12669_4.htm
unknown
https://www.4399.com/flash/204056_4.htm
unknown
http://anglebug.com/3970
unknown
https://www.4399.com/flash/205090_2.htm
unknown
https://www.startfenster.de
unknown
http://nmt.localhost/vite.svg
unknown
https://www.4399.com/flash/10379_3.htm
unknown
https://www.4399.com/flash/203018_4.htm
unknown
http://.jpg
unknown
https://login.chinacloudapi.cn/
unknown
http://nmt.localhost/fonts/LexendExa-Bold.ttf
unknown
https://www.so.com/?src=
unknown
http://anglebug.com/5901
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
nmtsocial.uno
5.42.101.19

IPs

IP
Domain
Country
Malicious
162.159.61.3
chrome.cloudflare-dns.com
United States
13.107.21.239
unknown
United States
127.0.0.1
unknown
unknown
172.64.41.3
unknown
United States
5.42.101.19
nmtsocial.uno
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A6DE824000
heap
page read and write
729801966000
trusted library allocation
page read and write
729800770000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
7298018E7000
trusted library allocation
page read and write
729801454000
trusted library allocation
page read and write
2AF01200000
trusted library allocation
page read and write
442000274000
trusted library allocation
page read and write
37E000220000
trusted library allocation
page read and write
729801593000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
1108005C8000
trusted library allocation
page read and write
3C9C00C4C000
trusted library allocation
page read and write
729801729000
trusted library allocation
page read and write
729801814000
trusted library allocation
page read and write
1108005C5000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE813000
heap
page read and write
4B5000
heap
page read and write
154D852E000
heap
page read and write
3C9C00D14000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
173C01120000
trusted library allocation
page read and write
3C9C01394000
trusted library allocation
page read and write
729801AB4000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
729801930000
trusted library allocation
page read and write
1108005C8000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
173C002B8000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
72980207C000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
74D8002B8000
trusted library allocation
page read and write
79E400201000
trusted library allocation
page read and write
2510000C3000
trusted library allocation
page read and write
1108004FB000
trusted library allocation
page read and write
72980180C000
trusted library allocation
page read and write
173C00244000
trusted library allocation
page read and write
2AF01880000
trusted library allocation
page read and write
729801EC8000
trusted library allocation
page read and write
72980176A000
trusted library allocation
page read and write
52FA7FD000
stack
page read and write
729800AB5000
trusted library allocation
page read and write
16C0002CC000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
173C0066C000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
3C9C013D8000
trusted library allocation
page read and write
7298019A1000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
154DA313000
heap
page read and write
729800830000
trusted library allocation
page read and write
110800687000
trusted library allocation
page read and write
643800244000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729800674000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
3A1E000
stack
page read and write
16C00020C000
trusted library allocation
page read and write
72980177C000
trusted library allocation
page read and write
2AF00202000
trusted library allocation
page read and write
729800F0C000
trusted library allocation
page read and write
3F61000
heap
page read and write
573400201000
trusted library allocation
page read and write
110800598000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
53340029C000
direct allocation
page read and write
729801764000
trusted library allocation
page read and write
173C00801000
trusted library allocation
page read and write
3C9C00CB8000
trusted library allocation
page read and write
7298014EC000
trusted library allocation
page read and write
110800710000
trusted library allocation
page read and write
72980164C000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
154DF9E0000
unkown
page readonly
4420002CC000
trusted library allocation
page read and write
173C00378000
trusted library allocation
page read and write
6BBABFE000
stack
page read and write
729801584000
trusted library allocation
page read and write
51B000
heap
page read and write
4809000
stack
page read and write
729800FD4000
trusted library allocation
page read and write
11080044D000
trusted library allocation
page read and write
73800032C000
trusted library allocation
page read and write
529E7FB000
stack
page read and write
729800F42000
trusted library allocation
page read and write
1108006B3000
trusted library allocation
page read and write
729801962000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
11080066E000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801674000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
110800614000
trusted library allocation
page read and write
2A6E19ED000
unclassified section
page read and write
7298009E0000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
72980172D000
trusted library allocation
page read and write
1FDC002B0000
direct allocation
page read and write
154D84F5000
heap
page read and write
147964B2000
heap
page read and write
1108004FB000
trusted library allocation
page read and write
729801968000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
573400238000
trusted library allocation
page read and write
110800A42000
trusted library allocation
page read and write
729801724000
trusted library allocation
page read and write
3C9C00DEC000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
729800F3C000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
3FA9000
heap
page read and write
2AA3DFE000
stack
page read and write
74D80020C000
trusted library allocation
page read and write
729801932000
trusted library allocation
page read and write
2AA25FE000
unkown
page readonly
79E4002B4000
trusted library allocation
page read and write
42C400080000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
2A975FE000
unkown
page readonly
DB7BBEF000
stack
page read and write
74D800254000
trusted library allocation
page read and write
154DF9C0000
unkown
page readonly
7298018BD000
trusted library allocation
page read and write
42C40027C000
trusted library allocation
page read and write
729801EC8000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
1108001CC000
trusted library allocation
page read and write
4F4000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
3C9C00BF0000
trusted library allocation
page read and write
2AF002C2000
trusted library allocation
page read and write
6BBB3FE000
unkown
page readonly
37E000408000
trusted library allocation
page read and write
154D8527000
heap
page read and write
729801928000
trusted library allocation
page read and write
72980195A000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
1108005EC000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
7298019A8000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
729801544000
trusted library allocation
page read and write
37E00020C000
trusted library allocation
page read and write
7298018B9000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
3C9C007D4000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980174C000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
9BC19FE000
stack
page read and write
729801948000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
3F11000
heap
page read and write
72980191C000
trusted library allocation
page read and write
3C9C00CD8000
trusted library allocation
page read and write
73800030C000
trusted library allocation
page read and write
4BD0002B8000
trusted library allocation
page read and write
590C0027C000
trusted library allocation
page read and write
729801A9A000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
1108005B1000
trusted library allocation
page read and write
3C9C00BBC000
trusted library allocation
page read and write
154D8534000
heap
page read and write
7298008A0000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
853000
heap
page read and write
729801754000
trusted library allocation
page read and write
110800598000
trusted library allocation
page read and write
72980177A000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
590C0028C000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
154DA302000
heap
page read and write
110800680000
trusted library allocation
page read and write
460E000
stack
page read and write
1479646D000
heap
page read and write
738000300000
trusted library allocation
page read and write
729800F94000
trusted library allocation
page read and write
1479649A000
heap
page read and write
7298019CE000
trusted library allocation
page read and write
7298006A0000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
42C4001CC000
trusted library allocation
page read and write
11080027B000
trusted library allocation
page read and write
729801D34000
trusted library allocation
page read and write
173C00238000
trusted library allocation
page read and write
7298018F0000
trusted library allocation
page read and write
110800687000
trusted library allocation
page read and write
3C9C00050000
trusted library allocation
page read and write
7298015EC000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
7298015C4000
trusted library allocation
page read and write
3C9C012BC000
trusted library allocation
page read and write
729800FC0000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
173C00284000
trusted library allocation
page read and write
729800EB2000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
7298017F4000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
590C00201000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
37E0002F0000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
1108005B5000
trusted library allocation
page read and write
729800770000
trusted library allocation
page read and write
110800500000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
9BC09FE000
stack
page read and write
72980177C000
trusted library allocation
page read and write
154D8529000
heap
page read and write
729800D64000
trusted library allocation
page read and write
729801EC8000
trusted library allocation
page read and write
729801774000
trusted library allocation
page read and write
72980165C000
trusted library allocation
page read and write
16C0002CC000
trusted library allocation
page read and write
3C9C000D8000
trusted library allocation
page read and write
89E25FE000
stack
page read and write
2AF00582000
trusted library allocation
page read and write
50A40030B000
direct allocation
page read and write
3FA9000
heap
page read and write
3C9C01384000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
738000274000
trusted library allocation
page read and write
2510000D8000
trusted library allocation
page read and write
729801938000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
3C9C01374000
trusted library allocation
page read and write
296BA681000
heap
page read and write
8B5000
heap
page read and write
110800722000
trusted library allocation
page read and write
11080068C000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
DB027FB000
stack
page read and write
11080068C000
trusted library allocation
page read and write
AD800298000
direct allocation
page read and write
7298015CC000
trusted library allocation
page read and write
14796400000
heap
page read and write
2A6DE600000
heap
page read and write
2A6DE824000
heap
page read and write
729800A98000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
79E400280000
trusted library allocation
page read and write
16C000244000
trusted library allocation
page read and write
9700027C000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
729801868000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
729800A2C000
trusted library allocation
page read and write
729800D94000
trusted library allocation
page read and write
4BD000294000
trusted library allocation
page read and write
729801E94000
trusted library allocation
page read and write
528FFFE000
unkown
page readonly
50A4002D0000
direct allocation
page read and write
729800F9C000
trusted library allocation
page read and write
6438002AC000
trusted library allocation
page read and write
4A1C0102C000
trusted library allocation
page read and write
729801968000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
2510000BC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729800A64000
trusted library allocation
page read and write
7298017DA000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
7298008C2000
trusted library allocation
page read and write
110800597000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
72980165C000
trusted library allocation
page read and write
3C9C008E4000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
7298017DA000
trusted library allocation
page read and write
729801AA4000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
16C0002E0000
trusted library allocation
page read and write
7298017A1000
trusted library allocation
page read and write
14793676000
heap
page read and write
110800201000
trusted library allocation
page read and write
296BF202000
heap
page read and write
7298016A4000
trusted library allocation
page read and write
1108006EA000
trusted library allocation
page read and write
110800481000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
154D852F000
heap
page read and write
2A6DE613000
heap
page read and write
97000298000
trusted library allocation
page read and write
5734002B0000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C007C0000
trusted library allocation
page read and write
154DA371000
heap
page read and write
729800F14000
trusted library allocation
page read and write
3C9C00C80000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
72980176A000
trusted library allocation
page read and write
50A400370000
direct allocation
page read and write
2BBE000
stack
page read and write
74D800238000
trusted library allocation
page read and write
729801AA9000
trusted library allocation
page read and write
9BC41FE000
unkown
page readonly
573400294000
trusted library allocation
page read and write
72980176C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801684000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
7430002AC000
direct allocation
page read and write
154D8380000
heap
page readonly
11080069F000
trusted library allocation
page read and write
3C9C00DF0000
trusted library allocation
page read and write
729801834000
trusted library allocation
page read and write
4BD0002B8000
trusted library allocation
page read and write
37E000338000
trusted library allocation
page read and write
729801964000
trusted library allocation
page read and write
3C9C00240000
trusted library allocation
page read and write
110800494000
trusted library allocation
page read and write
110800693000
trusted library allocation
page read and write
7298017F2000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
74D80040C000
trusted library allocation
page read and write
154D852F000
heap
page read and write
729801794000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
3FA0000
heap
page read and write
21A0000
remote allocation
page read and write
50A400280000
direct allocation
page read and write
7298016D4000
trusted library allocation
page read and write
2AF00242000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
173C00324000
trusted library allocation
page read and write
110800488000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
74D800274000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980170C000
trusted library allocation
page read and write
1108006AC000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
42C400134000
trusted library allocation
page read and write
2AF015C0000
trusted library allocation
page read and write
7298016E8000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
16C0002E0000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
729801AA9000
trusted library allocation
page read and write
72980145C000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
442000238000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
72980028C000
trusted library allocation
page read and write
72980146C000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
729801F3C000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
72980179C000
trusted library allocation
page read and write
2510000E0000
trusted library allocation
page read and write
154D8528000
heap
page read and write
729800824000
trusted library allocation
page read and write
2AF00000000
trusted library allocation
page readonly
50A40032A000
direct allocation
page read and write
1108005A9000
trusted library allocation
page read and write
3C9C00ACC000
trusted library allocation
page read and write
590C00248000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
7298019D8000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
DB7D3FA000
stack
page read and write
729801644000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
14793635000
heap
page read and write
529AFFE000
unkown
page readonly
573400237000
trusted library allocation
page read and write
154DD6C9000
unkown
page readonly
4420002CC000
trusted library allocation
page read and write
3C9C011F8000
trusted library allocation
page read and write
52947FE000
stack
page read and write
2A6DE824000
heap
page read and write
729801670000
trusted library allocation
page read and write
2AA85FE000
unkown
page readonly
72980203C000
trusted library allocation
page read and write
729801568000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
154D8527000
heap
page read and write
2A6DE82B000
heap
page read and write
2AA45FE000
unkown
page readonly
72980170C000
trusted library allocation
page read and write
140E3F000
unkown
page execute read
3C9C00E2D000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
7298017F4000
trusted library allocation
page read and write
3C9C002A4000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
7298014CC000
trusted library allocation
page read and write
251000140000
trusted library allocation
page read and write
72980182C000
trusted library allocation
page read and write
1108005B5000
trusted library allocation
page read and write
3C9C00AAC000
trusted library allocation
page read and write
729801D34000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980167C000
trusted library allocation
page read and write
AD8002BC000
direct allocation
page read and write
2A6DE824000
heap
page read and write
3C9C00ABC000
trusted library allocation
page read and write
296BA705000
heap
page read and write
110800268000
trusted library allocation
page read and write
154D84A2000
heap
page read and write
44200020C000
trusted library allocation
page read and write
3C9C00A0C000
trusted library allocation
page read and write
42C40000C000
trusted library allocation
page read and write
729801CB8000
trusted library allocation
page read and write
74D800201000
trusted library allocation
page read and write
729801972000
trusted library allocation
page read and write
11080043B000
trusted library allocation
page read and write
3C9C00866000
trusted library allocation
page read and write
2A6E202A000
unclassified section
page read and write
11080071D000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
7380002E0000
trusted library allocation
page read and write
533400201000
direct allocation
page read and write
5734002A0000
trusted library allocation
page read and write
1FDC00284000
direct allocation
page read and write
110800412000
trusted library allocation
page read and write
79E4002CC000
trusted library allocation
page read and write
154DED00000
heap
page read and write
1108007D6000
trusted library allocation
page read and write
154DAFC0000
unkown
page read and write
729801D2C000
trusted library allocation
page read and write
729800EF0000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
4BD0002C8000
trusted library allocation
page read and write
37E000230000
trusted library allocation
page read and write
72980165C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298015CC000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C01480000
trusted library allocation
page read and write
72980163C000
trusted library allocation
page read and write
110800254000
trusted library allocation
page read and write
3C9C00288000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
3F56000
heap
page read and write
1108007D6000
trusted library allocation
page read and write
42C40025C000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
1108005B1000
trusted library allocation
page read and write
1108006EA000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
6BBF3FE000
unkown
page readonly
42C400114000
trusted library allocation
page read and write
3C9C00DE8000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
2A6DE450000
unclassified section
page readonly
154DA302000
heap
page read and write
7298016FC000
trusted library allocation
page read and write
970002BC000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
1479362B000
heap
page read and write
79E400230000
trusted library allocation
page read and write
154DD6C7000
unkown
page readonly
173C01148000
trusted library allocation
page read and write
729801F94000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
7298017DA000
trusted library allocation
page read and write
2A97DFE000
stack
page read and write
2AF00482000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
729800EE8000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
3C9C00294000
trusted library allocation
page read and write
729801F74000
trusted library allocation
page read and write
7298009D4000
trusted library allocation
page read and write
729801EE0000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
3C9C00C4C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
50A400217000
direct allocation
page read and write
42C40027C000
trusted library allocation
page read and write
1108006EA000
trusted library allocation
page read and write
154D84F0000
heap
page read and write
729800AB5000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801EFB000
trusted library allocation
page read and write
729801774000
trusted library allocation
page read and write
296BA664000
heap
page read and write
5734002DC000
trusted library allocation
page read and write
9700028C000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
52FAFFE000
unkown
page readonly
3C9C00E4C000
trusted library allocation
page read and write
50A400201000
direct allocation
page read and write
52FC7F9000
stack
page read and write
154D852E000
heap
page read and write
729800A78000
trusted library allocation
page read and write
7298018B4000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
14798EE0000
trusted library allocation
page read and write
52A37FF000
stack
page read and write
4FA000
heap
page read and write
42C400001000
trusted library allocation
page read and write
14796434000
heap
page read and write
729800A50000
trusted library allocation
page read and write
173C00E01000
trusted library allocation
page read and write
42C400070000
trusted library allocation
page read and write
729801584000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
729802048000
trusted library allocation
page read and write
3C9C000CC000
trusted library allocation
page read and write
528CFFE000
unkown
page readonly
72980179C000
trusted library allocation
page read and write
729800A2C000
trusted library allocation
page read and write
7298019D4000
trusted library allocation
page read and write
154D8400000
heap
page read and write
9BC81FE000
unkown
page readonly
7298016C4000
trusted library allocation
page read and write
1F772970000
heap
page read and write
3C9C0086C000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
110800220000
trusted library allocation
page read and write
147963FD000
unclassified section
page read and write
446000
heap
page read and write
643800238000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
7380002D4000
trusted library allocation
page read and write
3C9C007AC000
trusted library allocation
page read and write
154DA313000
heap
page read and write
72980183C000
trusted library allocation
page read and write
72980083C000
trusted library allocation
page read and write
7298019D4000
trusted library allocation
page read and write
97000278000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
729800408000
trusted library allocation
page read and write
154D854E000
heap
page read and write
1108007A6000
trusted library allocation
