IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f3f35017-5ab4-4914-ab63-633f66945ced.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_f3f35017-5ab4-4914-ab63-633f66945ced.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs-1.js
ASCII text, with very long lines (1808), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\prefs.js (copy)
ASCII text, with very long lines (1808), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25358 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e847e56-eb11-48ae-8c47-e541346f16e5} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 164aa36f910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2908 -parentBuildID 20230927232528 -prefsHandle 2968 -prefMapHandle 3436 -prefsLen 26207 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbc28ed3-8904-43f8-b0a7-aa4ea3e6c308} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 164aa340810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4956 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5212 -prefMapHandle 5208 -prefsLen 33184 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa5bedb4-c327-455b-a71d-8da8b3bca3be} 7776 "\\.\pipe\gecko-crash-server-pipe.7776" 164c41f3f10 utility

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.njy8xaI_aUJp
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.16.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.184.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.16.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
164BDD3D000
trusted library allocation
page read and write
164C27CF000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BC0E5000
trusted library allocation
page read and write
164BA2FD000
trusted library allocation
page read and write
164BDF9E000
trusted library allocation
page read and write
164BCB80000
trusted library allocation
page read and write
164C60DB000
trusted library allocation
page read and write
164BBA1A000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
23FEA29F000
unclassified section
page read and write
164BC0D0000
trusted library allocation
page read and write
164C6047000
trusted library allocation
page read and write
164BC431000
trusted library allocation
page read and write
164BBADF000
trusted library allocation
page read and write
164BDF66000
trusted library allocation
page read and write
164C289E000
trusted library allocation
page read and write
19C3CA88000
heap
page read and write
164BC76E000
trusted library allocation
page read and write
164BB1A1000
trusted library allocation
page read and write
164B73F6000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C3253000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
19C3ADA0000
heap
page read and write
164BC44D000
trusted library allocation
page read and write
164B110D000
heap
page read and write
164BD8B3000
trusted library allocation
page read and write
164C60F6000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164BA91D000
trusted library allocation
page read and write
164BA359000
trusted library allocation
page read and write
164BA258000
trusted library allocation
page read and write
2C90CDCA000
heap
page read and write
164C27F5000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
164BDE0A000
trusted library allocation
page read and write
164B79AE000
heap
page read and write
164B10D8000
heap
page read and write
164C41CE000
trusted library allocation
page read and write
164B10CA000
heap
page read and write
164BCBF7000
trusted library allocation
page read and write
164BA2C1000
trusted library allocation
page read and write
164BC0F3000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BBBCC000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BCBA3000
trusted library allocation
page read and write
164BDBF2000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BB159000
trusted library allocation
page read and write
164C41F1000
trusted library allocation
page read and write
164C2576000
trusted library allocation
page read and write
164B72A3000
trusted library allocation
page read and write
164BCB8F000
trusted library allocation
page read and write
164BC2F0000
trusted library allocation
page read and write
164BB8EC000
trusted library allocation
page read and write
164BCBA3000
trusted library allocation
page read and write
164BB6E1000
trusted library allocation
page read and write
164BBFDD000
trusted library allocation
page read and write
164BBDE2000
trusted library allocation
page read and write
164C47D5000
trusted library allocation
page read and write
164BD79C000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BD7F6000
trusted library allocation
page read and write
164BC587000
trusted library allocation
page read and write
164B79C4000
heap
page read and write
164B110D000
heap
page read and write
164BB12A000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BB1E6000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164B61D1000
trusted library allocation
page read and write
164C60EA000
trusted library allocation
page read and write
164C60C0000
trusted library allocation
page read and write
164BB3B2000
trusted library allocation
page read and write
164BB1B1000
trusted library allocation
page read and write
7CDB5FF000
stack
page read and write
164BB3C3000
trusted library allocation
page read and write
23FEA423000
trusted library allocation
page read and write
164B767D000
trusted library allocation
page read and write
164BB4C7000
trusted library allocation
page read and write
164BC7B6000
trusted library allocation
page read and write
164B738C000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BB505000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164BCC7C000
trusted library allocation
page read and write
2C90C3C4000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
20CD5A67000
trusted library allocation
page read and write
164C657E000
trusted library allocation
page read and write
FBC82BD000
stack
page read and write
164BDFE5000
trusted library allocation
page read and write
164BBA2B000
trusted library allocation
page read and write
164BBE7C000
trusted library allocation
page read and write
164BC2DD000
trusted library allocation
page read and write
164BC6D3000
trusted library allocation
page read and write
164BBC33000
trusted library allocation
page read and write
2C90CE28000
heap
page read and write
2C90CE28000
heap
page read and write
164BBA26000
trusted library allocation
page read and write
164B72C5000
trusted library allocation
page read and write
164BDF6F000
trusted library allocation
page read and write
164BC0ED000
trusted library allocation
page read and write
164BB8D5000
trusted library allocation
page read and write
164BB518000
trusted library allocation
page read and write
164BC42D000
trusted library allocation
page read and write
164BD7EC000
trusted library allocation
page read and write
164BB62D000
trusted library allocation
page read and write
164BB86E000
trusted library allocation
page read and write
164BC7C1000
trusted library allocation
page read and write
164C28F0000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
15C4000
heap
page read and write
164B739D000
trusted library allocation
page read and write
DF0000
heap
page read and write
164BA2A5000
trusted library allocation
page read and write
164BC1AE000
trusted library allocation
page read and write
164BBA44000
trusted library allocation
page read and write
164BDFB3000
trusted library allocation
page read and write
164BB10B000
trusted library allocation
page read and write
164B10B2000
heap
page read and write
164C61D2000
trusted library allocation
page read and write
164BCAAC000
trusted library allocation
page read and write
164C2686000
trusted library allocation
page read and write
164C60D8000
trusted library allocation
page read and write
164C4A59000
trusted library allocation
page read and write
164C61C1000
trusted library allocation
page read and write
2C90BDE0000
unclassified section
page readonly
164BCBC4000
trusted library allocation
page read and write
164BA2FE000
trusted library allocation
page read and write
164BB2F8000
trusted library allocation
page read and write
164BB18A000
trusted library allocation
page read and write
164BA2A0000
trusted library allocation
page read and write
164BE923000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BB5BE000
trusted library allocation
page read and write
164C65A5000
trusted library allocation
page read and write
164BDFFC000
trusted library allocation
page read and write
164BA48D000
trusted library allocation
page read and write
164BBD61000
trusted library allocation
page read and write
2C90C312000
trusted library allocation
page read and write
164BCAA8000
trusted library allocation
page read and write
164BCAA4000
trusted library allocation
page read and write
164BC0E1000
trusted library allocation
page read and write
164BB5DF000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164C416E000
trusted library allocation
page read and write
164BC597000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BD7A4000
trusted library allocation
page read and write
164BA3CF000
trusted library allocation
page read and write
164B110C000
heap
page read and write
164BBDAC000
trusted library allocation
page read and write
164C26AF000
trusted library allocation
page read and write
164BB171000
trusted library allocation
page read and write
164BC0D6000
trusted library allocation
page read and write
2C90CE61000
heap
page read and write
164BBEBE000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
2C90CE28000
heap
page read and write
164BB5BC000
trusted library allocation
page read and write
2C90CE26000
heap
page read and write
164BA43A000
trusted library allocation
page read and write
164BB6BE000
trusted library allocation
page read and write
164BBEF1000
trusted library allocation
page read and write
164BC78B000
trusted library allocation
page read and write
164BA2D7000
trusted library allocation
page read and write
164BB5F8000
trusted library allocation
page read and write
164BC7E9000
trusted library allocation
page read and write
164BBA77000
trusted library allocation
page read and write
6906DFE000
unkown
page readonly
164BDDBA000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BDDBA000
trusted library allocation
page read and write
7CD95FB000
stack
page read and write
164BC0D2000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BDF6C000
trusted library allocation
page read and write
164C65D8000
trusted library allocation
page read and write
164BBA29000
trusted library allocation
page read and write
2C90CEB7000
heap
page read and write
164BBC62000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164C6281000
trusted library allocation
page read and write
164BDEC7000
trusted library allocation
page read and write
164BACDC000
trusted library allocation
page read and write
2C90BE54000
remote allocation
page execute read
164BCC40000
trusted library allocation
page read and write
2C90CDBD000
heap
page read and write
164BB6C9000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BDE82000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164BA3AC000
trusted library allocation
page read and write
164BC458000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164BD79C000
trusted library allocation
page read and write
164C4B04000
trusted library allocation
page read and write
164B5ACC000
trusted library allocation
page read and write
164B73F3000
trusted library allocation
page read and write
164BBDE6000
trusted library allocation
page read and write
164BDFE1000
trusted library allocation
page read and write
164C6F13000
trusted library allocation
page read and write
23FEA42E000
trusted library allocation
page read and write
23FEA60C000
trusted library allocation
page read and write
164BB1E0000
trusted library allocation
page read and write
164BA29D000
trusted library allocation
page read and write
164BC0B8000
trusted library allocation
page read and write
164C68C1000
heap
page read and write
164C26BF000
trusted library allocation
page read and write
164C6E60000
trusted library allocation
page read and write
164BB4F4000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BC0A2000
trusted library allocation
page read and write
164BB17E000
trusted library allocation
page read and write
164BBDE4000
trusted library allocation
page read and write
164BC0B4000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
164BC497000
trusted library allocation
page read and write
164BC441000
trusted library allocation
page read and write
164BBBC3000
trusted library allocation
page read and write
164C2864000
trusted library allocation
page read and write
164BBE06000
trusted library allocation
page read and write
13FE000
stack
page read and write
164C65B3000
trusted library allocation
page read and write
164BA38A000
trusted library allocation
page read and write
164BDDEB000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BC4DA000
trusted library allocation
page read and write
164BB4DE000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164BBEA2000
trusted library allocation
page read and write
164B7950000
heap
page read and write
164C27DD000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164C61B3000
trusted library allocation
page read and write
164C327E000
trusted library allocation
page read and write
164BCAF3000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164BA939000
trusted library allocation
page read and write
164BA189000
trusted library allocation
page read and write
164BBEA8000
trusted library allocation
page read and write
164BB8B4000
trusted library allocation
page read and write
164BACC5000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BBE86000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBFD5000
trusted library allocation
page read and write
164BBC36000
trusted library allocation
page read and write
20CD5A03000
trusted library allocation
page read and write
164B79C3000
heap
page read and write
164BBE4D000
trusted library allocation
page read and write
164C60E0000
trusted library allocation
page read and write
2C90C35F000
trusted library allocation
page read and write
164BB4DF000
trusted library allocation
page read and write
164BC0B8000
trusted library allocation
page read and write
164BDDEB000
trusted library allocation
page read and write
164BC498000
trusted library allocation
page read and write
164BDEFA000
trusted library allocation
page read and write
164BBA6C000
trusted library allocation
page read and write
164BDDC0000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164BA394000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BC4F3000
trusted library allocation
page read and write
164BB802000
trusted library allocation
page read and write
164BCB88000
trusted library allocation
page read and write
164BB4DE000
trusted library allocation
page read and write
164BBA2F000
trusted library allocation
page read and write
164BC0F6000
trusted library allocation
page read and write
164BB157000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
20CD5640000
remote allocation
page read and write
164B10CA000
heap
page read and write
2C90C0A9000
unkown
page execute read
164BBE9D000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBDE2000
trusted library allocation
page read and write
164BB15F000
trusted library allocation
page read and write
164BC054000
trusted library allocation
page read and write
164C657E000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
164BA2C9000
trusted library allocation
page read and write
FBC827E000
unkown
