IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cc892ae5-8467-4b84-b8a5-41b0e58678f4.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cc892ae5-8467-4b84-b8a5-41b0e58678f4.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2192 -parentBuildID 20230927232528 -prefsHandle 2128 -prefMapHandle 2112 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0bfec4f-8bcf-4d6f-b626-04387efa2974} 6004 "\\.\pipe\gecko-crash-server-pipe.6004" 13a2f46eb10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4204 -parentBuildID 20230927232528 -prefsHandle 4196 -prefMapHandle 4192 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b10031ad-d078-474c-8684-1fba315fc059} 6004 "\\.\pipe\gecko-crash-server-pipe.6004" 13a3efea410 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3756 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3700 -prefMapHandle 4944 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d12597e1-e262-4865-b922-edddb2660612} 6004 "\\.\pipe\gecko-crash-server-pipe.6004" 13a419efd10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListenerUseOfReleaseEventsWarningUse
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://youtube.com/
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://www.msn.
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
151.101.1.91
services.addons.mozilla.org
United States
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
13A404C8000
trusted library allocation
page read and write
13A40D30000
trusted library allocation
page read and write
13A418CC000
trusted library allocation
page read and write
13A4B417000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A4040A000
trusted library allocation
page read and write
13A470D7000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A36296000
heap
page read and write
6BDE39B000
stack
page read and write
13A4B91B000
trusted library allocation
page read and write
13A3F51D000
trusted library allocation
page read and write
13A4381C000
trusted library allocation
page read and write
13A402AC000
trusted library allocation
page read and write
13A40E4F000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A40EC9000
trusted library allocation
page read and write
13A4B0F5000
trusted library allocation
page read and write
13A4040D000
trusted library allocation
page read and write
13A3C360000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A3CBE9000
heap
page read and write
13A362A8000
heap
page read and write
13A42AF8000
trusted library allocation
page read and write
13A415FE000
trusted library allocation
page read and write
13A40174000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A3FC2C000
trusted library allocation
page read and write
13A4155E000
trusted library allocation
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A4148B000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
1666000
heap
page read and write
13A414C8000
trusted library allocation
page read and write
13A48AE9000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A3F091000
trusted library allocation
page read and write
13A48A4A000
trusted library allocation
page read and write
13A3F586000
trusted library allocation
page read and write
18FF700E000
trusted library allocation
page read and write
13A416C8000
trusted library allocation
page read and write
13A41BD3000
trusted library allocation
page read and write
13A3C360000
trusted library allocation
page read and write
13A4A827000
trusted library allocation
page read and write
13A47174000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4A8C2000
trusted library allocation
page read and write
13A478A4000
trusted library allocation
page read and write
13A4718D000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
1662000
heap
page read and write
13A41A3C000
trusted library allocation
page read and write
13A418CC000
trusted library allocation
page read and write
13A475F8000
trusted library allocation
page read and write
13A4B4AD000
trusted library allocation
page read and write
6BE06FE000
unkown
page readonly
13A40D84000
trusted library allocation
page read and write
13A41366000
trusted library allocation
page read and write
13A3FC72000
trusted library allocation
page read and write
13A4707B000
trusted library allocation
page read and write
13A411FA000
trusted library allocation
page read and write
13A48A50000
trusted library allocation
page read and write
13A47488000
trusted library allocation
page read and write
13A4B458000
trusted library allocation
page read and write
13A4B45A000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A40D82000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A40D7E000
trusted library allocation
page read and write
13A4013A000
trusted library allocation
page read and write
13A4B9F1000
trusted library allocation
page read and write
13A4B0B2000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A4B41D000
trusted library allocation
page read and write
13A4AFA0000
trusted library allocation
page read and write
13A4B3B2000
trusted library allocation
page read and write
13A3D3B8000
trusted library allocation
page read and write
13A491E5000
trusted library allocation
page read and write
100C4FE000
unkown
page readonly
13A48AF2000
trusted library allocation
page read and write
13A40F7E000
trusted library allocation
page read and write
2CB4C321000
trusted library allocation
page read and write
13A362F5000
heap
page read and write
13A3FADC000
trusted library allocation
page read and write
13A4B50B000
heap
page read and write
13A41A55000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A42F2B000
trusted library allocation
page read and write
20AC810E000
trusted library allocation
page read and write
13A4ACD5000
trusted library allocation
page read and write
13A47323000
trusted library allocation
page read and write
13A3FAC6000
trusted library allocation
page read and write
13A4B47D000
trusted library allocation
page read and write
13A41F30000
trusted library allocation
page read and write
13A3C874000
trusted library allocation
page read and write
13A4A005000
trusted library allocation
page read and write
13A36303000
heap
page read and write
13A4924D000
trusted library allocation
page read and write
13A404A0000
trusted library allocation
page read and write
DA0000
heap
page read and write
13A4AC6C000
trusted library allocation
page read and write
13A4128C000
trusted library allocation
page read and write
379B7841000
trusted library allocation
page execute read
13A4932C000
trusted library allocation
page read and write
13A41569000
trusted library allocation
page read and write
13A36290000
heap
page read and write
15A4000
heap
page read and write
13A4AF24000
trusted library allocation
page read and write
13A3FC2E000
trusted library allocation
page read and write
13A41A49000
trusted library allocation
page read and write
13A41826000
trusted library allocation
page read and write
13A4011F000
trusted library allocation
page read and write
13A4B2E3000
trusted library allocation
page read and write
20AC85EA000
heap
page read and write
13A362C4000
heap
page read and write
13A3F0C3000
trusted library allocation
page read and write
13A41391000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
13A4A8EE000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A42A26000
trusted library allocation
page read and write
13A3FCDF000
trusted library allocation
page read and write
13A40998000
trusted library allocation
page read and write
100A1BE000
stack
page read and write
13A405C7000
trusted library allocation
page read and write
13A41225000
trusted library allocation
page read and write
13A3CB90000
heap
page read and write
13A3FC2A000
trusted library allocation
page read and write
13A41F63000
trusted library allocation
page read and write
20AC8626000
heap
page read and write
13A362B1000
heap
page read and write
13A47833000
trusted library allocation
page read and write
13A40235000
trusted library allocation
page read and write
13A419EF000
trusted library allocation
page read and write
13A3C8A1000
trusted library allocation
page read and write
13A4139D000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A41BD3000
trusted library allocation
page read and write
13A40EF1000
trusted library allocation
page read and write
13A41EA1000
trusted library allocation
page read and write
13A4B976000
trusted library allocation
page read and write
20AC79BF000
trusted library allocation
page read and write
13A42F3E000
trusted library allocation
page read and write
13A4129C000
trusted library allocation
page read and write
13A4754C000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
1F696CAE000
heap
page read and write
13A409BF000
trusted library allocation
page read and write
13A40121000
trusted library allocation
page read and write
13A3F6AC000
trusted library allocation
page read and write
13A415FE000
trusted library allocation
page read and write
13A4B97A000
trusted library allocation
page read and write
13A362B6000
heap
page read and write
13A47549000
trusted library allocation
page read and write
13A3FDDD000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A3CB88000
heap
page read and write
13A3F543000
trusted library allocation
page read and write
13A4121E000
trusted library allocation
page read and write
13A42AD4000
trusted library allocation
page read and write
13A4B22F000
trusted library allocation
page read and write
13A4157A000
trusted library allocation
page read and write
13A4153D000
trusted library allocation
page read and write
13A41735000
trusted library allocation
page read and write
13A4B270000
trusted library allocation
page read and write
13A41B97000
trusted library allocation
page read and write
13A3C3A8000
trusted library allocation
page read and write
13A3F0DA000
trusted library allocation
page read and write
13A491C8000
trusted library allocation
page read and write
13A48A81000
trusted library allocation
page read and write
13A418D5000
trusted library allocation
page read and write
20AC8620000
heap
page read and write
13A3C89B000
trusted library allocation
page read and write
13A41580000
trusted library allocation
page read and write
13A40974000
trusted library allocation
page read and write
13A411E3000
trusted library allocation
page read and write
13A412D1000
trusted library allocation
page read and write
13A4B9E5000
trusted library allocation
page read and write
13A475C6000
trusted library allocation
page read and write
13A415FE000
trusted library allocation
page read and write
13A3CBC8000
heap
page read and write
13A497A2000
trusted library allocation
page read and write
3F61000
heap
page read and write
13A3628E000
heap
page read and write
2CB4C1C8000
trusted library allocation
page read and write
13A4AF1C000
trusted library allocation
page read and write
20AC863D000
heap
page read and write
13A362BE000
heap
page read and write
13A362B1000
heap
page read and write
13A3F6A7000
trusted library allocation
page read and write
13A470A3000
trusted library allocation
page read and write
13A473D3000
trusted library allocation
page read and write
13A41244000
trusted library allocation
page read and write
13A42F38000
trusted library allocation
page read and write
13A4ACD9000
trusted library allocation
page read and write
18FF6C20000
unclassified section
page readonly
13A43867000
trusted library allocation
page read and write
13A412D4000
trusted library allocation
page read and write
13A475CB000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
F80F7D8000
stack
page read and write
13A474F4000
trusted library allocation
page read and write
13A47545000
trusted library allocation
page read and write
13A417C4000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A41456000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A3F6BC000
trusted library allocation
page read and write
13A42961000
trusted library allocation
page read and write
13A49333000
trusted library allocation
page read and write
13A3F3B1000
trusted library allocation
page read and write
13A3F28F000
trusted library allocation
page read and write
13A41E13000
trusted library allocation
page read and write
13A41EA7000
trusted library allocation
page read and write
13A46E1A000
trusted library allocation
page read and write
13A3FCD4000
trusted library allocation
page read and write
13A403EA000
trusted library allocation
page read and write
13A49286000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4AF97000
trusted library allocation
page read and write
2B62C50A000
trusted library allocation
page read and write
13A48A6A000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A40D60000
trusted library allocation
page read and write
13A4B4AD000
trusted library allocation
page read and write
13A48AB5000
trusted library allocation
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A4B3BF000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
13A4B9E5000
trusted library allocation
page read and write
13A4AF10000
trusted library allocation
page read and write
2B62C500000
trusted library allocation
page read and write
13A43C02000
trusted library allocation
page read and write
13A4099C000
trusted library allocation
page read and write
13A3F062000
trusted library allocation
page read and write
13A4188A000
trusted library allocation
page read and write
13A401C0000
trusted library allocation
page read and write
13A42AD4000
trusted library allocation
page read and write
13A362DC000
heap
page read and write
18FF7076000
trusted library allocation
page read and write
13A4B261000
trusted library allocation
page read and write
13A3D3F1000
trusted library allocation
page read and write
13A3F9B8000
trusted library allocation
page read and write
13A4148B000
trusted library allocation
page read and write
13A3B3D9000
trusted library allocation
page read and write
13A415ED000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A41B88000
trusted library allocation
page read and write
20AC75F0000
remote allocation
page execute read
13A48A9F000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
13A4126D000
trusted library allocation
page read and write
13A36296000
heap
page read and write
1668000
heap
page read and write
13A36306000
heap
page read and write
13A41566000
trusted library allocation
page read and write
13A3ED52000
trusted library allocation
page read and write
49C000
unkown
page readonly
13A4AFC0000
trusted library allocation
page read and write
13A43850000
trusted library allocation
page read and write
13A40D04000
trusted library allocation
page read and write
13A41A50000
trusted library allocation
page read and write
75121FF000
stack
page read and write
20AC859C000
heap
page read and write
13A41580000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
20AC79C7000
trusted library allocation
page read and write
4D0000
unkown
page write copy
100C3FE000
unkown
page readonly
13A474BD000
trusted library allocation
page read and write
13A3FDEC000
trusted library allocation
page read and write
100C4BE000
stack
page read and write
13A4369E000
trusted library allocation
page read and write
13A415FB000
trusted library allocation
page read and write
13A362A9000
heap
page read and write
13A362F0000
heap
page read and write
13A4B4DD000
trusted library allocation
page read and write
13A4B45F000
trusted library allocation
page read and write
13A362FD000
heap
page read and write
13A48A80000
trusted library allocation
page read and write
13A3F645000
trusted library allocation
page read and write
20AC8699000
heap
page read and write
20AC8541000
heap
page read and write
13A3ED5E000
trusted library allocation
page read and write
13A3C8C0000
trusted library allocation
page read and write
1658000
heap
page read and write
13A4006D000
trusted library allocation
page read and write
13A3FCB8000
trusted library allocation
page read and write
13A3CBFA000
heap
page read and write
20AC8684000
heap
page read and write
13A40436000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A3F662000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4B0BF000
trusted library allocation
page read and write
13A47443000
trusted library allocation
page read and write
13A48AB5000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A471DA000
trusted library allocation
page read and write
13A42BA8000
trusted library allocation
page read and write
13A4B0F3000
trusted library allocation
page read and write
F8141BE000
unkown
page readonly
13A4155B000
trusted library allocation
page read and write
13A475BC000
trusted library allocation
page read and write
13A3CB9F000
heap
page read and write
13A42F09000
trusted library allocation
page read and write
13A42A77000
trusted library allocation
page read and write
13A362BF000
heap
page read and write
13A41470000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
2CB4BF7F000
unclassified section
page read and write
18FF708E000
trusted library allocation
page read and write
4CC000
unkown
page read and write
13A36290000
heap
page read and write
13A42A7A000
trusted library allocation
page read and write
13A4B9E7000
trusted library allocation
page read and write
13A470D1000
trusted library allocation
page read and write
13A416A3000
trusted library allocation
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A3FCF0000
trusted library allocation
page read and write
13A41540000
trusted library allocation
page read and write
13A418CE000
trusted library allocation
page read and write
13A496E1000
trusted library allocation
page read and write
13A41F6D000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A362CA000
heap
page read and write
13A362F9000
heap
page read and write
13A496C4000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
13A4B4A8000
trusted library allocation
page read and write
13A4B034000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A41264000
trusted library allocation
page read and write
13A3F6C7000
trusted library allocation
page read and write
18FF6D86000
heap
page read and write
13A4181D000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A470BB000
trusted library allocation
page read and write
13A48AC8000
trusted library allocation
page read and write
13A3F36B000
trusted library allocation
page read and write
13A3C863000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A4058C000
trusted library allocation
page read and write
13A418F9000
trusted library allocation
page read and write
13A41264000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A42998000
trusted library allocation
page read and write
F81107B000
stack
page read and write
13A3D329000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3CB83000
heap
page read and write
13A3C350000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A400DA000
trusted library allocation
page read and write
13A362C1000
heap
page read and write
13A412F8000
trusted library allocation
page read and write
2CB4C123000
trusted library allocation
page read and write
379B7830000
trusted library allocation
page execute read
13A3F65E000
trusted library allocation
page read and write
13A473E2000
trusted library allocation
page read and write
13A41BD8000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A40265000
trusted library allocation
page read and write
13A415FE000
trusted library allocation
page read and write
13A4129C000
trusted library allocation
page read and write
13A4AFB8000
trusted library allocation
page read and write
13A4B0E0000
trusted library allocation
page read and write
13A4141C000
trusted library allocation
page read and write
13A4ACED000
trusted library allocation
page read and write
13A3F58A000
trusted library allocation
page read and write
13A41024000
trusted library allocation
page read and write
13A4029B000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
13A415D7000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A362A5000
heap
page read and write
13A4098B000
trusted library allocation
page read and write
13A42950000
trusted library allocation
page read and write
20AC8623000
heap
page read and write
13A417A2000
trusted library allocation
page read and write
13A496AD000
trusted library allocation
page read and write
13A415B9000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4185D000
trusted library allocation
page read and write
13A42A6F000
trusted library allocation
page read and write
13A3D30D000
trusted library allocation
page read and write
13A4AF24000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A362CE000
heap
page read and write
13A48ACF000
trusted library allocation
page read and write
2CB4BF80000
heap
page read and write
13A48816000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A3629F000
heap
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A4123E000
trusted library allocation
page read and write
13A41697000
trusted library allocation
page read and write
13A48AC8000
trusted library allocation
page read and write
13A3F6F8000
trusted library allocation
page read and write
13A41A2C000
trusted library allocation
page read and write
18FF6D80000
heap
page read and write
13A362A9000
heap
page read and write
13A3629B000
heap
page read and write
13A475A5000
trusted library allocation
page read and write
13A48AE2000
trusted library allocation
page read and write
13A49248000
trusted library allocation
page read and write
13A42AB7000
trusted library allocation
page read and write
2CB4BDF0000
heap
page read and write
13A41A28000
trusted library allocation
page read and write
13FE000
stack
page read and write
13A3F399000
trusted library allocation
page read and write
13A3ACB3000
trusted library allocation
page read and write
13A49707000
trusted library allocation
page read and write
13A3F588000
trusted library allocation
page read and write
13A48AE2000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A362FA000
heap
page read and write
13A362DC000
heap
page read and write
13A4163C000
trusted library allocation
page read and write
13A40ED9000
trusted library allocation
page read and write
13A41584000
trusted library allocation
page read and write
13A41F5F000
trusted library allocation
page read and write
13A3CB9F000
heap
page read and write
13A4092A000
trusted library allocation
page read and write
13A4178A000
trusted library allocation
page read and write
13A42AC7000
trusted library allocation
page read and write
13A41638000
trusted library allocation
page read and write
13A41674000
trusted library allocation
page read and write
13A475F1000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4B0F3000
trusted library allocation
page read and write
13A475AA000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A3F55D000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A3F2FE000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A401CB000
trusted library allocation
page read and write
13A36306000
heap
page read and write
13A3F058000
trusted library allocation
page read and write
13A4A050000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A41BF8000
trusted library allocation
page read and write
13A3F2A0000
trusted library allocation
page read and write
13A3B3A8000
trusted library allocation
page read and write
13A42A17000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
2B62C400000
trusted library allocation
page read and write
13A40148000
trusted library allocation
page read and write
13A3D362000
trusted library allocation
page read and write
13A4A883000
trusted library allocation
page read and write
13A411F1000
trusted library allocation
page read and write
13A415A4000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
18FF7207000
trusted library allocation
page read and write
13A362AA000
heap
page read and write