page read and write
1108005B6000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
11080040D000
trusted library allocation
page read and write
42C40027C000
trusted library allocation
page read and write
3C9C00890000
trusted library allocation
page read and write
52FCFFE000
unkown
page readonly
5286FFE000
unkown
page readonly
7298016DC000
trusted library allocation
page read and write
52827FE000
stack
page read and write
11080065A000
trusted library allocation
page read and write
729801494000
trusted library allocation
page read and write
72980061C000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
729800FEC000
trusted library allocation
page read and write
72980196B000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
154D8527000
heap
page read and write
296BA64A000
heap
page read and write
533400270000
direct allocation
page read and write
72980161C000
trusted library allocation
page read and write
89DF5FC000
stack
page read and write
729800A50000
trusted library allocation
page read and write
729801916000
trusted library allocation
page read and write
729801914000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
11080067A000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
7298015ED000
trusted library allocation
page read and write
3C9C00D08000
trusted library allocation
page read and write
11080065F000
trusted library allocation
page read and write
37E000380000
trusted library allocation
page read and write
729800A44000
trusted library allocation
page read and write
729801815000
trusted library allocation
page read and write
72980208C000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
529D7FB000
stack
page read and write
173C00F4C000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
110800500000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
7298017CC000
trusted library allocation
page read and write
72980160C000
trusted library allocation
page read and write
729801834000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
DB7C3FE000
stack
page read and write
50A400328000
direct allocation
page read and write
7298016B4000
trusted library allocation
page read and write
738000210000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
2AF00082000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
14183F000
unkown
page execute read
729800AF0000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
2A6DE440000
unclassified section
page readonly
729800A38000
trusted library allocation
page read and write
147964C3000
heap
page read and write
2A6DE823000
heap
page read and write
110800722000
trusted library allocation
page read and write
3C9C001B8000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
729800614000
trusted library allocation
page read and write
154DA354000
heap
page read and write
72980158C000
trusted library allocation
page read and write
738000338000
trusted library allocation
page read and write
154D8280000
heap
page read and write
573400210000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
729800F64000
trusted library allocation
page read and write
110800668000
trusted library allocation
page read and write
2A6DE82E000
heap
page read and write
154DA202000
heap
page read and write
2A6DE82B000
heap
page read and write
1108007A6000
trusted library allocation
page read and write
7298018EC000
trusted library allocation
page read and write
154D84F7000
heap
page read and write
50A400318000
direct allocation
page read and write
3C9C00694000
trusted library allocation
page read and write
1108006BE000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
3C9C0140E000
trusted library allocation
page read and write
14796477000
heap
page read and write
1F772A13000
heap
page read and write
7298018E0000
trusted library allocation
page read and write
729800EF0000
trusted library allocation
page read and write
3C9C0131C000
trusted library allocation
page read and write
738000201000
trusted library allocation
page read and write
729801E54000
trusted library allocation
page read and write
729801A40000
trusted library allocation
page read and write
154D83E0000
trusted library allocation
page read and write
3C9C01313000
trusted library allocation
page read and write
42C400138000
trusted library allocation
page read and write
173C002C0000
trusted library allocation
page read and write
3C9C0132C000
trusted library allocation
page read and write
3C9C0084A000
trusted library allocation
page read and write
729801812000
trusted library allocation
page read and write
72980192E000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C00934000
trusted library allocation
page read and write
3F61000
heap
page read and write
729801822000
trusted library allocation
page read and write
729801745000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
37E000318000
trusted library allocation
page read and write
729801754000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298015AC000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
3C9C00A95000
trusted library allocation
page read and write
2AF00402000
trusted library allocation
page read and write
7298019DE000
trusted library allocation
page read and write
52FD7FB000
stack
page read and write
729801FF2000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
16C0002DC000
trusted library allocation
page read and write
3C9C00624000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
2AF01082000
trusted library allocation
page read and write
2AF01500000
trusted library allocation
page read and write
729800A9E000
trusted library allocation
page read and write
50A400338000
direct allocation
page read and write
72980180C000
trusted library allocation
page read and write
7298020F4000
trusted library allocation
page read and write
173C010AC000
trusted library allocation
page read and write
251000024000
trusted library allocation
page read and write
42C400174000
trusted library allocation
page read and write
729800AC0000
trusted library allocation
page read and write
3FC9000
heap
page read and write
2A6DE82B000
heap
page read and write
154D83C0000
heap
page read and write
11080048F000
trusted library allocation
page read and write
72980156C000
trusted library allocation
page read and write
7298008D9000
trusted library allocation
page read and write
729801584000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
3C9C00D30000
trusted library allocation
page read and write
729801AB4000
trusted library allocation
page read and write
729801814000
trusted library allocation
page read and write
729801A94000
trusted library allocation
page read and write
97000258000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE82B000
heap
page read and write
72980152C000
trusted library allocation
page read and write
154D8529000
heap
page read and write
11080045C000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
2A9ADFE000
stack
page read and write
72980163C000
trusted library allocation
page read and write
296BA5B0000
heap
page read and write
2A6DE824000
heap
page read and write
154DA321000
heap
page read and write
97000230000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
729801745000
trusted library allocation
page read and write
2A6E205C000
unclassified section
page read and write
110800693000
trusted library allocation
page read and write
2510000A0000
trusted library allocation
page read and write
2A6DE5B0000
trusted library allocation
page read and write
42C400360000
trusted library allocation
page read and write
110800631000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
141CDE000
unkown
page readonly
72980186C000
trusted library allocation
page read and write
154DA1C0000
trusted library section
page readonly
1A1DD202000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
7298015B4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
1108006B3000
trusted library allocation
page read and write
738000348000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
110800673000
trusted library allocation
page read and write
729800F2C000
trusted library allocation
page read and write
729802058000
trusted library allocation
page read and write
3C9C00950000
trusted library allocation
page read and write
3C9C00240000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
72980203C000
trusted library allocation
page read and write
3C9C00B74000
trusted library allocation
page read and write
729800817000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
14796512000
heap
page read and write
72980163C000
trusted library allocation
page read and write
173C00F90000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
729801D68000
trusted library allocation
page read and write
729801574000
trusted library allocation
page read and write
173C002A0000
trusted library allocation
page read and write
729800CAC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
643800264000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE824000
heap
page read and write
7298017A3000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
3C9C00885000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
3C9C0060C000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
37E0002C8000
trusted library allocation
page read and write
729801F00000
trusted library allocation
page read and write
738000358000
trusted library allocation
page read and write
37E0002D8000
trusted library allocation
page read and write
3C9C00201000
trusted library allocation
page read and write
AD800408000
direct allocation
page read and write
1108007D6000
trusted library allocation
page read and write
37E000258000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
173C0020C000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
110800631000
trusted library allocation
page read and write
729801EEC000
trusted library allocation
page read and write
73800040C000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
72980184C000
trusted library allocation
page read and write
729801A60000
trusted library allocation
page read and write
4B10000
heap
page read and write
729800F0C000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
110800699000
trusted library allocation
page read and write
37E000344000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
14796494000
heap
page read and write
72980207C000
trusted library allocation
page read and write
729801474000
trusted library allocation
page read and write
154D8529000
heap
page read and write
154DA368000
heap
page read and write
154D84AC000
heap
page read and write
729800A64000
trusted library allocation
page read and write
729800DC8000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
72980167D000
trusted library allocation
page read and write
110800774000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
14793657000
heap
page read and write
7430002B0000
direct allocation
page read and write
7298017C4000
trusted library allocation
page read and write
140736000
unkown
page read and write
11080079B000
trusted library allocation
page read and write
296BA638000
heap
page read and write
7298017A3000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801004000
trusted library allocation
page read and write
154DD705000
unkown
page readonly
72980174C000
trusted library allocation
page read and write
1FDC002A0000
direct allocation
page read and write
173C00FB0000
trusted library allocation
page read and write
3C9C00250000
trusted library allocation
page read and write
7380002B4000
trusted library allocation
page read and write
3C9C0127C000
trusted library allocation
page read and write
520000
heap
page read and write
110800164000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800618000
trusted library allocation
page read and write
3C9C008FF000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
16C0002C0000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
729801AC0000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
37E000300000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
42C4000BF000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
72980199F000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
729801729000
trusted library allocation
page read and write
154DFA10000
unkown
page readonly
42C40029C000
trusted library allocation
page read and write
7298002CC000
trusted library allocation
page read and write
DB7BBE6000
stack
page read and write
51E000
heap
page read and write
3C9C0080C000
trusted library allocation
page read and write
72980151D000
trusted library allocation
page read and write
173C0100C000
trusted library allocation
page read and write
3C9C00724000
trusted library allocation
page read and write
154DFA00000
unkown
page readonly
729800F0C000
trusted library allocation
page read and write
72980157C000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
50A40031A000
direct allocation
page read and write
72980175C000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
729801942000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980184C000
trusted library allocation
page read and write
50A400374000
direct allocation
page read and write
7298020F6000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
110800686000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298015E4000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
173C0104C000
trusted library allocation
page read and write
729801634000
trusted library allocation
page read and write
110800476000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
729801FE4000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
729801EBC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980173C000
trusted library allocation
page read and write
5334002AC000
direct allocation
page read and write
573400268000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
110800260000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
729800A4C000
trusted library allocation
page read and write
110800223000
trusted library allocation
page read and write
89E4DFE000
unkown
page readonly
7298016AC000
trusted library allocation
page read and write
173C00360000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
2A6DE854000
heap
page read and write
590C002B8000
trusted library allocation
page read and write
729801204000
trusted library allocation
page read and write
4420002B4000
trusted library allocation
page read and write
3C9C00BBC000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
173C00260000
trusted library allocation
page read and write
110800260000
trusted library allocation
page read and write
AD800254000
direct allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729800FAC000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
2A9FDFB000
stack
page read and write
729801966000
trusted library allocation
page read and write
743000234000
direct allocation
page read and write
72980169C000
trusted library allocation
page read and write
2A99DFE000
stack
page read and write
3C9C004C0000
trusted library allocation
page read and write
729801AA0000
trusted library allocation
page read and write
42C4000E0000
trusted library allocation
page read and write
110800699000
trusted library allocation
page read and write
1A1DD22B000
heap
page read and write
7298019EC000
trusted library allocation
page read and write
529F7FC000
stack
page read and write
7298017B4000
trusted library allocation
page read and write
3C9C0078C000
trusted library allocation
page read and write
7298016E8000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801F00000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
3C9C01380000
trusted library allocation
page read and write
3C9C001C8000
trusted library allocation
page read and write
1F772820000
heap
page read and write
4BD0002B8000
trusted library allocation
page read and write
110800288000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
401E000
heap
page read and write
590C002AC000
trusted library allocation
page read and write
50A400290000
direct allocation
page read and write
3C9C00C5C000
trusted library allocation
page read and write
1108006C3000
trusted library allocation
page read and write
251000118000
trusted library allocation
page read and write
729801910000
trusted library allocation
page read and write
7430002CC000
direct allocation
page read and write
2A98DFE000
stack
page read and write
729800A7C000
trusted library allocation
page read and write
72980182C000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
154DF9D0000
unkown
page readonly
729801CCB000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
147936BC000
heap
page read and write
729800F00000
trusted library allocation
page read and write
729800F8C000
trusted library allocation
page read and write
110800094000
trusted library allocation
page read and write
52F000
heap
page read and write
7298016C4000
trusted library allocation
page read and write
7298015C4000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
14793B02000
heap
page read and write
2A6DE642000
heap
page read and write
729801F74000
trusted library allocation
page read and write
2AF004C2000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
3C9C014B8000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
7298015A4000
trusted library allocation
page read and write
3C9C00E98000
trusted library allocation
page read and write
2A995FE000
unkown
page readonly
729801748000
trusted library allocation
page read and write
110800138000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
3C9C0081C000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
74D800270000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801992000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
533400284000
direct allocation
page read and write
52937FC000
stack
page read and write
72980077C000
trusted library allocation
page read and write
7298018F4000
trusted library allocation
page read and write
11080066E000
trusted library allocation
page read and write
251000100000
trusted library allocation
page read and write
1479649F000
heap
page read and write
11080051A000
trusted library allocation
page read and write
1108000EC000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
14793600000
heap
page read and write
2AA5DFE000
stack
page read and write
3C9C006E8000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
52877FD000
stack
page read and write
72980157C000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
1108006B9000
trusted library allocation
page read and write
1406C3000
unkown
page read and write
7298008C4000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
52867FD000
stack
page read and write
72980174E000
trusted library allocation
page read and write
7298019D8000
trusted library allocation
page read and write
72980203C000
trusted library allocation
page read and write
72980196D000
trusted library allocation
page read and write
14798EF7000
unclassified section
page read and write
6BBBBFD000
stack
page read and write
16C000270000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
442000250000
trusted library allocation
page read and write
9BCE9FC000
stack
page read and write
738000240000
trusted library allocation
page read and write
42C400350000
trusted library allocation
page read and write
7298018B4000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
57340024C000
trusted library allocation
page read and write
3FA9000
heap
page read and write
7298017A4000
trusted library allocation
page read and write
52F000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
173C0036C000
trusted library allocation
page read and write
729800614000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
3FA9000
heap
page read and write
3C9C00650000
trusted library allocation
page read and write
50A4002F4000
direct allocation
page read and write
729801C74000
trusted library allocation
page read and write
51E000
heap
page read and write
2A6DE824000
heap
page read and write
729801564000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
3C9C00D08000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
72980179C000
trusted library allocation
page read and write
643800201000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
9BC21FE000
unkown
page readonly
2A6DE824000
heap
page read and write
50F000
heap
page read and write
72980203C000
trusted library allocation
page read and write
11080005C000
trusted library allocation
page read and write
3C9C0082C000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
3C9C00624000
trusted library allocation
page read and write
3C9C00601000
trusted library allocation
page read and write
3F71000
heap
page read and write
3C9C00CC8000
trusted library allocation
page read and write
738000230000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
729802068000
trusted library allocation
page read and write
7380002C8000
trusted library allocation
page read and write
3F87000
heap
page read and write
72980152C000
trusted library allocation
page read and write
72980183C000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
2A6DE460000
heap
page read and write
52977FA000
stack
page read and write
7298015D4000
trusted library allocation
page read and write
57340028C000
trusted library allocation
page read and write
1479648C000
heap
page read and write
1108007A6000
trusted library allocation
page read and write
7298019BA000
trusted library allocation
page read and write
7298014AC000
trusted library allocation
page read and write
173C00354000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
37E000290000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
729801F6E000
trusted library allocation
page read and write
7298017CC000
trusted library allocation
page read and write
72980166C000
trusted library allocation
page read and write
573400298000
trusted library allocation
page read and write
173C00601000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
37E000304000
trusted library allocation
page read and write
14796419000
heap
page read and write
729800A64000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
296BA685000
heap
page read and write
729801634000
trusted library allocation
page read and write
729800EDC000
trusted library allocation
page read and write
173C0072C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980174C000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
154DA361000
heap
page read and write
7298017D4000
trusted library allocation
page read and write
7298018B0000
trusted library allocation
page read and write
14793702000
heap
page read and write
110800124000
trusted library allocation
page read and write
DB7CBFE000
stack
page read and write
729800A98000
trusted library allocation
page read and write
729801514000
trusted library allocation
page read and write
7298015E4000
trusted library allocation
page read and write
729801414000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
72980176C000
trusted library allocation
page read and write
42C400138000
trusted library allocation
page read and write
590C0024C000
trusted library allocation
page read and write
9BCD1FE000
unkown
page readonly
729801F58000
trusted library allocation
page read and write
7298017D4000
trusted library allocation
page read and write
48E000
heap
page read and write
3F11000
heap
page read and write
729801A3C000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
7298017CC000
trusted library allocation
page read and write
74D80032C000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
11080044A000
trusted library allocation
page read and write
154D8502000
heap
page read and write
3C9C0083C000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
50A4002EC000
direct allocation
page read and write
7298016C4000
trusted library allocation
page read and write
1108005A6000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
729801AD2000
trusted library allocation
page read and write
14793590000
heap
page read and write
9BC11FE000
unkown
page readonly
173C0080C000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
154D84F0000
heap
page read and write
573400328000
trusted library allocation
page read and write
3C9C00634000
trusted library allocation
page read and write
173C0030C000
trusted library allocation
page read and write
74D800354000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
154D852E000
heap
page read and write
6438002D0000
trusted library allocation
page read and write
173C00270000
trusted library allocation
page read and write
11080078C000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
154DAFE9000
unkown
page read and write
11080079B000
trusted library allocation
page read and write
154DAFEC000
unkown
page read and write
2A9D5FE000
unkown
page readonly
3C9C00D08000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
5293FFE000
unkown
page readonly
729801A5C000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
72980220C000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
729800F0C000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