page readonly
20CD55E0000
unclassified section
page readonly
164B10CB000
heap
page read and write
2C90C002000
unclassified section
page read and write
164C60F9000
trusted library allocation
page read and write
164BA47A000
trusted library allocation
page read and write
164BBE70000
trusted library allocation
page read and write
164BC4E0000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BA37C000
trusted library allocation
page read and write
164BBD9F000
trusted library allocation
page read and write
164BBA6C000
trusted library allocation
page read and write
164C26B1000
trusted library allocation
page read and write
6906DBD000
stack
page read and write
164BC7B0000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
2C90CDE1000
heap
page read and write
20CD56A0000
heap
page read and write
164BA9C2000
trusted library allocation
page read and write
164C2851000
trusted library allocation
page read and write
164C47DD000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164BA37E000
trusted library allocation
page read and write
164C64EE000
trusted library allocation
page read and write
164BC866000
trusted library allocation
page read and write
2C90CE98000
heap
page read and write
164BC758000
trusted library allocation
page read and write
164BCC93000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10FD000
heap
page read and write
164BA39A000
trusted library allocation
page read and write
164BA34C000
trusted library allocation
page read and write
164BA27F000
trusted library allocation
page read and write
164BDFA3000
trusted library allocation
page read and write
164BBA44000
trusted library allocation
page read and write
23FEA607000
trusted library allocation
page read and write
164BBD9F000
trusted library allocation
page read and write
164BB1C2000
trusted library allocation
page read and write
164BC0E7000
trusted library allocation
page read and write
164BB184000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
CD0000
unkown
page readonly
164BC553000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164C611B000
trusted library allocation
page read and write
164C60BE000
trusted library allocation
page read and write
164BA942000
trusted library allocation
page read and write
164B6126000
trusted library allocation
page read and write
6909078000
stack
page read and write
164BC7DB000
trusted library allocation
page read and write
2C90C0A0000
unkown
page execute read
164BDE12000
trusted library allocation
page read and write
164BBEB2000
trusted library allocation
page read and write
164C604B000
trusted library allocation
page read and write
23FEA494000
trusted library allocation
page read and write
164B10D1000
heap
page read and write
1FEA37E000
unkown
page readonly
164B10C3000
heap
page read and write
164BDDF0000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C288E000
trusted library allocation
page read and write
23FEA600000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BB18D000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164BC79A000
trusted library allocation
page read and write
164BC56C000
trusted library allocation
page read and write
164BC0C2000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164C6E44000
trusted library allocation
page read and write
164BC33F000
trusted library allocation
page read and write
164BB8D9000
trusted library allocation
page read and write
164BBF99000
trusted library allocation
page read and write
164B7663000
trusted library allocation
page read and write
164BBE88000
trusted library allocation
page read and write
164BDEAC000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BB1CC000
trusted library allocation
page read and write
164BC4D1000
trusted library allocation
page read and write
164BB4AC000
trusted library allocation
page read and write
164BC577000
trusted library allocation
page read and write
164B794E000
heap
page read and write
164C6E3E000
trusted library allocation
page read and write
164BB6CF000
trusted library allocation
page read and write
164BBA1D000
trusted library allocation
page read and write
164BA2B5000
trusted library allocation
page read and write
164C61EF000
trusted library allocation
page read and write
164ABC1F000
heap
page read and write
164BB1B1000
trusted library allocation
page read and write
164BBEA8000
trusted library allocation
page read and write
164BC783000
trusted library allocation
page read and write
164BC291000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164BB1C0000
trusted library allocation
page read and write
164BBDEC000
trusted library allocation
page read and write
164C27AC000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BCC93000
trusted library allocation
page read and write
164BB0CD000
trusted library allocation
page read and write
164BC7B9000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C49FC000
trusted library allocation
page read and write
164BCAE5000
trusted library allocation
page read and write
164BBE99000
trusted library allocation
page read and write
164BBA1A000
trusted library allocation
page read and write
164BB3C4000
trusted library allocation
page read and write
D9C000
unkown
page write copy
164BB4C0000
trusted library allocation
page read and write
164BBABC000
trusted library allocation
page read and write
164BDBCB000
trusted library allocation
page read and write
164BA904000
trusted library allocation
page read and write
164BBE2D000
trusted library allocation
page read and write
164BC267000
trusted library allocation
page read and write
164B9DE4000
trusted library allocation
page read and write
164C28C8000
trusted library allocation
page read and write
164B10E5000
heap
page read and write
164BB62B000
trusted library allocation
page read and write
164BCC56000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164C2599000
trusted library allocation
page read and write
164B10FD000
heap
page read and write
164BB1F8000
trusted library allocation
page read and write
164BCCE4000
trusted library allocation
page read and write
164BC07A000
trusted library allocation
page read and write
1632000
heap
page read and write
164BC4F8000
trusted library allocation
page read and write
164BC53F000
trusted library allocation
page read and write
164BC074000
trusted library allocation
page read and write
164BA46B000
trusted library allocation
page read and write
19C3AE07000
heap
page read and write
164BC7DF000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
164BDE48000
trusted library allocation
page read and write
164BD60B000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BB376000
trusted library allocation
page read and write
164B10D1000
heap
page read and write
15F0000
heap
page read and write
164B10B4000
heap
page read and write
164C61EC000
trusted library allocation
page read and write
164B73FA000
trusted library allocation
page read and write
164B72E7000
trusted library allocation
page read and write
164BB1EC000
trusted library allocation
page read and write
164BBD9F000
trusted library allocation
page read and write
164BB1CE000
trusted library allocation
page read and write
23FEA615000
trusted library allocation
page read and write
164BA38E000
trusted library allocation
page read and write
164C47BF000
trusted library allocation
page read and write
164BC369000
trusted library allocation
page read and write
164BA378000
trusted library allocation
page read and write
164BA32A000
trusted library allocation
page read and write
164B72C7000
trusted library allocation
page read and write
164BB4F4000
trusted library allocation
page read and write
164BB151000
trusted library allocation
page read and write
164BDE4E000
trusted library allocation
page read and write
164BC43F000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164C6E4F000
trusted library allocation
page read and write
164BACDB000
trusted library allocation
page read and write
164BBDE0000
trusted library allocation
page read and write
20CD5870000
heap
page read and write
164BD7F1000
trusted library allocation
page read and write
164B9D96000
trusted library allocation
page read and write
164C4B04000
trusted library allocation
page read and write
1613000
heap
page read and write
164C6056000
trusted library allocation
page read and write
164C6F36000
trusted library allocation
page read and write
164BA4FD000
trusted library allocation
page read and write
164BDDA1000
trusted library allocation
page read and write
164BC2BC000
trusted library allocation
page read and write
164B61A0000
trusted library allocation
page read and write
164C62EA000
trusted library allocation
page read and write
164BC56A000
trusted library allocation
page read and write
164BBFC7000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BDF7C000
trusted library allocation
page read and write
164BC4F0000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164C26BD000
trusted library allocation
page read and write
FBC82FE000
unkown
page readonly
164B10C3000
heap
page read and write
164BB18F000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164BBEC2000
trusted library allocation
page read and write
164BA2E8000
trusted library allocation
page read and write
164BB157000
trusted library allocation
page read and write
164C6412000
trusted library allocation
page read and write
164BB134000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BDF78000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164B7350000
trusted library allocation
page read and write
164BCB5F000
trusted library allocation
page read and write
164BB8A4000
trusted library allocation
page read and write
164C41F9000
trusted library allocation
page read and write
23FEA290000
unclassified section
page read and write
164B10B4000
heap
page read and write
164BC0D6000
trusted library allocation
page read and write
164C64B1000
trusted library allocation
page read and write
23FEA472000
trusted library allocation
page read and write
164BCB9B000
trusted library allocation
page read and write
164C6F10000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
164BA384000
trusted library allocation
page read and write
164B10FE000
heap
page read and write
164B10C8000
heap
page read and write
164B10C8000
heap
page read and write
164BC42F000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C6563000
trusted library allocation
page read and write
164C6191000
trusted library allocation
page read and write
164BBD7C000
trusted library allocation
page read and write
164BA2D6000
trusted library allocation
page read and write
164BC7BF000
trusted library allocation
page read and write
164BDDED000
trusted library allocation
page read and write
164C2664000
trusted library allocation
page read and write
164BC4E0000
trusted library allocation
page read and write
164B7298000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BA2E3000
trusted library allocation
page read and write
164BB6BE000
trusted library allocation
page read and write
164BBE5B000
trusted library allocation
page read and write
164BA922000
trusted library allocation
page read and write
2C90CE6D000
heap
page read and write
164BDF2D000
trusted library allocation
page read and write
20CD5A76000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10C3000
heap
page read and write
164BC28F000
trusted library allocation
page read and write
164B7952000
heap
page read and write
2C90CD9C000
heap
page read and write
164B10AD000
heap
page read and write
20CD5A30000
trusted library allocation
page read and write
164C6F1D000
trusted library allocation
page read and write
164C65A0000
trusted library allocation
page read and write
23FEA492000
trusted library allocation
page read and write
164B73DB000
trusted library allocation
page read and write
164C2542000
trusted library allocation
page read and write
164C6127000
trusted library allocation
page read and write
164C65D8000
trusted library allocation
page read and write
164BDBFC000
trusted library allocation
page read and write
164BC0B8000
trusted library allocation
page read and write
164BD727000
trusted library allocation
page read and write
164C4A89000
trusted library allocation
page read and write
164B72E7000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164BBC48000
trusted library allocation
page read and write
164BB6C2000
trusted library allocation
page read and write
164BB171000
trusted library allocation
page read and write
D717041E000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BDF78000
trusted library allocation
page read and write
164BDF76000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BCCDE000
trusted library allocation
page read and write
164BA4D5000
trusted library allocation
page read and write
15F8000
heap
page read and write
164C4A66000
trusted library allocation
page read and write
2C90C909000
trusted library allocation
page read and write
164BBA24000
trusted library allocation
page read and write
164BBED9000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BB171000
trusted library allocation
page read and write
164C26BA000
trusted library allocation
page read and write
164BA188000
trusted library allocation
page read and write
164BC273000
trusted library allocation
page read and write
164BB8EA000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164B7350000
trusted library allocation
page read and write
164BDDED000
trusted library allocation
page read and write
164B76F4000
trusted library allocation
page read and write
164BD69F000
trusted library allocation
page read and write
2C90C374000
trusted library allocation
page read and write
69090FE000
unkown
page readonly
164BC511000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
2C90CE6A000
heap
page read and write
164BA37C000
trusted library allocation
page read and write
164C4A85000
trusted library allocation
page read and write
164B9DE9000
trusted library allocation
page read and write
164BBAC5000
trusted library allocation
page read and write
164BB57F000
trusted library allocation
page read and write
164C6461000
trusted library allocation
page read and write
164C6249000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164BB1C2000
trusted library allocation
page read and write
164C61F5000
trusted library allocation
page read and write
162A000
heap
page read and write
164BDD10000
trusted library allocation
page read and write
164C60B3000
trusted library allocation
page read and write
164BBE99000
trusted library allocation
page read and write
164BC07D000
trusted library allocation
page read and write
164C65E6000
trusted library allocation
page read and write
164BB1C2000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C658B000
trusted library allocation
page read and write
164C3EE1000
trusted library allocation
page read and write
164BC4F0000
trusted library allocation
page read and write
164BCA71000
trusted library allocation
page read and write
164BC27F000
trusted library allocation
page read and write
164BC378000
trusted library allocation
page read and write
20CD5730000
unclassified section
page read and write
164B7688000
trusted library allocation
page read and write
164B7360000
trusted library allocation
page read and write
164C6F39000
trusted library allocation
page read and write
164BC443000
trusted library allocation
page read and write
164BDDC0000
trusted library allocation
page read and write
164BC557000
trusted library allocation
page read and write
2C90CEB7000
heap
page read and write
164C25BF000
trusted library allocation
page read and write
164BB1FA000
trusted library allocation
page read and write
164BDF6C000
trusted library allocation
page read and write