2CB4C198000
trusted library allocation
page read and write
20AC85BF000
heap
page read and write
13A48832000
trusted library allocation
page read and write
20AC792F000
trusted library allocation
page read and write
13A41584000
trusted library allocation
page read and write
13A3F65E000
trusted library allocation
page read and write
20AC8100000
trusted library allocation
page read and write
13A409C3000
trusted library allocation
page read and write
13A48AC4000
trusted library allocation
page read and write
13A3B22F000
trusted library allocation
page read and write
13A4B958000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4B593000
heap
page read and write
13A4AF7A000
trusted library allocation
page read and write
13A3F37D000
trusted library allocation
page read and write
13A4B0F7000
trusted library allocation
page read and write
13A4B3F5000
trusted library allocation
page read and write
13A3FCD4000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
13A48AE2000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A362CA000
heap
page read and write
13A416A3000
trusted library allocation
page read and write
20AC77C4000
heap
page read and write
13A409F1000
trusted library allocation
page read and write
13A41584000
trusted library allocation
page read and write
13A3FACC000
trusted library allocation
page read and write
13A411FD000
trusted library allocation
page read and write
13A418F5000
trusted library allocation
page read and write
13A4B274000
trusted library allocation
page read and write
13A3B2F6000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A36306000
heap
page read and write
13A3F660000
trusted library allocation
page read and write
13A41247000
trusted library allocation
page read and write
1658000
heap
page read and write
13A49306000
trusted library allocation
page read and write
13A49187000
trusted library allocation
page read and write
13A47143000
trusted library allocation
page read and write
20AC8117000
trusted library allocation
page read and write
13A3F684000
trusted library allocation
page read and write
13A41240000
trusted library allocation
page read and write
13A40EBB000
trusted library allocation
page read and write
13A4AF56000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A4B465000
trusted library allocation
page read and write
13A3FA8C000
trusted library allocation
page read and write
13A41249000
trusted library allocation
page read and write
13A48AD5000
trusted library allocation
page read and write
13A4A85F000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A42A7F000
trusted library allocation
page read and write
13A3FA14000
trusted library allocation
page read and write
13A4A893000
trusted library allocation
page read and write
13A41787000
trusted library allocation
page read and write
13A49241000
trusted library allocation
page read and write
13A3F6C7000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
F8121BE000
unkown
page readonly
13A41A5F000
trusted library allocation
page read and write
13A4B3BA000
trusted library allocation
page read and write
13A3C37D000
trusted library allocation
page read and write
13A4B3DD000
trusted library allocation
page read and write
13A3F582000
trusted library allocation
page read and write
18FF7065000
trusted library allocation
page read and write
13A418CC000
trusted library allocation
page read and write
13A36296000
heap
page read and write
1643000
heap
page read and write
13A362BC000
heap
page read and write
13A474FB000
trusted library allocation
page read and write
13A3C86B000
trusted library allocation
page read and write
13A406B2000
trusted library allocation
page read and write
2B62C2E0000
heap
page read and write
13A362A8000
heap
page read and write
13A3F56F000
trusted library allocation
page read and write
13A4B638000
heap
page read and write
13A4B0F1000
trusted library allocation
page read and write
13A4182F000
trusted library allocation
page read and write
13A411F7000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
13A412C3000
trusted library allocation
page read and write
20AC8620000
heap
page read and write
13A4B556000
heap
page read and write
13A40465000
trusted library allocation
page read and write
13A3C3B1000
trusted library allocation
page read and write
13A3FC4F000
trusted library allocation
page read and write
13A41BD0000
trusted library allocation
page read and write
13A4159D000
trusted library allocation
page read and write
13A3C96C000
trusted library allocation
page read and write
13A3F68B000
trusted library allocation
page read and write
13A4134E000
trusted library allocation
page read and write
13A416A3000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
13A4161D000
trusted library allocation
page read and write
13A4B3C6000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
13A3FCF0000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A41FE7000
trusted library allocation
page read and write
13A412A3000
trusted library allocation
page read and write
13A475FC000
trusted library allocation
page read and write
13A475AA000
trusted library allocation
page read and write
13A41695000
trusted library allocation
page read and write
6BE06BE000
stack
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A4966B000
trusted library allocation
page read and write
13A4719A000
trusted library allocation
page read and write
13A41266000
trusted library allocation
page read and write
13A415E1000
trusted library allocation
page read and write
13A409BF000
trusted library allocation
page read and write
13A415AC000
trusted library allocation
page read and write
6BE277E000
unkown
page readonly
13A42B5E000
trusted library allocation
page read and write
13A413BA000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A362F9000
heap
page read and write
13A47594000
trusted library allocation
page read and write
13A3F3F8000
trusted library allocation
page read and write
13A41BD3000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A3D3C9000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
13A3FDDA000
trusted library allocation
page read and write
13A3F382000
trusted library allocation
page read and write
13A362A7000
heap
page read and write
13A42A72000
trusted library allocation
page read and write
13A42A72000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A49186000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A3FAEF000
trusted library allocation
page read and write
13A4B4CF000
trusted library allocation
page read and write
13A3F389000
trusted library allocation
page read and write
13A3F6AF000
trusted library allocation
page read and write
13A42A20000
trusted library allocation
page read and write
13A470C9000
trusted library allocation
page read and write
13A362A3000
heap
page read and write
2CB4C200000
unclassified section
page readonly
13A41683000
trusted library allocation
page read and write
13A47552000
trusted library allocation
page read and write
13A3629E000
heap
page read and write
13A41712000
trusted library allocation
page read and write
13A3B31E000
trusted library allocation
page read and write
13A362A3000
heap
page read and write
13A3F586000
trusted library allocation
page read and write
13A41BD8000
trusted library allocation
page read and write
13A48AAE000
trusted library allocation
page read and write
13A414B6000
trusted library allocation
page read and write
13A419DF000
trusted library allocation
page read and write
13A418FB000
trusted library allocation
page read and write
13A3C83A000
trusted library allocation
page read and write
13A4155B000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A474F2000
trusted library allocation
page read and write
13A41570000
trusted library allocation
page read and write
13A491A3000
trusted library allocation
page read and write
13A416CA000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A3629C000
heap
page read and write
13A3FCA9000
trusted library allocation
page read and write
13A3F939000
trusted library allocation
page read and write
13A473F1000
trusted library allocation
page read and write
13A470B2000
trusted library allocation
page read and write
13A3F6B6000
trusted library allocation
page read and write
13A475A8000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A362FA000
heap
page read and write
13A3C360000
trusted library allocation
page read and write
13A413F9000
trusted library allocation
page read and write
13A429B5000
trusted library allocation
page read and write
13A4B9F0000
trusted library allocation
page read and write
13A3FA30000
trusted library allocation
page read and write
13A406BE000
trusted library allocation
page read and write
13A3D3C7000
trusted library allocation
page read and write
13A3F3B1000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A415AE000
trusted library allocation
page read and write
20AC8628000
heap
page read and write
163A000
heap
page read and write
13A4165C000
trusted library allocation
page read and write
13A40D7E000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A3FC75000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A49243000
trusted library allocation
page read and write
13A42A77000
trusted library allocation
page read and write
13A36304000
heap
page read and write
13A47392000
trusted library allocation
page read and write
20AC8113000
trusted library allocation
page read and write
2CB4C300000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
13A40D04000
trusted library allocation
page read and write
13A418F7000
trusted library allocation
page read and write
13A4B459000
trusted library allocation
page read and write
13A41787000
trusted library allocation
page read and write
2CB4C160000
trusted library allocation
page read and write
13A3F6C9000
trusted library allocation
page read and write
1658000
heap
page read and write
100BBFE000
stack
page read and write
13A3F6FE000
trusted library allocation
page read and write
13A4932E000
trusted library allocation
page read and write
13A4B53F000
heap
page read and write
13A3F21C000
trusted library allocation
page read and write
2CB4C10D000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A3CBE5000
heap
page read and write
13A4A8A6000
trusted library allocation
page read and write
13A3F562000
trusted library allocation
page read and write
13A3C98B000
trusted library allocation
page read and write
13A4AF4A000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A362AE000
heap
page read and write
13A3C8B4000
trusted library allocation
page read and write
13A46E00000
trusted library allocation
page read and write
100ABD8000
stack
page read and write
13A417EA000
trusted library allocation
page read and write
13A409C3000
trusted library allocation
page read and write
13A4145B000
trusted library allocation
page read and write
13A43208000
trusted library allocation
page read and write
13A3F391000
trusted library allocation
page read and write
13A414BA000
trusted library allocation
page read and write
13A4B9BA000
trusted library allocation
page read and write
13A492AC000
trusted library allocation
page read and write
13A42AEC000
trusted library allocation
page read and write
13A4123B000
trusted library allocation
page read and write
13A42BA6000
trusted library allocation
page read and write
13A362AA000
heap
page read and write
13A42A72000
trusted library allocation
page read and write
13A40EE3000
trusted library allocation
page read and write
13A418C4000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A48AD5000
trusted library allocation
page read and write
20AC8662000
heap
page read and write
355FB4F03000
trusted library allocation
page read and write
13A3F098000
trusted library allocation
page read and write
13A4169B000
trusted library allocation
page read and write
13A42A20000
trusted library allocation
page read and write
13A41247000
trusted library allocation
page read and write
13A478E6000
trusted library allocation
page read and write
13A4920C000
trusted library allocation
page read and write
13A42AEC000
trusted library allocation
page read and write
13A418F7000
trusted library allocation
page read and write
13A42A2E000
trusted library allocation
page read and write
13A41275000
trusted library allocation
page read and write
13A497F3000
trusted library allocation
page read and write
13A41BCC000
trusted library allocation
page read and write
20AC8661000
heap
page read and write
13A496FC000
trusted library allocation
page read and write
13A40EE5000
trusted library allocation
page read and write
13A41524000
trusted library allocation
page read and write
13A3C382000
trusted library allocation
page read and write
13A3EC64000
trusted library allocation
page read and write
13A3C3E2000
trusted library allocation
page read and write
2CB4C147000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A415E1000
trusted library allocation
page read and write
13A4B958000
trusted library allocation
page read and write
13A3CC2F000
trusted library allocation
page read and write
13A496BA000
trusted library allocation
page read and write
1F696CB3000
heap
page read and write
13A4020A000
trusted library allocation
page read and write
13A3C883000
trusted library allocation
page read and write
13A40434000
trusted library allocation
page read and write
13A41226000
trusted library allocation
page read and write
20AC790C000
trusted library allocation
page read and write
13A42954000
trusted library allocation
page read and write
13A401C3000
trusted library allocation
page read and write
13A47464000
trusted library allocation
page read and write
13A3F6C7000
trusted library allocation
page read and write
20AC85A9000
heap
page read and write
13A42A23000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A41817000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
13A47034000
trusted library allocation
page read and write
13A362F5000
heap
page read and write
13A3629C000
heap
page read and write
13A362C3000
heap
page read and write
13A3FDCA000
trusted library allocation
page read and write
13A3EDB2000
trusted library allocation
page read and write
13A3FAF9000
trusted library allocation
page read and write
13A4B0F3000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A49207000
trusted library allocation
page read and write
13A41272000
trusted library allocation
page read and write
13A4B9D2000
trusted library allocation
page read and write
13A3C82F000
trusted library allocation
page read and write
13A41A34000
trusted library allocation
page read and write
13A3CB78000
heap
page read and write
13A496C2000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A48800000
trusted library allocation
page read and write
13A3F6FE000
trusted library allocation
page read and write
2CB4BF72000
unclassified section
page read and write
13A4AF1C000
trusted library allocation
page read and write
13A416C6000
trusted library allocation
page read and write
13A3FC1B000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
150E000
stack
page read and write
13A41794000
trusted library allocation
page read and write
13A40272000
trusted library allocation
page read and write
13A475C9000
trusted library allocation
page read and write
13A49714000
trusted library allocation
page read and write
13A3ED3E000
trusted library allocation
page read and write
13A3CBE3000
heap
page read and write
13A409C3000
trusted library allocation
page read and write
3F61000
heap
page read and write
13A3C8AB000
trusted library allocation
page read and write
13A4B058000
trusted library allocation
page read and write
13A49243000
trusted library allocation
page read and write
13A4B0E0000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A362F2000
heap
page read and write
13A41827000
trusted library allocation
page read and write
13A48ACF000
trusted library allocation
page read and write
13A362AA000
heap
page read and write
13A401C0000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3C828000
trusted library allocation
page read and write
13A3CBC8000
heap
page read and write
13A474E7000
trusted library allocation
page read and write
13A4717F000
trusted library allocation
page read and write
13A3629E000
heap
page read and write
13A3D34F000
trusted library allocation
page read and write
13A416F9000
trusted library allocation
page read and write
13A41475000
trusted library allocation
page read and write
13A4155B000
trusted library allocation
page read and write
13A3EDC9000
trusted library allocation
page read and write
13A411DF000
trusted library allocation
page read and write
13A362FC000
heap
page read and write
13A362AF000
heap
page read and write
13A362F5000
heap
page read and write
13A41325000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A4177D000
trusted library allocation
page read and write
13A41540000
trusted library allocation
page read and write
13A3EE28000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A362B8000
heap
page read and write
13A41E72000
trusted library allocation
page read and write
13A4B022000
trusted library allocation
page read and write
13A409EE000
trusted library allocation
page read and write
13A40EC6000
trusted library allocation
page read and write
20AC7590000
unclassified section
page readonly
13A4A8FC000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A4068D000
trusted library allocation
page read and write
13A48AA4000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A49672000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A4B9D3000
trusted library allocation
page read and write
13A417FD000
trusted library allocation
page read and write
75151FF000
stack
page read and write
13A41307000
trusted library allocation
page read and write
13A492E4000
trusted library allocation
page read and write
13A42A67000
trusted library allocation
page read and write
13A3F095000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
13A48AEE000
trusted library allocation
page read and write
13A41794000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4ACFB000
trusted library allocation
page read and write
13A4B3F5000
trusted library allocation
page read and write
18FF7070000
trusted library allocation
page read and write
13A4B3B2000
trusted library allocation
page read and write
13A411B9000
trusted library allocation
page read and write
13A41BB7000
trusted library allocation
page read and write
13A3FB58000
trusted library allocation
page read and write
13A4B9D9000
trusted library allocation
page read and write
13A3C86B000
trusted library allocation
page read and write
4D4000
unkown
page readonly
13A48AE2000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4AF7F000
trusted library allocation
page read and write
13A4176F000
trusted library allocation
page read and write
13A471A2000
trusted library allocation
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A4B386000
trusted library allocation
page read and write
13A409EE000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A362A3000
heap
page read and write
13A48AD5000
trusted library allocation
page read and write
13A3D3CE000
trusted library allocation
page read and write
13A40D27000
trusted library allocation
page read and write
13A3C82F000
trusted library allocation
page read and write
2B62C2B0000
heap
page read and write
1637000
heap
page read and write
13A41709000
trusted library allocation
page read and write
13A3629A000
heap
page read and write
13A3F6B0000
trusted library allocation
page read and write
13A3FE64000
trusted library allocation
page read and write
13A41442000
trusted library allocation
page read and write
13A41A34000
trusted library allocation
page read and write
13A48AC4000
trusted library allocation
page read and write
13A4B3C6000
trusted library allocation
page read and write
2CB4C196000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A400BE000
trusted library allocation
page read and write
13A3D37E000
trusted library allocation
page read and write
1642000
heap
page read and write
13A41242000
trusted library allocation
page read and write
13A41E7E000
trusted library allocation
page read and write
13A41630000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A3F6BC000
trusted library allocation
page read and write
13A415E5000
trusted library allocation
page read and write
F80ED5D000
stack
page read and write
13A362D3000
heap
page read and write
13A41BEF000
trusted library allocation
page read and write
13A40255000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A3FA40000
trusted library allocation
page read and write
13A4883C000
trusted library allocation
page read and write
13A40D60000
trusted library allocation
page read and write
13A4126A000
trusted library allocation
page read and write
13A4129C000
trusted library allocation
page read and write
13A47015000
trusted library allocation
page read and write
13A48A68000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A42AE0000
trusted library allocation
page read and write
13A3C366000
trusted library allocation
page read and write
13A3FA83000
trusted library allocation
page read and write
13A362B4000
heap
page read and write
100C43D000
stack
page read and write
13A362CE000
heap
page read and write
13A3B3DB000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4A87F000
trusted library allocation
page read and write
13A48AF0000
trusted library allocation
page read and write
13A4B924000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A429ED000
trusted library allocation
page read and write
13A48ACF000
trusted library allocation
page read and write
1F6988BC000
heap
page read and write
13A3B271000
trusted library allocation
page read and write
13A3F6FE000
trusted library allocation
page read and write
13A416A3000
trusted library allocation
page read and write
13A47082000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A419A3000
trusted library allocation
page read and write
13A4B988000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A3FC07000
trusted library allocation
page read and write
13A3D3DE000
trusted library allocation
page read and write
13A4AC70000
trusted library allocation
page read and write
13A415BE000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A3ECD8000
trusted library allocation
page read and write
13A3F656000
trusted library allocation
page read and write
1F696C9A000
heap
page read and write
1658000
heap
page read and write
13A3F939000
trusted library allocation
page read and write
13A3F399000
trusted library allocation
page read and write
18FF6D84000
heap
page read and write
13A418CE000
trusted library allocation
page read and write
13A49286000
trusted library allocation
page read and write
18FF7072000
trusted library allocation
page read and write
13A40D38000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A41639000
trusted library allocation
page read and write
13A4B60F000
heap
page read and write
13A4155B000
trusted library allocation
page read and write
13A362A6000
heap
page read and write
13A473CE000
trusted library allocation
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A475B0000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A475FC000
trusted library allocation
page read and write
13A40480000
trusted library allocation
page read and write
2CB4C1A7000
trusted library allocation
page read and write
13A41817000
trusted library allocation
page read and write
13A40696000
trusted library allocation
page read and write
13A3F64A000
trusted library allocation
page read and write
13A4ACD9000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A4B06E000
trusted library allocation
page read and write
13A4065E000
trusted library allocation
page read and write
18FF705F000
trusted library allocation
page read and write
13A4123E000