52F67FE000
stack
page read and write
110800436000
trusted library allocation
page read and write
72980078C000
trusted library allocation
page read and write
72980182C000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
7298018FF000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
7298015F4000
trusted library allocation
page read and write
70E000
stack
page read and write
729801784000
trusted library allocation
page read and write
72980182C000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
14793A13000
heap
page read and write
729800A9E000
trusted library allocation
page read and write
110800280000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
729801E94000
trusted library allocation
page read and write
729801444000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
72980176C000
trusted library allocation
page read and write
72980180C000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
3C9C0123C000
trusted library allocation
page read and write
25100000C000
trusted library allocation
page read and write
729800EC8000
trusted library allocation
page read and write
729800A34000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
37E000201000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
97000201000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
9BC29FB000
stack
page read and write
57340026C000
trusted library allocation
page read and write
296BA613000
heap
page read and write
2A6DE552000
unclassified section
page read and write
7298016FC000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
1FDC00230000
direct allocation
page read and write
1108004EC000
trusted library allocation
page read and write
296BA666000
heap
page read and write
729801794000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
738000250000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
7298016A0000
trusted library allocation
page read and write
110800244000
trusted library allocation
page read and write
7298017A3000
trusted library allocation
page read and write
7298017EC000
trusted library allocation
page read and write
729801ADC000
trusted library allocation
page read and write
1108005EC000
trusted library allocation
page read and write
3C9C00DF0000
trusted library allocation
page read and write
72980177B000
trusted library allocation
page read and write
729801724000
trusted library allocation
page read and write
729801901000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
74D8002D4000
trusted library allocation
page read and write
1108005C5000
trusted library allocation
page read and write
3C9C013AC000
trusted library allocation
page read and write
110800710000
trusted library allocation
page read and write
1108005EC000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
810000
heap
page read and write
72980183A000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
50A400328000
direct allocation
page read and write
3C9C0134E000
trusted library allocation
page read and write
37E00029C000
trusted library allocation
page read and write
2AF01902000
trusted library allocation
page read and write
2AF00442000
trusted library allocation
page read and write
1108006A0000
trusted library allocation
page read and write
72980040C000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
72980176A000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
7298015EC000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
42C400060000
trusted library allocation
page read and write
72980167D000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
74D800250000
trusted library allocation
page read and write
72980209C000
trusted library allocation
page read and write
173C00360000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
44200029C000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
140000000
unkown
page readonly
729801004000
trusted library allocation
page read and write
729801F48000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3C9C00114000
trusted library allocation
page read and write
7298014C4000
trusted library allocation
page read and write
296BF040000
unkown
page readonly
729800A88000
trusted library allocation
page read and write
729800A7E000
trusted library allocation
page read and write
72980166D000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
154D8413000
heap
page read and write
110800436000
trusted library allocation
page read and write
7298008DC000
trusted library allocation
page read and write
3C9C006A0000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
5734002C0000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
50A40034F000
direct allocation
page read and write
3C9C01370000
trusted library allocation
page read and write
52A4FFE000
unkown
page readonly
729801CCD000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800722000
trusted library allocation
page read and write
7298018E2000
trusted library allocation
page read and write
729801904000
trusted library allocation
page read and write
154D842B000
heap
page read and write
72980151C000
trusted library allocation
page read and write
4BD0002CC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801644000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
3C9C00150000
trusted library allocation
page read and write
3C9C001DC000
trusted library allocation
page read and write
529FFFE000
unkown
page readonly
7298017A4000
trusted library allocation
page read and write
743000201000
direct allocation
page read and write
2A9F5FE000
unkown
page readonly
16C0002AC000
trusted library allocation
page read and write
7298018BA000
trusted library allocation
page read and write
729800EDC000
trusted library allocation
page read and write
173C002B8000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
52A1FFE000
unkown
page readonly
1108007A5000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
11080065F000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729800EDC000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
72980175C000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
850000
heap
page read and write
154DEC2F000
heap
page read and write
4BD0002A4000
trusted library allocation
page read and write
72980183C000
trusted library allocation
page read and write
72980177A000
trusted library allocation
page read and write
729800340000
trusted library allocation
page read and write
52817FC000
stack
page read and write
729800A40000
trusted library allocation
page read and write
6BB8BFB000
stack
page read and write
9700020C000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
11080079B000
trusted library allocation
page read and write
3C9C00B00000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
50A400310000
direct allocation
page read and write
110800444000
trusted library allocation
page read and write
72980183C000
trusted library allocation
page read and write
970002D8000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
6BBCBFE000
stack
page read and write
729801AB4000
trusted library allocation
page read and write
147964B9000
heap
page read and write
72980168C000
trusted library allocation
page read and write
7298014F4000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
79E400240000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
3C9C01348000
trusted library allocation
page read and write
1108006A1000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
3C9C00D44000
trusted library allocation
page read and write
52A07FD000
stack
page read and write
1108006B9000
trusted library allocation
page read and write
533400280000
direct allocation
page read and write
738000324000
trusted library allocation
page read and write
3C9C0040C000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
1108006A5000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
970002C8000
trusted library allocation
page read and write
2AA4DFE000
stack
page read and write
79E400250000
trusted library allocation
page read and write
154D8529000
heap
page read and write
729800A80000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
3C9C01001000
trusted library allocation
page read and write
3C9C0099C000
trusted library allocation
page read and write
7298017C4000
trusted library allocation
page read and write
50A40032C000
direct allocation
page read and write
7298017BC000
trusted library allocation
page read and write
154DD739000
unclassified section
page read and write
7298016B4000
trusted library allocation
page read and write
DB007FE000
stack
page read and write
2A6E19E7000
unclassified section
page read and write
729801674000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
3C9C0020C000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
52F37F2000
stack
page read and write
110800288000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
3C9C003A0000
trusted library allocation
page read and write
573400294000
trusted library allocation
page read and write
42C4000E4000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
4A1C01032000
trusted library allocation
page read and write
110800140000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
11080067A000
trusted library allocation
page read and write
4BD0002B8000
trusted library allocation
page read and write
533400220000
direct allocation
page read and write
1479893C000
unclassified section
page readonly
110800278000
trusted library allocation
page read and write
2A6DE400000
remote allocation
page read and write
573400338000
trusted library allocation
page read and write
154DED02000
heap
page read and write
147963E0000
unclassified section
page read and write
1108004EC000
trusted library allocation
page read and write
4BD0002C8000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801724000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
2AF00302000
trusted library allocation
page read and write
7DF407C91000
trusted library allocation
page execute read
2A6DE82B000
heap
page read and write
729801F58000
trusted library allocation
page read and write
16C000220000
trusted library allocation
page read and write
9BC31FE000
unkown
page readonly
3C9C00244000
trusted library allocation
page read and write
3F65000
heap
page read and write
729801AD2000
trusted library allocation
page read and write
110800444000
trusted library allocation
page read and write
3C9C00814000
trusted library allocation
page read and write
729801624000
trusted library allocation
page read and write
573400300000
trusted library allocation
page read and write
173C00348000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
3C9C00E8D000
trusted library allocation
page read and write
110800044000
trusted library allocation
page read and write
72980165A000
trusted library allocation
page read and write
42C40020C000
trusted library allocation
page read and write
173C01170000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
79E4002D0000
trusted library allocation
page read and write
42C400138000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
7298018E4000
trusted library allocation
page read and write
147935C0000
heap
page read and write
7298018CA000
trusted library allocation
page read and write
729800F3C000
trusted library allocation
page read and write
442000280000
trusted library allocation
page read and write
42C400144000
trusted library allocation
page read and write
16C0002DC000
trusted library allocation
page read and write
1A1DD1C0000
trusted library allocation
page read and write
3C9C00094000
trusted library allocation
page read and write
140E3D000
unkown
page write copy
729801F74000
trusted library allocation
page read and write
729801574000
trusted library allocation
page read and write
6438002E8000
trusted library allocation
page read and write
AD800288000
direct allocation
page read and write
528F7FC000
stack
page read and write
1108006B9000
trusted library allocation
page read and write
1108005A6000
trusted library allocation
page read and write
738000324000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
11080046F000
trusted library allocation
page read and write
110800680000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
3C9C00428000
trusted library allocation
page read and write
3FCF000
heap
page read and write
2A6DE824000
heap
page read and write
3C9C014A4000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
74D800318000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
7298017D4000
trusted library allocation
page read and write
729801EC8000
trusted library allocation
page read and write
154DEC00000
heap
page read and write
7430002A0000
direct allocation
page read and write
AD800264000
direct allocation
page read and write
DB01FFE000
stack
page read and write
1FDC00270000
direct allocation
page read and write
37E000354000
trusted library allocation
page read and write
16C000250000
trusted library allocation
page read and write
7298017EC000
trusted library allocation
page read and write
52FBFFE000
unkown
page readonly
7298006AC000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
7298019D0000
trusted library allocation
page read and write
729801923000
trusted library allocation
page read and write
154D84BC000
heap
page read and write
72980190D000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
110800294000
trusted library allocation
page read and write
3C9C00D30000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
729801968000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
3C9C00024000
trusted library allocation
page read and write
74D800260000
trusted library allocation
page read and write
110800288000
trusted library allocation
page read and write
110800597000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
16C0002F0000
trusted library allocation
page read and write
3C9C004A8000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
7298019A1000
trusted library allocation
page read and write
729801AB4000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
729801A24000
trusted library allocation
page read and write
3C9C00297000
trusted library allocation
page read and write
1108004AC000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
729800EB0000
trusted library allocation
page read and write
3C9C00B80000
trusted library allocation
page read and write
729801970000
trusted library allocation
page read and write
251000054000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
729801F30000
trusted library allocation
page read and write
52927FD000
stack
page read and write
154D8529000
heap
page read and write
296BA634000
heap
page read and write
79E4002CC000
trusted library allocation
page read and write
50A400212000
direct allocation
page read and write
3C9C01438000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
3C9C01418000
trusted library allocation
page read and write
643800220000
trusted library allocation
page read and write
3C9C000AF000
trusted library allocation
page read and write
1F702DC7000
unclassified section
page read and write
74D800324000
trusted library allocation
page read and write
5296FFE000
unkown
page readonly
7298019A6000
trusted library allocation
page read and write
173C00F7C000
trusted library allocation
page read and write
3C9C002FC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800541000
trusted library allocation
page read and write
296BA8D0000
heap
page read and write
3C9C00468000
trusted library allocation
page read and write
729801414000
trusted library allocation
page read and write
37E000244000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
729801814000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801834000
trusted library allocation
page read and write
16C0002C0000
trusted library allocation
page read and write
729802094000
trusted library allocation
page read and write
147935F9000
unclassified section
page read and write
528E7FE000
stack
page read and write
154D84F5000
heap
page read and write
729800EDC000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
729801923000
trusted library allocation
page read and write
16C0002C0000
trusted library allocation
page read and write
9BC71FE000
unkown
page readonly
11080071D000
trusted library allocation
page read and write
3F71000
heap
page read and write
3C9C00E6C000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
9700028C000
trusted library allocation
page read and write
3C9C005D0000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
590C0026C000
trusted library allocation
page read and write
110800495000
trusted library allocation
page read and write
3C9C0063C000
trusted library allocation
page read and write
3C9C00D88000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
72980177C000
trusted library allocation
page read and write
3C9C0059C000
trusted library allocation
page read and write
4420002CC000
trusted library allocation
page read and write
1108005C8000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
2A6DE3A0000
heap
page read and write
154DA323000
heap
page read and write
6438002C0000
trusted library allocation
page read and write
11080000C000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
173C007CC000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
72980176C000
trusted library allocation
page read and write
729801EF8000
trusted library allocation
page read and write
7298018E9000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
3C9C013D4000
trusted library allocation
page read and write
3C9C00B98000
trusted library allocation
page read and write
72980179E000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
72980156C000
trusted library allocation
page read and write
74D8002A0000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C014B4000
trusted library allocation
page read and write
643800278000
trusted library allocation
page read and write
2AF00040000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
729801925000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
3C9C0081C000
trusted library allocation
page read and write
72980169D000
trusted library allocation
page read and write
72980183C000
trusted library allocation
page read and write
7298019F0000
trusted library allocation
page read and write
528A7FE000
stack
page read and write
2AF00142000
trusted library allocation
page read and write
52917FC000
stack
page read and write
154DEC2F000
heap
page read and write
2A6DE824000
heap
page read and write
7298015AC000
trusted library allocation
page read and write
72980180C000
trusted library allocation
page read and write
590C00258000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
11080044D000
trusted library allocation
page read and write
729801920000
trusted library allocation
page read and write
2AA1DF9000
stack
page read and write
9BCE1FE000
unkown
page readonly
AD8002C0000
direct allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C00855000
trusted library allocation
page read and write
4420002D0000
trusted library allocation
page read and write
729801908000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
2AF01800000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
2A6DE602000
heap
page read and write
2A6DE82B000
heap
page read and write
1108005C5000
trusted library allocation
page read and write
154D845C000
heap
page read and write
7298016E8000
trusted library allocation
page read and write
9BCD9FE000
stack
page read and write
2A6DE5ED000
unclassified section
page read and write
1406C5000
unkown
page read and write
729801D84000
trusted library allocation
page read and write
154D8528000
heap
page read and write
110800220000
trusted library allocation
page read and write
729800418000
trusted library allocation
page read and write
173C0104C000
trusted library allocation
page read and write
7298019D4000
trusted library allocation
page read and write
5285FFE000
unkown
page readonly
5282FFE000
unkown
page readonly
1108001E9000
trusted library allocation
page read and write
738000408000
trusted library allocation
page read and write
3C9C013E8000
trusted library allocation
page read and write
1108006B2000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
590C00230000
trusted library allocation
page read and write
3C9C00BF0000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
154D82A0000
heap
page read and write
72980168C000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
72980186C000
trusted library allocation
page read and write
7298018FC000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
3C9C00240000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
50A4002C8000
direct allocation
page read and write
729800EC8000
trusted library allocation
page read and write
7298018CA000
trusted library allocation
page read and write
3C9C007B4000
trusted library allocation
page read and write
729801745000
trusted library allocation
page read and write
50A4002EC000
direct allocation
page read and write
2AF01080000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
110800263000
trusted library allocation
page read and write
729801998000
trusted library allocation
page read and write
110800218000
trusted library allocation
page read and write
1108006BE000
trusted library allocation
page read and write
729802078000
trusted library allocation
page read and write
3C9C00A9C000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
173C0031C000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
110800686000
trusted library allocation
page read and write
729801E54000
trusted library allocation
page read and write
729800638000
trusted library allocation
page read and write
42C40010C000
trusted library allocation
page read and write
729801A34000
trusted library allocation
page read and write
4E1000
heap
page read and write
7298018FF000
trusted library allocation
page read and write
590C00238000
trusted library allocation
page read and write
154DA36A000
heap
page read and write
16C0002AC000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
3FCF000
heap
page read and write
1108005B1000
trusted library allocation
page read and write
79E400270000
trusted library allocation
page read and write
3C9C00E70000
trusted library allocation
page read and write
729801864000
trusted library allocation
page read and write
2A6E1C12000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
79E4002B4000
trusted library allocation
page read and write
1108006BE000
trusted library allocation
page read and write
7298017A3000
trusted library allocation
page read and write
3C9C00237000
trusted library allocation
page read and write
9BCC1FE000
unkown
page readonly
110800775000
trusted library allocation
page read and write
4B11000
heap
page read and write
11080012E000
trusted library allocation
page read and write
2AF011C0000
trusted library allocation
page read and write
46A000
heap
page read and write
110800444000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
154D852F000
heap
page read and write
729800718000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
110800144000
trusted library allocation
page read and write
11080079A000
trusted library allocation
page read and write
7298017AC000
trusted library allocation
page read and write
2CBB000
stack
page read and write
50A400354000
direct allocation
page read and write
72980208C000
trusted library allocation
page read and write
729801EEC000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
42C40026C000
trusted library allocation
page read and write
147964AB000
heap
page read and write
110800475000
trusted library allocation
page read and write
3C9C00624000
trusted library allocation
page read and write
154DD2A2000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
173C0108C000
trusted library allocation
page read and write
2AF00542000
trusted library allocation
page read and write
173C00274000
trusted library allocation
page read and write
11080044D000
trusted library allocation
page read and write
7298015E4000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
3C9C001AC000
trusted library allocation
page read and write
1108006B2000
trusted library allocation
page read and write
729800F08000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
729801464000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
729801D78000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980159C000
trusted library allocation
page read and write
1FDC002C0000
direct allocation
page read and write
7298015C4000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980179D000
trusted library allocation
page read and write
1108005C5000
trusted library allocation
page read and write
2A9EDFE000
stack
page read and write
7298016B4000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
729800F0C000
trusted library allocation
page read and write
2A6DE86E000
heap
page read and write
72980181C000
trusted library allocation
page read and write
729801644000
trusted library allocation
page read and write
2AF003C2000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