164B7436000
trusted library allocation
page read and write
164BDF9E000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164C600C000
trusted library allocation
page read and write
164BA4D5000
trusted library allocation
page read and write
164B10FE000
heap
page read and write
164B10D7000
heap
page read and write
19C3CA70000
heap
page read and write
23FEA2A0000
heap
page read and write
164B738F000
trusted library allocation
page read and write
164BBE86000
trusted library allocation
page read and write
164BBFB0000
trusted library allocation
page read and write
164B9D94000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164C2682000
trusted library allocation
page read and write
164BDE9F000
trusted library allocation
page read and write
164BC8A7000
trusted library allocation
page read and write
164C28FB000
trusted library allocation
page read and write
164BD618000
trusted library allocation
page read and write
164BC3C2000
trusted library allocation
page read and write
164BC0A5000
trusted library allocation
page read and write
164C65F5000
trusted library allocation
page read and write
164C60DB000
trusted library allocation
page read and write
164C4B24000
trusted library allocation
page read and write
2C90CD8D000
heap
page read and write
164BC0DA000
trusted library allocation
page read and write
164BBE68000
trusted library allocation
page read and write
164BDB75000
trusted library allocation
page read and write
164BC0D2000
trusted library allocation
page read and write
164BB4F4000
trusted library allocation
page read and write
164B110F000
heap
page read and write
164B10B5000
heap
page read and write
164C41C3000
trusted library allocation
page read and write
2C90C2E4000
heap
page read and write
164B10D1000
heap
page read and write
164BB48E000
trusted library allocation
page read and write
164C4AB4000
trusted library allocation
page read and write
164BDA84000
trusted library allocation
page read and write
164BC413000
trusted library allocation
page read and write
1FE837E000
unkown
page readonly
164BA2B2000
trusted library allocation
page read and write
164BB417000
trusted library allocation
page read and write
164C6F15000
trusted library allocation
page read and write
164BC4C3000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164BCB3C000
trusted library allocation
page read and write
164B796A000
heap
page read and write
3E00000
heap
page read and write
164BB18A000
trusted library allocation
page read and write
23FEA070000
unclassified section
page readonly
164BDB6C000
trusted library allocation
page read and write
164C6243000
trusted library allocation
page read and write
19C3B000000
trusted library allocation
page read and write
164BD6CB000
trusted library allocation
page read and write
164BBFC7000
trusted library allocation
page read and write
164BB3B8000
trusted library allocation
page read and write
164BDF6A000
trusted library allocation
page read and write
164BCAFE000
trusted library allocation
page read and write
164BDE99000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164BA9FA000
trusted library allocation
page read and write
164BD606000
trusted library allocation
page read and write
164B5AF9000
trusted library allocation
page read and write
164BDD3B000
trusted library allocation
page read and write
164BCCD4000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BC3CE000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
19C3ADE0000
heap
page read and write
164BA42E000
trusted library allocation
page read and write
164BCAA6000
trusted library allocation
page read and write
164BCB76000
trusted library allocation
page read and write
20CD5AD7000
trusted library allocation
page read and write
164C49BA000
trusted library allocation
page read and write
164BB8D7000
trusted library allocation
page read and write
164BA371000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BC433000
trusted library allocation
page read and write
164C60CA000
trusted library allocation
page read and write
164BDE87000
trusted library allocation
page read and write
162A000
heap
page read and write
164BC78E000
trusted library allocation
page read and write
19C3AE00000
heap
page read and write
164BC55A000
trusted library allocation
page read and write
164BB12D000
trusted library allocation
page read and write
164BBAFD000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
164BB18D000
trusted library allocation
page read and write
164C4AF9000
trusted library allocation
page read and write
164BDEDC000
trusted library allocation
page read and write
164BBEA8000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BA2E8000
trusted library allocation
page read and write
164C28E0000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164C49D4000
trusted library allocation
page read and write
164BB131000
trusted library allocation
page read and write
164BB424000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC270000
trusted library allocation
page read and write
164BBFFA000
trusted library allocation
page read and write
32827FC000
stack
page read and write
164BA2B2000
trusted library allocation
page read and write
164BB5D3000
trusted library allocation
page read and write
164B9D9A000
trusted library allocation
page read and write
164C2504000
trusted library allocation
page read and write
164BA48D000
trusted library allocation
page read and write
164BCAA2000
trusted library allocation
page read and write
2C90C310000
trusted library allocation
page read and write
2C90C2E6000
heap
page read and write
164C251B000
trusted library allocation
page read and write
164BB4C4000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BDA8F000
trusted library allocation
page read and write
164BBE88000
trusted library allocation
page read and write
164BBDDE000
trusted library allocation
page read and write
164BC44D000
trusted library allocation
page read and write
164BDFC4000
trusted library allocation
page read and write
23FEA412000
trusted library allocation
page read and write
164B9D62000
trusted library allocation
page read and write
23FEA110000
heap
page read and write
164BC05E000
trusted library allocation
page read and write
164BDAAA000
trusted library allocation
page read and write
164BD77B000
trusted library allocation
page read and write
164C6F36000
trusted library allocation
page read and write
164BDFA3000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164BB198000
trusted library allocation
page read and write
164C2591000
trusted library allocation
page read and write
164BDDD3000
trusted library allocation
page read and write
164BA432000
trusted library allocation
page read and write
164C2533000
trusted library allocation
page read and write
164BBA4E000
trusted library allocation
page read and write
FBC8BFE000
stack
page read and write
164BB5F5000
trusted library allocation
page read and write
164BC4DA000
trusted library allocation
page read and write
164B7663000
trusted library allocation
page read and write
19C3AE32000
heap
page read and write
164BC06A000
trusted library allocation
page read and write
2C90CE98000
heap
page read and write
164B76F1000
trusted library allocation
page read and write
164B72EA000
trusted library allocation
page read and write
3E01000
heap
page read and write
164BA2A5000
trusted library allocation
page read and write
164BCC7C000
trusted library allocation
page read and write
164BB4C2000
trusted library allocation
page read and write
164C65B3000
trusted library allocation
page read and write
164C60D5000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BC78B000
trusted library allocation
page read and write
164BDF23000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
164BC26B000
trusted library allocation
page read and write
164C28D0000
trusted library allocation
page read and write
164BBED2000
trusted library allocation
page read and write
164B769D000
trusted library allocation
page read and write
164BB15C000
trusted library allocation
page read and write
164C41F9000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164BC39D000
trusted library allocation
page read and write
164BBEC6000
trusted library allocation
page read and write
164C27E5000
trusted library allocation
page read and write
164C4B01000
trusted library allocation
page read and write
164B619B000
trusted library allocation
page read and write
164BC187000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
164C6115000
trusted library allocation
page read and write
164C286E000
trusted library allocation
page read and write
164BC3B9000
trusted library allocation
page read and write
164BBE84000
trusted library allocation
page read and write
164BCB59000
trusted library allocation
page read and write
164B9D33000
trusted library allocation
page read and write
164B76F1000
trusted library allocation
page read and write
164BD750000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
20CD5A49000
trusted library allocation
page read and write
164B73E6000
trusted library allocation
page read and write
164C60CF000
trusted library allocation
page read and write
164C6051000
trusted library allocation
page read and write
164B73BE000
trusted library allocation
page read and write
164BC9E7000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
164BBFCC000
trusted library allocation
page read and write
164C288A000
trusted library allocation
page read and write
15E31A00000
trusted library allocation
page read and write
164B10BB000
heap
page read and write
164BB161000
trusted library allocation
page read and write
164BB6AF000
trusted library allocation
page read and write
164C65A0000
trusted library allocation
page read and write
164C65D8000
trusted library allocation
page read and write
164BDD17000
trusted library allocation
page read and write
164C2673000
trusted library allocation
page read and write
2C90CE32000
heap
page read and write
164BC260000
trusted library allocation
page read and write
164BCAE2000
trusted library allocation
page read and write
1634000
heap
page read and write
164B7974000
heap
page read and write
19C3AE34000
heap
page read and write
164C2833000
trusted library allocation
page read and write
164C288A000
trusted library allocation
page read and write
164BCC93000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B10B2000
heap
page read and write
164C61B3000
trusted library allocation
page read and write
164B10E5000
heap
page read and write
164B10CA000
heap
page read and write
164BBE99000
trusted library allocation
page read and write
2C90CE3D000
heap
page read and write
164BA3DF000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBE5F000
trusted library allocation
page read and write
164BBED9000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
23FEA400000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164C2673000
trusted library allocation
page read and write
164BB1A1000
trusted library allocation
page read and write
164BBD85000
trusted library allocation
page read and write
164BC4E2000
trusted library allocation
page read and write
164C26E2000
trusted library allocation
page read and write
164BA91C000
trusted library allocation
page read and write
164B10AB000
heap
page read and write
15C4000
heap
page read and write
164BD7A9000
trusted library allocation
page read and write
164B72A7000
trusted library allocation
page read and write
3E01000
heap
page read and write
2C90CDBF000
heap
page read and write
20CD5C03000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
2C90CDDC000
heap
page read and write
164BB51A000
trusted library allocation
page read and write
164BA452000
trusted library allocation
page read and write
20CD5900000
trusted library allocation
page read and write
164BDDB6000
trusted library allocation
page read and write
164BB4D7000
trusted library allocation
page read and write
164BBBF2000
trusted library allocation
page read and write
164BC2D5000
trusted library allocation
page read and write
164BB145000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
23FEA637000
trusted library allocation
page read and write
164BB5DD000
trusted library allocation
page read and write
164BB15C000
trusted library allocation
page read and write
164BCAB2000
trusted library allocation
page read and write
164BBE81000
trusted library allocation
page read and write
164BDDA8000
trusted library allocation
page read and write
164C4A18000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
164C27CF000
trusted library allocation
page read and write
164BBCF6000
trusted library allocation
page read and write
164BC07A000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BBF94000
trusted library allocation
page read and write
164C28E0000
trusted library allocation
page read and write
164C62BE000
trusted library allocation
page read and write
164B61B0000
trusted library allocation
page read and write
164BB3FC000
trusted library allocation
page read and write
2C90CEB9000
heap
page read and write
164B1105000
heap
page read and write
164B76D2000
trusted library allocation
page read and write
164BC985000
trusted library allocation
page read and write
164B794F000
heap
page read and write
164BBDE6000
trusted library allocation
page read and write
164BBA60000
trusted library allocation
page read and write
164BBCC2000
trusted library allocation
page read and write
164B7027000
trusted library allocation
page read and write
164B72D5000
trusted library allocation
page read and write
2C90CE31000
heap
page read and write
164BD88F000
trusted library allocation
page read and write
164BBA61000
trusted library allocation
page read and write
2C90C35C000
trusted library allocation
page read and write
164C32C0000
trusted library allocation
page read and write
164B10FF000
heap
page read and write
164B10D8000
heap
page read and write
164BB1B1000
trusted library allocation
page read and write
164BB1C0000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
690B9FE000
stack
page read and write
164BA2B5000
trusted library allocation
page read and write
164C60F6000
trusted library allocation
page read and write
2C90C010000
trusted library allocation
page read and write
1619000
heap
page read and write
164BCC50000
trusted library allocation
page read and write
164BB199000
trusted library allocation
page read and write
164B10C0000
heap
page read and write
164BA2A5000
trusted library allocation
page read and write
164BB565000
trusted library allocation
page read and write
164BBE98000
trusted library allocation
page read and write
2C90CE6A000
heap
page read and write
164B7684000
trusted library allocation
page read and write
164BDA59000
trusted library allocation
page read and write
164C2763000
trusted library allocation
page read and write
164B9D2B000
trusted library allocation
page read and write
164BC0F3000
trusted library allocation
page read and write
164BB6BA000
trusted library allocation
page read and write
164C65D5000
trusted library allocation
page read and write
164BB389000
trusted library allocation
page read and write
164BBADF000
trusted library allocation
page read and write
164BBA83000
trusted library allocation
page read and write
3282FFD000
stack
page read and write
164C628A000
trusted library allocation
page read and write
164B10FF000
heap
page read and write
164BDFE1000
trusted library allocation
page read and write
164BC26B000
trusted library allocation
page read and write
164BBDE0000
trusted library allocation
page read and write
164BBA97000
trusted library allocation
page read and write
164BD7A4000
trusted library allocation
page read and write
164BBE5B000
trusted library allocation