trusted library allocation
page read and write
13A492A3000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4B4AD000
trusted library allocation
page read and write
13A3F58C000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
13A418C8000
trusted library allocation
page read and write
13A4AFBA000
trusted library allocation
page read and write
13A3B36A000
trusted library allocation
page read and write
20AC796A000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
20AC8698000
heap
page read and write
13A496C5000
trusted library allocation
page read and write
13A4754C000
trusted library allocation
page read and write
13A42A72000
trusted library allocation
page read and write
13A475CC000
trusted library allocation
page read and write
13A41479000
trusted library allocation
page read and write
13A49241000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A42BA6000
trusted library allocation
page read and write
13A3FCC3000
trusted library allocation
page read and write
13A4178D000
trusted library allocation
page read and write
13A3FC6F000
trusted library allocation
page read and write
13A3D399000
trusted library allocation
page read and write
13A475B9000
trusted library allocation
page read and write
13A3FCDF000
trusted library allocation
page read and write
13A42ABF000
trusted library allocation
page read and write
13A400C3000
trusted library allocation
page read and write
13A3CB86000
heap
page read and write
13A418F7000
trusted library allocation
page read and write
13A429B1000
trusted library allocation
page read and write
13A3FCCB000
trusted library allocation
page read and write
20AC7800000
trusted library allocation
page read and write
13A3C86B000
trusted library allocation
page read and write
13A3C8EB000
trusted library allocation
page read and write
13A4B2E1000
trusted library allocation
page read and write
F80ED9E000
unkown
page readonly
13A41564000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3FC7F000
trusted library allocation
page read and write
13A40931000
trusted library allocation
page read and write
13A42AFC000
trusted library allocation
page read and write
13A42AD7000
trusted library allocation
page read and write
163F000
heap
page read and write
13A412A0000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3C965000
trusted library allocation
page read and write
13A48A8F000
trusted library allocation
page read and write
13A3ACEF000
trusted library allocation
page read and write
13A42AEC000
trusted library allocation
page read and write
13A41F97000
trusted library allocation
page read and write
13A3C8A1000
trusted library allocation
page read and write
13A412A7000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
2B62C300000
heap
page read and write
13A362C4000
heap
page read and write
13A4B010000
trusted library allocation
page read and write
13A3FB7F000
trusted library allocation
page read and write
20AC7620000
heap
page read and write
13A417C0000
trusted library allocation
page read and write
13A4165C000
trusted library allocation
page read and write
20AC862D000
heap
page read and write
379B7830000
trusted library allocation
page execute read
13A48AD8000
trusted library allocation
page read and write
13A36296000
heap
page read and write
1F6988B1000
heap
page read and write
13A4ACFB000
trusted library allocation
page read and write
13A414A5000
trusted library allocation
page read and write
13A4176F000
trusted library allocation
page read and write
13A41E36000
trusted library allocation
page read and write
13A3B38C000
trusted library allocation
page read and write
13A40EED000
trusted library allocation
page read and write
13A41567000
trusted library allocation
page read and write
13A42BEA000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4129C000
trusted library allocation
page read and write
13A4787C000
trusted library allocation
page read and write
13A48AC8000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
13A41F6D000
trusted library allocation
page read and write
13A4B2DD000
trusted library allocation
page read and write
13A3CB9F000
heap
page read and write
13A47093000
trusted library allocation
page read and write
13A400C3000
trusted library allocation
page read and write
13A48AE9000
trusted library allocation
page read and write
13A41580000
trusted library allocation
page read and write
1610000
heap
page read and write
13A42A49000
trusted library allocation
page read and write
13A3D3C7000
trusted library allocation
page read and write
13A3F6B6000
trusted library allocation
page read and write
13A4A884000
trusted library allocation
page read and write
13A41E89000
trusted library allocation
page read and write
13A497A2000
trusted library allocation
page read and write
13A4167A000
trusted library allocation
page read and write
13A4B92C000
trusted library allocation
page read and write
1F696F20000
heap
page read and write
13A4AC2B000
trusted library allocation
page read and write
13A36303000
heap
page read and write
13A47146000
trusted library allocation
page read and write
13A42A2E000
trusted library allocation
page read and write
13A4B49C000
trusted library allocation
page read and write
13A4AF88000
trusted library allocation
page read and write
13A3FA54000
trusted library allocation
page read and write
13A4B440000
trusted library allocation
page read and write
13A418E4000
trusted library allocation
page read and write
13A3FCD1000
trusted library allocation
page read and write
13A40109000
trusted library allocation
page read and write
13A48AC6000
trusted library allocation
page read and write
13A3D3F1000
trusted library allocation
page read and write
13A475A8000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
2CB4C179000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A362F2000
heap
page read and write
13A4128C000
trusted library allocation
page read and write
13A3F24D000
trusted library allocation
page read and write
13A42A6F000
trusted library allocation
page read and write
13A41570000
trusted library allocation
page read and write
2CB4C15D000
trusted library allocation
page read and write
13A40444000
trusted library allocation
page read and write
13A40DFE000
trusted library allocation
page read and write
13A470A3000
trusted library allocation
page read and write
20AC7580000
unclassified section
page readonly
15A4000
heap
page read and write
13A36303000
heap
page read and write
13A409C3000
trusted library allocation
page read and write
13A40662000
trusted library allocation
page read and write
13A3EFFB000
trusted library allocation
page read and write
13A409BF000
trusted library allocation
page read and write
13A40EEF000
trusted library allocation
page read and write
13A3FD80000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A3C88A000
trusted library allocation
page read and write
13A47893000
trusted library allocation
page read and write
13A4920C000
trusted library allocation
page read and write
13A4B958000
trusted library allocation
page read and write
13A41983000
trusted library allocation
page read and write
13A41BD0000
trusted library allocation
page read and write
13A40068000
trusted library allocation
page read and write
13A41EA7000
trusted library allocation
page read and write
13A3B2F8000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
1658000
heap
page read and write
13A412C3000
trusted library allocation
page read and write
13A4B952000
trusted library allocation
page read and write
13A4932E000
trusted library allocation
page read and write
13A41F83000
trusted library allocation
page read and write
13A4730E000
trusted library allocation
page read and write
13A418E4000
trusted library allocation
page read and write
13A4B444000
trusted library allocation
page read and write
13A4B9D9000
trusted library allocation
page read and write
13A42A32000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A415D7000
trusted library allocation
page read and write
13A401FB000
trusted library allocation
page read and write
13A4AF97000
trusted library allocation
page read and write
13A3630C000
heap
page read and write
13A47177000
trusted library allocation
page read and write
13A419EF000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A3D3C9000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A4B9DC000
trusted library allocation
page read and write
13A418E6000
trusted library allocation
page read and write
13A49241000
trusted library allocation
page read and write
13A3FCDF000
trusted library allocation
page read and write
13A3ACC1000
trusted library allocation
page read and write
13A40D1C000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
2CB4C740000
heap
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A475F6000
trusted library allocation
page read and write
13A36300000
heap
page read and write
13A47433000
trusted library allocation
page read and write
13A41B95000
trusted library allocation
page read and write
13A42A7F000
trusted library allocation
page read and write
4CC000
unkown
page write copy
13A36296000
heap
page read and write
13A4ACAD000
trusted library allocation
page read and write
13A41FD4000
trusted library allocation
page read and write
13A47119000
trusted library allocation
page read and write
13A4155B000
trusted library allocation
page read and write
20AC795F000
trusted library allocation
page read and write
20AC858D000
heap
page read and write
6BE0F7E000
stack
page read and write
13A41E89000
trusted library allocation
page read and write
13A41BCC000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A41A5B000
trusted library allocation
page read and write
1F6988B9000
heap
page read and write
13A362F0000
heap
page read and write
13A415FB000
trusted library allocation
page read and write
13A4185D000
trusted library allocation
page read and write
13A40EEF000
trusted library allocation
page read and write
13A48AE5000
trusted library allocation
page read and write
CF6F5FF000
stack
page read and write
13A4701E000
trusted library allocation
page read and write
13A49357000
trusted library allocation
page read and write
18FF6DA0000
heap
page read and write
13A48AE5000
trusted library allocation
page read and write
13A3EDAA000
trusted library allocation
page read and write
13A41A5B000
trusted library allocation
page read and write
13A41BC3000
trusted library allocation
page read and write
13A429A4000
trusted library allocation
page read and write
13A42B71000
trusted library allocation
page read and write
13A3EDFC000
trusted library allocation
page read and write
13A41BCF000
trusted library allocation
page read and write
13A47097000
trusted library allocation
page read and write
3F61000
heap
page read and write
13A362BE000
heap
page read and write
13A4011F000
trusted library allocation
page read and write
13A40EE1000
trusted library allocation
page read and write
13A4B924000
trusted library allocation
page read and write
13A40D9F000
trusted library allocation
page read and write
13A3C8C3000
trusted library allocation
page read and write
13A3D3B8000
trusted library allocation
page read and write
13A3FDD3000
trusted library allocation
page read and write
13A48ACD000
trusted library allocation
page read and write
13A41584000
trusted library allocation
page read and write
13A362AA000
heap
page read and write
13A4B958000
trusted library allocation
page read and write
13A36296000
heap
page read and write
3F60000
heap
page read and write
F8107FE000
stack
page read and write
13A47418000
trusted library allocation
page read and write
13A412A7000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A4124D000
trusted library allocation
page read and write
13A4123E000
trusted library allocation
page read and write
13A3D3BE000
trusted library allocation
page read and write
13A4A893000
trusted library allocation
page read and write
13A4B9C3000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A42BDC000
trusted library allocation
page read and write
1650000
heap
page read and write
13A3F639000
trusted library allocation
page read and write
13A41820000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4B432000
trusted library allocation
page read and write
13A4700F000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A4B49C000
trusted library allocation
page read and write
13A416CA000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A492C5000
trusted library allocation
page read and write
13A40073000
trusted library allocation
page read and write
CF6EDFD000
stack
page read and write
20AC867B000
heap
page read and write
13A3C8B4000
trusted library allocation
page read and write
13A3C370000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
13A3C99E000
trusted library allocation
page read and write
13A4754E000
trusted library allocation
page read and write
13A40ED9000
trusted library allocation
page read and write
13A4130A000
trusted library allocation
page read and write
13A42AFD000
trusted library allocation
page read and write
13A415A0000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
18FF6C40000
heap
page read and write
13A49357000
trusted library allocation
page read and write
13A41BF1000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A4094E000
trusted library allocation
page read and write
13A42AD4000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A415B3000
trusted library allocation
page read and write
13A3CBAD000
heap
page read and write
13A48A5F000
trusted library allocation
page read and write
13A429CA000
trusted library allocation
page read and write
13A4979B000
trusted library allocation
page read and write
13A401CB000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
13A473B3000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A3B3FE000
trusted library allocation
page read and write
13A406E3000
trusted library allocation
page read and write
13A36300000
heap
page read and write
13A4B3EF000
trusted library allocation
page read and write
1F696CD0000
heap
page read and write
13A362C4000
heap
page read and write
13A41F2D000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A4B9F6000
trusted library allocation
page read and write
13A478EB000
trusted library allocation
page read and write
13A40440000
trusted library allocation
page read and write
13A497FD000
trusted library allocation
page read and write
13A4170F000
trusted library allocation
page read and write
20AC8540000
heap
page read and write
13A411CC000
trusted library allocation
page read and write
13A3F58C000
trusted library allocation
page read and write
13A4B456000
trusted library allocation
page read and write
20AC85DC000
heap
page read and write
13A4B9EC000
trusted library allocation
page read and write
13A3F6F5000
trusted library allocation
page read and write
13A41A50000
trusted library allocation
page read and write
13A4AFBA000
trusted library allocation
page read and write
75139FE000
stack
page read and write
13A3B223000
trusted library allocation
page read and write
1639000
heap
page read and write
13A362AF000
heap
page read and write
13A362CA000
heap
page read and write
13A36296000
heap
page read and write
13A3CBFA000
heap
page read and write
13A3F3A9000
trusted library allocation
page read and write
13A3FA62000
trusted library allocation
page read and write
13A419BF000
trusted library allocation
page read and write
13A42A42000
trusted library allocation
page read and write
13A3F6F8000
trusted library allocation
page read and write
13A475EF000
trusted library allocation
page read and write
13A474C9000
trusted library allocation
page read and write
13A3F382000
trusted library allocation
page read and write
13A41482000
trusted library allocation
page read and write
13A40D82000
trusted library allocation
page read and write
13A49186000
trusted library allocation
page read and write
13A49E00000
trusted library allocation
page read and write
13A40920000
trusted library allocation
page read and write
13A42AB7000
trusted library allocation
page read and write
13A40974000
trusted library allocation
page read and write
13A41254000
trusted library allocation
page read and write
13A42A67000
trusted library allocation
page read and write
13A3F363000
trusted library allocation
page read and write
13A3F6F8000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A36296000
heap
page read and write
13A3F3B1000
trusted library allocation
page read and write
13A478AC000
trusted library allocation
page read and write
13A3F58C000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A42952000
trusted library allocation
page read and write
13A4B3DD000
trusted library allocation
page read and write
13A4B3A1000
trusted library allocation
page read and write
13A48AE7000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A4B0EF000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A47587000
trusted library allocation
page read and write
20AC7EEB000
unkown
page execute read
13A3C8F9000
trusted library allocation
page read and write
13A41691000
trusted library allocation
page read and write
13A42AC2000
trusted library allocation
page read and write
13A417AA000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A413D6000
trusted library allocation
page read and write
13A48A68000
trusted library allocation
page read and write
20AC7EE0000
unkown
page execute read
20AC7FF0000
heap
page read and write
13A415A4000
trusted library allocation
page read and write
13A42AEC000
trusted library allocation
page read and write
13A415B3000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A4B3A4000
trusted library allocation
page read and write
13A4B9CB000
trusted library allocation
page read and write
13A3FD5F000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A362B8000
heap
page read and write
13A3CC27000
trusted library allocation
page read and write
13A3FC4F000
trusted library allocation
page read and write
13A40298000
trusted library allocation
page read and write
13A40EDF000
trusted library allocation
page read and write
6BE063C000
stack
page read and write
13A416CE000
trusted library allocation
page read and write
13A41BB9000
trusted library allocation
page read and write
13A473D3000
trusted library allocation
page read and write
13A471E5000
trusted library allocation
page read and write
13A475C0000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
2CB4C167000
trusted library allocation
page read and write
13A362FD000
heap
page read and write
20AC8629000
heap
page read and write
13A3F684000
trusted library allocation
page read and write
13A362A6000
heap
page read and write
13A3CBFA000
heap
page read and write
13A4177D000
trusted library allocation
page read and write
13A47454000
trusted library allocation
page read and write
13A49798000
trusted library allocation
page read and write
13A41BC3000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A3C360000
trusted library allocation
page read and write
13A47317000
trusted library allocation
page read and write
13A4A0AC000
trusted library allocation
page read and write
13A42B98000
trusted library allocation
page read and write
13A41BCC000
trusted library allocation
page read and write
13A4157A000
trusted library allocation
page read and write
13A41CB9000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A473CB000
trusted library allocation
page read and write
13A417A2000
trusted library allocation
page read and write
13A3D333000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A3629F000
heap
page read and write
13A41891000
trusted library allocation
page read and write
13A4017A000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A3D3B6000
trusted library allocation
page read and write
13A41EB1000
trusted library allocation
page read and write
13A4B952000
trusted library allocation
page read and write
13A4B278000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A47594000
trusted library allocation
page read and write
13A49205000
trusted library allocation
page read and write
13A40D70000
trusted library allocation
page read and write
13A492A3000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A4AFA0000
trusted library allocation
page read and write
13A3F553000
trusted library allocation
page read and write
13A42BC3000
trusted library allocation
page read and write
13A3C992000
trusted library allocation
page read and write
13A3D39D000
trusted library allocation
page read and write
13A3D3BE000
trusted library allocation
page read and write
13A40974000
trusted library allocation
page read and write
13A417A9000
trusted library allocation
page read and write
13A3C723000
trusted library allocation
page read and write
13A3FD9D000
trusted library allocation
page read and write
13A4B9F6000
trusted library allocation
page read and write
13A362DC000
heap
page read and write
13A362FC000
heap
page read and write
13A4789B000
trusted library allocation
page read and write
2CB4BF70000
unclassified section
page read and write
13A4185D000
trusted library allocation
page read and write
13A3F3C4000
trusted library allocation
page read and write
75129FE000
stack
page read and write
13A3FA4F000
trusted library allocation
page read and write
13A475ED000
trusted library allocation
page read and write
13A42F10000
trusted library allocation
page read and write
13A419C1000
trusted library allocation
page read and write
13A3B3B0000
trusted library allocation
page read and write
13A3CB78000
heap
page read and write
13A3F919000
trusted library allocation
page read and write
13A40D38000
trusted library allocation
page read and write
20AC866A000
heap
page read and write
13A406F3000
trusted library allocation
page read and write
13A4970A000
trusted library allocation
page read and write
13A48A35000
trusted library allocation
page read and write
1641000
heap
page read and write
13A3F940000
trusted library allocation
page read and write
13A4716B000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
15A4000
heap
page read and write
13A4B3F5000
trusted library allocation
page read and write
13A473F9000
trusted library allocation
page read and write
13A4155F000
trusted library allocation
page read and write
6BE1F7E000
stack
page read and write
13A362AF000
heap
page read and write
13A362FA000
heap
page read and write
13A362C3000
heap
page read and write
13A4A037000
trusted library allocation
page read and write
13A40D7E000
trusted library allocation
page read and write
18FF7013000
trusted library allocation
page read and write
13A3AC90000
trusted library allocation
page read and write
165D000
heap
page read and write
13A48AD5000
trusted library allocation
page read and write
13A42F1C000
trusted library allocation
page read and write
13A4B3A1000
trusted library allocation
page read and write
13A4979D000
trusted library allocation
page read and write
1618000
heap
page read and write
13A4701B000
trusted library allocation
page read and write
13A362DC000
heap
page read and write
13A48AC8000
trusted library allocation
page read and write
13A471BD000
trusted library allocation
page read and write
13A4155B000
trusted library allocation
page read and write
2CB4C110000
trusted library allocation
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A4099C000
trusted library allocation
page read and write
13A3D3BE000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
20AC8698000
heap
page read and write
13A47408000
trusted library allocation
page read and write
13A47853000
trusted library allocation
page read and write
13A4295D000
trusted library allocation
page read and write
13A470D7000
trusted library allocation
page read and write
13A40DBA000
trusted library allocation
page read and write
13A416A3000
trusted library allocation
page read and write
13A471A2000
trusted library allocation