3C9C00C01000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
72980194F000
trusted library allocation
page read and write
50A40032F000
direct allocation
page read and write
110800254000
trusted library allocation
page read and write
DB7EBFE000
stack
page read and write
42C400038000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
72980166C000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
14796484000
heap
page read and write
729801664000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
729801D4C000
trusted library allocation
page read and write
7298017F2000
trusted library allocation
page read and write
6BBDBFC000
stack
page read and write
72980156C000
trusted library allocation
page read and write
154DD6B3000
unkown
page readonly
72980159C000
trusted library allocation
page read and write
16C000201000
trusted library allocation
page read and write
729801D4C000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3F56000
heap
page read and write
72980194C000
trusted library allocation
page read and write
533400250000
direct allocation
page read and write
110800412000
trusted library allocation
page read and write
3C9C00B74000
trusted library allocation
page read and write
7430002C4000
direct allocation
page read and write
1108007A6000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
7298017E4000
trusted library allocation
page read and write
42C400130000
trusted library allocation
page read and write
173C00320000
trusted library allocation
page read and write
11080060F000
trusted library allocation
page read and write
89E7DFE000
unkown
page readonly
729801F3C000
trusted library allocation
page read and write
573400220000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
2A6E19F0000
unclassified section
page read and write
72980151C000
trusted library allocation
page read and write
1108001DC000
trusted library allocation
page read and write
50A4002A4000
direct allocation
page read and write
729801920000
trusted library allocation
page read and write
1108004F8000
trusted library allocation
page read and write
729802018000
trusted library allocation
page read and write
729801AAB000
trusted library allocation
page read and write
4420002CC000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
296BA600000
heap
page read and write
729801564000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
729801718000
trusted library allocation
page read and write
7298017F4000
trusted library allocation
page read and write
6438002BC000
trusted library allocation
page read and write
2AA0DFE000
stack
page read and write
729800A78000
trusted library allocation
page read and write
530000
heap
page read and write
4BD0002A4000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
729801FF2000
trusted library allocation
page read and write
3C9C0130C000
trusted library allocation
page read and write
110800468000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
37E0002AC000
trusted library allocation
page read and write
2AA05FE000
unkown
page readonly
2A6DE5E7000
unclassified section
page read and write
729801F94000
trusted library allocation
page read and write
110800443000
trusted library allocation
page read and write
729801670000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
72980165C000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
7298016C4000
trusted library allocation
page read and write
7298018F0000
trusted library allocation
page read and write
729801D34000
trusted library allocation
page read and write
14796500000
heap
page read and write
110800840000
trusted library allocation
page read and write
4600000
stack
page read and write
2A6DE82B000
heap
page read and write
729801414000
trusted library allocation
page read and write
72980077C000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
1A1DD21C000
heap
page read and write
2A6E1BF4000
trusted library allocation
page read and write
72980077C000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
110800444000
trusted library allocation
page read and write
6BBD3FE000
unkown
page readonly
729801654000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
729801AB5000
trusted library allocation
page read and write
42C4000FD000
trusted library allocation
page read and write
3C9C00294000
trusted library allocation
page read and write
154DED02000
heap
page read and write
2A6DE82B000
heap
page read and write
7298016BC000
trusted library allocation
page read and write
729800DC8000
trusted library allocation
page read and write
7298018F8000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
2A6DE82B000
heap
page read and write
251000044000
trusted library allocation
page read and write
7298018F0000
trusted library allocation
page read and write
729801834000
trusted library allocation
page read and write
14793510000
heap
page read and write
42C400054000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
110800299000
trusted library allocation
page read and write
110800260000
trusted library allocation
page read and write
729801534000
trusted library allocation
page read and write
3C9C014D0000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
173C00F4F000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
173C00404000
trusted library allocation
page read and write
7298017D4000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
9BCB9FE000
stack
page read and write
140E3F000
unkown
page execute read
7298016BC000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
643800274000
trusted library allocation
page read and write
50A4002BC000
direct allocation
page read and write
729801734000
trusted library allocation
page read and write
3DF6000
stack
page read and write
251000080000
trusted library allocation
page read and write
296BA634000
heap
page read and write
74D80030C000
trusted library allocation
page read and write
173C0100C000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
2AA65FE000
unkown
page readonly
3C9C000E8000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
72980191A000
trusted library allocation
page read and write
3C9C007EC000
trusted library allocation
page read and write
729801729000
trusted library allocation
page read and write
11080044A000
trusted library allocation
page read and write
AD8002D4000
direct allocation
page read and write
296BA5D0000
heap
page read and write
2A6DE824000
heap
page read and write
2A6DE857000
heap
page read and write
72980203C000
trusted library allocation
page read and write
72980199F000
trusted library allocation
page read and write
7298016DC000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
3C9C014B0000
trusted library allocation
page read and write
1108005A9000
trusted library allocation
page read and write
1479642F000
heap
page read and write
738000354000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
42C400134000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801D18000
trusted library allocation
page read and write
729800F6C000
trusted library allocation
page read and write
3C9C00AC0000
trusted library allocation
page read and write
173C00308000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
50A40024C000
direct allocation
page read and write
16C000238000
trusted library allocation
page read and write
72980164C000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
296BA634000
heap
page read and write
2AF01580000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801664000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
50A400326000
direct allocation
page read and write
110800464000
trusted library allocation
page read and write
738000280000
trusted library allocation
page read and write
573400278000
trusted library allocation
page read and write
3C9C0045E000
trusted library allocation
page read and write
9BC79FD000
stack
page read and write
110800775000
trusted library allocation
page read and write
74300024C000
direct allocation
page read and write
529C7FE000
stack
page read and write
4BD000294000
trusted library allocation
page read and write
3C9C0114C000
trusted library allocation
page read and write
729800684000
trusted library allocation
page read and write
2A9DDFD000
stack
page read and write
14793613000
heap
page read and write
110800288000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
5289FFE000
unkown
page readonly
72980176A000
trusted library allocation
page read and write
37E000238000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
729800F10000
trusted library allocation
page read and write
7298015EC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3C9C01354000
trusted library allocation
page read and write
57340027C000
trusted library allocation
page read and write
729800F5C000
trusted library allocation
page read and write
173C01198000
trusted library allocation
page read and write
251000104000
trusted library allocation
page read and write
729800FB0000
trusted library allocation
page read and write
7298017A3000
trusted library allocation
page read and write
1108006B3000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
7298019A1000
trusted library allocation
page read and write
729800F08000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800284000
trusted library allocation
page read and write
5334002B0000
direct allocation
page read and write
110800592000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
4BD0002C8000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
3C9C01364000
trusted library allocation
page read and write
DB7FBF5000
stack
page read and write
110800738000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
4B11000
heap
page read and write
3C9C00A01000
trusted library allocation
page read and write
52A17FD000
stack
page read and write
79E400238000
trusted library allocation
page read and write
154DA367000
heap
page read and write
23BE000
stack
page read and write
1108005EC000
trusted library allocation
page read and write
729801CCB000
trusted library allocation
page read and write
154D8551000
heap
page read and write
729800F3C000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
7380002A8000
trusted library allocation
page read and write
74D800300000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
296BA66E000
heap
page read and write
738000270000
trusted library allocation
page read and write
1108007BD000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
3C9C0024A000
trusted library allocation
page read and write
7298002A0000
trusted library allocation
page read and write
590C0023C000
trusted library allocation
page read and write
5334002A0000
direct allocation
page read and write
72980178C000
trusted library allocation
page read and write
79E400260000
trusted library allocation
page read and write
110800228000
trusted library allocation
page read and write
52837FB000
stack
page read and write
37E00034C000
trusted library allocation
page read and write
173C00FB0000
trusted library allocation
page read and write
1A1DD180000
heap
page readonly
3C9C00D98000
trusted library allocation
page read and write
2AF00040000
trusted library allocation
page readonly
72980164C000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C0086C000
trusted library allocation
page read and write
147935B0000
unclassified section
page readonly
738000284000
trusted library allocation
page read and write
590C002B8000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
3C9C00A6C000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
7298017AC000
trusted library allocation
page read and write
154D8533000
heap
page read and write
7298017B8000
trusted library allocation
page read and write
173C0080C000
trusted library allocation
page read and write
42C4001F4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801844000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980156C000
trusted library allocation
page read and write
729800F10000
trusted library allocation
page read and write
643800288000
trusted library allocation
page read and write
11080079A000
trusted library allocation
page read and write
110800636000
trusted library allocation
page read and write
729801814000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
42C40029C000
trusted library allocation
page read and write
173C0025C000
trusted library allocation
page read and write
173C010CC000
trusted library allocation
page read and write
72980157C000
trusted library allocation
page read and write
1108000C4000
trusted library allocation
page read and write
72980199F000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3C9C007CC000
trusted library allocation
page read and write
738000334000
trusted library allocation
page read and write
1108006BE000
trusted library allocation
page read and write
6BB9BFE000
stack
page read and write
1FDC002D4000
direct allocation
page read and write
729801734000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
3C9C0001C000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298016E8000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
3FCF000
heap
page read and write
729801524000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
2AF01900000
trusted library allocation
page read and write
1F772803000
remote allocation
page execute read
729800F14000
trusted library allocation
page read and write
21A0000
remote allocation
page read and write
729801794000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
7298015E4000
trusted library allocation
page read and write
729801614000
trusted library allocation
page read and write
3C9C00758000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
7298018FA000
trusted library allocation
page read and write
72980176A000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
2AF01280000
trusted library allocation
page read and write
3C9C000AA000
trusted library allocation
page read and write
729801DA0000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
729800AF0000
trusted library allocation
page read and write
7298009DC000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
154D8528000
heap
page read and write
110800699000
trusted library allocation
page read and write
3E03000
heap
page read and write
729801644000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
42C4000D8000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
3C9C00B68000
trusted library allocation
page read and write
154DEC37000
heap
page read and write
11080027B000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
729801C90000
trusted library allocation
page read and write
729801822000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
5291FFE000
unkown
page readonly
3C9C012D0000
trusted library allocation
page read and write
296BEF50000
trusted library section
page readonly
3FD0000
heap
page read and write
154DEC02000
heap
page read and write
7298016B1000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
743000290000
direct allocation
page read and write
590C00268000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
7298018F6000
trusted library allocation
page read and write
7298017D4000
trusted library allocation
page read and write
729801ACC000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
173C00C04000
trusted library allocation
page read and write
1C0000
heap
page read and write
110800618000
trusted library allocation
page read and write
147964AE000
heap
page read and write
1108007D6000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
110800668000
trusted library allocation
page read and write
3C9C00B38000
trusted library allocation
page read and write
173C010EC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
173C010EC000
trusted library allocation
page read and write
14798EFD000
unclassified section
page read and write
11080048A000
trusted library allocation
page read and write
3C9C00D94000
trusted library allocation
page read and write
72980166D000
trusted library allocation
page read and write
442000260000
trusted library allocation
page read and write
DB7DBFD000
stack
page read and write
7298018F8000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
1108004F8000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
72980144C000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
729801414000
trusted library allocation
page read and write
110800244000
trusted library allocation
page read and write
7298019E4000
trusted library allocation
page read and write
42C400374000
trusted library allocation
page read and write
1A1DD080000
heap
page read and write
7298016EC000
trusted library allocation
page read and write
729800A40000
trusted library allocation
page read and write
3C9C00DEC000
trusted library allocation
page read and write
4609000
stack
page read and write
729801824000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
72980161E000
trusted library allocation
page read and write
110800280000
trusted library allocation
page read and write
729801C4C000
trusted library allocation
page read and write
729800EB8000
trusted library allocation
page read and write
DB02FFC000
stack
page read and write
251000108000
trusted library allocation
page read and write
1108001B8000
trusted library allocation
page read and write
154DF660000
trusted library section
page read and write
7298015EC000
trusted library allocation
page read and write
3C9C00DE4000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
729801E7C000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
110800038000
trusted library allocation
page read and write
14796480000
heap
page read and write
729801534000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
7298018AC000
trusted library allocation
page read and write
729801E94000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
3C9C00E0C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE824000
heap
page read and write
89E6DFE000
unkown
page readonly
110800722000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
154DA36A000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
3C9C0072C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
110800A42000
trusted library allocation
page read and write
729801988000
trusted library allocation
page read and write
3C9C012F8000
trusted library allocation
page read and write
42C400190000
trusted library allocation
page read and write
7298019CC000
trusted library allocation
page read and write
2A96DFE000
stack
page read and write
442000270000
trusted library allocation
page read and write
573400248000
trusted library allocation
page read and write
110800739000
trusted library allocation
page read and write
729801964000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
296BA658000
heap
page read and write
74D800358000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
2A6DE824000
heap
page read and write
16C000308000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
2A6DE82A000
heap
page read and write
3C9C002CC000
trusted library allocation
page read and write
3C9C0034F000
trusted library allocation
page read and write
3C9C001D0000
trusted library allocation
page read and write
1A1DD302000
heap
page read and write
72980170C000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
2AF01380000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
729801AC0000
trusted library allocation
page read and write
110800254000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
3C9C00E0C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
1108005C1000
trusted library allocation
page read and write
72980166A000
trusted library allocation
page read and write
74D800324000
trusted library allocation
page read and write
729801990000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
1479644B000
heap
page read and write
3C9C0077C000
trusted library allocation
page read and write
729801994000
trusted library allocation
page read and write
1A1DD0A0000
heap
page read and write
729801664000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
970002A0000
trusted library allocation
page read and write
79E4002C0000
trusted library allocation
page read and write
79E4002B4000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801F74000
trusted library allocation
page read and write
42C4001A4000
trusted library allocation
page read and write
3C9C01313000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
2A6E2050000
unclassified section
page read and write
4420002D0000
trusted library allocation
page read and write
154D854E000
heap
page read and write
729801414000
trusted library allocation
page read and write
3F32000
heap
page read and write
AD8002A4000
direct allocation
page read and write
3C9C00124000
trusted library allocation
page read and write
1FDC00234000
direct allocation
page read and write
110800254000
trusted library allocation
page read and write
3C9C01478000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
1108006C3000
trusted library allocation
page read and write
729801930000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
110800688000
trusted library allocation
page read and write
14798930000
unclassified section
page readonly
173C00408000
trusted library allocation
page read and write
42C4001AC000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
42C40010C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
154DA376000
heap
page read and write
533400240000
direct allocation
page read and write
11080066E000
trusted library allocation
page read and write
643800248000
trusted library allocation
page read and write
50A400318000
direct allocation
page read and write
97000248000
trusted library allocation
page read and write
110800661000
trusted library allocation
page read and write
14798951000
unclassified section
page readonly
11080071D000
trusted library allocation
page read and write
3F63000
heap
page read and write
72980032C000
trusted library allocation
page read and write
7298019A1000
trusted library allocation
page read and write
110800223000
trusted library allocation
page read and write
173C010AC000
trusted library allocation
page read and write
173C002EC000
trusted library allocation
page read and write
3C9C003A0000
trusted library allocation
page read and write
3C9C0018C000
trusted library allocation
page read and write
AD800234000
direct allocation
page read and write
7298017B4000
trusted library allocation
page read and write
296BF030000
heap
page read and write
21A0000
remote allocation
page read and write
2A6DE825000
heap
page read and write
2A6DE825000
heap
page read and write
2A6DE824000
heap
page read and write
251000070000
trusted library allocation
page read and write
154D8569000
heap
page read and write
42C400388000
trusted library allocation
page read and write
729800EE8000
trusted library allocation
page read and write
743000240000
direct allocation
page read and write
4420002B4000
trusted library allocation
page read and write
7298015B4000
trusted library allocation
page read and write
467000
heap
page read and write
7298016B4000
trusted library allocation
page read and write
729801860000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
1F772830000
unclassified section
page readonly
72980158C000
trusted library allocation
page read and write
16C000288000
trusted library allocation
page read and write
147963F7000
unclassified section
page read and write
11080006C000
trusted library allocation
page read and write
110800545000
trusted library allocation
page read and write
3C9C0083C000
trusted library allocation
page read and write
42C4000F0000
trusted library allocation
page read and write
729801930000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801764000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
37E000210000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
110800444000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
528AFFE000
unkown
page readonly
3C9C010AC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C00684000
trusted library allocation
page read and write
50A400320000
direct allocation
page read and write
729801960000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800680000
trusted library allocation
page read and write
3C9C00B5C000
trusted library allocation
page read and write
729802025000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
173C00294000
trusted library allocation
page read and write
154DD6D5000
unkown
page readonly
3FAA000
heap
page read and write
110800412000
trusted library allocation
page read and write
110800263000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729800F14000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
72980183A000
trusted library allocation
page read and write
7298002D4000
trusted library allocation
page read and write
4BD000294000
trusted library allocation
page read and write
1F7727F0000
remote allocation
page read and write
154D852F000
heap
page read and write
3C9C009CC000
trusted library allocation
page read and write
7380002E8000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
729800EC8000
trusted library allocation