page read and write
164B73A8000
trusted library allocation
page read and write
23FEA4E7000
trusted library allocation
page read and write
164BDDB6000
trusted library allocation
page read and write
164BDDED000
trusted library allocation
page read and write
164BC9B0000
trusted library allocation
page read and write
164BB58B000
trusted library allocation
page read and write
164C645D000
trusted library allocation
page read and write
164B9D9A000
trusted library allocation
page read and write
164BA298000
trusted library allocation
page read and write
164BA943000
trusted library allocation
page read and write
164C4AB1000
trusted library allocation
page read and write
164BC7B9000
trusted library allocation
page read and write
164BBADD000
trusted library allocation
page read and write
2C90CDA4000
heap
page read and write
164C41F1000
trusted library allocation
page read and write
164BB1FD000
trusted library allocation
page read and write
164BC931000
trusted library allocation
page read and write
164C6F2D000
trusted library allocation
page read and write
20CD5732000
unclassified section
page read and write
FBC833E000
stack
page read and write
164C64BF000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164B9DE4000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
1624000
heap
page read and write
164BA18D000
trusted library allocation
page read and write
164B618D000
trusted library allocation
page read and write
FBC823B000
stack
page read and write
164B10FC000
heap
page read and write
164C65B7000
trusted library allocation
page read and write
23FEA447000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
164BC8A7000
trusted library allocation
page read and write
164BBE00000
trusted library allocation
page read and write
20CD5AF8000
trusted library allocation
page read and write
164BDE18000
trusted library allocation
page read and write
164BBEF1000
trusted library allocation
page read and write
164C266A000
trusted library allocation
page read and write
164BBE92000
trusted library allocation
page read and write
164BC072000
trusted library allocation
page read and write
164BBA92000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BB8E6000
trusted library allocation
page read and write
164C60EA000
trusted library allocation
page read and write
164C4AB1000
trusted library allocation
page read and write
164BDB4A000
trusted library allocation
page read and write
164BB15D000
trusted library allocation
page read and write
164BD72E000
trusted library allocation
page read and write
164B9DE4000
trusted library allocation
page read and write
164BA92D000
trusted library allocation
page read and write
164BD8A9000
trusted library allocation
page read and write
164B76C8000
trusted library allocation
page read and write
164BA4D8000
trusted library allocation
page read and write
690C1FE000
unkown
page readonly
164BDF9E000
trusted library allocation
page read and write
164BDF54000
trusted library allocation
page read and write
CD1000
unkown
page execute read
164BB145000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164C608D000
trusted library allocation
page read and write
1FE69D8000
stack
page read and write
164C2595000
trusted library allocation
page read and write
164BB5C3000
trusted library allocation
page read and write
164BBEC2000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BC362000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164C64B7000
trusted library allocation
page read and write
164BB4DC000
trusted library allocation
page read and write
164BD7E9000
trusted library allocation
page read and write
23FEA498000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164C2879000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BA9FA000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BDF6C000
trusted library allocation
page read and write
164C61B3000
trusted library allocation
page read and write
164BC484000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
1FE79FE000
stack
page read and write
23FEA280000
heap
page readonly
164C4188000
trusted library allocation
page read and write
164BD710000
trusted library allocation
page read and write
164B10FD000
heap
page read and write
164BDE7F000
trusted library allocation
page read and write
164BD778000
trusted library allocation
page read and write
164C6225000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BCBDE000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164BC436000
trusted library allocation
page read and write
164BA13C000
trusted library allocation
page read and write
164BCA18000
trusted library allocation
page read and write
164C6E44000
trusted library allocation
page read and write
164BC0E5000
trusted library allocation
page read and write
164BC7B9000
trusted library allocation
page read and write
2C90CDA9000
heap
page read and write
2C90CE2F000
heap
page read and write
164C60E0000
trusted library allocation
page read and write
164BC495000
trusted library allocation
page read and write
2C90CE40000
heap
page read and write
164BD7A9000
trusted library allocation
page read and write
164BBE86000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164C6164000
trusted library allocation
page read and write
164C7178000
trusted library allocation
page read and write
164C60C3000
trusted library allocation
page read and write
164BB480000
trusted library allocation
page read and write
164BBE9D000
trusted library allocation
page read and write
164BBDFE000
trusted library allocation
page read and write
164BC35A000
trusted library allocation
page read and write
3ACED991000
trusted library allocation
page execute read
164BBA6D000
trusted library allocation
page read and write
164B6175000
trusted library allocation
page read and write
164BB161000
trusted library allocation
page read and write
164BBAF4000
trusted library allocation
page read and write
164C28FB000
trusted library allocation
page read and write
164C28E0000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164BC4EC000
trusted library allocation
page read and write
164C60A6000
trusted library allocation
page read and write
164BB6ED000
trusted library allocation
page read and write
164BDD3F000
trusted library allocation
page read and write
164B6113000
trusted library allocation
page read and write
164C49D9000
trusted library allocation
page read and write
164C6F33000
trusted library allocation
page read and write
164BB6B6000
trusted library allocation
page read and write
164BA378000
trusted library allocation
page read and write
164B72D3000
trusted library allocation
page read and write
164BD8FE000
trusted library allocation
page read and write
1550000
heap
page read and write
164BB871000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164C6F39000
trusted library allocation
page read and write
164C4A18000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164C49FC000
trusted library allocation
page read and write
164BCAAE000
trusted library allocation
page read and write
164BA2CE000
trusted library allocation
page read and write
164BB1BA000
trusted library allocation
page read and write
164BB4B5000
trusted library allocation
page read and write
164BB5D7000
trusted library allocation
page read and write
164B1112000
heap
page read and write
164BCC5B000
trusted library allocation
page read and write
164BBA2F000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C4143000
trusted library allocation
page read and write
164BA2C4000
trusted library allocation
page read and write
164BDAD3000
trusted library allocation
page read and write
2C90C381000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BD7F1000
trusted library allocation
page read and write
164C6191000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BC27F000
trusted library allocation
page read and write
164BDA55000
trusted library allocation
page read and write
3ACED9B1000
trusted library allocation
page execute read
164C41DA000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164B109D000
heap
page read and write
164B10FC000
heap
page read and write
164BD730000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164B10FE000
heap
page read and write
164BBDE2000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164B9DDC000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164B73AA000
trusted library allocation
page read and write
164B73F6000
trusted library allocation
page read and write
164C7162000
trusted library allocation
page read and write
164C2689000
trusted library allocation
page read and write
20CD5A8F000
trusted library allocation
page read and write
164C6F39000
trusted library allocation
page read and write
164BDD0B000
trusted library allocation
page read and write
164BD77B000
trusted library allocation
page read and write
164BDE48000
trusted library allocation
page read and write
164C62BE000
trusted library allocation
page read and write
164BC291000
trusted library allocation
page read and write
164BBADF000
trusted library allocation
page read and write
164BB1C3000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164B10FC000
heap
page read and write
164BDDB4000
trusted library allocation
page read and write
164B6166000
trusted library allocation
page read and write
164BB8FB000
trusted library allocation
page read and write
164BDF8C000
trusted library allocation
page read and write
164BDB84000
trusted library allocation
page read and write
164BCC93000
trusted library allocation
page read and write
164C26EA000
trusted library allocation
page read and write
19C3B10A000
trusted library allocation
page read and write
164C41AD000
trusted library allocation
page read and write
164BB171000
trusted library allocation
page read and write
164C60B3000
trusted library allocation
page read and write
164BA18D000
trusted library allocation
page read and write
164C2589000
trusted library allocation
page read and write
23FEA4B4000
trusted library allocation
page read and write
164BBEC2000
trusted library allocation
page read and write
164BB14C000
trusted library allocation
page read and write
164B9D8D000
trusted library allocation
page read and write
2C90CE84000
heap
page read and write
164BBEA2000
trusted library allocation
page read and write
164BC0ED000
trusted library allocation
page read and write
164BBDFE000
trusted library allocation
page read and write
2C90CE31000
heap
page read and write
164BC50D000
trusted library allocation
page read and write
164BBDE8000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BB1B9000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
2C90C00F000
unclassified section
page read and write
164B10D2000
heap
page read and write
164B10FC000
heap
page read and write
164BCC93000
trusted library allocation
page read and write
164BC8CE000
trusted library allocation
page read and write
164BB5A9000
trusted library allocation
page read and write
164BA172000
trusted library allocation
page read and write
164B9DF7000
trusted library allocation
page read and write
164B110E000
heap
page read and write
FBC9BFE000
stack
page read and write
2C90CDCA000
heap
page read and write
164B10E3000
heap
page read and write
164BDDC0000
trusted library allocation
page read and write
164BA15A000
trusted library allocation
page read and write
164BD778000
trusted library allocation
page read and write
164C47D0000
trusted library allocation
page read and write
164BC7DB000
trusted library allocation
page read and write
164BDD15000
trusted library allocation
page read and write
164C4199000
trusted library allocation
page read and write
2C90C377000
trusted library allocation
page read and write
164BDE50000
trusted library allocation
page read and write
164C6022000
trusted library allocation
page read and write
164BA2AF000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
2C90CE2F000
heap
page read and write
164BB4FA000
trusted library allocation
page read and write
164C27DD000
trusted library allocation
page read and write
164BCBDE000
trusted library allocation
page read and write
164C62A8000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBA8D000
trusted library allocation
page read and write
164BDE6B000
trusted library allocation
page read and write
164BB622000
trusted library allocation
page read and write
164B5AB3000
trusted library allocation
page read and write
164BDDB6000
trusted library allocation
page read and write
164B10D7000
heap
page read and write
164B7950000
heap
page read and write
164BBEC6000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BDEFC000
trusted library allocation
page read and write
164BD6C1000
trusted library allocation
page read and write
164BBA41000
trusted library allocation
page read and write
164BB3D8000
trusted library allocation
page read and write
164C6E4A000
trusted library allocation
page read and write
164BBAE8000
trusted library allocation
page read and write
164B7396000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC50F000
trusted library allocation
page read and write
164BDE75000
trusted library allocation
page read and write
164C60B8000
trusted library allocation
page read and write
164C28A8000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
1617000
heap
page read and write
164B1104000
heap
page read and write
164B10C8000
heap
page read and write
164B10E3000
heap
page read and write
164BC5D7000
trusted library allocation
page read and write
164BC78E000
trusted library allocation
page read and write
20CD5750000
heap
page read and write
164C258D000
trusted library allocation
page read and write
164BBEC6000
trusted library allocation
page read and write
164BB1B9000
trusted library allocation
page read and write
164BB117000
trusted library allocation
page read and write
164BBBD9000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10AD000
heap
page read and write
164B10C8000
heap
page read and write
164BC4E0000
trusted library allocation
page read and write
164BA165000
trusted library allocation
page read and write
7CDBDFE000
stack
page read and write
164C6236000
trusted library allocation
page read and write
2C90CE20000
heap
page read and write
164BCAA8000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164BB4B5000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164C618C000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164BDF2C000
trusted library allocation
page read and write
164B9D2F000
trusted library allocation
page read and write
2C90CDAC000
heap
page read and write
164B10D8000
heap
page read and write
164BDFF2000
trusted library allocation
page read and write
164C65FD000
trusted library allocation
page read and write
164ABC28000
heap
page read and write
164BA47C000
trusted library allocation
page read and write
164C60BC000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBEBE000
trusted library allocation
page read and write
164BB1FC000
trusted library allocation
page read and write
164BE900000
trusted library allocation
page read and write
2C90CE98000
heap
page read and write
164BB335000
trusted library allocation
page read and write
2C90C368000
trusted library allocation
page read and write
164C645F000
trusted library allocation
page read and write
160F000
heap
page read and write
164BD638000
trusted library allocation
page read and write
164BC441000
trusted library allocation
page read and write
164BCB27000
trusted library allocation
page read and write
164C32B3000
trusted library allocation
page read and write
164BDF72000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBA2B000
trusted library allocation
page read and write
690A13E000
stack
page read and write
2C90CEB7000
heap