page read and write
13A4B2DF000
trusted library allocation
page read and write
13A3C844000
trusted library allocation
page read and write
13A41712000
trusted library allocation
page read and write
13D0003F000
trusted library allocation
page read and write
13A478E6000
trusted library allocation
page read and write
20AC8000000
heap
page read and write
13A475AE000
trusted library allocation
page read and write
13A47598000
trusted library allocation
page read and write
13A4758A000
trusted library allocation
page read and write
13A42A67000
trusted library allocation
page read and write
13A42A72000
trusted library allocation
page read and write
13A41778000
trusted library allocation
page read and write
13A4167D000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A30E03000
heap
page read and write
13A3CBE8000
heap
page read and write
13A41456000
trusted library allocation
page read and write
13A362B7000
heap
page read and write
1665000
heap
page read and write
13A3EDE6000
trusted library allocation
page read and write
13A41BD8000
trusted library allocation
page read and write
13A4ACFB000
trusted library allocation
page read and write
13A40ED9000
trusted library allocation
page read and write
13A4161B000
trusted library allocation
page read and write
13A3D36F000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A417D2000
trusted library allocation
page read and write
13A4709B000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A40675000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A3ACDF000
trusted library allocation
page read and write
13A419A3000
trusted library allocation
page read and write
20AC85BD000
heap
page read and write
13A3D3DE000
trusted library allocation
page read and write
20AC8620000
heap
page read and write
13A36296000
heap
page read and write
13A411FA000
trusted library allocation
page read and write
13A3FC91000
trusted library allocation
page read and write
13A3ED6A000
trusted library allocation
page read and write
13A48AE2000
trusted library allocation
page read and write
13A3FA98000
trusted library allocation
page read and write
13A41249000
trusted library allocation
page read and write
13A41215000
trusted library allocation
page read and write
13A3C8C0000
trusted library allocation
page read and write
13A3D3F1000
trusted library allocation
page read and write
13A416CC000
trusted library allocation
page read and write
13A40D3C000
trusted library allocation
page read and write
CF6E5FC000
stack
page read and write
13A4141C000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A48AD5000
trusted library allocation
page read and write
13A41266000
trusted library allocation
page read and write
13A41BD3000
trusted library allocation
page read and write
D3A000
stack
page read and write
13A40EBD000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A42B98000
trusted library allocation
page read and write
13A4755A000
trusted library allocation
page read and write
13A41A44000
trusted library allocation
page read and write
2CB4C100000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A3F232000
trusted library allocation
page read and write
13A473ED000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
20AC8698000
heap
page read and write
13A3ACEF000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A3ECEA000
trusted library allocation
page read and write
13A41247000
trusted library allocation
page read and write
13A3D369000
trusted library allocation
page read and write
20AC863D000
heap
page read and write
13A47097000
trusted library allocation
page read and write
13A40981000
trusted library allocation
page read and write
13A413A9000
trusted library allocation
page read and write
13A47197000
trusted library allocation
page read and write
13A41594000
trusted library allocation
page read and write
13A3C86D000
trusted library allocation
page read and write
13A3629E000
heap
page read and write
20AC7F00000
heap
page read and write
13A3F538000
trusted library allocation
page read and write
13A4099E000
trusted library allocation
page read and write
13A4ACED000
trusted library allocation
page read and write
13A3FC75000
trusted library allocation
page read and write
13A3C80F000
trusted library allocation
page read and write
13A41BA7000
trusted library allocation
page read and write
13A3F6D4000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
13A3F925000
trusted library allocation
page read and write
13A3F288000
trusted library allocation
page read and write
13A4ACD6000
trusted library allocation
page read and write
13A402B2000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A3F59C000
trusted library allocation
page read and write
18FF70A1000
trusted library allocation
page read and write
13A3D39A000
trusted library allocation
page read and write
13A36292000
heap
page read and write
13A48AE9000
trusted library allocation
page read and write
20AC7670000
heap
page read and write
13A3EED6000
trusted library allocation
page read and write
13A40143000
trusted library allocation
page read and write
1F696DE0000
heap
page read and write
13A41683000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A40DBA000
trusted library allocation
page read and write
2CB4BDD0000
unclassified section
page readonly
20AC767A000
heap
page read and write
13A4013A000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
13A3CBC8000
heap
page read and write
13A41584000
trusted library allocation
page read and write
13A42BAD000
trusted library allocation
page read and write
13A41813000
trusted library allocation
page read and write
13A3C844000
trusted library allocation
page read and write
20AC7EA0000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A3FB8F000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A36296000
heap
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A478E6000
trusted library allocation
page read and write
13A496B5000
trusted library allocation
page read and write
13A49333000
trusted library allocation
page read and write
2B62C507000
trusted library allocation
page read and write
13A3F049000
trusted library allocation
page read and write
13A3C917000
trusted library allocation
page read and write
13A42ABF000
trusted library allocation
page read and write
13A413E7000
trusted library allocation
page read and write
13A41BC8000
trusted library allocation
page read and write
13A41A61000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A48AEE000
trusted library allocation
page read and write
13A46E00000
trusted library allocation
page read and write
13A362DC000
heap
page read and write
13A3C83A000
trusted library allocation
page read and write
13A41204000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A48A5F000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A362B9000
heap
page read and write
13A3D36E000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A362CA000
heap
page read and write
13A3B313000
trusted library allocation
page read and write
13A3C8EB000
trusted library allocation
page read and write
13A48AB0000
trusted library allocation
page read and write
13A42BF7000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A419A3000
trusted library allocation
page read and write
13A362FC000
heap
page read and write
13A3FDB6000
trusted library allocation
page read and write
13A41BF8000
trusted library allocation
page read and write
13A3C874000
trusted library allocation
page read and write
13A41823000
trusted library allocation
page read and write
13A42AB7000
trusted library allocation
page read and write
2CB4C1E8000
trusted library allocation
page read and write
13A473F4000
trusted library allocation
page read and write
13A3F300000
trusted library allocation
page read and write
13A41695000
trusted library allocation
page read and write
13A41EB1000
trusted library allocation
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A41A24000
trusted library allocation
page read and write
13A3F0C3000
trusted library allocation
page read and write
13A3B3A0000
trusted library allocation
page read and write
13A3C8C0000
trusted library allocation
page read and write
13A3F639000
trusted library allocation
page read and write
24AB5C21E000
trusted library allocation
page read and write
13A4B976000
trusted library allocation
page read and write
13A4B47A000
trusted library allocation
page read and write
20AC79F5000
trusted library allocation
page read and write
13A49FF1000
trusted library allocation
page read and write
13A41697000
trusted library allocation
page read and write
13A48A80000
trusted library allocation
page read and write
13A40D2C000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A4972E000
trusted library allocation
page read and write
13A3F079000
trusted library allocation
page read and write
13A4A067000
trusted library allocation
page read and write
2CB4BDB0000
remote allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A40434000
trusted library allocation
page read and write
13A4ACAD000
trusted library allocation
page read and write
13A47533000
trusted library allocation
page read and write
13A419EF000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A4756A000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A403F2000
trusted library allocation
page read and write
13A362CE000
heap
page read and write
13A41674000
trusted library allocation
page read and write
20AC866A000
heap
page read and write
13A362C3000
heap
page read and write
13A362C4000
heap
page read and write
13A4B952000
trusted library allocation
page read and write
18FF7003000
trusted library allocation
page read and write
13A40D35000
trusted library allocation
page read and write
13A4731D000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A470C9000
trusted library allocation
page read and write
13A40965000
trusted library allocation
page read and write
13A42BEA000
trusted library allocation
page read and write
13A42ABF000
trusted library allocation
page read and write
13A4B3BA000
trusted library allocation
page read and write
13A3B366000
trusted library allocation
page read and write
13A42AEC000
trusted library allocation
page read and write
13A40D3F000
trusted library allocation
page read and write
13A4B0FB000
trusted library allocation
page read and write
13A43684000
trusted library allocation
page read and write
13A41A5F000
trusted library allocation
page read and write
13A418F7000
trusted library allocation
page read and write
2CB4C266000
heap
page read and write
13A4145B000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A4B9B2000
trusted library allocation
page read and write
13A47034000
trusted library allocation
page read and write
13A411C5000
trusted library allocation
page read and write
13A49714000
trusted library allocation
page read and write
13A474D7000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A470B5000
trusted library allocation
page read and write
18FF6D30000
heap
page read and write
20AC85A0000
heap
page read and write
13A415FE000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A3C3AD000
trusted library allocation
page read and write
13A41A61000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A492E4000
trusted library allocation
page read and write
13A41B8C000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A362AF000
heap
page read and write
13A4B553000
heap
page read and write
13A3C883000
trusted library allocation
page read and write
13A42AB7000
trusted library allocation
page read and write
13A4133B000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A362AF000
heap
page read and write
13A3CB78000
heap
page read and write
20AC7F18000
unkown
page execute read
13A3FCF6000
trusted library allocation
page read and write
20AC7986000
trusted library allocation
page read and write
13A3FCDF000
trusted library allocation
page read and write
13A42AC2000
trusted library allocation
page read and write
13A4B93A000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
13A3FAA9000
trusted library allocation
page read and write
20AC85BD000
heap
page read and write
13A48AE9000
trusted library allocation
page read and write
13A4145E000
trusted library allocation
page read and write
100E4FE000
unkown
page readonly
13A362F2000
heap
page read and write
13A41554000
trusted library allocation
page read and write
13A475BC000
trusted library allocation
page read and write
400000
unkown
page readonly
13A42A5B000
trusted library allocation
page read and write
13A497A2000
trusted library allocation
page read and write
13A470D1000
trusted library allocation
page read and write
13A4B9CF000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A41E9E000
trusted library allocation
page read and write
13A4095E000
trusted library allocation
page read and write
13A4163E000
trusted library allocation
page read and write
13A36300000
heap
page read and write
13A3B3D9000
trusted library allocation
page read and write
13A436CE000
trusted library allocation
page read and write
13A40E82000
trusted library allocation
page read and write
13A4B40F000
trusted library allocation
page read and write
13A4159C000
trusted library allocation
page read and write
13A4155C000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A48A64000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A3F0D6000
trusted library allocation
page read and write
13A3F64D000
trusted library allocation
page read and write
13A4B3A4000
trusted library allocation
page read and write
13A48A67000
trusted library allocation
page read and write
13A418C8000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A4388A000
trusted library allocation
page read and write
13A4B386000
trusted library allocation
page read and write
13A43638000
trusted library allocation
page read and write
13A4ACD5000
trusted library allocation
page read and write
13A42BF5000
trusted library allocation
page read and write
13A415B1000
trusted library allocation
page read and write
13A412A3000
trusted library allocation
page read and write
13A4B394000
trusted library allocation
page read and write
13A416B5000
trusted library allocation
page read and write
13A3ACA4000
trusted library allocation
page read and write
13A4B0F9000
trusted library allocation
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A403F0000
trusted library allocation
page read and write
13A416B5000
trusted library allocation
page read and write
13A3B3AE000
trusted library allocation
page read and write
13A496AF000
trusted library allocation
page read and write
13A3B3A5000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A415ED000
trusted library allocation
page read and write
13A4B432000
trusted library allocation
page read and write
20AC7981000
trusted library allocation
page read and write
20AC8021000
heap
page read and write
13A41F69000
trusted library allocation
page read and write
13A4AC11000
trusted library allocation
page read and write
13A41570000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
20AC85CD000
heap
page read and write
13A42A6F000
trusted library allocation
page read and write
13A406AC000
trusted library allocation
page read and write
20AC85E1000
heap
page read and write
13A3B271000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
20AC859C000
heap
page read and write
13A417CF000
trusted library allocation
page read and write
13A41E72000
trusted library allocation
page read and write
13A4154C000
trusted library allocation
page read and write
13A48AC8000
trusted library allocation
page read and write
13A470B2000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4978E000
trusted library allocation
page read and write
13A416CC000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A42AE0000
trusted library allocation
page read and write
13A40D35000
trusted library allocation
page read and write
13A42F2B000
trusted library allocation
page read and write
13A48A7D000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
2CB4BD50000
unclassified section
page readonly
20AC862D000
heap
page read and write
13A4AF38000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A46E3C000
trusted library allocation
page read and write
13A48A9C000
trusted library allocation
page read and write
13A401FB000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3FA88000
trusted library allocation
page read and write
13A48A93000
trusted library allocation
page read and write
13A4B9BA000
trusted library allocation
page read and write
13A471B3000
trusted library allocation
page read and write
15A4000
heap
page read and write
165F000
heap
page read and write
13A47587000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A4759A000
trusted library allocation
page read and write
13A3B319000
trusted library allocation
page read and write
13A3CBFE000
heap
page read and write
13A4B0F7000
trusted library allocation
page read and write
13A4B480000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A3F59C000
trusted library allocation
page read and write
13A4B535000
heap
page read and write
13A362C4000
heap
page read and write
13A47093000
trusted library allocation
page read and write
13A417DF000
trusted library allocation
page read and write
13A4B97D000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A40446000
trusted library allocation
page read and write
18FF6C60000
heap
page read and write
13A4167E000
trusted library allocation
page read and write
13A415FB000
trusted library allocation
page read and write
13A3C82F000
trusted library allocation
page read and write
13A4B0E0000
trusted library allocation
page read and write
379B7706000
trusted library allocation
page execute read
13A3F08E000
trusted library allocation
page read and write
20AC863D000
heap
page read and write
13A3ACC6000
trusted library allocation
page read and write
13A409AE000
trusted library allocation
page read and write
13A475F1000
trusted library allocation
page read and write
13A42958000
trusted library allocation
page read and write
13A41580000
trusted library allocation
page read and write
13A3F6F5000
trusted library allocation
page read and write
13A41302000
trusted library allocation
page read and write
13A418E7000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A401E7000
trusted library allocation
page read and write
13A4703D000
trusted library allocation
page read and write
13DB000
stack
page read and write
13A362BE000
heap
page read and write
13A471E9000
trusted library allocation
page read and write
13A3F355000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A4B0B2000
trusted library allocation
page read and write
13A3F053000
trusted library allocation
page read and write
13A41728000
trusted library allocation
page read and write
13A41EDD000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A41B95000
trusted library allocation
page read and write
13A4A8EE000
trusted library allocation
page read and write
13A3FDBD000
trusted library allocation
page read and write
13A3F2B2000
trusted library allocation
page read and write
13A4A680000
trusted library allocation
page read and write
13A49301000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A4B9F0000
trusted library allocation
page read and write
13A4AFD7000
trusted library allocation
page read and write
18FF7081000
trusted library allocation
page read and write
13A3F09C000
trusted library allocation
page read and write
13A417DF000
trusted library allocation
page read and write
13A478EC000
trusted library allocation
page read and write
13A4095B000
trusted library allocation
page read and write
13A41240000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
13A42981000
trusted library allocation
page read and write
13A49708000
trusted library allocation
page read and write
13A415F7000
trusted library allocation
page read and write
13A415C1000
trusted library allocation
page read and write
13A48AF5000
trusted library allocation
page read and write
13A3C3B2000
trusted library allocation
page read and write
13A4B976000
trusted library allocation
page read and write
13A41B86000
trusted library allocation
page read and write
13A48ACF000
trusted library allocation
page read and write
13A4979F000
trusted library allocation
page read and write
13A4B26E000
trusted library allocation
page read and write
13A3B2FE000
trusted library allocation
page read and write
13A42BDC000
trusted library allocation
page read and write
13A47417000
trusted library allocation
page read and write
13A362CE000
heap
page read and write
6BE067E000
unkown
page readonly
13A47051000
trusted library allocation
page read and write
20AC85A9000
heap
page read and write
13A362FA000
heap
page read and write
13A49306000
trusted library allocation
page read and write
13A3B326000
trusted library allocation
page read and write
13A3F6B6000
trusted library allocation
page read and write
13A3C83E000
trusted library allocation
page read and write
13A3D36F000
trusted library allocation
page read and write
13A3D38D000
trusted library allocation
page read and write
13A417C0000
trusted library allocation
page read and write
13A3F250000
trusted library allocation
page read and write
13A3F6A0000
trusted library allocation
page read and write
13A3D3BE000
trusted library allocation
page read and write
13A41536000
trusted library allocation
page read and write
13A4788A000
trusted library allocation
page read and write
13A4B3BF000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
20AC796F000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A478FE000
trusted library allocation
page read and write
13A47470000
trusted library allocation
page read and write
13A4A8E3000
trusted library allocation
page read and write
13A3CBAE000
heap
page read and write
13A4B5A1000
heap
page read and write
163D000
heap
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A3C3F3000
trusted library allocation
page read and write
18FF700C000
trusted library allocation
page read and write
20AC7923000
trusted library allocation
page read and write
20AC862D000
heap
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
6BE177E000
unkown
page readonly
13A41712000
trusted library allocation
page read and write
13A403E0000
trusted library allocation
page read and write
13A41594000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A3CB9F000
heap
page read and write
20AC859F000
heap
page read and write
13A362A8000
heap
page read and write
13A4A8EE000
trusted library allocation
page read and write
13A492C5000
trusted library allocation
page read and write
13A48A5C000
trusted library allocation
page read and write
13A3C8C3000
trusted library allocation
page read and write
1646000
heap
page read and write
13A3F0FD000
trusted library allocation
page read and write
13A417D9000
trusted library allocation
page read and write
13A3FD93000
trusted library allocation
page read and write
F8139BE000
stack
page read and write
13A3F6CC000
trusted library allocation
page read and write
13A3F391000
trusted library allocation
page read and write
13A43805000
trusted library allocation
page read and write
13A3D310000
trusted library allocation
page read and write
13A40D11000
trusted library allocation
page read and write
13A40E9C000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A3F37D000
trusted library allocation
page read and write
13A41F61000
trusted library allocation
page read and write
13A3FDB3000
trusted library allocation
page read and write
13A4ACD9000
trusted library allocation
page read and write
13A40D70000
trusted library allocation
page read and write
13A41232000
trusted library allocation
page read and write
13A412C3000
trusted library allocation
page read and write
13A40D38000
trusted library allocation
page read and write
13A40EEB000
trusted library allocation
page read and write