page read and write
7298018E9000
trusted library allocation
page read and write
74D800210000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
72980180C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298016BC000
trusted library allocation
page read and write
2AF01100000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
3C9C0100C000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
729801F3C000
trusted library allocation
page read and write
729800634000
trusted library allocation
page read and write
3F71000
heap
page read and write
729800848000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
6BBE3FE000
unkown
page readonly
52987FC000
stack
page read and write
729801F3C000
trusted library allocation
page read and write
21B0000
heap
page read and write
89E65FE000
stack
page read and write
7380002A0000
trusted library allocation
page read and write
154D8480000
heap
page read and write
1108004C6000
trusted library allocation
page read and write
729801968000
trusted library allocation
page read and write
72980174A000
trusted library allocation
page read and write
37E000418000
trusted library allocation
page read and write
7298018F0000
trusted library allocation
page read and write
729801824000
trusted library allocation
page read and write
37E000290000
trusted library allocation
page read and write
16C000298000
trusted library allocation
page read and write
3C9C00246000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
729801E4C000
trusted library allocation
page read and write
4FD000
heap
page read and write
42C400198000
trusted library allocation
page read and write
3C9C00F48000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
3C9C0019C000
trusted library allocation
page read and write
110800462000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
729801534000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729800A80000
trusted library allocation
page read and write
37E000308000
trusted library allocation
page read and write
729801FE4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980199C000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
42C4001D8000
trusted library allocation
page read and write
2AF00502000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801ED1000
trusted library allocation
page read and write
16C0002DC000
trusted library allocation
page read and write
14183F000
unkown
page execute read
729800A44000
trusted library allocation
page read and write
72980199C000
trusted library allocation
page read and write
729801AA4000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
729801908000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
72980164C000
trusted library allocation
page read and write
154D853D000
heap
page read and write
1108001F0000
trusted library allocation
page read and write
251000058000
trusted library allocation
page read and write
50A40036C000
direct allocation
page read and write
729801930000
trusted library allocation
page read and write
729800EB4000
trusted library allocation
page read and write
729800770000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
173C00220000
trusted library allocation
page read and write
2A6DE866000
heap
page read and write
89E2DFE000
unkown
page readonly
590C0020C000
trusted library allocation
page read and write
110800500000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298015EC000
trusted library allocation
page read and write
14793A02000
heap
page read and write
110800592000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801724000
trusted library allocation
page read and write
79E40029C000
trusted library allocation
page read and write
154DFE02000
heap
page read and write
4EC000
heap
page read and write
1FDC00280000
direct allocation
page read and write
7298017DC000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
73800032C000
trusted library allocation
page read and write
729800D7C000
trusted library allocation
page read and write
729800788000
trusted library allocation
page read and write
1F772942000
unclassified section
page read and write
1FDC0024C000
direct allocation
page read and write
729801CB8000
trusted library allocation
page read and write
7430002C0000
direct allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C00278000
trusted library allocation
page read and write
573400304000
trusted library allocation
page read and write
173C00378000
trusted library allocation
page read and write
1108005B1000
trusted library allocation
page read and write
110800429000
trusted library allocation
page read and write
173C00A04000
trusted library allocation
page read and write
529B7FE000
stack
page read and write
72980172C000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
729801E4C000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
442000244000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
296BA702000
heap
page read and write
9BCE9FE000
stack
page read and write
729800EF8000
trusted library allocation
page read and write
9BC49F5000
stack
page read and write
729801504000
trusted library allocation
page read and write
3C9C00BD0000
trusted library allocation
page read and write
110800522000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
173C00244000
trusted library allocation
page read and write
296BAC30000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
72980156C000
trusted library allocation
page read and write
729800F3C000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
11080066E000
trusted library allocation
page read and write
1F772C05000
heap
page read and write
1108006B3000
trusted library allocation
page read and write
729801704000
trusted library allocation
page read and write
3C9C00024000
trusted library allocation
page read and write
72980074C000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
467000
heap
page read and write
729801674000
trusted library allocation
page read and write
743000260000
direct allocation
page read and write
9BC91FE000
unkown
page readonly
729801584000
trusted library allocation
page read and write
533400234000
direct allocation
page read and write
729801934000
trusted library allocation
page read and write
729801D36000
trusted library allocation
page read and write
7298018BA000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
154D84C9000
heap
page read and write
16C0002DC000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
7298016E2000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
4BD000294000
trusted library allocation
page read and write
173C007CC000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
5734002AC000
trusted library allocation
page read and write
729800FEC000
trusted library allocation
page read and write
729801819000
trusted library allocation
page read and write
3C9C002AC000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
738000338000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
173C0094C000
trusted library allocation
page read and write
7298017F2000
trusted library allocation
page read and write
7298009D4000
trusted library allocation
page read and write
2A6DE86E000
heap
page read and write
2AF000C2000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
7298014B4000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
4420002CC000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
154D854E000
heap
page read and write
1108004EC000
trusted library allocation
page read and write
154DD700000
unkown
page readonly
7298016EC000
trusted library allocation
page read and write
7298017EC000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
154DA213000
heap
page read and write
743000250000
direct allocation
page read and write
79E40020C000
trusted library allocation
page read and write
173C00201000
trusted library allocation
page read and write
72980167D000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
110800170000
trusted library allocation
page read and write
3C9C00970000
trusted library allocation
page read and write
173C00348000
trusted library allocation
page read and write
173C00360000
trusted library allocation
page read and write
154DED02000
heap
page read and write
729801822000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
729801574000
trusted library allocation
page read and write
154D84ED000
heap
page read and write
7298017B4000
trusted library allocation
page read and write
173C00354000
trusted library allocation
page read and write
7298008B4000
trusted library allocation
page read and write
74D8002E0000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
154D8471000
heap
page read and write
4420002B4000
trusted library allocation
page read and write
738000238000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
3C9C00624000
trusted library allocation
page read and write
7430002D8000
direct allocation
page read and write
2AF014C0000
trusted library allocation
page read and write
3C9C005C4000
trusted library allocation
page read and write
3C9C0121C000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
42C40029C000
trusted library allocation
page read and write
442000284000
trusted library allocation
page read and write
42C400281000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
569400244000
direct allocation
page read and write
79E4002CC000
trusted library allocation
page read and write
72980162C000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
11080066D000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
110800592000
trusted library allocation
page read and write
3C9C00401000
trusted library allocation
page read and write
2A6DE5F0000
unclassified section
page read and write
72980166C000
trusted library allocation
page read and write
74300029C000
direct allocation
page read and write
7298015CC000
trusted library allocation
page read and write
3C9C00EA8000
trusted library allocation
page read and write
147964F2000
heap
page read and write
1108000AC000
trusted library allocation
page read and write
9BCF1FE000
unkown
page readonly
2AF01300000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
74D80029C000
trusted library allocation
page read and write
3C9C0083C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3C9C01376000
trusted library allocation
page read and write
970002C8000
trusted library allocation
page read and write
251000114000
trusted library allocation
page read and write
3C9C009BC000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
72980177B000
trusted library allocation
page read and write
147964D1000
heap
page read and write
2A6DE824000
heap
page read and write
110800500000
trusted library allocation
page read and write
154D8526000
heap
page read and write
573400408000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
DB7E3FB000
stack
page read and write
154D8557000
heap
page read and write
3C9C003A0000
trusted library allocation
page read and write
729800E0C000
trusted library allocation
page read and write
9BC39FC000
stack
page read and write
72980185C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298017CC000
trusted library allocation
page read and write
3C9C00B8C000
trusted library allocation
page read and write
37E0002B8000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
3C9C00134000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
1108001CC000
trusted library allocation
page read and write
5334002CC000
direct allocation
page read and write
72980158C000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
154D841C000
heap
page read and write
2A6DE824000
heap
page read and write
729801E54000
trusted library allocation
page read and write
729801F30000
trusted library allocation
page read and write
3C9C00928000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
72980162C000
trusted library allocation
page read and write
173C00354000
trusted library allocation
page read and write
173C010EC000
trusted library allocation
page read and write
2A6DE809000
heap
page read and write
110800288000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
110800775000
trusted library allocation
page read and write
573400418000
trusted library allocation
page read and write
7298017AA000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
3C9C00E6C000
trusted library allocation
page read and write
42C400201000
trusted library allocation
page read and write
50E000
heap
page read and write
7298018F0000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
2A6DE809000
heap
page read and write
7298017BC000
trusted library allocation
page read and write
296BA652000
heap
page read and write
16C0002AC000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
529EFFE000
unkown
page readonly
72980080C000
trusted library allocation
page read and write
729800D6C000
trusted library allocation
page read and write
51B000
heap
page read and write
729800EAC000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
173C010AC000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
37E000320000
trusted library allocation
page read and write
3C9C00F48000
trusted library allocation
page read and write
729801CC8000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298015AC000
trusted library allocation
page read and write
3C9C00030000
trusted library allocation
page read and write
729801644000
trusted library allocation
page read and write
97000274000
trusted library allocation
page read and write
2A95DF6000
stack
page read and write
729801844000
trusted library allocation
page read and write
2A6E2027000
unclassified section
page read and write
154DA302000
heap
page read and write
729800DC8000
trusted library allocation
page read and write
7298016E2000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
251000028000
trusted library allocation
page read and write
3C9C00CF8000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
7298017C4000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
37E00032C000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
7298020F4000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
729801912000
trusted library allocation
page read and write
3C9C00A88000
trusted library allocation
page read and write
110800170000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
729801824000
trusted library allocation
page read and write
154DED02000
heap
page read and write
3C9C00B4C000
trusted library allocation
page read and write
729800624000
trusted library allocation
page read and write
173C010EC000
trusted library allocation
page read and write
3C9C0016C000
trusted library allocation
page read and write
729801615000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
110800636000
trusted library allocation
page read and write
729800DB4000
trusted library allocation
page read and write
1108004F8000
trusted library allocation
page read and write
2AF01480000
trusted library allocation
page read and write
154D8529000
heap
page read and write
16C0002AC000
trusted library allocation
page read and write
7298015A4000
trusted library allocation
page read and write
13D000
stack
page read and write
7298017A1000
trusted library allocation
page read and write
97000238000
trusted library allocation
page read and write
3C9C00B10000
trusted library allocation
page read and write
154DFA70000
unkown
page readonly
729801644000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
21B4000
heap
page read and write
2AA55FE000
unkown
page readonly
11080079B000
trusted library allocation
page read and write
729801F30000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
154DA371000
heap
page read and write
7298017E4000
trusted library allocation
page read and write
7298015A4000
trusted library allocation
page read and write
529BFFE000
unkown
page readonly
42C4000C4000
trusted library allocation
page read and write
1479363D000
heap
page read and write
72980192A000
trusted library allocation
page read and write
1108005C8000
trusted library allocation
page read and write
7298017DA000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
4A1C01034000
trusted library allocation
page read and write
110800774000
trusted library allocation
page read and write
110800170000
trusted library allocation
page read and write
72980208C000
trusted library allocation
page read and write
37E0002E8000
trusted library allocation
page read and write
729800770000
trusted library allocation
page read and write
16C0002AC000
trusted library allocation
page read and write
173C00348000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
729802026000
trusted library allocation
page read and write
50A400270000
direct allocation
page read and write
1108001A4000
trusted library allocation
page read and write
110800673000
trusted library allocation
page read and write
729800FA4000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
7298017DC000
trusted library allocation
page read and write
50A40021C000
direct allocation
page read and write
110800738000
trusted library allocation
page read and write
6BBEBFE000
stack
page read and write
11080048F000
trusted library allocation
page read and write
AD8002A8000
direct allocation
page read and write
72980208C000
trusted library allocation
page read and write
154DA302000
heap
page read and write
97000220000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
6BBA3FE000
unkown
page readonly
7298016DC000
trusted library allocation
page read and write
154D8531000
heap
page read and write
3C9C00E5C000
trusted library allocation
page read and write
110800254000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
533400260000
direct allocation
page read and write
6438002E4000
trusted library allocation
page read and write
50A400220000
direct allocation
page read and write
57340040C000
trusted library allocation
page read and write
1F772780000
unclassified section
page readonly
3C9C00234000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801704000
trusted library allocation
page read and write
110800299000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
11080048F000
trusted library allocation
page read and write
729801534000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
729801CC8000
trusted library allocation
page read and write
74D800334000
trusted library allocation
page read and write
52FE7FA000
stack
page read and write
7298017F2000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
7298014FC000
trusted library allocation
page read and write
50A400294000
direct allocation
page read and write
72980174C000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
729801624000
trusted library allocation
page read and write
3C9C004D4000
trusted library allocation
page read and write
528D7FE000
stack
page read and write
729800F08000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
3C9C00A58000
trusted library allocation
page read and write
72980185C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298016C4000
trusted library allocation
page read and write
729800D94000
trusted library allocation
page read and write
73800029C000
trusted library allocation
page read and write
72980207C000
trusted library allocation
page read and write
140000000
unkown
page readonly
7FFE21720000
direct allocation
page execute read
1108005B1000
trusted library allocation
page read and write
729800A44000
trusted library allocation
page read and write
7298017D4000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
72980203C000
trusted library allocation
page read and write
79E400254000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
3C9C01340000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
42C400168000
trusted library allocation
page read and write
7298017DC000
trusted library allocation
page read and write
2AF00282000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
110800250000
trusted library allocation
page read and write
110800495000
trusted library allocation
page read and write
3F72000
heap
page read and write
154DD710000
heap
page read and write
7298016DC000
trusted library allocation
page read and write
2AF012C0000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
7298006AC000
trusted library allocation
page read and write
79E4002B4000
trusted library allocation
page read and write
2AF01540000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C000BB000
trusted library allocation
page read and write
42C40022C000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
11080020C000
trusted library allocation
page read and write
729801FE4000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801794000
trusted library allocation
page read and write
50A400310000
direct allocation
page read and write
2AA7DFE000
stack
page read and write
7298015D4000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
1A1DD213000
heap
page read and write
2A6DE824000
heap
page read and write
72980163C000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
729801AA4000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
729801AD8000
trusted library allocation
page read and write
154DA376000
heap
page read and write
72980174C000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
147964C8000
heap
page read and write
3C9C01401000
trusted library allocation
page read and write
7298009E4000
trusted library allocation
page read and write
729801524000
trusted library allocation
page read and write
72980179C000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
3FA9000
heap
page read and write
42C400180000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
147935A0000
unclassified section
page readonly
DB7BBEC000
stack
page read and write
89E5DFE000
unkown
page readonly
7298017F2000
trusted library allocation
page read and write
729800A7E000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
573400258000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980032C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C00B20000
trusted library allocation
page read and write
37E000280000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801644000
trusted library allocation
page read and write
3C9C00861000
trusted library allocation
page read and write
173C011AC000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
410000
heap
page read and write
1108000D4000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
50A4002DC000
direct allocation
page read and write
154DA376000
heap
page read and write
50A400234000
direct allocation
page read and write
72980152C000
trusted library allocation
page read and write
42C40021C000
trusted library allocation
page read and write
11080060C000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
5292FFE000
unkown
page readonly
729800A20000
trusted library allocation
page read and write
3C9C00DA4000
trusted library allocation
page read and write
7298016A0000
trusted library allocation
page read and write
3C9C00550000
trusted library allocation
page read and write
3C9C00D98000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801824000
trusted library allocation
page read and write
154DD722000
unclassified section
page read and write
2A6DE82B000
heap
page read and write
2A6DE824000
heap
page read and write
7298017F2000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
3C9C00863000
trusted library allocation
page read and write
110800500000
trusted library allocation
page read and write
3FF0000
heap
page read and write
110800693000
trusted library allocation
page read and write
154D853D000
heap
page read and write
2510000AC000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
528DFFE000
unkown
page readonly
2AF010C2000
trusted library allocation
page read and write
37E000344000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729802088000
trusted library allocation
page read and write
110800680000
trusted library allocation
page read and write
57340023C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3C9C00450000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
729801614000
trusted library allocation
page read and write
52FDFFE000
unkown
page readonly
729800A2C000
trusted library allocation
page read and write
7298015F4000
trusted library allocation
page read and write
296BA61B000
heap
page read and write
1108005C1000
trusted library allocation
page read and write
7298015F4000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
1FDC00250000
direct allocation
page read and write
2A9CDFE000
stack
page read and write
729801954000
trusted library allocation
page read and write
7298016E2000
trusted library allocation
page read and write
173C010EC000
trusted library allocation
page read and write
729801964000
trusted library allocation
page read and write
7298008B4000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
729801966000
trusted library allocation
page read and write
AD800230000
direct allocation
page read and write
72980172C000
trusted library allocation
page read and write
37E00024C000
trusted library allocation
page read and write
2AF01180000
trusted library allocation
page read and write