page read and write
164BC431000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BB579000
trusted library allocation
page read and write
164BDF60000
trusted library allocation
page read and write
164BDDC9000
trusted library allocation
page read and write
164BBA32000
trusted library allocation
page read and write
164BDDE8000
trusted library allocation
page read and write
164BB1C2000
trusted library allocation
page read and write
164BDDEB000
trusted library allocation
page read and write
2C90CEA9000
heap
page read and write
164B110D000
heap
page read and write
164BDE5A000
trusted library allocation
page read and write
164C6886000
heap
page read and write
69098FE000
stack
page read and write
164BDF38000
trusted library allocation
page read and write
164BC4CB000
trusted library allocation
page read and write
164B611E000
trusted library allocation
page read and write
164BA2E3000
trusted library allocation
page read and write
164BDA84000
trusted library allocation
page read and write
164BA2F4000
trusted library allocation
page read and write
15E319F0000
heap
page read and write
164BDFC4000
trusted library allocation
page read and write
164BDF72000
trusted library allocation
page read and write
164C6422000
trusted library allocation
page read and write
164BC0A2000
trusted library allocation
page read and write
164BB586000
trusted library allocation
page read and write
164BDF7C000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BA177000
trusted library allocation
page read and write
164BA2D3000
trusted library allocation
page read and write
164C25CF000
trusted library allocation
page read and write
23FEA240000
heap
page read and write
164B7949000
heap
page read and write
164BBBFA000
trusted library allocation
page read and write
164BBFFE000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BB590000
trusted library allocation
page read and write
164BB4E2000
trusted library allocation
page read and write
164B70DE000
trusted library allocation
page read and write
164C2671000
trusted library allocation
page read and write
164C27D3000
trusted library allocation
page read and write
164C6490000
trusted library allocation
page read and write
164BBA1F000
trusted library allocation
page read and write
164B6071000
trusted library allocation
page read and write
20CD5A00000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BC0D6000
trusted library allocation
page read and write
164C26EA000
trusted library allocation
page read and write
690B1FE000
unkown
page readonly
164C60BE000
trusted library allocation
page read and write
164BA25E000
trusted library allocation
page read and write
164BC484000
trusted library allocation
page read and write
164B10CA000
heap
page read and write
164BDFAC000
trusted library allocation
page read and write
164BCCB0000
trusted library allocation
page read and write
164C6453000
trusted library allocation
page read and write
164C6595000
trusted library allocation
page read and write
2C90CE98000
heap
page read and write
164C284F000
trusted library allocation
page read and write
164C2876000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BD7FE000
trusted library allocation
page read and write
164B61A5000
trusted library allocation
page read and write
164BA2FE000
trusted library allocation
page read and write
164C61F5000
trusted library allocation
page read and write
164BCAD6000
trusted library allocation
page read and write
164BCCAB000
trusted library allocation
page read and write
2C90C379000
trusted library allocation
page read and write
164BDFF4000
trusted library allocation
page read and write
1FE827E000
unkown
page readonly
20CD5A46000
trusted library allocation
page read and write
164BD7E9000
trusted library allocation
page read and write
164B10A2000
heap
page read and write
164BA36D000
trusted library allocation
page read and write
164C250F000
trusted library allocation
page read and write
164BBC23000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BA37E000
trusted library allocation
page read and write
23FEA060000
unclassified section
page readonly
164B10D8000
heap
page read and write
164C600E000
trusted library allocation
page read and write
164BB1B6000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BBFF6000
trusted library allocation
page read and write
2C90BFE0000
heap
page readonly
164C6575000
trusted library allocation
page read and write
164BC433000
trusted library allocation
page read and write
164C28F0000
trusted library allocation
page read and write
164BC577000
trusted library allocation
page read and write
164BC970000
trusted library allocation
page read and write
164BD8B5000
trusted library allocation
page read and write
164BC0D0000
trusted library allocation
page read and write
164BB5BC000
trusted library allocation
page read and write
164B763C000
trusted library allocation
page read and write
164BA2C2000
trusted library allocation
page read and write
164BA163000
trusted library allocation
page read and write
164BC3D7000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164BBEB2000
trusted library allocation
page read and write
164B5AA6000
trusted library allocation
page read and write
2C90CE31000
heap
page read and write
164C2723000
trusted library allocation
page read and write
164BC7E1000
trusted library allocation
page read and write
164C6F39000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
2C90CDA0000
heap
page read and write
2C90CD9C000
heap
page read and write
164B10FE000
heap
page read and write
164BC313000
trusted library allocation
page read and write
164BC422000
trusted library allocation
page read and write
164B1105000
heap
page read and write
164BBF89000
trusted library allocation
page read and write
164C657F000
trusted library allocation
page read and write
164BA9FC000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC27F000
trusted library allocation
page read and write
19C3CB70000
heap
page read and write
164BAC43000
trusted library allocation
page read and write
15E316E0000
heap
page read and write
164C6130000
trusted library allocation
page read and write
164C289A000
trusted library allocation
page read and write
164BC5AF000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
164C3EAD000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BDFC4000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BACDB000
trusted library allocation
page read and write
164C6F17000
trusted library allocation
page read and write
164BACCD000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164BA345000
trusted library allocation
page read and write
20CD5A72000
trusted library allocation
page read and write
1623000
heap
page read and write
2C90CE21000
heap
page read and write
164C282E000
trusted library allocation
page read and write
164C26FD000
trusted library allocation
page read and write
164B5ABF000
trusted library allocation
page read and write
2C90C0C0000
trusted library section
page readonly
164BC769000
trusted library allocation
page read and write
FBC79FE000
stack
page read and write
164B73DB000
trusted library allocation
page read and write
23FEA468000
trusted library allocation
page read and write
19C3B2C5000
heap
page read and write
164B10B4000
heap
page read and write
164BA394000
trusted library allocation
page read and write
164BA41E000
trusted library allocation
page read and write
164BA371000
trusted library allocation
page read and write
164C6058000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10BE000
heap
page read and write
164C2654000
trusted library allocation
page read and write
164BDBD4000
trusted library allocation
page read and write
164BB531000
trusted library allocation
page read and write
164BB4D9000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BB1C2000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BDECD000
trusted library allocation
page read and write
164BBABC000
trusted library allocation
page read and write
164BA39B000
trusted library allocation
page read and write
164BC0FE000
trusted library allocation
page read and write
164B9DF6000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BBDE4000
trusted library allocation
page read and write
164B72A7000
trusted library allocation
page read and write
164B10D1000
heap
page read and write
164BD694000
trusted library allocation
page read and write
164B10AA000
heap
page read and write
164BB10C000
trusted library allocation
page read and write
164C2600000
trusted library allocation
page read and write
23FEA500000
unclassified section
page readonly
164B7690000
trusted library allocation
page read and write
164BCA19000
trusted library allocation
page read and write
164B7682000
trusted library allocation
page read and write
2C90C303000
trusted library allocation
page read and write
164BB1BA000
trusted library allocation
page read and write
2C90BE80000
heap
page read and write
164BD714000
trusted library allocation
page read and write
2C90CDBD000
heap
page read and write
164BA363000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164B10AE000
heap
page read and write
164C26F6000
trusted library allocation
page read and write
3ACED99D000
trusted library allocation
page execute read
1FE82FE000
unkown
page readonly
164BA38E000
trusted library allocation
page read and write
164BA926000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BB14C000
trusted library allocation
page read and write
164BD6AE000
trusted library allocation
page read and write
164BA390000
trusted library allocation
page read and write
164BD7FE000
trusted library allocation
page read and write
164BBDEA000
trusted library allocation
page read and write
23FEA46E000
trusted library allocation
page read and write
164BDE50000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164BDF83000
trusted library allocation
page read and write
164C28A8000
trusted library allocation
page read and write
164B73BE000
trusted library allocation
page read and write
164BC2BC000
trusted library allocation
page read and write
164BC351000
trusted library allocation
page read and write
164BD752000
trusted library allocation
page read and write
164BACCA000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164B1105000
heap
page read and write
164B110D000
heap
page read and write
164B10C3000
heap
page read and write
164BDFE5000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BA3B3000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164BBFC4000
trusted library allocation
page read and write
2C90CDAC000
heap
page read and write
164BC79A000
trusted library allocation
page read and write
164C259D000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BCAFE000
trusted library allocation
page read and write
164BB1FC000
trusted library allocation
page read and write
164B9F00000
trusted library allocation
page read and write
20CD5A1C000
trusted library allocation
page read and write
164BA2F0000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164C4A66000
trusted library allocation
page read and write
164BA26E000
trusted library allocation
page read and write
164C6140000
trusted library allocation
page read and write
164BB805000
trusted library allocation
page read and write
164BB199000
trusted library allocation
page read and write
164BCAD6000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
164BB4C2000
trusted library allocation
page read and write
161B000
heap
page read and write
164BC0FE000
trusted library allocation
page read and write
164C27E5000
trusted library allocation
page read and write
164BC4F8000
trusted library allocation
page read and write
164B1111000
heap
page read and write
164B79C4000
heap
page read and write
164BC5EB000
trusted library allocation
page read and write
164C6415000
trusted library allocation
page read and write
164BC187000
trusted library allocation
page read and write
164C26B1000
trusted library allocation
page read and write
164B9DE6000
trusted library allocation
page read and write
164C689E000
heap
page read and write
164BC270000
trusted library allocation
page read and write
164BDF83000
trusted library allocation
page read and write
164BA2F0000
trusted library allocation
page read and write
13BF000
stack
page read and write
164BB42C000
trusted library allocation
page read and write
164BB1B1000
trusted library allocation
page read and write
164B73DD000
trusted library allocation
page read and write
164C257F000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164C6F36000
trusted library allocation
page read and write
164C602A000
trusted library allocation
page read and write
164B76CB000
trusted library allocation
page read and write
164BB1BA000
trusted library allocation
page read and write
164BCC76000
trusted library allocation
page read and write
164C28F0000
trusted library allocation
page read and write
C4E000
stack
page read and write
164C286E000
trusted library allocation
page read and write
164BC593000
trusted library allocation
page read and write
3ACED901000
trusted library allocation
page execute read
2C90C2E0000
heap
page read and write
164BB155000
trusted library allocation
page read and write
164C6006000
trusted library allocation
page read and write
3ACED9B1000
trusted library allocation
page execute read
164BA44E000
trusted library allocation
page read and write
164BBE70000
trusted library allocation
page read and write
164BDFFC000
trusted library allocation
page read and write
164C4133000
trusted library allocation
page read and write
164BBDDE000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BDE0F000
trusted library allocation
page read and write
164BB6CF000
trusted library allocation
page read and write
164C25AF000
trusted library allocation
page read and write
164B60FB000
trusted library allocation
page read and write
164C62A7000
trusted library allocation
page read and write
164B110C000
heap
page read and write
164BA2A0000
trusted library allocation
page read and write
164BD7E9000
trusted library allocation
page read and write
164BB5D6000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BACC3000
trusted library allocation
page read and write
164BC0B4000
trusted library allocation
page read and write
164C286E000
trusted library allocation
page read and write
164C288D000
trusted library allocation
page read and write
164C6485000
trusted library allocation
page read and write
164BBC1E000
trusted library allocation
page read and write
164BB471000
trusted library allocation
page read and write
164BC2AF000
trusted library allocation
page read and write
164BA473000
trusted library allocation
page read and write
164BDF66000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BCB76000
trusted library allocation
page read and write
164BC7B9000
trusted library allocation
page read and write
164C27AC000
trusted library allocation
page read and write
164B73C7000
trusted library allocation
page read and write
164BA942000
trusted library allocation
page read and write
164BB118000
trusted library allocation
page read and write
164B76F1000
trusted library allocation
page read and write
164BBA30000
trusted library allocation
page read and write
164B794D000
heap
page read and write
164C413F000
trusted library allocation
page read and write
23FEA61D000
trusted library allocation
page read and write
164C32EF000
trusted library allocation
page read and write
164B73AB000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BA9F0000
trusted library allocation
page read and write
20CD5A70000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164C28BC000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BDDD3000
trusted library allocation