13A4ACED000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A401A2000
trusted library allocation
page read and write
18FF6C80000
heap
page read and write
13A42BB7000
trusted library allocation
page read and write
F80EDDE000
stack
page read and write
13A4B3CA000
trusted library allocation
page read and write
13A415FE000
trusted library allocation
page read and write
13A3C824000
trusted library allocation
page read and write
13A4755A000
trusted library allocation
page read and write
13A413AD000
trusted library allocation
page read and write
13A3FCF0000
trusted library allocation
page read and write
13A4006E000
trusted library allocation
page read and write
20AC7912000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A474F7000
trusted library allocation
page read and write
18FF70B1000
trusted library allocation
page read and write
13A4AC06000
trusted library allocation
page read and write
13A492AC000
trusted library allocation
page read and write
13A42AF8000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A418CE000
trusted library allocation
page read and write
13A4B526000
heap
page read and write
13A4185D000
trusted library allocation
page read and write
13A40963000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A41674000
trusted library allocation
page read and write
13A41FEB000
trusted library allocation
page read and write
13A3CBA0000
heap
page read and write
13A3F922000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A362DC000
heap
page read and write
13A4B0EF000
trusted library allocation
page read and write
13A3F6BB000
trusted library allocation
page read and write
13A474DD000
trusted library allocation
page read and write
13A4B0F5000
trusted library allocation
page read and write
13A4099E000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
18FF70DA000
trusted library allocation
page read and write
13A403F6000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A41575000
trusted library allocation
page read and write
13A42AE0000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A416E1000
trusted library allocation
page read and write
13A3F57E000
trusted library allocation
page read and write
13A471B3000
trusted library allocation
page read and write
13A415F7000
trusted library allocation
page read and write
13A419A3000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A40073000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A4037F000
trusted library allocation
page read and write
13A42A7A000
trusted library allocation
page read and write
13A4966D000
trusted library allocation
page read and write
13A3C73A000
trusted library allocation
page read and write
13A4B9CB000
trusted library allocation
page read and write
13A3D3C7000
trusted library allocation
page read and write
13A3C834000
trusted library allocation
page read and write
13A3B523000
trusted library allocation
page read and write
13A3FCC5000
trusted library allocation
page read and write
20AC79BC000
trusted library allocation
page read and write
13A48AE5000
trusted library allocation
page read and write
13A415DF000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A362C4000
heap
page read and write
13A40D70000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A3F922000
trusted library allocation
page read and write
CF6E5FF000
stack
page read and write
13A3629F000
heap
page read and write
13A409EE000
trusted library allocation
page read and write
13A40D29000
trusted library allocation
page read and write
13A3D3B8000
trusted library allocation
page read and write
13A362B2000
heap
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A362CF000
heap
page read and write
13A3F6CF000
trusted library allocation
page read and write
13A415FB000
trusted library allocation
page read and write
13A3FA99000
trusted library allocation
page read and write
13A4B930000
trusted library allocation
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A42A3F000
trusted library allocation
page read and write
13A41232000
trusted library allocation
page read and write
1639000
heap
page read and write
13A42BEA000
trusted library allocation
page read and write
13A42B91000
trusted library allocation
page read and write
13A48AD5000
trusted library allocation
page read and write
13A475F1000
trusted library allocation
page read and write
13A491E5000
trusted library allocation
page read and write
13A475C6000
trusted library allocation
page read and write
13A362FC000
heap
page read and write
13A362BE000
heap
page read and write
13A40EF1000
trusted library allocation
page read and write
13A41676000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A47481000
trusted library allocation
page read and write
13A3C8A5000
trusted library allocation
page read and write
13A4B0A9000
trusted library allocation
page read and write
13A474C3000
trusted library allocation
page read and write
13A4B465000
trusted library allocation
page read and write
13A3D369000
trusted library allocation
page read and write
2CB4C12E000
trusted library allocation
page read and write
13A47552000
trusted library allocation
page read and write
13A4970C000
trusted library allocation
page read and write
13A48AB0000
trusted library allocation
page read and write
13A41E35000
trusted library allocation
page read and write
379B7706000
trusted library allocation
page execute read
13A36296000
heap
page read and write
13A4029B000
trusted library allocation
page read and write
13A409EE000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A3F393000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A48AC4000
trusted library allocation
page read and write
13A47036000
trusted library allocation
page read and write
13A3CB86000
heap
page read and write
13A415CB000
trusted library allocation
page read and write
13A4B2E3000
trusted library allocation
page read and write
13A3F67D000
trusted library allocation
page read and write
13A4173A000
trusted library allocation
page read and write
13A40123000
trusted library allocation
page read and write
13A4B4DD000
trusted library allocation
page read and write
F81217E000
stack
page read and write
13A401FB000
trusted library allocation
page read and write
13A3EC62000
trusted library allocation
page read and write
13A409A4000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A3FAF2000
trusted library allocation
page read and write
13A3FC09000
trusted library allocation
page read and write
13BE000
stack
page read and write
20AC85A4000
heap
page read and write
13A4A08A000
trusted library allocation
page read and write
13A415DD000
trusted library allocation
page read and write
13A43244000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
13A362A5000
heap
page read and write
13A3C89B000
trusted library allocation
page read and write
13A41340000
trusted library allocation
page read and write
13A48A9A000
trusted library allocation
page read and write
13A4159D000
trusted library allocation
page read and write
13A4B26C000
trusted library allocation
page read and write
13A41900000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
2CB4C103000
trusted library allocation
page read and write
13A3F389000
trusted library allocation
page read and write
13A475F6000
trusted library allocation
page read and write
13A418DB000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3D3A0000
trusted library allocation
page read and write
13A41343000
trusted library allocation
page read and write
13A3F35B000
trusted library allocation
page read and write
13A416B5000
trusted library allocation
page read and write
13A4012F000
trusted library allocation
page read and write
13A4B550000
heap
page read and write
13A3F293000
trusted library allocation
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A362C4000
heap
page read and write
13A40ECB000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A418E4000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A3FA5E000
trusted library allocation
page read and write
13A4057A000
trusted library allocation
page read and write
13A4B3DA000
trusted library allocation
page read and write
13A3F68A000
trusted library allocation
page read and write
13A48A90000
trusted library allocation
page read and write
13A40971000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
2CB4BF30000
heap
page read and write
18FF7000000
trusted library allocation
page read and write
13A4B548000
heap
page read and write
13A3F575000
trusted library allocation
page read and write
13A48A54000
trusted library allocation
page read and write
13A42A32000
trusted library allocation
page read and write
13A3F35E000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A3FCBD000
trusted library allocation
page read and write
13A4754E000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
13A41254000
trusted library allocation
page read and write
13A362DC000
heap
page read and write
13A48AAE000
trusted library allocation
page read and write
13A42BE1000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4B0FB000
trusted library allocation
page read and write
13A4B00E000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A4017E000
trusted library allocation
page read and write
13A4B988000
trusted library allocation
page read and write
13A415A0000
trusted library allocation
page read and write
13A3F2FE000
trusted library allocation
page read and write
13A48A88000
trusted library allocation
page read and write
13A3F63B000
trusted library allocation
page read and write
13A4748B000
trusted library allocation
page read and write
13A362CA000
heap
page read and write
13A497F4000
trusted library allocation
page read and write
13A40F52000
trusted library allocation
page read and write
13A40ECD000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A415CB000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
13A3ACEF000
trusted library allocation
page read and write
6BDFDFE000
stack
page read and write
13A362B8000
heap
page read and write
13A362B1000
heap
page read and write
13A40EE1000
trusted library allocation
page read and write
13A40FFB000
trusted library allocation
page read and write
13A41674000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A401D1000
trusted library allocation
page read and write
13A4098E000
trusted library allocation
page read and write
13A3CBFC000
heap
page read and write
13A40410000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A40D89000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A3B3F0000
trusted library allocation
page read and write
13A42AFC000
trusted library allocation
page read and write
13A3FA8A000
trusted library allocation
page read and write
13A41BC8000
trusted library allocation
page read and write
13A4A8A6000
trusted library allocation
page read and write
13A362FC000
heap
page read and write
13A3F6FE000
trusted library allocation
page read and write
13A41482000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3C834000
trusted library allocation
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A42ABF000
trusted library allocation
page read and write
13A417B7000
trusted library allocation
page read and write
13A40D60000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
401000
unkown
page execute read
13A47072000
trusted library allocation
page read and write
13A47177000
trusted library allocation
page read and write
13A4AF06000
trusted library allocation
page read and write
13A48AE2000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A41305000
trusted library allocation
page read and write
13A400F9000
trusted library allocation
page read and write
13A4B2DB000
trusted library allocation
page read and write
13A400AA000
trusted library allocation
page read and write
13A3C83A000
trusted library allocation
page read and write
13A4B0BF000
trusted library allocation
page read and write
13A415E1000
trusted library allocation
page read and write
13A3F58B000
trusted library allocation
page read and write
13A42AD4000
trusted library allocation
page read and write
13A412A0000
trusted library allocation
page read and write
13A3C3A8000
trusted library allocation
page read and write
13A3C889000
trusted library allocation
page read and write
13A362AA000
heap
page read and write
13A4B556000
heap
page read and write
13A419C1000
trusted library allocation
page read and write
13A41827000
trusted library allocation
page read and write
13A418EA000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A48AC8000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
20AC8631000
heap
page read and write
13A3CB78000
heap
page read and write
13A409A1000
trusted library allocation
page read and write
13A4165C000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A362C4000
heap
page read and write
13A3CB91000
heap
page read and write
2CB4BFC0000
heap
page read and write
13A3FD45000
trusted library allocation
page read and write
13A49F84000
trusted library allocation
page read and write
13A47363000
trusted library allocation
page read and write
20AC8103000
trusted library allocation
page read and write
20AC862D000
heap
page read and write
13A42F51000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A432C4000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A4B40F000
trusted library allocation
page read and write
13A40ECB000
trusted library allocation
page read and write
13A48A9B000
trusted library allocation
page read and write
13A4B2E7000
trusted library allocation
page read and write
13A41BCC000
trusted library allocation
page read and write
13A40229000
trusted library allocation
page read and write
20AC79BA000
trusted library allocation
page read and write
13A3D3A7000
trusted library allocation
page read and write
13A41CD1000
trusted library allocation
page read and write
13A412A0000
trusted library allocation
page read and write
13A3CB8F000
heap
page read and write
20AC8661000
heap
page read and write
13A40DFA000
trusted library allocation
page read and write
13A3FCBC000
trusted library allocation
page read and write
13A411D7000
trusted library allocation
page read and write
13A402BA000
trusted library allocation
page read and write
13A41442000
trusted library allocation
page read and write
13A49357000
trusted library allocation
page read and write
13A4B29C000
trusted library allocation
page read and write
13A40282000
trusted library allocation
page read and write
100CCFE000
stack
page read and write
13A416CE000
trusted library allocation
page read and write
13A47392000
trusted library allocation
page read and write
13A40660000
trusted library allocation
page read and write
13A48AA4000
trusted library allocation
page read and write
13A3F63B000
trusted library allocation
page read and write
13A4752F000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A41EA1000
trusted library allocation
page read and write
13A3FAFD000
trusted library allocation
page read and write
13A3FC7F000
trusted library allocation
page read and write
13A41737000
trusted library allocation
page read and write
18FF6D10000
heap
page readonly
13A36296000
heap
page read and write
13A36296000
heap
page read and write
13A4098B000
trusted library allocation
page read and write
13A40D3C000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
13A48A83000
trusted library allocation
page read and write
13A40D2A000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A418EA000
trusted library allocation
page read and write
1649000
heap
page read and write
18FF6B90000
unclassified section
page readonly
13A3D3B8000
trusted library allocation
page read and write
13A4B636000
heap
page read and write
13A3D3CB000
trusted library allocation
page read and write
2CB4C1CB000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A3FC1D000
trusted library allocation
page read and write
13A3FC27000
trusted library allocation
page read and write
13A48ACB000
trusted library allocation
page read and write
13A41573000
trusted library allocation
page read and write
4C2000
unkown
page readonly
13A41AFD000
trusted library allocation
page read and write
13A418D5000
trusted library allocation
page read and write
13A41249000
trusted library allocation
page read and write
13A41FD4000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A3B382000
trusted library allocation
page read and write
13A30DFA000
heap
page read and write
13A362BC000
heap
page read and write
18FF70C3000
trusted library allocation
page read and write
13A362A9000
heap
page read and write
13A415FE000
trusted library allocation
page read and write
13A497F8000
trusted library allocation
page read and write
13A4B0BF000
trusted library allocation
page read and write
13A41676000
trusted library allocation
page read and write
13A4ACD9000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A42BE1000
trusted library allocation
page read and write
13A48A97000
trusted library allocation
page read and write
18FF6CCA000
heap
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A416C6000
trusted library allocation
page read and write
13A41695000
trusted library allocation
page read and write
13A418BB000
trusted library allocation
page read and write
13A429B1000
trusted library allocation
page read and write
13A3F39B000
trusted library allocation
page read and write
13A40F57000
trusted library allocation
page read and write
13A41641000
trusted library allocation
page read and write
13A3F6AF000
trusted library allocation
page read and write
13A4127D000
trusted library allocation
page read and write
13A48AE5000
trusted library allocation
page read and write
13A3C83E000
trusted library allocation
page read and write
13A4094E000
trusted library allocation
page read and write
13A41E98000
trusted library allocation
page read and write
13A3FA3B000
trusted library allocation
page read and write
13A3FC72000
trusted library allocation
page read and write
20AC85AC000
heap
page read and write
13A3FAC6000
trusted library allocation
page read and write
13A475EF000
trusted library allocation
page read and write
20AC77C0000
heap
page read and write
13A49248000
trusted library allocation
page read and write
13A42A5B000
trusted library allocation
page read and write
13A3F54C000
trusted library allocation
page read and write
18FF7049000
trusted library allocation
page read and write
13A48AF4000
trusted library allocation
page read and write
13A48800000
trusted library allocation
page read and write
13A40DBA000
trusted library allocation
page read and write
F81213E000
unkown
page readonly
13A41AFC000
trusted library allocation
page read and write
13A3FA1D000
trusted library allocation
page read and write
13A40D69000
trusted library allocation
page read and write
13A48A54000
trusted library allocation
page read and write
13A3FAD1000
trusted library allocation
page read and write
13A40677000
trusted library allocation
page read and write
13A41F4A000
trusted library allocation
page read and write
1F696F10000
heap
page read and write
13A4136E000
trusted library allocation
page read and write
13A48A7E000
trusted library allocation
page read and write
13A4B917000
trusted library allocation
page read and write
1F69700A000
trusted library allocation
page read and write
13A42A77000
trusted library allocation
page read and write
13A41B95000
trusted library allocation
page read and write
13A415D7000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
13A41BD0000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
13A3629F000
heap
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A41EE5000
trusted library allocation
page read and write
13A41708000
trusted library allocation
page read and write
13A3C8A8000
trusted library allocation
page read and write
13A4920C000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A4AFD3000
trusted library allocation
page read and write
20AC867B000
heap
page read and write
13A362F2000
heap
page read and write
13A3F087000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A3B3DB000
trusted library allocation
page read and write
13A40DBA000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
13A48A6A000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A42B5A000
trusted library allocation
page read and write
13A42A77000
trusted library allocation
page read and write
13A3CBA0000
heap
page read and write
13A4096A000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A4AFB8000
trusted library allocation
page read and write
13A41676000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
13A3CB8F000
heap
page read and write
13A3F6F5000
trusted library allocation
page read and write
13A4B3A1000
trusted library allocation
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A3F6A7000
trusted library allocation
page read and write
1665000
heap
page read and write
13A3F6CC000
trusted library allocation
page read and write
13A3C366000
trusted library allocation
page read and write
13A415AC000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A362F4000
heap
page read and write
13A362F2000
heap
page read and write
13A3B271000
trusted library allocation
page read and write
13A415C3000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A475F8000
trusted library allocation
page read and write
20AC7910000
trusted library allocation
page read and write
13A362FD000
heap
page read and write
13A4A0A8000
trusted library allocation
page read and write
13A41CC8000
trusted library allocation
page read and write
13A3AC9E000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A3F5CB000
trusted library allocation
page read and write
1F697007000
trusted library allocation
page read and write
13A3FD86000
trusted library allocation
page read and write
13A416C8000
trusted library allocation
page read and write
13A3EC5C000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
164A000
heap
page read and write
13A4A093000
trusted library allocation
page read and write
13A41569000
trusted library allocation
page read and write
13A42AC2000
trusted library allocation
page read and write
13A42AF8000
trusted library allocation
page read and write
13A415DF000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
100DCFE000
stack
page read and write
13A362C4000
heap
page read and write
13A3F36B000
trusted library allocation
page read and write
13A4AF38000
trusted library allocation
page read and write
13A4B23A000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A3C3AD000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A362BE000
heap
page read and write
13A4A84F000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
20AC8631000
heap
page read and write
2CB4C16E000
trusted library allocation
page read and write
13A41BB7000
trusted library allocation
page read and write
13A41288000
trusted library allocation
page read and write
13A48AF5000
trusted library allocation
page read and write
13A475F1000
trusted library allocation
page read and write
13A3ED8D000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
20AC7600000
unclassified section
page readonly
13A3F6CF000
trusted library allocation
page read and write
13A496D7000
trusted library allocation
page read and write
13A3EE1C000
trusted library allocation
page read and write
13A3EE30000
trusted library allocation
page read and write
2CB4C317000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3F244000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
1643000
heap
page read and write
13A362D3000
heap
page read and write
2CB4BFCA000
heap
page read and write
13A48AEE000
trusted library allocation
page read and write
13A4189D000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
2CB4C112000
trusted library allocation
page read and write
F811078000
stack
page read and write
13A4B272000
trusted library allocation
page read and write
13A3EEFC000