72980177C000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
72980183A000
trusted library allocation
page read and write
729801C98000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
147964D4000
heap
page read and write
729800EF0000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
729801CF8000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980163C000
trusted library allocation
page read and write
173C002D0000
trusted library allocation
page read and write
528BFFE000
unkown
page readonly
72980181C000
trusted library allocation
page read and write
110800636000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
11080065F000
trusted library allocation
page read and write
7298018E7000
trusted library allocation
page read and write
1108005A9000
trusted library allocation
page read and write
729802090000
trusted library allocation
page read and write
42C40023C000
trusted library allocation
page read and write
1FDC00220000
direct allocation
page read and write
1108005C1000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
1108000E1000
trusted library allocation
page read and write
3C9C0017C000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
729800AC2000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
3C9C00624000
trusted library allocation
page read and write
1108006C3000
trusted library allocation
page read and write
2AF01400000
trusted library allocation
page read and write
141CDE000
unkown
page readonly
72980080C000
trusted library allocation
page read and write
533400230000
direct allocation
page read and write
4A1C0102A000
trusted library allocation
page read and write
729801F3C000
trusted library allocation
page read and write
2A6DE809000
heap
page read and write
729800724000
trusted library allocation
page read and write
2A6DE580000
heap
page read and write
1FDC002C4000
direct allocation
page read and write
3C9C014DC000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
154DA313000
heap
page read and write
729801AB4000
trusted library allocation
page read and write
529CFFE000
unkown
page readonly
729801764000
trusted library allocation
page read and write
7298018BD000
trusted library allocation
page read and write
743000284000
direct allocation
page read and write
3C9C01338000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
154DD284000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
79E400244000
trusted library allocation
page read and write
3C9C00DC4000
trusted library allocation
page read and write
729801524000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980184C000
trusted library allocation
page read and write
14796502000
heap
page read and write
729801F94000
trusted library allocation
page read and write
2A6DE809000
heap
page read and write
11080047C000
trusted library allocation
page read and write
25100001C000
trusted library allocation
page read and write
5294FFE000
unkown
page readonly
2A6E1890000
unclassified section
page readonly
9700028C000
trusted library allocation
page read and write
7298017EC000
trusted library allocation
page read and write
5297FFE000
unkown
page readonly
16C000264000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
11080044F000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729800F34000
trusted library allocation
page read and write
3C9C00294000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
52F6FFE000
unkown
page readonly
3C9C0145C000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
5287FFE000
unkown
page readonly
9BC59FB000
stack
page read and write
72980163C000
trusted library allocation
page read and write
1479649C000
heap
page read and write
7298015DC000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
1108006B9000
trusted library allocation
page read and write
743000220000
direct allocation
page read and write
729800F3C000
trusted library allocation
page read and write
2AA8DFE000
stack
page read and write
5284FFE000
unkown
page readonly
11080040D000
trusted library allocation
page read and write
4BD000294000
trusted library allocation
page read and write
7298009D4000
trusted library allocation
page read and write
154D8527000
heap
page read and write
AD800404000
direct allocation
page read and write
7298017EC000
trusted library allocation
page read and write
3C9C0120C000
trusted library allocation
page read and write
173C0033C000
trusted library allocation
page read and write
1108000FC000
trusted library allocation
page read and write
72980060C000
trusted library allocation
page read and write
7380002B8000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
7298014BC000
trusted library allocation
page read and write
110800661000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
509000
heap
page read and write
528C7FE000
stack
page read and write
729801E0C000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
72980155C000
trusted library allocation
page read and write
72980182A000
trusted library allocation
page read and write
154DD9C9000
unclassified section
page read and write
110800618000
trusted library allocation
page read and write
3C9C00DDC000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
970002B0000
trusted library allocation
page read and write
154D8527000
heap
page read and write
7298014D4000
trusted library allocation
page read and write
42C40017C000
trusted library allocation
page read and write
173C008AC000
trusted library allocation
page read and write
AD800274000
direct allocation
page read and write
3C9C00D58000
trusted library allocation
page read and write
110800240000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
533400290000
direct allocation
page read and write
7298016E4000
trusted library allocation
page read and write
2A9E5FE000
unkown
page readonly
2AF01680000
trusted library allocation
page read and write
729801824000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
154DD9B2000
unclassified section
page read and write
729801594000
trusted library allocation
page read and write
1108006AE000
trusted library allocation
page read and write
3C9C00E0C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
42C400380000
trusted library allocation
page read and write
3FEF000
heap
page read and write
3C9C006F8000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
72980208C000
trusted library allocation
page read and write
72980199C000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
729801962000
trusted library allocation
page read and write
2AF004C0000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
729801774000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
6438002A0000
trusted library allocation
page read and write
729802094000
trusted library allocation
page read and write
729800EF0000
trusted library allocation
page read and write
16C0002AC000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
79E4002B4000
trusted library allocation
page read and write
3C9C00248000
trusted library allocation
page read and write
3C9C00244000
trusted library allocation
page read and write
14796506000
heap
page read and write
2A6DE56A000
unclassified section
page read and write
729800AB5000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
72980165C000
trusted library allocation
page read and write
3C9C0015C000
trusted library allocation
page read and write
74D80032C000
trusted library allocation
page read and write
2AF01740000
trusted library allocation
page read and write
7298019D6000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
3C9C006A0000
trusted library allocation
page read and write
140E3D000
unkown
page read and write
729801624000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
729801644000
trusted library allocation
page read and write
74D800284000
trusted library allocation
page read and write
11080017C000
trusted library allocation
page read and write
42C4001C2000
trusted library allocation
page read and write
110800624000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
173C00390000
trusted library allocation
page read and write
72980077C000
trusted library allocation
page read and write
154DED02000
heap
page read and write
729800EB0000
trusted library allocation
page read and write
11080049A000
trusted library allocation
page read and write
DB7F3FE000
stack
page read and write
2A6DE825000
heap
page read and write
50A400230000
direct allocation
page read and write
154D852E000
heap
page read and write
573400230000
trusted library allocation
page read and write
11080066E000
trusted library allocation
page read and write
729801714000
trusted library allocation
page read and write
52857FB000
stack
page read and write
154D83A0000
heap
page read and write
729801744000
trusted library allocation
page read and write
3C9C000F8000
trusted library allocation
page read and write
89E35FC000
stack
page read and write
729800EF8000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
3C9C013C0000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
110800631000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
7298019AA000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
11080044C000
trusted library allocation
page read and write
3C9C00297000
trusted library allocation
page read and write
5283FFE000
unkown
page readonly
7298016FC000
trusted library allocation
page read and write
72980080F000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
7298015F4000
trusted library allocation
page read and write
1108006B3000
trusted library allocation
page read and write
1479647B000
heap
page read and write
9BBD9FB000
stack
page read and write
7298016F4000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801E7C000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
74D800408000
trusted library allocation
page read and write
729800EC1000
trusted library allocation
page read and write
16C000274000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
3C9C0129C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
42C400124000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
729801CE0000
trusted library allocation
page read and write
729801E7C000
trusted library allocation
page read and write
147939D0000
trusted library allocation
page read and write
79E400220000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
729801D4C000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
738000254000
trusted library allocation
page read and write
154DA306000
heap
page read and write
72980163C000
trusted library allocation
page read and write
1108001B8000
trusted library allocation
page read and write
729801A20000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
729801414000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
74D800280000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
529A7FD000
stack
page read and write
173C0108C000
trusted library allocation
page read and write
251000038000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
72980162C000
trusted library allocation
page read and write
729801F68000
trusted library allocation
page read and write
729800DB4000
trusted library allocation
page read and write
6BBC3FE000
unkown
page readonly
74D80029C000
trusted library allocation
page read and write
729801754000
trusted library allocation
page read and write
16C000260000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298017E2000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
97000264000
trusted library allocation
page read and write
110800223000
trusted library allocation
page read and write
72980160C000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
743000280000
direct allocation
page read and write
1F772840000
unclassified section
page readonly
573400404000
trusted library allocation
page read and write
3C9C00794000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
3C9C00248000
trusted library allocation
page read and write
110800596000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
4E7000
heap
page read and write
72980199F000
trusted library allocation
page read and write
499000
heap
page read and write
2A6DE41D000
remote allocation
page execute read
72980177C000
trusted library allocation
page read and write
9BC89FE000
stack
page read and write
6438002D4000
trusted library allocation
page read and write
1108005A2000
trusted library allocation
page read and write
7298015B4000
trusted library allocation
page read and write
74D8002A8000
trusted library allocation
page read and write
154DA302000
heap
page read and write
729801724000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
1F772A02000
heap
page read and write
729800A90000
trusted library allocation
page read and write
518000
heap
page read and write
AD8002EC000
direct allocation
page read and write
729801958000
trusted library allocation
page read and write
643800284000
trusted library allocation
page read and write
110800667000
trusted library allocation
page read and write
74D800230000
trusted library allocation
page read and write
AD800220000
direct allocation
page read and write
729801F65000
trusted library allocation
page read and write
7298015F1000
trusted library allocation
page read and write
7298014E4000
trusted library allocation
page read and write
2AF00182000
trusted library allocation
page read and write
AD8002DC000
direct allocation
page read and write
110800164000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
42C400088000
trusted library allocation
page read and write
729801AC0000
trusted library allocation
page read and write
7298016DC000
trusted library allocation
page read and write
2A6E25D1000
unclassified section
page read and write
1108004C6000
trusted library allocation
page read and write
3F10000
heap
page read and write
7298015C4000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
729801704000
trusted library allocation
page read and write
72980160C000
trusted library allocation
page read and write
2A6DE390000
unclassified section
page readonly
2A6DE824000
heap
page read and write
144000
stack
page read and write
4BD0002CC000
trusted library allocation
page read and write
14793584000
remote allocation
page execute read
2A6DE824000
heap
page read and write
11080071D000
trusted library allocation
page read and write
1108006B3000
trusted library allocation
page read and write
729801F30000
trusted library allocation
page read and write
110800190000
trusted library allocation
page read and write
42C400138000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729800F44000
trusted library allocation
page read and write
4BD0002B8000
trusted library allocation
page read and write
57340020C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
11080040D000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
1F702B60000
unclassified section
page readonly
72980168C000
trusted library allocation
page read and write
729801624000
trusted library allocation
page read and write
3C9C00D68000
trusted library allocation
page read and write
729800A7C000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
154DD980000
unkown
page readonly
89E45FE000
stack
page read and write
11080076E000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
2AF013C0000
trusted library allocation
page read and write
16C000230000
trusted library allocation
page read and write
4E1000
heap
page read and write
729800770000
trusted library allocation
page read and write
14793930000
unclassified section
page readonly
729801724000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
7298016E8000
trusted library allocation
page read and write
7298016DC000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801C7C000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
110800090000
trusted library allocation
page read and write
72980165C000
trusted library allocation
page read and write
4A1C0103C000
trusted library allocation
page read and write
1FDC00240000
direct allocation
page read and write
2A6DE82B000
heap
page read and write
4420002CC000
trusted library allocation
page read and write
590C0029C000
trusted library allocation
page read and write
11080009C000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
7298015C4000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298017E2000
trusted library allocation
page read and write
1108005C8000
trusted library allocation
page read and write
72980152C000
trusted library allocation
page read and write
3C9C0149C000
trusted library allocation
page read and write
729800AF0000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
154D8440000
heap
page read and write
173C0024C000
trusted library allocation
page read and write
72980074C000
trusted library allocation
page read and write
3C9C014C0000
trusted library allocation
page read and write
14793570000
remote allocation
page read and write
251000060000
trusted library allocation
page read and write
2AF01440000
trusted library allocation
page read and write
37E000320000
trusted library allocation
page read and write
3F56000
heap
page read and write
7298018C5000
trusted library allocation
page read and write
173C00360000
trusted library allocation
page read and write
442000220000
trusted library allocation
page read and write
2AF01902000
trusted library allocation
page read and write
3C9C00068000
trusted library allocation
page read and write
154DA313000
heap
page read and write
42C4000CC000
trusted library allocation
page read and write
729801574000
trusted library allocation
page read and write
3C9C008B0000
trusted library allocation
page read and write
7298019AA000
trusted library allocation
page read and write
1108005C5000
trusted library allocation
page read and write
729801F94000
trusted library allocation
page read and write
4A1C01040000
trusted library allocation
page read and write
1108005A6000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
2AF016C0000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
72980158C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
729800EE8000
trusted library allocation
page read and write
2AF00382000
trusted library allocation
page read and write
110800001000
trusted library allocation
page read and write
1108005B6000
trusted library allocation
page read and write
72980176C000
trusted library allocation
page read and write
2510000CC000
trusted library allocation
page read and write
7298017DA000
trusted library allocation
page read and write
590C002BC000
trusted library allocation
page read and write
4A1C01026000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
173C01184000
trusted library allocation
page read and write
3C9C00E3C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
173C01001000
trusted library allocation
page read and write
37E000278000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
47FF000
stack
page read and write
2AF01340000
trusted library allocation
page read and write
173C00378000
trusted library allocation
page read and write
3C9C00A30000
trusted library allocation
page read and write
729801734000
trusted library allocation
page read and write
7298015E4000
trusted library allocation
page read and write
729801814000
trusted library allocation
page read and write
2AF01240000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
140001000
unkown
page execute read
7298016A4000
trusted library allocation
page read and write
729801E0C000
trusted library allocation
page read and write
25100008C000
trusted library allocation
page read and write
154DD6CD000
unkown
page readonly
729801754000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
3C9C00D7C000
trusted library allocation
page read and write
79E4002CC000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
5288FFE000
unkown
page readonly
1406C7000
unkown
page readonly
1F702DD0000
unclassified section
page read and write
442000201000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
3C9C0140C000
trusted library allocation
page read and write
72980157C000
trusted library allocation
page read and write
2AF01600000
trusted library allocation
page read and write
173C0036C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
1108004EC000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
154D8528000
heap
page read and write
1108007BE000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
3C9C00738000
trusted library allocation
page read and write
14796487000
heap
page read and write
3C9C009D8000
trusted library allocation
page read and write
173C0060C000
trusted library allocation
page read and write
72980152B000
trusted library allocation
page read and write
729801FE4000
trusted library allocation
page read and write
72980163C000
trusted library allocation
page read and write
42C4000C8000
trusted library allocation
page read and write
442000210000
trusted library allocation
page read and write
AD800201000
direct allocation
page read and write
140485000
unkown
page readonly
1108005B5000
trusted library allocation
page read and write
2A6DE800000
heap
page read and write
7298017BC000
trusted library allocation
page read and write
97000210000
trusted library allocation
page read and write
2A9B5FE000
unkown
page readonly
74D8002C8000
trusted library allocation
page read and write
3C9C00CE8000
trusted library allocation
page read and write
110800230000
trusted library allocation
page read and write
110800024000
trusted library allocation
page read and write
72980196D000
trusted library allocation
page read and write
1108001D8000
trusted library allocation
page read and write
3C9C007F4000
trusted library allocation
page read and write
89E3DFE000
unkown
page readonly
729801752000
trusted library allocation
page read and write
2A985FE000
unkown
page readonly
738000220000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729801E54000
trusted library allocation
page read and write
154DFA50000
trusted library section
page readonly
3C9C014C8000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
72980158C000
trusted library allocation
page read and write
154D854F000
heap
page read and write
72980153C000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
42C400024000
trusted library allocation
page read and write
173C00390000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
154D856B000
heap
page read and write
738000260000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
2A6DE62A000
heap
page read and write
9700028C000
trusted library allocation
page read and write
729801CC0000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
1108006A5000
trusted library allocation
page read and write
72980196B000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
3F69000
heap
page read and write
110800444000
trusted library allocation
page read and write
3F68000
heap
page read and write
3F9B000
heap
page read and write
72980175C000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
3C9C00BE4000
trusted library allocation
page read and write
154DD6B1000
unkown
page readonly
147964CA000
heap
page read and write
74D800220000
trusted library allocation
page read and write
738000318000
trusted library allocation
page read and write
154DA302000
heap
page read and write
3C9C006D4000
trusted library allocation
page read and write
4D8000
heap
page read and write
52A47FE000
stack
page read and write
743000210000
direct allocation
page read and write
110800164000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
526000
heap
page read and write
3C9C00A40000
trusted library allocation
page read and write
3C9C0098C000
trusted library allocation
page read and write
110800667000
trusted library allocation
page read and write
3C9C00E7C000
trusted library allocation
page read and write
154DD780000
trusted library section
page read and write
5290FFE000
unkown
page readonly
110800421000
trusted library allocation
page read and write
72980179C000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
110800154000
trusted library allocation
page read and write
729801918000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729801842000
trusted library allocation
page read and write
7298015BC000
trusted library allocation
page read and write
52967FE000
stack
page read and write
7298017A3000
trusted library allocation
page read and write
11080066E000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
729800EC8000
trusted library allocation
page read and write
72980163C000
trusted library allocation
page read and write
72980167D000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
442000240000
trusted library allocation
page read and write
3EFE000
stack
page read and write
72980183A000
trusted library allocation
page read and write
50A400260000
direct allocation
page read and write
729801F3C000
trusted library allocation
page read and write
173C00348000
trusted library allocation
page read and write
729802090000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729800A2C000
trusted library allocation
page read and write
154DA302000
heap
page read and write
72980180C000
trusted library allocation
page read and write
729801574000