page read and write
D9C000
unkown
page read and write
164B9D62000
trusted library allocation
page read and write
164BB14C000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164B10E3000
heap
page read and write
164BBDE4000
trusted library allocation
page read and write
164BC495000
trusted library allocation
page read and write
2C90C000000
unclassified section
page read and write
164B10C3000
heap
page read and write
164BC0E7000
trusted library allocation
page read and write
164BDE57000
trusted library allocation
page read and write
164BC0B4000
trusted library allocation
page read and write
164BC458000
trusted library allocation
page read and write
164B73C7000
trusted library allocation
page read and write
164BB1C0000
trusted library allocation
page read and write
164BC577000
trusted library allocation
page read and write
164BA9E0000
trusted library allocation
page read and write
164BD7FE000
trusted library allocation
page read and write
164C65FD000
trusted library allocation
page read and write
164C71AD000
trusted library allocation
page read and write
2C90C3BB000
trusted library allocation
page read and write
164B10D1000
heap
page read and write
164BB8FD000
trusted library allocation
page read and write
164BC4C3000
trusted library allocation
page read and write
164BD716000
trusted library allocation
page read and write
164B72DC000
trusted library allocation
page read and write
164C288D000
trusted library allocation
page read and write
164BBA26000
trusted library allocation
page read and write
164BC4FC000
trusted library allocation
page read and write
164BBEA2000
trusted library allocation
page read and write
164BD799000
trusted library allocation
page read and write
164BA170000
trusted library allocation
page read and write
164C49AE000
trusted library allocation
page read and write
164BDDBA000
trusted library allocation
page read and write
164BDF2A000
trusted library allocation
page read and write
164BC5D5000
trusted library allocation
page read and write
2C90C790000
heap
page read and write
164BD7E1000
trusted library allocation
page read and write
164BD7E1000
trusted library allocation
page read and write
164BC484000
trusted library allocation
page read and write
164BDB67000
trusted library allocation
page read and write
164C6595000
trusted library allocation
page read and write
164BB589000
trusted library allocation
page read and write
164B6076000
trusted library allocation
page read and write
164B7381000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC937000
trusted library allocation
page read and write
164C27BD000
trusted library allocation
page read and write
164BB14C000
trusted library allocation
page read and write
164BB52E000
trusted library allocation
page read and write
164BC44D000
trusted library allocation
page read and write
164BC408000
trusted library allocation
page read and write
164BB508000
trusted library allocation
page read and write
164C2897000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B61B0000
trusted library allocation
page read and write
164BBE92000
trusted library allocation
page read and write
164C6047000
trusted library allocation
page read and write
164B110E000
heap
page read and write
164C2873000
trusted library allocation
page read and write
164BD642000
trusted library allocation
page read and write
164BBDFE000
trusted library allocation
page read and write
164BC43F000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BB5F5000
trusted library allocation
page read and write
164BB5D3000
trusted library allocation
page read and write
164BBBFD000
trusted library allocation
page read and write
164B10D5000
heap
page read and write
164B6119000
trusted library allocation
page read and write
20CD5D0C000
trusted library allocation
page read and write
164BC5C4000
trusted library allocation
page read and write
164BB184000
trusted library allocation
page read and write
164BBBB4000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
2C90CEA9000
heap
page read and write
164B10AB000
heap
page read and write
164BB58D000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164B10B9000
heap
page read and write
164BD7A4000
trusted library allocation
page read and write
164BCC59000
trusted library allocation
page read and write
164BC4FD000
trusted library allocation
page read and write
164C6F36000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10BA000
heap
page read and write
164BBE88000
trusted library allocation
page read and write
164C6455000
trusted library allocation
page read and write
164B7688000
trusted library allocation
page read and write
23FEA0E7000
remote allocation
page execute read
164C6231000
trusted library allocation
page read and write
164BB117000
trusted library allocation
page read and write
164C68BA000
heap
page read and write
164B10D1000
heap
page read and write
164BD7A1000
trusted library allocation
page read and write
164C604B000
trusted library allocation
page read and write
164BD6D8000
trusted library allocation
page read and write
164BD7A1000
trusted library allocation
page read and write
164B6023000
trusted library allocation
page read and write
23FEA403000
trusted library allocation
page read and write
164BB5F8000
trusted library allocation
page read and write
164BC47E000
trusted library allocation
page read and write
164BB3FC000
trusted library allocation
page read and write
164BC3FE000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164BA9F2000
trusted library allocation
page read and write
164BCAAE000
trusted library allocation
page read and write
164BCB7B000
trusted library allocation
page read and write
164BDEDD000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
D92000
unkown
page readonly
164BB1C0000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164BC966000
trusted library allocation
page read and write
164BBDE6000
trusted library allocation
page read and write
164BDDF0000
trusted library allocation
page read and write
164BA942000
trusted library allocation
page read and write
164BB1BA000
trusted library allocation
page read and write
23FEA292000
unclassified section
page read and write
164BDFF4000
trusted library allocation
page read and write
164BB10F000
trusted library allocation
page read and write
164BA942000
trusted library allocation
page read and write
164C6036000
trusted library allocation
page read and write
164BB145000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BD7E1000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164BC3A6000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
23FEA632000
trusted library allocation
page read and write
1623000
heap
page read and write
164BC4CB000
trusted library allocation
page read and write
164BC28B000
trusted library allocation
page read and write
164BCC57000
trusted library allocation
page read and write
164BDFE1000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10C8000
heap
page read and write
164BB4B5000
trusted library allocation
page read and write
B9A000
stack
page read and write
164B10D3000
heap
page read and write
164C32E9000
trusted library allocation
page read and write
164BDFAC000
trusted library allocation
page read and write
164BC0DA000
trusted library allocation
page read and write
164BD8A7000
trusted library allocation
page read and write
164BA2F0000
trusted library allocation
page read and write
164C2665000
trusted library allocation
page read and write
164B768B000
trusted library allocation
page read and write
20CD5A0C000
trusted library allocation
page read and write
164C6E57000
trusted library allocation
page read and write
164BC267000
trusted library allocation
page read and write
164BDFC4000
trusted library allocation
page read and write
164BC4E0000
trusted library allocation
page read and write
164BC6D8000
trusted library allocation
page read and write
164B10FF000
heap
page read and write
164BC1D5000
trusted library allocation
page read and write
164BCB3E000
trusted library allocation
page read and write
164C2545000
trusted library allocation
page read and write
164C32EA000
trusted library allocation
page read and write
164B5A81000
trusted library allocation
page read and write
164BC456000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBF97000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BBAC5000
trusted library allocation
page read and write
164BB5DD000
trusted library allocation
page read and write
164BBE9E000
trusted library allocation
page read and write
164BBCE3000
trusted library allocation
page read and write
164B10AF000
heap
page read and write
164BBA29000
trusted library allocation
page read and write
164C27BD000
trusted library allocation
page read and write
164BC0E5000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
23FEA5E0000
heap
page read and write
164BB387000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
20CD5ADB000
trusted library allocation
page read and write
2C90CE29000
heap
page read and write
164C6013000
trusted library allocation
page read and write
164C6F2B000
trusted library allocation
page read and write
164BC6C1000
trusted library allocation
page read and write
164BBE70000
trusted library allocation
page read and write
164B7950000
heap
page read and write
164BB533000
trusted library allocation
page read and write
20CD55D0000
unclassified section
page readonly
164BCB9F000
trusted library allocation
page read and write
164BC3BD000
trusted library allocation
page read and write
164C6894000
heap
page read and write
164B10FC000
heap
page read and write
164BDDBA000
trusted library allocation
page read and write
23FEA45D000
trusted library allocation
page read and write
164BDDCB000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164B109A000
heap
page read and write
164BBE58000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164B616A000
trusted library allocation
page read and write
164B10B2000
heap
page read and write
164B10D2000
heap
page read and write
164BA17B000
trusted library allocation
page read and write
164BA2F4000
trusted library allocation
page read and write
164BB15C000
trusted library allocation
page read and write
164BDBC6000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BBEBC000
trusted library allocation
page read and write
164C6F15000
trusted library allocation
page read and write
164C658B000
trusted library allocation
page read and write
164BB15F000
trusted library allocation
page read and write
164BDED7000
trusted library allocation
page read and write
164BB6C4000
trusted library allocation
page read and write
164BA2B2000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BA926000
trusted library allocation
page read and write
164BB4FA000
trusted library allocation
page read and write
7CD9DFE000
stack
page read and write
164BCB5B000
trusted library allocation
page read and write
164C6E41000
trusted library allocation
page read and write
164C6575000
trusted library allocation
page read and write
164BBE88000
trusted library allocation
page read and write
164BB8A9000
trusted library allocation
page read and write
164C41DA000
trusted library allocation
page read and write
164BC7EF000
trusted library allocation
page read and write
164BDED7000
trusted library allocation
page read and write
164BB528000
trusted library allocation
page read and write
164BD772000
trusted library allocation
page read and write
164BC484000
trusted library allocation
page read and write
164BBE92000
trusted library allocation
page read and write
164B7659000
trusted library allocation
page read and write
164BB117000
trusted library allocation
page read and write
164BCB7B000
trusted library allocation
page read and write
164BB616000
trusted library allocation
page read and write
CD0000
unkown
page readonly
164C3E96000
trusted library allocation
page read and write
20CD56E0000
heap
page read and write
164B10BC000
heap
page read and write
164BDDD3000
trusted library allocation
page read and write
164BC754000
trusted library allocation
page read and write
164C2616000
trusted library allocation
page read and write
164BC27F000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BB1E6000
trusted library allocation
page read and write
164B7344000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BACDB000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BB5DD000
trusted library allocation
page read and write
164BA36D000
trusted library allocation
page read and write
164B73EB000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BC5FA000
trusted library allocation
page read and write
164C68BA000
heap
page read and write
23FEA230000
heap
page read and write
19C3AE1D000
heap
page read and write
164B1104000
heap
page read and write
164BA23D000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BBA93000
trusted library allocation
page read and write
164BB6BA000
trusted library allocation
page read and write
164BA172000
trusted library allocation
page read and write
164B72C7000
trusted library allocation
page read and write
164BBC62000
trusted library allocation
page read and write
20CD5AB0000
trusted library allocation
page read and write
164BD6E4000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164B10CC000
heap
page read and write
164BA982000
trusted library allocation
page read and write
164BC1D5000
trusted library allocation
page read and write
164BDFB3000
trusted library allocation
page read and write
164BA951000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BC404000
trusted library allocation
page read and write
C00000
heap
page read and write
164B10C8000
heap
page read and write
164BBEBE000
trusted library allocation
page read and write
164BDFE1000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164BBE7F000
trusted library allocation
page read and write
164BC3E1000
trusted library allocation
page read and write
164BBED9000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164C41AD000
trusted library allocation
page read and write
164BC0B4000
trusted library allocation
page read and write
2C90BF70000
heap
page read and write
164BDFEF000
trusted library allocation
page read and write
164C5600000
trusted library allocation
page read and write
164BCC57000
trusted library allocation
page read and write
164BDDA8000
trusted library allocation
page read and write
164BA23B000
trusted library allocation
page read and write
164C4AFC000
trusted library allocation
page read and write
164C2851000
trusted library allocation
page read and write
164C25A5000
trusted library allocation
page read and write
164C3D00000
trusted library allocation
page read and write
20CD5B00000
heap
page read and write
164C3F00000
trusted library allocation
page read and write
164C6178000
trusted library allocation
page read and write
164B764C000
trusted library allocation
page read and write
2C90C100000
trusted library allocation
page read and write
164BC4C3000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BB186000
trusted library allocation
page read and write
FBCA3FE000
unkown
page readonly
164B10D3000
heap
page read and write
164BA2E8000
trusted library allocation
page read and write
164BDFE6000
trusted library allocation
page read and write
164BDFF0000
trusted library allocation
page read and write
164C32CA000
trusted library allocation
page read and write
164BA166000
trusted library allocation
page read and write
164BC4C3000
trusted library allocation
page read and write
164C6571000
trusted library allocation
page read and write
164C28FB000
trusted library allocation
page read and write
164B7398000
trusted library allocation
page read and write