trusted library allocation
page read and write
13A49333000
trusted library allocation
page read and write
13A3F541000
trusted library allocation
page read and write
13A3CBE5000
heap
page read and write
13A415AE000
trusted library allocation
page read and write
13A4B9CF000
trusted library allocation
page read and write
13A4182F000
trusted library allocation
page read and write
13A3C889000
trusted library allocation
page read and write
13A3F6F8000
trusted library allocation
page read and write
13A4366D000
trusted library allocation
page read and write
13A3FAA9000
trusted library allocation
page read and write
13A3CB9A000
heap
page read and write
13A41A2F000
trusted library allocation
page read and write
15A0000
heap
page read and write
20AC8628000
heap
page read and write
13A362A5000
heap
page read and write
13A362CA000
heap
page read and write
13A415D4000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A36290000
heap
page read and write
164C000
heap
page read and write
13A3FAD8000
trusted library allocation
page read and write
13A415FB000
trusted library allocation
page read and write
13A3FD72000
trusted library allocation
page read and write
13A429A5000
trusted library allocation
page read and write
13A49795000
trusted library allocation
page read and write
13A419FB000
trusted library allocation
page read and write
13A3FDCD000
trusted library allocation
page read and write
13A416CE000
trusted library allocation
page read and write
13A473ED000
trusted library allocation
page read and write
13A4B97A000
trusted library allocation
page read and write
13A4967E000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A40144000
trusted library allocation
page read and write
13A40D3C000
trusted library allocation
page read and write
13A3D3CD000
trusted library allocation
page read and write
13A4173E000
trusted library allocation
page read and write
13A4B0FD000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A4B9F0000
trusted library allocation
page read and write
13A3F6FE000
trusted library allocation
page read and write
13A418A9000
trusted library allocation
page read and write
13A42AF8000
trusted library allocation
page read and write
13A419C1000
trusted library allocation
page read and write
13A470CF000
trusted library allocation
page read and write
13A4B599000
heap
page read and write
1570000
heap
page read and write
13A3C356000
trusted library allocation
page read and write
13A3FC12000
trusted library allocation
page read and write
13A42973000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A41372000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3CBFE000
heap
page read and write
13A42A42000
trusted library allocation
page read and write
13A4B417000
trusted library allocation
page read and write
13A3CBAE000
heap
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A41538000
trusted library allocation
page read and write
13A3FCEB000
trusted library allocation
page read and write
13A3C999000
trusted library allocation
page read and write
13A415D7000
trusted library allocation
page read and write
13A49207000
trusted library allocation
page read and write
13A3F65B000
trusted library allocation
page read and write
13A4B429000
trusted library allocation
page read and write
4D4000
unkown
page readonly
13A4B5B1000
heap
page read and write
13A3FA3D000
trusted library allocation
page read and write
2380000
heap
page read and write
13A3F58C000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A40587000
trusted library allocation
page read and write
13A415F4000
trusted library allocation
page read and write
13A42A7F000
trusted library allocation
page read and write
13A3C3C0000
trusted library allocation
page read and write
13A41FEB000
trusted library allocation
page read and write
13A3D3C7000
trusted library allocation
page read and write
13A41582000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A3B3FE000
trusted library allocation
page read and write
13A4B976000
trusted library allocation
page read and write
20AC8628000
heap
page read and write
13A48AD5000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A3FAC6000
trusted library allocation
page read and write
13A48AF0000
trusted library allocation
page read and write
13A4B3DB000
trusted library allocation
page read and write
13A48AE5000
trusted library allocation
page read and write
13A40D60000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A42AB7000
trusted library allocation
page read and write
13A3F566000
trusted library allocation
page read and write
13A4B0FD000
trusted library allocation
page read and write
13A3FDAA000
trusted library allocation
page read and write
13A416CA000
trusted library allocation
page read and write
13A3F0D4000
trusted library allocation
page read and write
13A40952000
trusted library allocation
page read and write
164F000
heap
page read and write
75149FE000
stack
page read and write
13A362A0000
heap
page read and write
13A362F5000
heap
page read and write
13A40D24000
trusted library allocation
page read and write
13A42ACC000
trusted library allocation
page read and write
13A4B499000
trusted library allocation
page read and write
13A40436000
trusted library allocation
page read and write
163A000
heap
page read and write
13A41CBD000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
13A3F070000
trusted library allocation
page read and write
13A41FE7000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
15A4000
heap
page read and write
13A3C82C000
trusted library allocation
page read and write
13A3D362000
trusted library allocation
page read and write
18FF730C000
trusted library allocation
page read and write
13A40EE3000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A3FACE000
trusted library allocation
page read and write
13A438AC000
trusted library allocation
page read and write
13A4B038000
trusted library allocation
page read and write
13A3F0DA000
trusted library allocation
page read and write
20AC859C000
heap
page read and write
1F696E00000
trusted library allocation
page read and write
13A41467000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A362B1000
heap
page read and write
13A40EF1000
trusted library allocation
page read and write
13A414B6000
trusted library allocation
page read and write
13A3D38D000
trusted library allocation
page read and write
13A4A200000
trusted library allocation
page read and write
13A362C5000
heap
page read and write
1658000
heap
page read and write
13A4017E000
trusted library allocation
page read and write
13A41BB9000
trusted library allocation
page read and write
13EF000
stack
page read and write
13A4123E000
trusted library allocation
page read and write
13A41E3A000
trusted library allocation
page read and write
13A41E16000
trusted library allocation
page read and write
13A4B07D000
trusted library allocation
page read and write
13A41288000
trusted library allocation
page read and write
13A4719A000
trusted library allocation
page read and write
13A3D3F0000
trusted library allocation
page read and write
13A418B3000
trusted library allocation
page read and write
13A418D5000
trusted library allocation
page read and write
13A48ACF000
trusted library allocation
page read and write
13A3FCEB000
trusted library allocation
page read and write
13A400C6000
trusted library allocation
page read and write
20AC862D000
heap
page read and write
13A49248000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A3F399000
trusted library allocation
page read and write
13A4128F000
trusted library allocation
page read and write
13A4B399000
trusted library allocation
page read and write
75141FF000
stack
page read and write
13A42B67000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A4B94E000
trusted library allocation
page read and write
13A47151000
trusted library allocation
page read and write
13A42F22000
trusted library allocation
page read and write
100D4FE000
unkown
page readonly
2340000
heap
page read and write
20AC7ED0000
trusted library allocation
page read and write
2CB4C310000
trusted library allocation
page read and write
13A42BE1000
trusted library allocation
page read and write
13A40FA4000
trusted library allocation
page read and write
13A3C886000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A4067C000
trusted library allocation
page read and write
13A4AF3C000
trusted library allocation
page read and write
13A429F7000
trusted library allocation
page read and write
13A41AA3000
trusted library allocation
page read and write
13A48A38000
trusted library allocation
page read and write
13A4B501000
heap
page read and write
13A3F59C000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
18FF6D20000
unclassified section
page read and write
13A362F4000
heap
page read and write
13A362FA000
heap
page read and write
13A41735000
trusted library allocation
page read and write
13A362A7000
heap
page read and write
13A3EE4F000
trusted library allocation
page read and write
13A496DD000
trusted library allocation
page read and write
13A415C6000
trusted library allocation
page read and write
13A478A0000
trusted library allocation
page read and write
13A4924D000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
18FF6C00000
remote allocation
page read and write
20AC8631000
heap
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
13A4B97D000
trusted library allocation
page read and write
13A3CBB6000
heap
page read and write
13A41580000
trusted library allocation
page read and write
13A4B3C4000
trusted library allocation
page read and write
1634000
heap
page read and write
13A4163C000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
400000
unkown
page readonly
18FF6E80000
unclassified section
page readonly
13A47066000
trusted library allocation
page read and write
13A3F6AD000
trusted library allocation
page read and write
F81113E000
unkown
page readonly
13A3F6F8000
trusted library allocation
page read and write
13A491C8000
trusted library allocation
page read and write
13A3F652000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
13A4B0F9000
trusted library allocation
page read and write
13A3F67D000
trusted library allocation
page read and write
13A3AC98000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A3F67D000
trusted library allocation
page read and write
13A3CBFA000
heap
page read and write
13A3ECB7000
trusted library allocation
page read and write
13A470BB000
trusted library allocation
page read and write
F8131BE000
unkown
page readonly
13A4129C000
trusted library allocation
page read and write
20AC77C6000
heap
page read and write
13A41564000
trusted library allocation
page read and write
13A3FB6C000
trusted library allocation
page read and write
13A41E3A000
trusted library allocation
page read and write
13A41244000
trusted library allocation
page read and write
13A416F1000
trusted library allocation
page read and write
13A3C39A000
trusted library allocation
page read and write
13A471BA000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A400D9000
trusted library allocation
page read and write
13A4155E000
trusted library allocation
page read and write
13A40D3C000
trusted library allocation
page read and write
13A475C9000
trusted library allocation
page read and write
13A429B5000
trusted library allocation
page read and write
13A48AAA000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
13A4B0F5000
trusted library allocation
page read and write
13A4023E000
trusted library allocation
page read and write
13A415D9000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A4A86C000
trusted library allocation
page read and write
13A3C3B1000
trusted library allocation
page read and write
13A47036000
trusted library allocation
page read and write
13A4B3CB000
trusted library allocation
page read and write
13A400BE000
trusted library allocation
page read and write
13A478DE000
trusted library allocation
page read and write
13A3C39C000
trusted library allocation
page read and write
13A3D3BE000
trusted library allocation
page read and write
13A40D94000
trusted library allocation
page read and write
DEE000
stack
page read and write
20AC8623000
heap
page read and write
13A4B9EB000
trusted library allocation
page read and write
13A4B3DA000
trusted library allocation
page read and write
13A3CBA0000
heap
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A3D3C2000
trusted library allocation
page read and write
13A362AE000
heap
page read and write
13A3ECF5000
trusted library allocation
page read and write
13A49F6D000
trusted library allocation
page read and write
13A3FDA5000
trusted library allocation
page read and write
13A3F343000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A4155B000
trusted library allocation
page read and write
6BDEDD8000
stack
page read and write
13A41249000
trusted library allocation
page read and write
13A4B44A000
trusted library allocation
page read and write
13A41735000
trusted library allocation
page read and write
13A4013A000
trusted library allocation
page read and write
13A4B9C3000
trusted library allocation
page read and write
13A3B37D000
trusted library allocation
page read and write
13A412A7000
trusted library allocation
page read and write
13A3B375000
trusted library allocation
page read and write
13A42A20000
trusted library allocation
page read and write
13A40D9F000
trusted library allocation
page read and write
15A4000
heap
page read and write
2CB4BF00000
heap
page read and write
13A3F586000
trusted library allocation
page read and write
13A36299000
heap
page read and write
13A42A49000
trusted library allocation
page read and write
13A4B499000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
13A41BF4000
trusted library allocation
page read and write
13A49243000
trusted library allocation
page read and write
13A41247000
trusted library allocation
page read and write
13A4122B000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A3ACF9000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
1643000
heap
page read and write
13A47592000
trusted library allocation
page read and write
13A4716F000
trusted library allocation
page read and write
13A40D89000
trusted library allocation
page read and write
13A4B988000
trusted library allocation
page read and write
13A41543000
trusted library allocation
page read and write
13A4B915000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
13A41689000
trusted library allocation
page read and write
13A415AC000
trusted library allocation
page read and write
13A470CF000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A41224000
trusted library allocation
page read and write
13A412A7000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A4364E000
trusted library allocation
page read and write
13A41823000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A41728000
trusted library allocation
page read and write
13A3FC2A000
trusted library allocation
page read and write
13A41A58000
trusted library allocation
page read and write
13A40EE5000
trusted library allocation
page read and write
13A4B919000
trusted library allocation
page read and write
13A475ED000
trusted library allocation
page read and write
13A41F74000
trusted library allocation
page read and write
13A491A2000
trusted library allocation
page read and write
13A4012A000
trusted library allocation
page read and write
20AC77F0000
unclassified section
page read and write
13A3F254000
trusted library allocation
page read and write
13A414D1000
trusted library allocation
page read and write
13A49306000
trusted library allocation
page read and write
13A411F4000
trusted library allocation
page read and write
13A4153F000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
2CB4BD40000
unclassified section
page readonly
13A492A3000
trusted library allocation
page read and write
13A3F55D000
trusted library allocation
page read and write
13A475F8000
trusted library allocation
page read and write
13A401CB000
trusted library allocation
page read and write
13A3FCC7000
trusted library allocation
page read and write
13A4181D000
trusted library allocation
page read and write
13A417A2000
trusted library allocation
page read and write
13A42A67000
trusted library allocation
page read and write
13A3C369000
trusted library allocation
page read and write
13A41F69000
trusted library allocation
page read and write
13A400BE000
trusted library allocation
page read and write
13A362CE000
heap
page read and write
18FF706B000
trusted library allocation
page read and write
18FF6CC0000
heap
page read and write
13A3C728000
trusted library allocation
page read and write
13A41F97000
trusted library allocation
page read and write
13A40D82000
trusted library allocation
page read and write
13A3C9A8000
trusted library allocation
page read and write
13A401CB000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A362C4000
heap
page read and write
13A41643000
trusted library allocation
page read and write
13A3EDA3000
trusted library allocation
page read and write
13A41827000
trusted library allocation
page read and write
13A3D3DE000
trusted library allocation
page read and write
13A474F0000
trusted library allocation
page read and write
6BDE3DE000
unkown
page readonly
13A415A0000
trusted library allocation
page read and write
13A3D364000
trusted library allocation
page read and write
20AC7989000
trusted library allocation
page read and write
13A411E7000
trusted library allocation
page read and write
13A471FC000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A362C3000
heap
page read and write
13A4013D000
trusted library allocation
page read and write
13A470CF000
trusted library allocation
page read and write
13A3B3BF000
trusted library allocation
page read and write
13A403DD000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A49286000
trusted library allocation
page read and write
13A3EC4B000
trusted library allocation
page read and write
13A41BA7000
trusted library allocation
page read and write
13A41594000
trusted library allocation
page read and write
13A414BA000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A4700F000
trusted library allocation
page read and write
13A4B988000
trusted library allocation
page read and write
13A4037C000
trusted library allocation
page read and write
13A40292000
trusted library allocation
page read and write
13A496FC000
trusted library allocation
page read and write
13A40D6B000
trusted library allocation
page read and write
13A41FD4000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A40EDF000
trusted library allocation
page read and write
13A4123E000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A40E5C000
trusted library allocation
page read and write
13A418E7000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
20AC85AC000
heap
page read and write
13A4ACAD000
trusted library allocation
page read and write
13A49301000
trusted library allocation
page read and write
13A471CE000
trusted library allocation
page read and write
13A4926D000
trusted library allocation
page read and write
13A4B0F9000
trusted library allocation
page read and write
75131FE000
stack
page read and write
20AC8684000
heap
page read and write
13A362DC000
heap
page read and write
13A4161F000
trusted library allocation
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A47018000
trusted library allocation
page read and write
13A3F6F8000
trusted library allocation
page read and write
13A474C3000
trusted library allocation
page read and write
13A41E9C000
trusted library allocation
page read and write
13A475F6000
trusted library allocation
page read and write
13A401CB000
trusted library allocation
page read and write
13A40148000
trusted library allocation
page read and write
13A416C6000
trusted library allocation
page read and write
13A4758C000
trusted library allocation
page read and write
13A40969000
trusted library allocation
page read and write
13A3F05A000
trusted library allocation
page read and write
13A362CA000
heap
page read and write
13A42993000
trusted library allocation
page read and write
13A415D7000
trusted library allocation
page read and write
13A41556000
trusted library allocation
page read and write
13A4123B000
trusted library allocation
page read and write
13A42930000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A36290000
heap
page read and write
13A36290000
heap
page read and write
13A4AF7F000
trusted library allocation
page read and write
13A412A0000
trusted library allocation
page read and write
13A416C6000
trusted library allocation
page read and write
13A475CB000
trusted library allocation
page read and write
13A3C898000
trusted library allocation
page read and write
13A41FEE000
trusted library allocation
page read and write
20AC7900000
trusted library allocation
page read and write
20AC7948000
trusted library allocation
page read and write
13A47539000
trusted library allocation
page read and write
13A42B71000
trusted library allocation
page read and write
13A40D89000
trusted library allocation
page read and write
13A3C96F000
trusted library allocation
page read and write
13A470C9000
trusted library allocation
page read and write
13A3D3C9000
trusted library allocation
page read and write
13A475A5000
trusted library allocation
page read and write
13A412A7000
trusted library allocation
page read and write
13A3C8F9000
trusted library allocation
page read and write
13A3EDAE000
trusted library allocation
page read and write
18FF6D2F000
unclassified section
page read and write
13A362AE000
heap
page read and write
13A4979F000
trusted library allocation
page read and write
13A48AC9000
trusted library allocation
page read and write
13A3C87C000
trusted library allocation
page read and write
13A40670000
trusted library allocation
page read and write
13A4057E000
trusted library allocation
page read and write
13A3F6FC000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
13A4B9E7000
trusted library allocation
page read and write
20AC8640000
heap
page read and write
13A362CA000
heap
page read and write
13A40E80000
trusted library allocation
page read and write
13A40EED000
trusted library allocation
page read and write
20AC7976000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A4AFFC000
trusted library allocation
page read and write
13A411BB000
trusted library allocation
page read and write
13A3CBC8000
heap
page read and write
13A40D82000
trusted library allocation
page read and write
13A41A44000
trusted library allocation
page read and write
13A419F4000
trusted library allocation
page read and write
13A4AFA6000
trusted library allocation
page read and write
13A3C8CA000
trusted library allocation
page read and write
13A3F54C000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A3F22D000
trusted library allocation
page read and write
13A4AC69000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A41AFD000
trusted library allocation
page read and write
13A4A8F0000
trusted library allocation
page read and write
13A3C3AD000
trusted library allocation
page read and write
13A415AC000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A406D3000
trusted library allocation
page read and write
13A47552000
trusted library allocation
page read and write
13A3FAC6000
trusted library allocation
page read and write
13A3ED30000
trusted library allocation
page read and write
13A4B9F6000
trusted library allocation
page read and write
13A40D9F000
trusted library allocation
page read and write
13A3CB78000
heap
page read and write
13A48AE2000
trusted library allocation
page read and write
13A4B2E5000
trusted library allocation
page read and write
13A3F0D6000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A416C6000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4178A000
trusted library allocation