trusted library allocation
page read and write
44C000
heap
page read and write
52A27FE000
stack
page read and write
14796447000
heap
page read and write
3C3E000
stack
page read and write
3FCF000
heap
page read and write
729800A50000
trusted library allocation
page read and write
42C40028C000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
3C9C006B0000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
729801A94000
trusted library allocation
page read and write
72980207C000
trusted library allocation
page read and write
7298015C4000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
147964B0000
heap
page read and write
1A1DD1A0000
heap
page read and write
729801584000
trusted library allocation
page read and write
110800456000
trusted library allocation
page read and write
72980032C000
trusted library allocation
page read and write
729801834000
trusted library allocation
page read and write
296BA629000
heap
page read and write
3C9C00D94000
trusted library allocation
page read and write
729800620000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298019DE000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
79E400274000
trusted library allocation
page read and write
11080058A000
trusted library allocation
page read and write
72980196D000
trusted library allocation
page read and write
1108005A6000
trusted library allocation
page read and write
97000254000
trusted library allocation
page read and write
173C010CC000
trusted library allocation
page read and write
72980160C000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
3C9C00BB4000
trusted library allocation
page read and write
729800F3C000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
729801614000
trusted library allocation
page read and write
110800840000
trusted library allocation
page read and write
2AA35FE000
unkown
page readonly
72980178C000
trusted library allocation
page read and write
154DEC37000
heap
page read and write
110800555000
trusted library allocation
page read and write
1108006AC000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729800830000
trusted library allocation
page read and write
729801524000
trusted library allocation
page read and write
7298017F4000
trusted library allocation
page read and write
2AF01640000
trusted library allocation
page read and write
1A1DD200000
heap
page read and write
72980196D000
trusted library allocation
page read and write
3C9C0058C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298017DA000
trusted library allocation
page read and write
3C9C00540000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
11080024C000
trusted library allocation
page read and write
729801754000
trusted library allocation
page read and write
3C9C00878000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
1108007A6000
trusted library allocation
page read and write
173C0080C000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980177C000
trusted library allocation
page read and write
72980032C000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
729800314000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
729801F74000
trusted library allocation
page read and write
1FDC00210000
direct allocation
page read and write
50A400240000
direct allocation
page read and write
72980183A000
trusted library allocation
page read and write
2510000F0000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
42C4001BD000
trusted library allocation
page read and write
3C9C00E91000
trusted library allocation
page read and write
173C00230000
trusted library allocation
page read and write
729801CBB000
trusted library allocation
page read and write
729801774000
trusted library allocation
page read and write
5281FFE000
unkown
page readonly
42C40024C000
trusted library allocation
page read and write
3C9C00001000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
52887FD000
stack
page read and write
729800AB5000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
7298016EC000
trusted library allocation
page read and write
3C9C00D4C000
trusted library allocation
page read and write
7298017FA000
trusted library allocation
page read and write
3C9C0005C000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
72980174C000
trusted library allocation
page read and write
729801C98000
trusted library allocation
page read and write
173C00FB0000
trusted library allocation
page read and write
729801951000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
1108005EC000
trusted library allocation
page read and write
110800436000
trusted library allocation
page read and write
729801EC8000
trusted library allocation
page read and write
729801634000
trusted library allocation
page read and write
52F77FB000
stack
page read and write
72980177C000
trusted library allocation
page read and write
3C9C011EC000
trusted library allocation
page read and write
729801624000
trusted library allocation
page read and write
3C9C0135F000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
52FF7FC000
stack
page read and write
729801594000
trusted library allocation
page read and write
72980203C000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
729800F1C000
trusted library allocation
page read and write
14793645000
heap
page read and write
53340024C000
direct allocation
page read and write
52F9FFE000
unkown
page readonly
4420002B4000
trusted library allocation
page read and write
3C9C00A90000
trusted library allocation
page read and write
154DF622000
unclassified section
page read and write
729801814000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
729801FE4000
trusted library allocation
page read and write
72980198C000
trusted library allocation
page read and write
110800401000
trusted library allocation
page read and write
110800710000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
7298019D2000
trusted library allocation
page read and write
3C9C00E01000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
3C9C012E4000
trusted library allocation
page read and write
72980156C000
trusted library allocation
page read and write
729801E54000
trusted library allocation
page read and write
729801D4C000
trusted library allocation
page read and write
2AF01780000
trusted library allocation
page read and write
173C00F54000
trusted library allocation
page read and write
5334002C4000
direct allocation
page read and write
2A6DE82B000
heap
page read and write
74D800240000
trusted library allocation
page read and write
1FDC00201000
direct allocation
page read and write
1108007BE000
trusted library allocation
page read and write
173C0033C000
trusted library allocation
page read and write
173C00354000
trusted library allocation
page read and write
173C00F5C000
trusted library allocation
page read and write
110800687000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980167C000
trusted library allocation
page read and write
4420002B4000
trusted library allocation
page read and write
7298019D4000
trusted library allocation
page read and write
1F772B02000
heap
page read and write
729801EE0000
trusted library allocation
page read and write
173C0033C000
trusted library allocation
page read and write
7298017D7000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
729800A90000
trusted library allocation
page read and write
3C9C00774000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
79E4002D0000
trusted library allocation
page read and write
1108006AC000
trusted library allocation
page read and write
154DA371000
heap
page read and write
2A6DE809000
heap
page read and write
7298016D4000
trusted library allocation
page read and write
729800ED0000
trusted library allocation
page read and write
154D854E000
heap
page read and write
729801774000
trusted library allocation
page read and write
42C400130000
trusted library allocation
page read and write
16C000244000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
42C400340000
trusted library allocation
page read and write
7298019F0000
trusted library allocation
page read and write
37E000430000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
5295FFE000
unkown
page readonly
11080049F000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
729801CB8000
trusted library allocation
page read and write
7298019C0000
trusted library allocation
page read and write
1FDC00290000
direct allocation
page read and write
9BC69FE000
stack
page read and write
11080079B000
trusted library allocation
page read and write
729801C19000
trusted library allocation
page read and write
5298FFE000
unkown
page readonly
2AF017C0000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
3F71000
heap
page read and write
3C9C005C4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
42C400154000
trusted library allocation
page read and write
110800412000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
2AA15FE000
unkown
page readonly
147938E0000
heap
page read and write
729800FE4000
trusted library allocation
page read and write
173C002FC000
trusted library allocation
page read and write
5334002D8000
direct allocation
page read and write
2A6DE824000
heap
page read and write
729800DC8000
trusted library allocation
page read and write
72980203C000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
173C00348000
trusted library allocation
page read and write
72980060C000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
3FD0000
heap
page read and write
110800775000
trusted library allocation
page read and write
643800210000
trusted library allocation
page read and write
140702000
unkown
page execute read
2AA95FE000
unkown
page readonly
729801774000
trusted library allocation
page read and write
147964ED000
heap
page read and write
729800A40000
trusted library allocation
page read and write
729800EE8000
trusted library allocation
page read and write
3C9C01201000
trusted library allocation
page read and write
3C9C0084C000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
7298015CB000
trusted library allocation
page read and write
729801E7C000
trusted library allocation
page read and write
72980191E000
trusted library allocation
page read and write
154DA36A000
heap
page read and write
729800F0C000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
1108006C3000
trusted library allocation
page read and write
154D854E000
heap
page read and write
7298017B4000
trusted library allocation
page read and write
74D800348000
trusted library allocation
page read and write
72980166D000
trusted library allocation
page read and write
37E00040C000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
72980183C000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
2A9BDFE000
stack
page read and write
16C0002DC000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
79E4002CC000
trusted library allocation
page read and write
74D800404000
trusted library allocation
page read and write
729800694000
trusted library allocation
page read and write
37E000364000
trusted library allocation
page read and write
729801824000
trusted library allocation
page read and write
1108006EA000
trusted library allocation
page read and write
1108006A0000
trusted library allocation
page read and write
3C9C00320000
trusted library allocation
page read and write
7298016C4000
trusted library allocation
page read and write
729801774000
trusted library allocation
page read and write
173C0033C000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
296BA638000
heap
page read and write
7298018F0000
trusted library allocation
page read and write
50A4002A0000
direct allocation
page read and write
2A6DE80F000
heap
page read and write
14793900000
trusted library allocation
page read and write
440E000
stack
page read and write
1479366C000
heap
page read and write
72980152C000
trusted library allocation
page read and write
110800476000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
154D854E000
heap
page read and write
729801624000
trusted library allocation
page read and write
729801594000
trusted library allocation
page read and write
729801DA0000
trusted library allocation
page read and write
5299FFE000
unkown
page readonly
1108005C1000
trusted library allocation
page read and write
729801780000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
72980168C000
trusted library allocation
page read and write
729801852000
trusted library allocation
page read and write
729800614000
trusted library allocation
page read and write
154DD8D0000
trusted library section
page read and write
147939E0000
trusted library allocation
page read and write
1A1DEC02000
heap
page read and write
52847FD000
stack
page read and write
1108005EC000
trusted library allocation
page read and write
72980061C000
trusted library allocation
page read and write
154DED02000
heap
page read and write
16C000300000
trusted library allocation
page read and write
729801D4F000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
3C9C00BD0000
trusted library allocation
page read and write
738000418000
trusted library allocation
page read and write
729800A34000
trusted library allocation
page read and write
729801614000
trusted library allocation
page read and write
42C400298000
trusted library allocation
page read and write
3C9C00D6B000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
50A4002B8000
direct allocation
page read and write
7298015AC000
trusted library allocation
page read and write
7298019A4000
trusted library allocation
page read and write
1F7729A0000
trusted library allocation
page read and write
296BA638000
heap
page read and write
7298008B4000
trusted library allocation
page read and write
72980151C000
trusted library allocation
page read and write
3C9C00904000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
3C9C00801000
trusted library allocation
page read and write
729800AC7000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
7298017AC000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
729801D34000
trusted library allocation
page read and write
729801708000
trusted library allocation
page read and write
729801EE0000
trusted library allocation
page read and write
3F34000
heap
page read and write
110800A42000
trusted library allocation
page read and write
729800EF0000
trusted library allocation
page read and write
729800FB8000
trusted library allocation
page read and write
11080069A000
trusted library allocation
page read and write
3C9C00030000
trusted library allocation
page read and write
1108005C1000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
729801484000
trusted library allocation
page read and write
7298014DC000
trusted library allocation
page read and write
72980153C000
trusted library allocation
page read and write
729801729000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
72980164A000
trusted library allocation
page read and write
11080043D000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
37E000401000
trusted library allocation
page read and write
110800693000
trusted library allocation
page read and write
4000000
heap
page read and write
2A6DE85C000
heap
page read and write
729800AB5000
trusted library allocation
page read and write
7298017E4000
trusted library allocation
page read and write
110800601000
trusted library allocation
page read and write
7298016DC000
trusted library allocation
page read and write
3C9C00918000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
729801925000
trusted library allocation
page read and write
643800230000
trusted library allocation
page read and write
7298006AC000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
7298019D8000
trusted library allocation
page read and write
729800830000
trusted library allocation
page read and write
729801ADE000
trusted library allocation
page read and write
2AF01042000
trusted library allocation
page read and write
2AF00342000
trusted library allocation
page read and write
7298016DC000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
74D8002E8000
trusted library allocation
page read and write
3C9C00AF0000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
52FEFFE000
unkown
page readonly
110800526000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
3C9C00240000
trusted library allocation
page read and write
1F772A00000
heap
page read and write
1FDC0029C000
direct allocation
page read and write
110800412000
trusted library allocation
page read and write
72980199C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
729801916000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
2AF01840000
trusted library allocation
page read and write
1108000E7000
trusted library allocation
page read and write
729801744000
trusted library allocation
page read and write
11080067A000
trusted library allocation
page read and write
110800668000
trusted library allocation
page read and write
173C00F7C000
trusted library allocation
page read and write
AD800284000
direct allocation
page read and write
729801734000
trusted library allocation
page read and write
518000
heap
page read and write
72980149C000
trusted library allocation
page read and write
296BA5E0000
heap
page readonly
1108005C8000
trusted library allocation
page read and write
729801854000
trusted library allocation
page read and write
729801901000
trusted library allocation
page read and write
16C0002AC000
trusted library allocation
page read and write
72980178C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
729800A44000
trusted library allocation
page read and write
5280FFE000
unkown
page readonly
3F88000
heap
page read and write
7298019AC000
trusted library allocation
page read and write
9BC61FE000
unkown
page readonly
72980169C000
trusted library allocation
page read and write
729800F14000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
37E000424000
trusted library allocation
page read and write
3C9C00DC8000
trusted library allocation
page read and write
72980190D000
trusted library allocation
page read and write
3C9C00DB4000
trusted library allocation
page read and write
1479369A000
heap
page read and write
729800F3C000
trusted library allocation
page read and write
11080069F000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
729800F2C000
trusted library allocation
page read and write
729801F65000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
154DEC2F000
heap
page read and write
110800254000
trusted library allocation
page read and write
154D8533000
heap
page read and write
729801F58000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
173C00378000
trusted library allocation
page read and write
3C9C00BB0000
trusted library allocation
page read and write
14793669000
heap
page read and write
72980164A000
trusted library allocation
page read and write
528EFFE000
unkown
page readonly
729801524000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
643800254000
trusted library allocation
page read and write
729801934000
trusted library allocation
page read and write
529DFFE000
unkown
page readonly
7298015EC000
trusted library allocation
page read and write
42C4000AC000
trusted library allocation
page read and write
729801932000
trusted library allocation
page read and write
1F772930000
heap
page readonly
7298018C5000
trusted library allocation
page read and write
72980152B000
trusted library allocation
page read and write
147964A6000
heap
page read and write
72980156C000
trusted library allocation
page read and write
14793500000
unclassified section
page readonly
173C0104C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980182C000
trusted library allocation
page read and write
729801852000
trusted library allocation
page read and write
729801901000
trusted library allocation
page read and write
251000094000
trusted library allocation
page read and write
729801C10000
trusted library allocation
page read and write
173C0026C000
trusted library allocation
page read and write
1F772790000
heap
page read and write
1FDC00260000
direct allocation
page read and write
729800A88000
trusted library allocation
page read and write
7298009E4000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
173C00334000
trusted library allocation
page read and write
5334002C0000
direct allocation
page read and write
2A6E1A08000
unclassified section
page read and write
72980184C000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
2A6DE80A000
heap
page read and write
154D8529000
heap
page read and write
173C00EAC000
trusted library allocation
page read and write
3C9C00C2C000
trusted library allocation
page read and write
72980150C000
trusted library allocation
page read and write
110800598000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
7298016C4000
trusted library allocation
page read and write
1A1DD1E0000
heap
page read and write
72980182A000
trusted library allocation
page read and write
729801674000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
173C00E0C000
trusted library allocation
page read and write
729800EC8000
trusted library allocation
page read and write
7298017EC000
trusted library allocation
page read and write
52997FE000
stack
page read and write
110800667000
trusted library allocation
page read and write
42C40010C000
trusted library allocation
page read and write
72980154C000
trusted library allocation
page read and write
154DEC10000
heap
page read and write
110800739000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
296BF150000
unkown
page readonly
3C9C0000C000
trusted library allocation
page read and write
5334002E8000
direct allocation
page read and write
110800840000
trusted library allocation
page read and write
1F772A2B000
heap
page read and write
3C9C003E4000
trusted library allocation
page read and write
2A9C5FE000
unkown
page readonly
1F772C02000
heap
page read and write
72980159C000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
72980158C000
trusted library allocation
page read and write
173C0036C000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
3C9C01470000
trusted library allocation
page read and write
7298015BC000
trusted library allocation
page read and write
DB00FFC000
stack
page read and write
52F7FFE000
unkown
page readonly
2AF001C0000
trusted library allocation
page read and write
729800FE4000
trusted library allocation
page read and write
72980172C000
trusted library allocation
page read and write
7298019F0000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
1108004F8000
trusted library allocation
page read and write
4E7000
heap
page read and write
5734002D0000
trusted library allocation
page read and write
50A400210000
direct allocation
page read and write
2A6DE860000
heap
page read and write
7298017DC000
trusted library allocation
page read and write
79E400284000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
442000254000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
147964CE000
heap
page read and write
110800551000
trusted library allocation
page read and write
110800284000
trusted library allocation
page read and write
3C9C00BBC000
trusted library allocation
page read and write
11080060F000
trusted library allocation
page read and write
729801794000
trusted library allocation
page read and write
16C0002B8000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
7298016FC000
trusted library allocation
page read and write
729800EF0000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
72980196B000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
14793970000
heap
page read and write
4420002C0000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
3C9C0136A000
trusted library allocation
page read and write
7298016CC000
trusted library allocation
page read and write
7298017A4000
trusted library allocation
page read and write
3FEF000
heap
page read and write
729800A78000
trusted library allocation
page read and write
72980199C000
trusted library allocation
page read and write
29BE000
stack
page read and write
729801FE4000
trusted library allocation
page read and write
729801664000
trusted library allocation
page read and write
729800830000
trusted library allocation
page read and write
154D8551000
heap
page read and write
2A6DE809000
heap
page read and write
7298016E8000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE82B000
heap
page read and write
72980174D000
trusted library allocation
page read and write
729800AB5000
trusted library allocation
page read and write
AD8002CC000
direct allocation
page read and write
173C0094C000
trusted library allocation
page read and write
440000
heap
page read and write
72980190B000
trusted library allocation
page read and write
9BCB1FE000
unkown
page readonly
72980177A000
trusted library allocation
page read and write
154DEC2B000
heap
page read and write
729801824000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
72980181C000
trusted library allocation
page read and write
729800ACA000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
72980198A000
trusted library allocation
page read and write
729801D94000
trusted library allocation