164C64B3000
trusted library allocation
page read and write
164C68BA000
heap
page read and write
164BDFB3000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BBEA2000
trusted library allocation
page read and write
164C26DB000
trusted library allocation
page read and write
164BBA2B000
trusted library allocation
page read and write
164C688E000
heap
page read and write
162A000
heap
page read and write
164BA4ED000
trusted library allocation
page read and write
164BBE84000
trusted library allocation
page read and write
164BCB97000
trusted library allocation
page read and write
164BD7EC000
trusted library allocation
page read and write
164BB1B9000
trusted library allocation
page read and write
164C28FB000
trusted library allocation
page read and write
164C3280000
trusted library allocation
page read and write
164BDDFC000
trusted library allocation
page read and write
164BC0C2000
trusted library allocation
page read and write
164BB18D000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10C8000
heap
page read and write
164B10D8000
heap
page read and write
164B10E3000
heap
page read and write
164BC553000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164BC4DA000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BB31A000
trusted library allocation
page read and write
164C5802000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
2C90CD9F000
heap
page read and write
164B7972000
heap
page read and write
164BA9E9000
trusted library allocation
page read and write
164BBE92000
trusted library allocation
page read and write
164BB4D1000
trusted library allocation
page read and write
164BDD70000
trusted library allocation
page read and write
2C90C386000
trusted library allocation
page read and write
164B76D2000
trusted library allocation
page read and write
164BA95A000
trusted library allocation
page read and write
2C90CE29000
heap
page read and write
164BBED9000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BBDE6000
trusted library allocation
page read and write
164BC3D2000
trusted library allocation
page read and write
164BA9FA000
trusted library allocation
page read and write
164BC449000
trusted library allocation
page read and write
164C6575000
trusted library allocation
page read and write
2C90CE28000
heap
page read and write
164BA2E3000
trusted library allocation
page read and write
164BC55D000
trusted library allocation
page read and write
164BC4F8000
trusted library allocation
page read and write
164BA2D6000
trusted library allocation
page read and write
164BBDAC000
trusted library allocation
page read and write
164BA356000
trusted library allocation
page read and write
164BDBF9000
trusted library allocation
page read and write
164C2896000
trusted library allocation
page read and write
23FEA2E0000
heap
page read and write
164BB112000
trusted library allocation
page read and write
164B7949000
heap
page read and write
164BDF2A000
trusted library allocation
page read and write
164BBE53000
trusted library allocation
page read and write
164BB1D3000
trusted library allocation
page read and write
164B5A9E000
trusted library allocation
page read and write
164BA260000
trusted library allocation
page read and write
164C6047000
trusted library allocation
page read and write
164BDF9E000
trusted library allocation
page read and write
164BDDD3000
trusted library allocation
page read and write
164C60DE000
trusted library allocation
page read and write
164BA2AF000
trusted library allocation
page read and write
164BA2A2000
trusted library allocation
page read and write
164BBDE0000
trusted library allocation
page read and write
164BC091000
trusted library allocation
page read and write
164BBA6A000
trusted library allocation
page read and write
164BDFB3000
trusted library allocation
page read and write
164B10FE000
heap
page read and write
164BBAC5000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164B10C3000
heap
page read and write
164BDE4E000
trusted library allocation
page read and write
164BA182000
trusted library allocation
page read and write
2C90C02A000
heap
page read and write
164B79B1000
heap
page read and write
164B73A6000
trusted library allocation
page read and write
164BC33B000
trusted library allocation
page read and write
164C26BA000
trusted library allocation
page read and write
2C90CE20000
heap
page read and write
164BB5FB000
trusted library allocation
page read and write
164BDF76000
trusted library allocation
page read and write
164BC484000
trusted library allocation
page read and write
164C26BD000
trusted library allocation
page read and write
164B10FD000
heap
page read and write
164BD775000
trusted library allocation
page read and write
164BC284000
trusted library allocation
page read and write
164BD799000
trusted library allocation
page read and write
164C65D5000
trusted library allocation
page read and write
164BDE68000
trusted library allocation
page read and write
164BDEA3000
trusted library allocation
page read and write
164BB619000
trusted library allocation
page read and write
164C60BA000
trusted library allocation
page read and write
164B72DC000
trusted library allocation
page read and write
164BC1E6000
trusted library allocation
page read and write
2C90C3E9000
trusted library allocation
page read and write
164BB159000
trusted library allocation
page read and write
164BB5D5000
trusted library allocation
page read and write
164BCC7C000
trusted library allocation
page read and write
2C90C090000
trusted library allocation
page read and write
164C25A1000
trusted library allocation
page read and write
164C49D6000
trusted library allocation
page read and write
164BBDEC000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164B10FC000
heap
page read and write
164BBC55000
trusted library allocation
page read and write
164BA2BA000
trusted library allocation
page read and write
164B10FE000
heap
page read and write
164C65E6000
trusted library allocation
page read and write
2C90CD49000
heap
page read and write
164B10C3000
heap
page read and write
164C26D7000
trusted library allocation
page read and write
164B6126000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
164C47C5000
trusted library allocation
page read and write
164BBEA8000
trusted library allocation
page read and write
164C326E000
trusted library allocation
page read and write
164BC53F000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10B9000
heap
page read and write
164C6E41000
trusted library allocation
page read and write
D7170424000
trusted library allocation
page read and write
15E315A0000
heap
page read and write
164B10CC000
heap
page read and write
164B5AC0000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164C6F42000
trusted library allocation
page read and write
164BDDED000
trusted library allocation
page read and write
164BB376000
trusted library allocation
page read and write
164B709C000
trusted library allocation
page read and write
164C64E3000
trusted library allocation
page read and write
164BB14C000
trusted library allocation
page read and write
1616000
heap
page read and write
164B10FC000
heap
page read and write
164C6E4F000
trusted library allocation
page read and write
164BB873000
trusted library allocation
page read and write
164C257F000
trusted library allocation
page read and write
164C27AC000
trusted library allocation
page read and write
164BCAE8000
trusted library allocation
page read and write
164BB4FA000
trusted library allocation
page read and write
164C6134000
trusted library allocation
page read and write
164BC287000
trusted library allocation
page read and write
164BCB36000
trusted library allocation
page read and write
2C90BE60000
unclassified section
page readonly
164BCC93000
trusted library allocation
page read and write
164BDF36000
trusted library allocation
page read and write
164BC4D1000
trusted library allocation
page read and write
164C61C1000
trusted library allocation
page read and write
164B5AC3000
trusted library allocation
page read and write
164BDDD1000
trusted library allocation
page read and write
164BBE63000
trusted library allocation
page read and write
164C6E94000
trusted library allocation
page read and write
164BC6E3000
trusted library allocation
page read and write
164BDF2A000
trusted library allocation
page read and write
DA4000
unkown
page readonly
164B10D8000
heap
page read and write
164C6051000
trusted library allocation
page read and write
2C90C0AE000
unkown
page execute read
164BCBE7000
trusted library allocation
page read and write
164BA38A000
trusted library allocation
page read and write
164C477D000
trusted library allocation
page read and write
164BC3C8000
trusted library allocation
page read and write
164C28D0000
trusted library allocation
page read and write
164BA9E9000
trusted library allocation
page read and write
2C90CE26000
heap
page read and write
164B10D8000
heap
page read and write
164B10C8000
heap
page read and write
164C4A59000
trusted library allocation
page read and write
164B10D0000
heap
page read and write
164B61A0000
trusted library allocation
page read and write
164C4784000
trusted library allocation
page read and write
2C90CE31000
heap
page read and write
164BCCDE000
trusted library allocation
page read and write
164C2689000
trusted library allocation
page read and write
164BB15D000
trusted library allocation
page read and write
164BBCBE000
trusted library allocation
page read and write
164BA359000
trusted library allocation
page read and write
164BDB2C000
trusted library allocation
page read and write
2C90CE98000
heap
page read and write
164B79C4000
heap
page read and write
164C329F000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
164BCB9F000
trusted library allocation
page read and write
164BA43D000
trusted library allocation
page read and write
164B9D62000
trusted library allocation
page read and write
164BBE61000
trusted library allocation
page read and write
164BA9E9000
trusted library allocation
page read and write
15E31A07000
trusted library allocation
page read and write
164BC6FD000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164C60D8000
trusted library allocation
page read and write
C9E000
stack
page read and write
690A9FE000
stack
page read and write
164BA2ED000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BDDA1000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164BC458000
trusted library allocation
page read and write
164BC35F000
trusted library allocation
page read and write
164BDFA4000
trusted library allocation
page read and write
164C657E000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C6051000
trusted library allocation
page read and write
13CF000
stack
page read and write
164B10FC000
heap
page read and write
164BB52A000
trusted library allocation
page read and write
164BBDEC000
trusted library allocation
page read and write
164BB31C000
trusted library allocation
page read and write
164C416A000
trusted library allocation
page read and write
164BA4C5000
trusted library allocation
page read and write
2C90CE23000
heap
page read and write
164BBCD0000
trusted library allocation
page read and write
164BD7EC000
trusted library allocation
page read and write
164BDBC2000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164C6931000
heap
page read and write
164BA28F000
trusted library allocation
page read and write
164BB512000
trusted library allocation
page read and write
2C90CE6A000
heap
page read and write
164C65AD000
trusted library allocation
page read and write
164BDD4C000
trusted library allocation
page read and write
164C658B000
trusted library allocation
page read and write
164C2876000
trusted library allocation
page read and write
164BCB38000
trusted library allocation
page read and write
32837FE000
stack
page read and write
164C6851000
heap
page read and write
164BD79C000
trusted library allocation
page read and write
164BA427000
trusted library allocation
page read and write
23FEA4A4000
trusted library allocation
page read and write
164C60F0000
trusted library allocation
page read and write
164C6F39000
trusted library allocation
page read and write
164B73C7000
trusted library allocation
page read and write
164B796A000
heap
page read and write
164BDB57000
trusted library allocation
page read and write
164BCC93000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164BA48D000
trusted library allocation
page read and write
164BDF72000
trusted library allocation
page read and write
164BC7BE000
trusted library allocation
page read and write
164BA163000
trusted library allocation
page read and write
164C58A8000
trusted library allocation
page read and write
164B602F000
trusted library allocation
page read and write
164BC07A000
trusted library allocation
page read and write
164BDEE2000
trusted library allocation
page read and write
164C5C00000
trusted library allocation
page read and write
164BD6CF000
trusted library allocation
page read and write
164BBFA5000
trusted library allocation
page read and write
164C60AB000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164C6119000
trusted library allocation
page read and write
164C2829000
trusted library allocation
page read and write
19C3CA79000
heap
page read and write
164BDF46000
trusted library allocation
page read and write
164BC495000
trusted library allocation
page read and write
164BDD43000
trusted library allocation
page read and write
164BBDFE000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
2C90C348000
trusted library allocation
page read and write
164BC57B000
trusted library allocation
page read and write
164BBDBF000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164BD8A1000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164C32AC000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10C1000
heap
page read and write
20CD5A13000
trusted library allocation
page read and write
164BDFC4000
trusted library allocation
page read and write
164BA18E000
trusted library allocation
page read and write
164BB184000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
23FEA5E6000
heap
page read and write
164BDDC0000
trusted library allocation
page read and write
2C90C0A3000
unkown
page execute read
164BA438000
trusted library allocation
page read and write
164C266A000
trusted library allocation
page read and write
164BC495000
trusted library allocation
page read and write
164B72DC000
trusted library allocation
page read and write
164BCB86000
trusted library allocation
page read and write
1FE833E000
stack
page read and write
164BC062000
trusted library allocation
page read and write
164BBE43000
trusted library allocation
page read and write
164BBD7F000
trusted library allocation
page read and write
23FEA47A000
trusted library allocation
page read and write
164BC458000
trusted library allocation
page read and write
19C3AE22000
heap
page read and write
164BC300000
trusted library allocation
page read and write
164B7950000
heap
page read and write
164BD791000
trusted library allocation
page read and write
164C6F1F000
trusted library allocation
page read and write
164BA34C000
trusted library allocation
page read and write
164BC0DA000
trusted library allocation
page read and write
164BB0DD000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164BBEA8000
trusted library allocation
page read and write
164BA2DC000
trusted library allocation
page read and write
164C289A000
trusted library allocation
page read and write
23FEA200000
heap
page read and write
164BC0FC000
trusted library allocation
page read and write
164C6F2B000
trusted library allocation
page read and write
164BC98C000
trusted library allocation