page read and write
13A4014F000
trusted library allocation
page read and write
13A3C3A8000
trusted library allocation
page read and write
13A473A7000
trusted library allocation
page read and write
13A41275000
trusted library allocation
page read and write
13A4924D000
trusted library allocation
page read and write
13A42F0B000
trusted library allocation
page read and write
2CB4C338000
trusted library allocation
page read and write
13A4B2E1000
trusted library allocation
page read and write
13A4B036000
trusted library allocation
page read and write
20AC85A3000
heap
page read and write
13A42A7A000
trusted library allocation
page read and write
13A3C877000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A41EE5000
trusted library allocation
page read and write
13A3F562000
trusted library allocation
page read and write
13A415BE000
trusted library allocation
page read and write
13A3F076000
trusted library allocation
page read and write
13A4014F000
trusted library allocation
page read and write
13A42BF7000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A4B2E9000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A491A2000
trusted library allocation
page read and write
18FF7024000
trusted library allocation
page read and write
13A41A58000
trusted library allocation
page read and write
13A3F65D000
trusted library allocation
page read and write
13A3D37A000
trusted library allocation
page read and write
13A401FB000
trusted library allocation
page read and write
13A47600000
trusted library allocation
page read and write
13A47018000
trusted library allocation
page read and write
F8129BE000
stack
page read and write
13A3F54A000
trusted library allocation
page read and write
13A4178A000
trusted library allocation
page read and write
2CB4C31F000
trusted library allocation
page read and write
20AC7EEE000
unkown
page execute read
13A4B0FB000
trusted library allocation
page read and write
13A41231000
trusted library allocation
page read and write
13A362C1000
heap
page read and write
13A3CBFA000
heap
page read and write
13A362AF000
heap
page read and write
13A41275000
trusted library allocation
page read and write
20AC8684000
heap
page read and write
13A3F94D000
trusted library allocation
page read and write
13A478EB000
trusted library allocation
page read and write
13A47587000
trusted library allocation
page read and write
20AC85A0000
heap
page read and write
20AC866A000
heap
page read and write
13A4AF88000
trusted library allocation
page read and write
13A4120E000
trusted library allocation
page read and write
13A48A8A000
trusted library allocation
page read and write
13A409A1000
trusted library allocation
page read and write
20AC79EB000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A4B394000
trusted library allocation
page read and write
13A40D06000
trusted library allocation
page read and write
DF0000
heap
page read and write
13A3CBFE000
heap
page read and write
13A3629A000
heap
page read and write
13A4098B000
trusted library allocation
page read and write
13A4B9D6000
trusted library allocation
page read and write
13A401F7000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A47157000
trusted library allocation
page read and write
13A4B551000
heap
page read and write
13A48ACD000
trusted library allocation
page read and write
13A41A55000
trusted library allocation
page read and write
13A478D5000
trusted library allocation
page read and write
13A4B9DC000
trusted library allocation
page read and write
13A41BD8000
trusted library allocation
page read and write
13A41244000
trusted library allocation
page read and write
13A409BD000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
18FF70A8000
trusted library allocation
page read and write
13A3FC27000
trusted library allocation
page read and write
13A4ACD5000
trusted library allocation
page read and write
13A4745E000
trusted library allocation
page read and write
13A3B2FB000
trusted library allocation
page read and write
13A3D33B000
trusted library allocation
page read and write
13A419F4000
trusted library allocation
page read and write
13A36303000
heap
page read and write
13A4122B000
trusted library allocation
page read and write
13A4164C000
trusted library allocation
page read and write
13A48A85000
trusted library allocation
page read and write
13A4172A000
trusted library allocation
page read and write
13A4932C000
trusted library allocation
page read and write
13A3FC6F000
trusted library allocation
page read and write
13A4B9F6000
trusted library allocation
page read and write
2CB4C1B7000
trusted library allocation
page read and write
13A362A8000
heap
page read and write
F81193E000
stack
page read and write
2CB4BEE0000
heap
page read and write
13A3C8A8000
trusted library allocation
page read and write
13A47387000
trusted library allocation
page read and write
13A40D35000
trusted library allocation
page read and write
13A3ECB1000
trusted library allocation
page read and write
20AC85A9000
heap
page read and write
13A36296000
heap
page read and write
13A40D89000
trusted library allocation
page read and write
13A4B460000
trusted library allocation
page read and write
13A474BB000
trusted library allocation
page read and write
13A400C7000
trusted library allocation
page read and write
13A41A44000
trusted library allocation
page read and write
20AC8698000
heap
page read and write
13A4B3B0000
trusted library allocation
page read and write
13A3C3C7000
trusted library allocation
page read and write
13A419FB000
trusted library allocation
page read and write
13A41EF0000
trusted library allocation
page read and write
13A4702A000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A4B036000
trusted library allocation
page read and write
13A4173F000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A406A3000
trusted library allocation
page read and write
2CB4C260000
heap
page read and write
13A3C736000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A4043C000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A4B0F7000
trusted library allocation
page read and write
13A4705B000
trusted library allocation
page read and write
20AC8631000
heap
page read and write
13A3C874000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A412A3000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3D395000
trusted library allocation
page read and write
13A403E7000
trusted library allocation
page read and write
13A41FFD000
trusted library allocation
page read and write
6BE05FE000
unkown
page readonly
13A40E8F000
trusted library allocation
page read and write
13A41BF8000
trusted library allocation
page read and write
13A3F94D000
trusted library allocation
page read and write
13A3F586000
trusted library allocation
page read and write
20AC86B7000
heap
page read and write
164A000
heap
page read and write
20AC8549000
heap
page read and write
13A3F04C000
trusted library allocation
page read and write
13A3C898000
trusted library allocation
page read and write
13A412FD000
trusted library allocation
page read and write
13A40141000
trusted library allocation
page read and write
18FF7100000
heap
page read and write
13A3F6D2000
trusted library allocation
page read and write
13A4A836000
trusted library allocation
page read and write
13A47897000
trusted library allocation
page read and write
13A362A7000
heap
page read and write
13A40D2C000
trusted library allocation
page read and write
13A40E8D000
trusted library allocation
page read and write
13A41240000
trusted library allocation
page read and write
13A3FA33000
trusted library allocation
page read and write
13A4B006000
trusted library allocation
page read and write
13A416B5000
trusted library allocation
page read and write
13A41E5C000
trusted library allocation
page read and write
13A48AE5000
trusted library allocation
page read and write
13A471BA000
trusted library allocation
page read and write
13A473B3000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A419C1000
trusted library allocation
page read and write
13A4021B000
trusted library allocation
page read and write
1642000
heap
page read and write
13A362B1000
heap
page read and write
13A415F7000
trusted library allocation
page read and write
13A3F391000
trusted library allocation
page read and write
13A47475000
trusted library allocation
page read and write
13A3C834000
trusted library allocation
page read and write
13A42A3F000
trusted library allocation
page read and write
13A401C3000
trusted library allocation
page read and write
18FF7300000
trusted library allocation
page read and write
13A418C8000
trusted library allocation
page read and write
13A40405000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A3CBFA000
heap
page read and write
13A400C3000
trusted library allocation
page read and write
13A4126D000
trusted library allocation
page read and write
1F696CC3000
heap
page read and write
13A415D9000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
13A415F7000
trusted library allocation
page read and write
13A49F9E000
trusted library allocation
page read and write
13A4299B000
trusted library allocation
page read and write
1665000
heap
page read and write
13A46E32000
trusted library allocation
page read and write
13A401A3000
trusted library allocation
page read and write
18FF707B000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
13A4ACFB000
trusted library allocation
page read and write
13A4A400000
trusted library allocation
page read and write
13A47886000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
2CB4C31C000
trusted library allocation
page read and write
13A40D67000
trusted library allocation
page read and write
13A3C3AD000
trusted library allocation
page read and write
13A4B97B000
trusted library allocation
page read and write
1643000
heap
page read and write
13A4B034000
trusted library allocation
page read and write
13A42A1C000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A3D3B8000
trusted library allocation
page read and write
13A475B0000
trusted library allocation
page read and write
13A3F36B000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A362AE000
heap
page read and write
13A41BC8000
trusted library allocation
page read and write
13A47365000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A41288000
trusted library allocation
page read and write
13A3F6F5000
trusted library allocation
page read and write
13A47015000
trusted library allocation
page read and write
13A417C6000
trusted library allocation
page read and write
13A48AAC000
trusted library allocation
page read and write
13A40971000
trusted library allocation
page read and write
1E0E000
stack
page read and write
13A475BF000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
13A417F2000
trusted library allocation
page read and write
13A41B95000
trusted library allocation
page read and write
13A3EDF6000
trusted library allocation
page read and write
13A4B93A000
trusted library allocation
page read and write
13A41697000
trusted library allocation
page read and write
13A4AC70000
trusted library allocation
page read and write
13A4157A000
trusted library allocation
page read and write
1632000
heap
page read and write
13A4B9D6000
trusted library allocation
page read and write
13A4AF2E000
trusted library allocation
page read and write
13A362B2000
heap
page read and write
13A41674000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A362B8000
heap
page read and write
13A401C0000
trusted library allocation
page read and write
13A4152F000
trusted library allocation
page read and write
13A40FC0000
trusted library allocation
page read and write
13A42BA1000
trusted library allocation
page read and write
1F696C90000
heap
page read and write
13A48AD0000
trusted library allocation
page read and write
20AC7978000
trusted library allocation
page read and write
20AC85CA000
heap
page read and write
13A4155B000
trusted library allocation
page read and write
13CE000
stack
page read and write
13A416C8000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A4759A000
trusted library allocation
page read and write
13A48AE2000
trusted library allocation
page read and write
1662000
heap
page read and write
13A475AE000
trusted library allocation
page read and write
13A3D3E6000
trusted library allocation
page read and write
13A3FAF9000
trusted library allocation
page read and write
13A412A0000
trusted library allocation
page read and write
13A41244000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
13A419FB000
trusted library allocation
page read and write
13A4B49C000
trusted library allocation
page read and write
20AC8632000
heap
page read and write
13A41735000
trusted library allocation
page read and write
13A412CD000
trusted library allocation
page read and write
13A492A7000
trusted library allocation
page read and write
13A492E4000
trusted library allocation
page read and write
13A41BF5000
trusted library allocation
page read and write
13A3D38D000
trusted library allocation
page read and write
13A42AE0000
trusted library allocation
page read and write
13A42B8E000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A41559000
trusted library allocation
page read and write
13A42A26000
trusted library allocation
page read and write
13A4B9D3000
trusted library allocation
page read and write
13A3F060000
trusted library allocation
page read and write
13A473AD000
trusted library allocation
page read and write
13A41BA7000
trusted library allocation
page read and write
13A3FC1C000
trusted library allocation
page read and write
18FF6D22000
unclassified section
page read and write
13A4B3BA000
trusted library allocation
page read and write
13A41BCC000
trusted library allocation
page read and write
13A4A002000
trusted library allocation
page read and write
1F696CC2000
heap
page read and write
13A46E1E000
trusted library allocation
page read and write
13A4B276000
trusted library allocation
page read and write
13A3C95F000
trusted library allocation
page read and write
13A40E79000
trusted library allocation
page read and write
20AC85E8000
heap
page read and write
13A4176F000
trusted library allocation
page read and write
13A4B926000
trusted library allocation
page read and write
13A42A7A000
trusted library allocation
page read and write
20AC8629000
heap
page read and write
13A362BE000
heap
page read and write
13A475BA000
trusted library allocation
page read and write
13A40696000
trusted library allocation
page read and write
13A40E42000
trusted library allocation
page read and write
20AC8631000
heap
page read and write
13A492C5000
trusted library allocation
page read and write
13A4B94E000
trusted library allocation
page read and write
13A3ACBF000
trusted library allocation
page read and write
13A4B0EF000
trusted library allocation
page read and write
13A3CB78000
heap
page read and write
13A49793000
trusted library allocation
page read and write
13A473D7000
trusted library allocation
page read and write
13A41B84000
trusted library allocation
page read and write
13A3F9CB000
trusted library allocation
page read and write
13A4B9FD000
trusted library allocation
page read and write
100A1FE000
unkown
page readonly
1F697000000
trusted library allocation
page read and write
13A3F34F000
trusted library allocation
page read and write
13A4B2AC000
trusted library allocation
page read and write
13A4926D000
trusted library allocation
page read and write
13A362F5000
heap
page read and write
13A3FD4A000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A362F0000
heap
page read and write
13A3F545000
trusted library allocation
page read and write
20AC79C2000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
13A3B3C8000
trusted library allocation
page read and write
13A473A7000
trusted library allocation
page read and write
13A48ACB000
trusted library allocation
page read and write
13A47024000
trusted library allocation
page read and write
2344000
heap
page read and write
13A36296000
heap
page read and write
13A3D3C7000
trusted library allocation
page read and write
13A4B94E000
trusted library allocation
page read and write
20AC795C000
trusted library allocation
page read and write
13A4B9BA000
trusted library allocation
page read and write
13A4B9C3000
trusted library allocation
page read and write
13A4B5D1000
heap
page read and write
13A42F49000
trusted library allocation
page read and write
13A414B6000
trusted library allocation
page read and write
13A401CB000
trusted library allocation
page read and write
2CB4BF33000
heap
page read and write
13A473ED000
trusted library allocation
page read and write
13A419FB000
trusted library allocation
page read and write
13A40E7E000
trusted library allocation
page read and write
13A43893000
trusted library allocation
page read and write
13A4932C000
trusted library allocation
page read and write
13A41F63000
trusted library allocation
page read and write
2CB4C15B000
trusted library allocation
page read and write
13A4AFFC000
trusted library allocation
page read and write
13A47425000
trusted library allocation
page read and write
13A409F1000
trusted library allocation
page read and write
13A3FDAE000
trusted library allocation
page read and write
1632000
heap
page read and write
13A41249000
trusted library allocation
page read and write
13A3F6FE000
trusted library allocation
page read and write
13A3FCD1000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A41683000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3630C000
heap
page read and write
13A49205000
trusted library allocation
page read and write
13A412A3000
trusted library allocation
page read and write
13A418B1000
trusted library allocation
page read and write
13A3EC29000
trusted library allocation
page read and write
13A4AF0F000
trusted library allocation
page read and write
13A41BC3000
trusted library allocation
page read and write
13A47022000
trusted library allocation
page read and write
13A3B276000
trusted library allocation
page read and write
F8110FE000
unkown
page readonly
13A491C8000
trusted library allocation
page read and write
13A3FCB6000
trusted library allocation
page read and write
379B77A1000
trusted library allocation
page execute read
13A49FCE000
trusted library allocation
page read and write
13A41BFC000
trusted library allocation
page read and write
13A3FAA0000
trusted library allocation
page read and write
13A3FCCB000
trusted library allocation
page read and write
13A42F51000
trusted library allocation
page read and write
13A3D3C9000
trusted library allocation
page read and write
20AC8698000
heap
page read and write
13A3F363000
trusted library allocation
page read and write
13A406FD000
trusted library allocation
page read and write
13A3D3E2000
trusted library allocation
page read and write
13A40D7E000
trusted library allocation
page read and write
18FF6DA3000
heap
page read and write
13A4A8B4000
trusted library allocation
page read and write
13A48AF0000
trusted library allocation
page read and write
13A3630C000
heap
page read and write
13A3628E000
heap
page read and write
15B0000
trusted library allocation
page read and write
13A3F586000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
220E000
stack
page read and write
13A411C0000
trusted library allocation
page read and write
13A4749E000
trusted library allocation
page read and write
13A429C5000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A3ED6E000
trusted library allocation
page read and write
20AC77D0000
heap
page readonly
13A473E5000
trusted library allocation
page read and write
13A4AFC0000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A40DB0000
trusted library allocation
page read and write
13A409C3000
trusted library allocation
page read and write
13A4B98B000
trusted library allocation
page read and write
13A4718D000
trusted library allocation
page read and write
13A3FAED000
trusted library allocation
page read and write
13A414BA000
trusted library allocation
page read and write
13A475C6000
trusted library allocation
page read and write
13A40956000
trusted library allocation
page read and write
13A40F54000
trusted library allocation
page read and write
13A3B3E4000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A3F382000
trusted library allocation
page read and write
13A3B3DB000
trusted library allocation
page read and write
13A412A3000
trusted library allocation
page read and write
20AC799F000
trusted library allocation
page read and write
13A4145E000
trusted library allocation
page read and write
13A3D39D000
trusted library allocation
page read and write
13A4B2E5000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
13A3ACCC000
trusted library allocation
page read and write
13A41275000
trusted library allocation
page read and write
13A42A5C000
trusted library allocation
page read and write
13A40D70000
trusted library allocation
page read and write
13A3D3DE000
trusted library allocation
page read and write
13A470D1000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A40D11000
trusted library allocation
page read and write
13A4B460000
trusted library allocation
page read and write
13A496CC000
trusted library allocation
page read and write
13A409FB000
trusted library allocation
page read and write
18FF6BA0000
unclassified section
page readonly
13A4ACD9000
trusted library allocation
page read and write
13A3FC11000
trusted library allocation
page read and write
13A41890000
trusted library allocation
page read and write
13A41BB9000
trusted library allocation
page read and write
13A3FADB000
trusted library allocation
page read and write
13A3FD65000
trusted library allocation
page read and write
2CB4C172000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A4B2A8000
trusted library allocation
page read and write
13A47882000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A3CBE5000
heap
page read and write
13A417E2000
trusted library allocation
page read and write
13A362A6000
heap
page read and write
13A475FC000
trusted library allocation
page read and write
13A3FADC000
trusted library allocation
page read and write
13A3F389000
trusted library allocation
page read and write
13A3ECAB000
trusted library allocation
page read and write
13A41FEB000
trusted library allocation
page read and write
13A47545000
trusted library allocation
page read and write
13A492AC000
trusted library allocation
page read and write
2B62C370000
heap
page read and write
13A49205000
trusted library allocation
page read and write
20AC8628000
heap
page read and write
20AC8621000
heap
page read and write
13A40FA4000
trusted library allocation
page read and write
13A3FC12000
trusted library allocation
page read and write
13A4B94E000
trusted library allocation
page read and write
13A3D3CD000
trusted library allocation
page read and write
13A4ACAD000
trusted library allocation
page read and write
13A41A44000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A362CD000
heap
page read and write
13A3C8B4000
trusted library allocation
page read and write
13A4703E000
trusted library allocation
page read and write
20AC86B9000
heap
page read and write
13A406DB000
trusted library allocation
page read and write
13A4B3DD000
trusted library allocation
page read and write
13A473D3000
trusted library allocation
page read and write
13A4B038000
trusted library allocation
page read and write
13A3B400000
trusted library allocation
page read and write
13A4099C000
trusted library allocation
page read and write
13A419F4000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A362AF000
heap
page read and write
18FF70F4000
trusted library allocation
page read and write
13A3F695000
trusted library allocation
page read and write
13A49F2F000
trusted library allocation
page read and write
13A417B5000
trusted library allocation