page read and write
7298016E4000
trusted library allocation
page read and write
3C9C00DDC000
trusted library allocation
page read and write
72980156C000
trusted library allocation
page read and write
37E000404000
trusted library allocation
page read and write
3C9C00660000
trusted library allocation
page read and write
729801694000
trusted library allocation
page read and write
72980173C000
trusted library allocation
page read and write
52F97FE000
stack
page read and write
729800770000
trusted library allocation
page read and write
1F772850000
heap
page read and write
2A6DE824000
heap
page read and write
173C0072C000
trusted library allocation
page read and write
74D8002B4000
trusted library allocation
page read and write
14796610000
unclassified section
page read and write
729802025000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
3C9C00700000
trusted library allocation
page read and write
7298016AC000
trusted library allocation
page read and write
3C9C00D70000
trusted library allocation
page read and write
1108004EC000
trusted library allocation
page read and write
50A400310000
direct allocation
page read and write
2A6DE824000
heap
page read and write
173C0030C000
trusted library allocation
page read and write
52FB7FE000
stack
page read and write
2A6DE824000
heap
page read and write
7298017D7000
trusted library allocation
page read and write
1108004FB000
trusted library allocation
page read and write
52F87FE000
stack
page read and write
729800858000
trusted library allocation
page read and write
4420002A4000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
11080079B000
trusted library allocation
page read and write
296BA62B000
heap
page read and write
50A400335000
direct allocation
page read and write
729800A20000
trusted library allocation
page read and write
173C00390000
trusted library allocation
page read and write
729800654000
trusted library allocation
page read and write
74D800418000
trusted library allocation
page read and write
2AF018C0000
trusted library allocation
page read and write
1108006D1000
trusted library allocation
page read and write
743000270000
direct allocation
page read and write
3C9C00DEC000
trusted library allocation
page read and write
7298017BC000
trusted library allocation
page read and write
42C400364000
trusted library allocation
page read and write
1108007D6000
trusted library allocation
page read and write
729801E94000
trusted library allocation
page read and write
89E55FE000
stack
page read and write
729801E94000
trusted library allocation
page read and write
7298019D8000
trusted library allocation
page read and write
3C9C00E1C000
trusted library allocation
page read and write
729801974000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
7298016D4000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
72980164A000
trusted library allocation
page read and write
729801844000
trusted library allocation
page read and write
729801D2C000
trusted library allocation
page read and write
533400210000
direct allocation
page read and write
173C00210000
trusted library allocation
page read and write
173C010CC000
trusted library allocation
page read and write
4BD0002A4000
trusted library allocation
page read and write
729800F4C000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
110800164000
trusted library allocation
page read and write
7298015C4000
trusted library allocation
page read and write
72980187C000
trusted library allocation
page read and write
154DA302000
heap
page read and write
72980181C000
trusted library allocation
page read and write
72980177A000
trusted library allocation
page read and write
11080066D000
trusted library allocation
page read and write
4017000
heap
page read and write
72980153C000
trusted library allocation
page read and write
72980080C000
trusted library allocation
page read and write
7298016B4000
trusted library allocation
page read and write
729800FDC000
trusted library allocation
page read and write
7298018DC000
trusted library allocation
page read and write
729801930000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
42C400281000
trusted library allocation
page read and write
16C0002DC000
trusted library allocation
page read and write
74D800338000
trusted library allocation
page read and write
590C00294000
trusted library allocation
page read and write
729801EBC000
trusted library allocation
page read and write
7298008C4000
trusted library allocation
page read and write
110800114000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800775000
trusted library allocation
page read and write
7298015CC000
trusted library allocation
page read and write
729800F0B000
trusted library allocation
page read and write
1108005B6000
trusted library allocation
page read and write
738000244000
trusted library allocation
page read and write
7298014A4000
trusted library allocation
page read and write
729802012000
trusted library allocation
page read and write
72980199F000
trusted library allocation
page read and write
9BCA9FE000
stack
page read and write
1108007D6000
trusted library allocation
page read and write
72980074C000
trusted library allocation
page read and write
173C002B0000
trusted library allocation
page read and write
729801914000
trusted library allocation
page read and write
528B7FC000
stack
page read and write
147935D0000
heap
page readonly
72980165C000
trusted library allocation
page read and write
738000404000
trusted library allocation
page read and write
3C9C0125C000
trusted library allocation
page read and write
11080040D000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
147935E2000
unclassified section
page read and write
729801EEC000
trusted library allocation
page read and write
729800EB0000
trusted library allocation
page read and write
729801615000
trusted library allocation
page read and write
110800631000
trusted library allocation
page read and write
729801004000
trusted library allocation
page read and write
3C9C00BF0000
trusted library allocation
page read and write
11080065A000
trusted library allocation
page read and write
79E4002B4000
trusted library allocation
page read and write
11080060C000
trusted library allocation
page read and write
7298018F2000
trusted library allocation
page read and write
42C400294000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE82B000
heap
page read and write
7298016D4000
trusted library allocation
page read and write
42C400340000
trusted library allocation
page read and write
154DA300000
heap
page read and write
729800FEC000
trusted library allocation
page read and write
2A6DE802000
heap
page read and write
190000
heap
page read and write
729801F3C000
trusted library allocation
page read and write
42C40015C000
trusted library allocation
page read and write
729801870000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
42C400138000
trusted library allocation
page read and write
72980159C000
trusted library allocation
page read and write
729800F74000
trusted library allocation
page read and write
154DA376000
heap
page read and write
42C4000A0000
trusted library allocation
page read and write
729800F3C000
trusted library allocation
page read and write
9BCC9FE000
stack
page read and write
7298016C4000
trusted library allocation
page read and write
3C9C002E4000
trusted library allocation
page read and write
11080067A000
trusted library allocation
page read and write
1108007A4000
trusted library allocation
page read and write
743000230000
direct allocation
page read and write
72980157C000
trusted library allocation
page read and write
72980195C000
trusted library allocation
page read and write
3C9C0120C000
trusted library allocation
page read and write
3C9C0021C000
trusted library allocation
page read and write
173C010EC000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
7298019DE000
trusted library allocation
page read and write
110800487000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729802047000
trusted library allocation
page read and write
154DD1F0000
trusted library section
page read and write
11080065A000
trusted library allocation
page read and write
AD800210000
direct allocation
page read and write
729801CA4000
trusted library allocation
page read and write
37E000370000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
173C0036C000
trusted library allocation
page read and write
72980196B000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
7298015EF000
trusted library allocation
page read and write
9BBF9FE000
stack
page read and write
72980157C000
trusted library allocation
page read and write
1108006AC000
trusted library allocation
page read and write
3C9C00DE8000
trusted library allocation
page read and write
729801724000
trusted library allocation
page read and write
2A9A5FE000
unkown
page readonly
7298015D4000
trusted library allocation
page read and write
16C0002AC000
trusted library allocation
page read and write
729800A88000
trusted library allocation
page read and write
154DF9F0000
unkown
page readonly
729800C0C000
trusted library allocation
page read and write
729800830000
trusted library allocation
page read and write
73800020C000
trusted library allocation
page read and write
74D800244000
trusted library allocation
page read and write
DB017FE000
stack
page read and write
173C002CC000
trusted library allocation
page read and write
72980147C000
trusted library allocation
page read and write
11080065F000
trusted library allocation
page read and write
729801928000
trusted library allocation
page read and write
729801DA4000
trusted library allocation
page read and write
72980161C000
trusted library allocation
page read and write
729801F58000
trusted library allocation
page read and write
110800495000
trusted library allocation
page read and write
11080044C000
trusted library allocation
page read and write
3F11000
heap
page read and write
729800A44000
trusted library allocation
page read and write
110800244000
trusted library allocation
page read and write
7298017DA000
trusted library allocation
page read and write
AD800294000
direct allocation
page read and write
57340031C000
trusted library allocation
page read and write
729801704000
trusted library allocation
page read and write
52FFFFE000
unkown
page readonly
110800722000
trusted library allocation
page read and write
173C01148000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
50A400321000
direct allocation
page read and write
173C0033C000
trusted library allocation
page read and write
7298017B4000
trusted library allocation
page read and write
154DF990000
unkown
page readonly
729800DC8000
trusted library allocation
page read and write
2A6DE702000
heap
page read and write
173C00354000
trusted library allocation
page read and write
729800A2C000
trusted library allocation
page read and write
2AF01140000
trusted library allocation
page read and write
16C000278000
trusted library allocation
page read and write
AD800250000
direct allocation
page read and write
52897FD000
stack
page read and write
729800A80000
trusted library allocation
page read and write
154D8527000
heap
page read and write
2B00000C000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
7298019BA000
trusted library allocation
page read and write
DB7BBF5000
stack
page read and write
72980148C000
trusted library allocation
page read and write
110800050000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
1108000DD000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
7298015DC000
trusted library allocation
page read and write
729800730000
trusted library allocation
page read and write
72980182C000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
7298016BC000
trusted library allocation
page read and write
3C9C005B0000
trusted library allocation
page read and write
3C9C011EC000
trusted library allocation
page read and write
89E75FE000
stack
page read and write
296BA67B000
heap
page read and write
1108007BC000
trusted library allocation
page read and write
11080069A000
trusted library allocation
page read and write
3C9C00228000
trusted library allocation
page read and write
7298018D0000
trusted library allocation
page read and write
7298017CC000
trusted library allocation
page read and write
79E4002CC000
trusted library allocation
page read and write
3C9C00564000
trusted library allocation
page read and write
7298018F0000
trusted library allocation
page read and write
7298019A1000
trusted library allocation
page read and write
729801AC0000
trusted library allocation
page read and write
3C9C001E8000
trusted library allocation
page read and write
110800104000
trusted library allocation
page read and write
296BA63F000
heap
page read and write
7298017B4000
trusted library allocation
page read and write
1FDC002AC000
direct allocation
page read and write
729801A50000
trusted library allocation
page read and write
729800A38000
trusted library allocation
page read and write
37E000294000
trusted library allocation
page read and write
2AF001C2000
trusted library allocation
page read and write
729800EB8000
trusted library allocation
page read and write
1108005C5000
trusted library allocation
page read and write
7298019BA000
trusted library allocation
page read and write
154DD6B5000
unkown
page readonly
3C9C00B44000
trusted library allocation
page read and write
729800EC8000
trusted library allocation
page read and write
729800A78000
trusted library allocation
page read and write
52807FB000
stack
page read and write
72980174C000
trusted library allocation
page read and write
7298016A4000
trusted library allocation
page read and write
1479364C000
heap
page read and write
3C9C00BA4000
trusted library allocation
page read and write
72980181B000
trusted library allocation
page read and write
14793642000
heap
page read and write
7298016BC000
trusted library allocation
page read and write
1108005B1000
trusted library allocation
page read and write
2A6DE5D0000
unclassified section
page read and write
590C00278000
trusted library allocation
page read and write
72980163C000
trusted library allocation
page read and write
729800818000
trusted library allocation
page read and write
729801564000
trusted library allocation
page read and write
4BD0002C8000
trusted library allocation
page read and write
729801F68000
trusted library allocation
page read and write
3C9C00901000
trusted library allocation
page read and write
3C9C01428000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
810000
trusted library allocation
page read and write
72980181C000
trusted library allocation
page read and write
590C002B8000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
52F8FFE000
unkown
page readonly
72980180C000
trusted library allocation
page read and write
154DEC2F000
heap
page read and write
729801684000
trusted library allocation
page read and write
154DA371000
heap
page read and write
42C400118000
trusted library allocation
page read and write
11080071D000
trusted library allocation
page read and write
154DA36A000
heap
page read and write
154D853D000
heap
page read and write
729800F00000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
7298008B4000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
110800284000
trusted library allocation
page read and write
154DA365000
heap
page read and write
1108007D6000
trusted library allocation
page read and write
72980199C000
trusted library allocation
page read and write
50A40031B000
direct allocation
page read and write
2A6DE824000
heap
page read and write
1A0000
heap
page read and write
7298016BC000
trusted library allocation
page read and write
1F772A1B000
heap
page read and write
1108005B6000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
1108004C6000
trusted library allocation
page read and write
2AA2DFE000
stack
page read and write
1F772959000
unclassified section
page read and write
72980180C000
trusted library allocation
page read and write
3C9C0083C000
trusted library allocation
page read and write
5734002E8000
trusted library allocation
page read and write
AD80023C000
direct allocation
page read and write
11080073B000
trusted library allocation
page read and write
7298017EA000
trusted library allocation
page read and write
1108000FC000
trusted library allocation
page read and write
729801EE0000
trusted library allocation
page read and write
729800EB8000
trusted library allocation
page read and write
7298019DC000
trusted library allocation
page read and write
729801D92000
trusted library allocation
page read and write
8B0000
heap
page read and write
110800598000
trusted library allocation
page read and write
2A6DE540000
heap
page readonly
729800EE4000
trusted library allocation
page read and write
173C002DC000
trusted library allocation
page read and write
110800738000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
3C9C006C8000
trusted library allocation
page read and write
7298016F4000
trusted library allocation
page read and write
729801E7C000
trusted library allocation
page read and write
729800A44000
trusted library allocation
page read and write
729800F00000
trusted library allocation
page read and write
729800DC8000
trusted library allocation
page read and write
7298017F4000
trusted library allocation
page read and write
97000240000
trusted library allocation
page read and write
729801764000
trusted library allocation
page read and write
3C9C00714000
trusted library allocation
page read and write
50A4002EC000
direct allocation
page read and write
72980161C000
trusted library allocation
page read and write
729800334000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
72980165C000
trusted library allocation
page read and write
72980167C000
trusted library allocation
page read and write
7298017F2000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
420E000
stack
page read and write
72980175C000
trusted library allocation
page read and write
729801B3C000
trusted library allocation
page read and write
729800A80000
trusted library allocation
page read and write
110800775000
trusted library allocation
page read and write
7298018FF000
trusted library allocation
page read and write
2AF00102000
trusted library allocation
page read and write
4BD0002C8000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
729800EB4000
trusted library allocation
page read and write
729801AA6000
trusted library allocation
page read and write
729801CCD000
trusted library allocation
page read and write
110800722000
trusted library allocation
page read and write
3C9C009E8000
trusted library allocation
page read and write
1108005A9000
trusted library allocation
page read and write
42C400354000
trusted library allocation
page read and write
7298015BC000
trusted library allocation
page read and write
729800F08000
trusted library allocation
page read and write
442000230000
trusted library allocation
page read and write
50A400284000
direct allocation
page read and write
72980157C000
trusted library allocation
page read and write
154DF678000
trusted library section
page read and write
2A6DE420000
remote allocation
page read and write
9BC51FE000
unkown
page readonly
7298016BC000
trusted library allocation
page read and write
7298015D4000
trusted library allocation
page read and write
52907FC000
stack
page read and write
110800618000
trusted library allocation
page read and write
7298020D4000
trusted library allocation
page read and write
50A40025C000
direct allocation
page read and write
251000001000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
4BD0002B8000
trusted library allocation
page read and write
729800F54000
trusted library allocation
page read and write
72980182A000
trusted library allocation
page read and write
3C9C00D18000
trusted library allocation
page read and write
154DF63A000
unclassified section
page read and write
154D8527000
heap
page read and write
7298006A0000
trusted library allocation
page read and write
11080007E000
trusted library allocation
page read and write
5734002F0000
trusted library allocation
page read and write
7298017B8000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
7298019B0000
trusted library allocation
page read and write
2ABE000
stack
page read and write
2A6DE82B000
heap
page read and write
729800624000
trusted library allocation
page read and write
729801573000
trusted library allocation
page read and write
37E000268000
trusted library allocation
page read and write
16C0002E0000
trusted library allocation
page read and write
2A6DE430000
heap
page read and write
7298016AC000
trusted library allocation
page read and write
154D8513000
heap
page read and write
110800412000
trusted library allocation
page read and write
729800EF8000
trusted library allocation
page read and write
52A0FFE000
unkown
page readonly
7298017B4000
trusted library allocation
page read and write
4BD0002A8000
trusted library allocation
page read and write
110800636000
trusted library allocation
page read and write
42C400170000
trusted library allocation
page read and write
72980190B000
trusted library allocation
page read and write
729800F24000
trusted library allocation
page read and write
72980171C000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
729801784000
trusted library allocation
page read and write
14073C000
unkown
page execute read
79E4002A4000
trusted library allocation
page read and write
590C00220000
trusted library allocation
page read and write
729800EB8000
trusted library allocation
page read and write
73800029C000
trusted library allocation
page read and write
7298018D8000
trusted library allocation
page read and write
729801906000
trusted library allocation
page read and write
729801554000
trusted library allocation
page read and write
2A6DE824000
heap
page read and write
2AF01700000
trusted library allocation
page read and write
729800A98000
trusted library allocation
page read and write
11080064D000
trusted library allocation
page read and write
DB037FE000
stack
page read and write
729800A78000
trusted library allocation
page read and write
110800699000
trusted library allocation
page read and write
3C9C0086C000
trusted library allocation
page read and write
154DA30C000
heap
page read and write
729800AF0000
trusted library allocation
page read and write
729801584000
trusted library allocation
page read and write
72980200C000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
729800A50000
trusted library allocation
page read and write
1108007BE000
trusted library allocation
page read and write
110800710000
trusted library allocation
page read and write
110800170000
trusted library allocation
page read and write
3C9C0077C000
trusted library allocation
page read and write
3C9C00D68000
trusted library allocation
page read and write
AD800244000
direct allocation
page read and write
729800FE4000
trusted library allocation
page read and write
72980175C000
trusted library allocation
page read and write
74D800338000
trusted library allocation
page read and write
72980170C000
trusted library allocation
page read and write
72980184C000
trusted library allocation
page read and write
729800816000
trusted library allocation
page read and write
154D853D000
heap
page read and write
52957FB000
stack
page read and write
1108007BE000
trusted library allocation
page read and write
729801684000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
2A6DE82A000
heap
page read and write
173C0110C000
trusted library allocation
page read and write
729801654000
trusted library allocation
page read and write
11080044D000
trusted library allocation
page read and write
110800592000
trusted library allocation
page read and write
72980169C000
trusted library allocation
page read and write
729800A44000
trusted library allocation
page read and write
729801CAC000
trusted library allocation
page read and write
7298018D4000
trusted library allocation
page read and write
7298019A8000
trusted library allocation
page read and write
7298015AC000
trusted library allocation
page read and write
7298017E2000
trusted library allocation
page read and write
729800EC6000
trusted library allocation
page read and write
729801930000
trusted library allocation
page read and write
729800818000
trusted library allocation
page read and write
3C9C000B4000
trusted library allocation
page read and write
72980175D000
trusted library allocation
page read and write
72980180C000
trusted library allocation
page read and write
3C9C01490000
trusted library allocation
page read and write
729800F0B000
trusted library allocation
page read and write
3C9C00297000
trusted library allocation
page read and write
3C9C00C2C000
trusted library allocation
page read and write
2A6DE82B000
heap
page read and write
7298016AC000
trusted library allocation
page read and write
729800A64000
trusted library allocation
page read and write
2A6DE825000
heap
page read and write
729801674000
trusted library allocation
page read and write
There are 4477 hidden memdumps, click here to show them.