page read and write
13A3C8AF000
trusted library allocation
page read and write
20AC8631000
heap
page read and write
13A41A58000
trusted library allocation
page read and write
13A40D9F000
trusted library allocation
page read and write
13A3CB9F000
heap
page read and write
20AC77F2000
unclassified section
page read and write
2CB4C181000
trusted library allocation
page read and write
13A40171000
trusted library allocation
page read and write
13A4704E000
trusted library allocation
page read and write
13A415D4000
trusted library allocation
page read and write
F810FFE000
unkown
page readonly
2CB4C264000
heap
page read and write
13A362AF000
heap
page read and write
13A3FDEA000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
2CB4C332000
trusted library allocation
page read and write
13A415ED000
trusted library allocation
page read and write
13A3CBFA000
heap
page read and write
13A3F37D000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
1F696DC0000
heap
page read and write
13A3C834000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
49C000
unkown
page readonly
13A42ABF000
trusted library allocation
page read and write
13A36303000
heap
page read and write
13A3D3F1000
trusted library allocation
page read and write
13A4AFBC000
trusted library allocation
page read and write
13A471D4000
trusted library allocation
page read and write
13A3AC81000
trusted library allocation
page read and write
20AC8684000
heap
page read and write
18FF7011000
trusted library allocation
page read and write
13A4B9FE000
trusted library allocation
page read and write
13A4B91B000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
20AC7964000
trusted library allocation
page read and write
13A36296000
heap
page read and write
13A4AC27000
trusted library allocation
page read and write
13A401FB000
trusted library allocation
page read and write
13A405BB000
trusted library allocation
page read and write
18FF7203000
trusted library allocation
page read and write
13A3F0FD000
trusted library allocation
page read and write
20AC7E60000
trusted library section
page readonly
13A362F2000
heap
page read and write
1658000
heap
page read and write
13A3F54C000
trusted library allocation
page read and write
13A41FEE000
trusted library allocation
page read and write
13A41220000
trusted library allocation
page read and write
13A478A8000
trusted library allocation
page read and write
13A3629C000
heap
page read and write
13A47039000
trusted library allocation
page read and write
13A48A9B000
trusted library allocation
page read and write
13A362F5000
heap
page read and write
20AC8626000
heap
page read and write
13A474DB000
trusted library allocation
page read and write
13A48A64000
trusted library allocation
page read and write
13A3B271000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A42AC7000
trusted library allocation
page read and write
20AC77FF000
unclassified section
page read and write
13A362BE000
heap
page read and write
13A4099C000
trusted library allocation
page read and write
13A42AFC000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A4170F000
trusted library allocation
page read and write
13A4AF2E000
trusted library allocation
page read and write
13A403EE000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A3EE21000
trusted library allocation
page read and write
13A4B556000
heap
page read and write
13A3F65B000
trusted library allocation
page read and write
13A41F5B000
trusted library allocation
page read and write
13A41FEE000
trusted library allocation
page read and write
13A3C979000
trusted library allocation
page read and write
13A41BD3000
trusted library allocation
page read and write
162F000
heap
page read and write
13A4B443000
trusted library allocation
page read and write
13A4B545000
heap
page read and write
13A4298C000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4926D000
trusted library allocation
page read and write
13A4B952000
trusted library allocation
page read and write
13A41A55000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A4A8E9000
trusted library allocation
page read and write
13A49207000
trusted library allocation
page read and write
18FF7078000
trusted library allocation
page read and write
13A4B3FD000
trusted library allocation
page read and write
13A4B97D000
trusted library allocation
page read and write
13A3F6B6000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A42AF8000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A42A49000
trusted library allocation
page read and write
20AC86AD000
heap
page read and write
13A415FB000
trusted library allocation
page read and write
13A3C380000
trusted library allocation
page read and write
13A3ED95000
trusted library allocation
page read and write
13A409F8000
trusted library allocation
page read and write
13A362CF000
heap
page read and write
13A42AE0000
trusted library allocation
page read and write
13A4703F000
trusted library allocation
page read and write
13A492A7000
trusted library allocation
page read and write
13A41F74000
trusted library allocation
page read and write
13A416B5000
trusted library allocation
page read and write
13A41266000
trusted library allocation
page read and write
13A3C369000
trusted library allocation
page read and write
13A48A86000
trusted library allocation
page read and write
13A3F08A000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A413C6000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
1640000
heap
page read and write
18FF705D000
trusted library allocation
page read and write
13A4AC72000
trusted library allocation
page read and write
13A42964000
trusted library allocation
page read and write
13A492A7000
trusted library allocation
page read and write
13A42AC2000
trusted library allocation
page read and write
13A46E00000
trusted library allocation
page read and write
13A415FB000
trusted library allocation
page read and write
13A4185D000
trusted library allocation
page read and write
13A41346000
trusted library allocation
page read and write
13A40EE5000
trusted library allocation
page read and write
13A48A6A000
trusted library allocation
page read and write
13A40E7B000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A362F2000
heap
page read and write
13A416CC000
trusted library allocation
page read and write
13A3629F000
heap
page read and write
13A4B924000
trusted library allocation
page read and write
13A41F1B000
trusted library allocation
page read and write
13A4AFA6000
trusted library allocation
page read and write
13A436F1000
trusted library allocation
page read and write
13A3F6AF000
trusted library allocation
page read and write
13A418E4000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A41A47000
trusted library allocation
page read and write
13A418CE000
trusted library allocation
page read and write
13A473D7000
trusted library allocation
page read and write
13A4B44F000
trusted library allocation
page read and write
13A3FA40000
trusted library allocation
page read and write
13A3C929000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A4A858000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
20AC7EE9000
unkown
page execute read
13A4B065000
trusted library allocation
page read and write
13A4012A000
trusted library allocation
page read and write
13A40D94000
trusted library allocation
page read and write
18FF6F00000
trusted library allocation
page read and write
13A48AEE000
trusted library allocation
page read and write
2CB4C31A000
trusted library allocation
page read and write
13A416E1000
trusted library allocation
page read and write
13A475F8000
trusted library allocation
page read and write
13A42A77000
trusted library allocation
page read and write
13A4B93A000
trusted library allocation
page read and write
401000
unkown
page execute read
13A362A9000
heap
page read and write
20AC7640000
heap
page read and write
13A43837000
trusted library allocation
page read and write
13A4B0F1000
trusted library allocation
page read and write
1F696F25000
heap
page read and write
13A3628E000
heap
page read and write
13A4125F000
trusted library allocation
page read and write
13A4704D000
trusted library allocation
page read and write
13A4ACC2000
trusted library allocation
page read and write
13A414A5000
trusted library allocation
page read and write
13A3EE12000
trusted library allocation
page read and write
20AC862D000
heap
page read and write
13A4ACFB000
trusted library allocation
page read and write
13A4B0B2000
trusted library allocation
page read and write
13A4755A000
trusted library allocation
page read and write
13A41247000
trusted library allocation
page read and write
13A475ED000
trusted library allocation
page read and write
13A3D369000
trusted library allocation
page read and write
13A3C82F000
trusted library allocation
page read and write
13A48A5F000
trusted library allocation
page read and write
13A470D7000
trusted library allocation
page read and write
13A4B3EF000
trusted library allocation
page read and write
13A4128C000
trusted library allocation
page read and write
13A40D94000
trusted library allocation
page read and write
13A41823000
trusted library allocation
page read and write
13A3B326000
trusted library allocation
page read and write
13A4B3EF000
trusted library allocation
page read and write
13A41F83000
trusted library allocation
page read and write
13A4B2DF000
trusted library allocation
page read and write
13A4717F000
trusted library allocation
page read and write
13A4A8EE000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A3C8AF000
trusted library allocation
page read and write
13A3F6B2000
trusted library allocation
page read and write
13A4B2E7000
trusted library allocation
page read and write
2B62C1D0000
heap
page read and write
13A4B556000
heap
page read and write
13A41BCC000
trusted library allocation
page read and write
13A475BC000
trusted library allocation
page read and write
13A41240000
trusted library allocation
page read and write
13A362BC000
heap
page read and write
13A418D5000
trusted library allocation
page read and write
13A475EF000
trusted library allocation
page read and write
13A48A86000
trusted library allocation
page read and write
13A4157A000
trusted library allocation
page read and write
13A4736D000
trusted library allocation
page read and write
18FF7030000
trusted library allocation
page read and write
13A4ACED000
trusted library allocation
page read and write
13A418E4000
trusted library allocation
page read and write
13A4758E000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A3D3F0000
trusted library allocation
page read and write
13A3FAFD000
trusted library allocation
page read and write
13A41253000
trusted library allocation
page read and write
13A3FCB6000
trusted library allocation
page read and write
13A42A6F000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
20AC85AC000
heap
page read and write
13A4746B000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A3FD29000
trusted library allocation
page read and write
13A47315000
trusted library allocation
page read and write
13A41532000
trusted library allocation
page read and write
13A4164C000
trusted library allocation
page read and write
13A3B3E0000
trusted library allocation
page read and write
13A42A7F000
trusted library allocation
page read and write
13A362A5000
heap
page read and write
13A42AC2000
trusted library allocation
page read and write
13A47174000
trusted library allocation
page read and write
13A41240000
trusted library allocation
page read and write
13A3CB78000
heap
page read and write
13A3CB8C000
heap
page read and write
13A4B2DD000
trusted library allocation
page read and write
13A42BA6000
trusted library allocation
page read and write
13A48A4D000
trusted library allocation
page read and write
13A418A6000
trusted library allocation
page read and write
13A362CD000
heap
page read and write
13A40D20000
trusted library allocation
page read and write
13A362F4000
heap
page read and write
13A3629C000
heap
page read and write
13A41547000
trusted library allocation
page read and write
13A48AB5000
trusted library allocation
page read and write
2B62C309000
heap
page read and write
13A362F2000
heap
page read and write
13A3ED5A000
trusted library allocation
page read and write
13A4932E000
trusted library allocation
page read and write
13A42B8E000
trusted library allocation
page read and write
13A36303000
heap
page read and write
13A3FC1D000
trusted library allocation
page read and write
13A3D3CD000
trusted library allocation
page read and write
13A3F925000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A41FE7000
trusted library allocation
page read and write
1F6988AF000
heap
page read and write
13A49301000
trusted library allocation
page read and write
13A3C886000
trusted library allocation
page read and write
13A4ACED000
trusted library allocation
page read and write
13A475FC000
trusted library allocation
page read and write
13A3C360000
trusted library allocation
page read and write
13A3CBAC000
heap
page read and write
13A47870000
trusted library allocation
page read and write
13A4B3A4000
trusted library allocation
page read and write
13A362CE000
heap
page read and write
1F6988A0000
heap
page read and write
13A4069B000
trusted library allocation
page read and write
13A41E38000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
13A414C3000
trusted library allocation
page read and write
13A413E5000
trusted library allocation
page read and write
13A401A2000
trusted library allocation
page read and write
1667000
heap
page read and write
13A3B3D9000
trusted library allocation
page read and write
13A362F0000
heap
page read and write
13A3F047000
trusted library allocation
page read and write
13A4B93A000
trusted library allocation
page read and write
13A3C360000
trusted library allocation
page read and write
13A416F6000
trusted library allocation
page read and write
13A362C3000
heap
page read and write
13A3CBA0000
heap
page read and write
13A3C8A5000
trusted library allocation
page read and write
13A3FCA6000
trusted library allocation
page read and write
2CB4C30C000
trusted library allocation
page read and write
13A41EF0000
trusted library allocation
page read and write
13A362B1000
heap
page read and write
13A40141000
trusted library allocation
page read and write
13A415AC000
trusted library allocation
page read and write
15A4000
heap
page read and write
13A406C4000
trusted library allocation
page read and write
13A416CE000
trusted library allocation
page read and write
13A3F07E000
trusted library allocation
page read and write
2CB4BF60000
heap
page readonly
13A41F9E000
trusted library allocation
page read and write
13A4AFD3000
trusted library allocation
page read and write
13A416F9000
trusted library allocation
page read and write
13A3CB86000
heap
page read and write
13A4B0F1000
trusted library allocation
page read and write
13A478D5000
trusted library allocation
page read and write
13A47066000
trusted library allocation
page read and write
20AC7973000
trusted library allocation
page read and write
13A4170F000
trusted library allocation
page read and write
13A4B41D000
trusted library allocation
page read and write
13A42AC7000
trusted library allocation
page read and write
13A41776000
trusted library allocation
page read and write
13A41784000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A418F9000
trusted library allocation
page read and write
13A3F0B1000
trusted library allocation
page read and write
13A41826000
trusted library allocation
page read and write
13A3F5A2000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A417B4000
trusted library allocation
page read and write
18FF6C15000
remote allocation
page execute read
13A42A7A000
trusted library allocation
page read and write
20AC85A9000
heap
page read and write
13A40EEB000
trusted library allocation
page read and write
20AC7780000
heap
page read and write
13A48AE5000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A42BDC000
trusted library allocation
page read and write
13A4B3CB000
trusted library allocation
page read and write
13A40D94000
trusted library allocation
page read and write
13A3F07B000
trusted library allocation
page read and write
13A362D3000
heap
page read and write
100C47E000
unkown
page readonly
13A4094E000
trusted library allocation
page read and write
13A42A7F000
trusted library allocation
page read and write
13A3D31F000
trusted library allocation
page read and write
13A471C0000
trusted library allocation
page read and write
13A41B8A000
trusted library allocation
page read and write
13A4ACAD000
trusted library allocation
page read and write
13A3F23B000
trusted library allocation
page read and write
13A3FC12000
trusted library allocation
page read and write
13A3F93C000
trusted library allocation
page read and write
13A491E5000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A362F9000
heap
page read and write
20AC866D000
heap
page read and write
13A473A7000
trusted library allocation
page read and write
13A3F6B6000
trusted library allocation
page read and write
13A48ACB000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A42F16000
trusted library allocation
page read and write
2CB4BDC2000
remote allocation
page execute read
13A4736B000
trusted library allocation
page read and write
13A36304000
heap
page read and write
4C2000
unkown
page readonly
13A42A67000
trusted library allocation
page read and write
13A3F5CB000
trusted library allocation
page read and write
20AC7EF0000
trusted library allocation
page read and write
13A42AC7000
trusted library allocation
page read and write
13A3D38B000
trusted library allocation
page read and write
13A4B9D9000
trusted library allocation
page read and write
13A42AFC000
trusted library allocation
page read and write
13A4B553000
heap
page read and write
13A41244000
trusted library allocation
page read and write
13A48ACF000
trusted library allocation
page read and write
13A4B2DB000
trusted library allocation
page read and write
13A42AC7000
trusted library allocation
page read and write
13A473F9000
trusted library allocation
page read and write
13A42968000
trusted library allocation
page read and write
2CB4C000000
trusted library allocation
page read and write
13A3F55F000
trusted library allocation
page read and write
13A4AFBC000
trusted library allocation
page read and write
20AC7903000
trusted library allocation
page read and write
13A41291000
trusted library allocation
page read and write
13A3C834000
trusted library allocation
page read and write
13A4A8EE000
trusted library allocation
page read and write
13A40E82000
trusted library allocation
page read and write
13A4173A000
trusted library allocation
page read and write
13A4A839000
trusted library allocation
page read and write
13A4013A000
trusted library allocation
page read and write
13A3F6B8000
trusted library allocation
page read and write
13A3C8F9000
trusted library allocation
page read and write
20AC867B000
heap
page read and write
18FF7200000
trusted library allocation
page read and write
13A4B97D000
trusted library allocation
page read and write
13A4B2E9000
trusted library allocation
page read and write
20AC85F9000
heap
page read and write
13A48ACF000
trusted library allocation
page read and write
20AC85CA000
heap
page read and write
13A36290000
heap
page read and write
13A48AD2000
trusted library allocation
page read and write
13A41242000
trusted library allocation
page read and write
13A4B54D000
heap
page read and write
13A4157A000
trusted library allocation
page read and write
13A4AF30000
trusted library allocation
page read and write
2CB4C117000
trusted library allocation
page read and write
13A4A01C000
trusted library allocation
page read and write
13A478B3000
trusted library allocation
page read and write
13A43230000
trusted library allocation
page read and write
13A4B26A000
trusted library allocation
page read and write
13A3FA99000
trusted library allocation
page read and write
13A411C9000
trusted library allocation
page read and write
2CB4C17B000
trusted library allocation
page read and write
1646000
heap
page read and write
13A4AC70000
trusted library allocation
page read and write
13A41728000
trusted library allocation
page read and write
13A362B8000
heap
page read and write
13A4124E000
trusted library allocation
page read and write
13A406CD000
trusted library allocation
page read and write
13A47197000
trusted library allocation
page read and write
13A4AF59000
trusted library allocation
page read and write
13A40959000
trusted library allocation
page read and write
13A3C840000
trusted library allocation
page read and write
13A3CBA8000
heap
page read and write
13A4748F000
trusted library allocation
page read and write
13A3F547000
trusted library allocation
page read and write
13A474E9000
trusted library allocation
page read and write
13A3F59C000
trusted library allocation
page read and write
13A3628E000
heap
page read and write
13A4ACA5000
trusted library allocation
page read and write
13A42A5B000
trusted library allocation
page read and write
13A417E2000
trusted library allocation
page read and write
13A409BF000
trusted library allocation
page read and write
13A36290000
heap
page read and write
13A4B429000
trusted library allocation
page read and write
24AB5C224000
trusted library allocation
page read and write
13A48AD2000
trusted library allocation
page read and write
13A362C4000
heap
page read and write
13A409F8000
trusted library allocation
page read and write
13A362BE000
heap
page read and write
13A474CD000
trusted library allocation
page read and write
13A3F21A000
trusted library allocation
page read and write
13A4B5C6000
heap
page read and write
13A3FBE6000
trusted library allocation
page read and write
13A401C3000
trusted library allocation
page read and write
13A4017D000
trusted library allocation
page read and write
2CB4C308000
trusted library allocation
page read and write
13A4B0FD000
trusted library allocation
page read and write
13A416CC000
trusted library allocation
page read and write
13A3FC22000
trusted library allocation
page read and write
13A362FA000
heap
page read and write
13A41EDD000
trusted library allocation
page read and write
13A496BD000
trusted library allocation
page read and write
13A42A6F000
trusted library allocation
page read and write
75121FB000
stack
page read and write
13A3D3A5000
trusted library allocation
page read and write
13A3FCB2000
trusted library allocation
page read and write
13A3CBE8000
heap
page read and write
13A415B3000
trusted library allocation
page read and write
13A417D9000
trusted library allocation
page read and write
13A48A58000
trusted library allocation
page read and write
20AC8698000
heap
page read and write
13A3F680000
trusted library allocation
page read and write
13A41266000
trusted library allocation
page read and write
13A4B5C6000
heap
page read and write
13A3F3A2000
trusted library allocation
page read and write
13A40FC0000
trusted library allocation
page read and write
13A3F0B2000
trusted library allocation
page read and write
13A362A7000
heap
page read and write
13A3D31C000
trusted library allocation
page read and write
13A362AF000
heap
page read and write
13A49798000
trusted library allocation
page read and write
13A418E0000
trusted library allocation
page read and write
13A41A61000
trusted library allocation
page read and write
13A4B022000
trusted library allocation
page read and write
13A3D3AE000
trusted library allocation
page read and write
13A4125F000
trusted library allocation
page read and write
13A418F7000
trusted library allocation
page read and write
13A41380000
trusted library allocation
page read and write
There are 3789 hidden memdumps, click here to show them.