page read and write
164C60EA000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164C6885000
heap
page read and write
164BDF36000
trusted library allocation
page read and write
164BDB51000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BDFEB000
trusted library allocation
page read and write
164C25BF000
trusted library allocation
page read and write
164BDE68000
trusted library allocation
page read and write
164BBA10000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164C62BE000
trusted library allocation
page read and write
164C32DD000
trusted library allocation
page read and write
164C645B000
trusted library allocation
page read and write
164BBED2000
trusted library allocation
page read and write
164BC449000
trusted library allocation
page read and write
2C90CE2F000
heap
page read and write
20CD5A78000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBA1D000
trusted library allocation
page read and write
164BC985000
trusted library allocation
page read and write
164BA4C2000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C47E0000
trusted library allocation
page read and write
164BC0AA000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BB1B1000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
20CD5A5D000
trusted library allocation
page read and write
164BC0A2000
trusted library allocation
page read and write
164BB4EF000
trusted library allocation
page read and write
164C61F5000
trusted library allocation
page read and write
164BB3C1000
trusted library allocation
page read and write
164BC0B9000
trusted library allocation
page read and write
164BBA9B000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
164BDBB5000
trusted library allocation
page read and write
164C4ACA000
trusted library allocation
page read and write
164BC7B6000
trusted library allocation
page read and write
164B10BC000
heap
page read and write
164C26BF000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
2C90CE2F000
heap
page read and write
164BBD87000
trusted library allocation
page read and write
164BD672000
trusted library allocation
page read and write
164BDBBD000
trusted library allocation
page read and write
164C6F22000
trusted library allocation
page read and write
164C27D3000
trusted library allocation
page read and write
164BDFF2000
trusted library allocation
page read and write
164C6595000
trusted library allocation
page read and write
164BC4FD000
trusted library allocation
page read and write
164C623B000
trusted library allocation
page read and write
164BBA6A000
trusted library allocation
page read and write
2C90CDF9000
heap
page read and write
164C61F5000
trusted library allocation
page read and write
164BC25D000
trusted library allocation
page read and write
164BDE42000
trusted library allocation
page read and write
2C90C3C2000
trusted library allocation
page read and write
164BBD49000
trusted library allocation
page read and write
164BC4CB000
trusted library allocation
page read and write
164BBFE3000
trusted library allocation
page read and write
164C5400000
trusted library allocation
page read and write
2C90C323000
trusted library allocation
page read and write
164C65F5000
trusted library allocation
page read and write
164C6561000
trusted library allocation
page read and write
164C65A1000
trusted library allocation
page read and write
164BB1B1000
trusted library allocation
page read and write
164BB6D9000
trusted library allocation
page read and write
164BB104000
trusted library allocation
page read and write
164C415C000
trusted library allocation
page read and write
164BB1C2000
trusted library allocation
page read and write
164BDFC9000
trusted library allocation
page read and write
164B7286000
trusted library allocation
page read and write
164BBEC2000
trusted library allocation
page read and write
DA4000
unkown
page readonly
164BB17E000
trusted library allocation
page read and write
164BC7DB000
trusted library allocation
page read and write
164BA2DC000
trusted library allocation
page read and write
2C90CEA9000
heap
page read and write
164C2680000
trusted library allocation
page read and write
164BB876000
trusted library allocation
page read and write
164C6E57000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164BB5DF000
trusted library allocation
page read and write
164C26EA000
trusted library allocation
page read and write
164C601B000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BA26F000
trusted library allocation
page read and write
164C62DB000
trusted library allocation
page read and write
164BA371000
trusted library allocation
page read and write
164BBA42000
trusted library allocation
page read and write
20CD5AC4000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10CC000
heap
page read and write
164C32DE000
trusted library allocation
page read and write
164BD8EA000
trusted library allocation
page read and write
164BC4F3000
trusted library allocation
page read and write
164BBDE8000
trusted library allocation
page read and write
164BBED9000
trusted library allocation
page read and write
164C65B5000
trusted library allocation
page read and write
164BBA44000
trusted library allocation
page read and write
164BDFF4000
trusted library allocation
page read and write
164C2676000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C6931000
heap
page read and write
164BC77A000
trusted library allocation
page read and write
164BCC5E000
trusted library allocation
page read and write
164C629E000
trusted library allocation
page read and write
164BA452000
trusted library allocation
page read and write
164BCC5E000
trusted library allocation
page read and write
164BD630000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164BA344000
trusted library allocation
page read and write
164BC2D6000
trusted library allocation
page read and write
164C41A3000
trusted library allocation
page read and write
164C6570000
trusted library allocation
page read and write
20CD5A5F000
trusted library allocation
page read and write
164BC0ED000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164C6F0D000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164BA9EE000
trusted library allocation
page read and write
164C47A8000
trusted library allocation
page read and write
164BA2D3000
trusted library allocation
page read and write
164BB6B6000
trusted library allocation
page read and write
CD1000
unkown
page execute read
164C32D5000
trusted library allocation
page read and write
164B796A000
heap
page read and write
164B10C3000
heap
page read and write
164C26D7000
trusted library allocation
page read and write
164BC3A3000
trusted library allocation
page read and write
164C6E4A000
trusted library allocation
page read and write
164BDF5C000
trusted library allocation
page read and write
164BA2AF000
trusted library allocation
page read and write
164B10FF000
heap
page read and write
164B7952000
heap
page read and write
164BC32E000
trusted library allocation
page read and write
164BC8DE000
trusted library allocation
page read and write
164BA3B3000
trusted library allocation
page read and write
164BBD52000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BB151000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10E3000
heap
page read and write
164C65D8000
trusted library allocation
page read and write
23B0000
heap
page read and write
164B60FE000
trusted library allocation
page read and write
164C61EC000
trusted library allocation
page read and write
19C3B100000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164B10E3000
heap
page read and write
164BCB86000
trusted library allocation
page read and write
164BDADC000
trusted library allocation
page read and write
164BB350000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164C288A000
trusted library allocation
page read and write
15C4000
heap
page read and write
164BB2D5000
trusted library allocation
page read and write
164BA921000
trusted library allocation
page read and write
164B73BE000
trusted library allocation
page read and write
164BC063000
trusted library allocation
page read and write
164C65CE000
trusted library allocation
page read and write
7CD95FF000
stack
page read and write
164BDFAC000
trusted library allocation
page read and write
164B10AC000
heap
page read and write
164C602B000
trusted library allocation
page read and write
164C28FB000
trusted library allocation
page read and write
1633000
heap
page read and write
164BC0DA000
trusted library allocation
page read and write
164B735D000
trusted library allocation
page read and write
164C256F000
trusted library allocation
page read and write
164BA2B3000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BC3CE000
trusted library allocation
page read and write
164BBDEA000
trusted library allocation
page read and write
20CD5A69000
trusted library allocation
page read and write
164BBCB6000
trusted library allocation
page read and write
2C90CDA9000
heap
page read and write
164C6F33000
trusted library allocation
page read and write
164BC87F000
trusted library allocation
page read and write
164BB18D000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164B10FC000
heap
page read and write
164BA4AE000
trusted library allocation
page read and write
FBC81FE000
unkown
page readonly
164C265E000
trusted library allocation
page read and write
164B6182000
trusted library allocation
page read and write
164BDB81000
trusted library allocation
page read and write
164C4A5C000
trusted library allocation
page read and write
164B72DC000
trusted library allocation
page read and write
23FEA410000
trusted library allocation
page read and write
164BA9FA000
trusted library allocation
page read and write
164C610F000
trusted library allocation
page read and write
164BA2D6000
trusted library allocation
page read and write
13EF000
stack
page read and write
164B10E3000
heap
page read and write
164BC484000
trusted library allocation
page read and write
164BB5B1000
trusted library allocation
page read and write
164BA181000
trusted library allocation
page read and write
164BBADD000
trusted library allocation
page read and write
164B7348000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C64BB000
trusted library allocation
page read and write
164C6047000
trusted library allocation
page read and write
164C608D000
trusted library allocation
page read and write
20CD5A24000
trusted library allocation
page read and write
2C90CDA9000
heap
page read and write
164B10C3000
heap
page read and write
164BA384000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BD621000
trusted library allocation
page read and write
164BDDB4000
trusted library allocation
page read and write
164BBE58000
trusted library allocation
page read and write
164C4796000
trusted library allocation
page read and write
164C658B000
trusted library allocation
page read and write
164C65F5000
trusted library allocation
page read and write
164BD6C7000
trusted library allocation
page read and write
164BBED9000
trusted library allocation
page read and write
164BC4F3000
trusted library allocation
page read and write
164C621F000
trusted library allocation
page read and write
2C90CEA9000
heap
page read and write
164BBFE0000
trusted library allocation
page read and write
164C32D0000
trusted library allocation
page read and write
164BB6D9000
trusted library allocation
page read and write
164BB0EF000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BB576000
trusted library allocation
page read and write
164BB62F000
trusted library allocation
page read and write
164BC3A1000
trusted library allocation
page read and write
164C6013000
trusted library allocation
page read and write
164BC0A2000
trusted library allocation
page read and write
164BBEBE000
trusted library allocation
page read and write
164B10FF000
heap
page read and write
164BC4C3000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B10D8000
heap
page read and write
164B10D2000
heap
page read and write
164B10C3000
heap
page read and write
164B10B4000
heap
page read and write
164B7429000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164BB6EA000
trusted library allocation
page read and write
164BDE44000
trusted library allocation
page read and write
164BACCA000
trusted library allocation
page read and write
164BB1E2000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164C28F7000
trusted library allocation
page read and write
164B5A98000
trusted library allocation
page read and write
164BC28C000
trusted library allocation
page read and write
164BBE7F000
trusted library allocation
page read and write
164BB6DF000
trusted library allocation
page read and write
164BB543000
trusted library allocation
page read and write
164BBE88000
trusted library allocation
page read and write
164BDFB3000
trusted library allocation
page read and write
164BCCDE000
trusted library allocation
page read and write
164BC27F000
trusted library allocation
page read and write
164B72B3000
trusted library allocation
page read and write
164BA4FD000
trusted library allocation
page read and write
164BB186000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BD78C000
trusted library allocation
page read and write
164BC449000
trusted library allocation
page read and write
164B10B9000
heap
page read and write
164C60BE000
trusted library allocation
page read and write
164B76CF000
trusted library allocation
page read and write
164BBD3B000
trusted library allocation
page read and write
164BCBE7000
trusted library allocation
page read and write
4022DA03000
trusted library allocation
page read and write
164BC07A000
trusted library allocation
page read and write
164BACC5000
trusted library allocation
page read and write
164BC431000
trusted library allocation
page read and write
164BB325000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164C65F5000
trusted library allocation
page read and write
20CD56C0000
heap
page read and write
164BBC47000
trusted library allocation
page read and write
164BCB30000
trusted library allocation
page read and write
164BD63E000
trusted library allocation
page read and write
164B7333000
trusted library allocation
page read and write
164C4A5C000
trusted library allocation
page read and write
2C90CE99000
heap
page read and write
164C61D2000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BA359000
trusted library allocation
page read and write
164C2686000
trusted library allocation
page read and write
164C41ED000
trusted library allocation
page read and write
164BACCA000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164C2862000
trusted library allocation
page read and write
164BB1B1000
trusted library allocation
page read and write
164BB353000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BC7EF000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BA4D5000
trusted library allocation
page read and write
162A000
heap
page read and write
164B794C000
heap
page read and write
2C90CE61000
heap
page read and write
164BA17E000
trusted library allocation
page read and write
164BDF55000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
D6C000
unkown
page readonly
164BBA3C000
trusted library allocation
page read and write
164BC326000
trusted library allocation
page read and write
164C64BD000
trusted library allocation
page read and write
164BCB9B000
trusted library allocation
page read and write
164C6F36000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C28BC000
trusted library allocation
page read and write
164BB14C000
trusted library allocation
page read and write
164B5ADF000
trusted library allocation
page read and write
164BBEB2000
trusted library allocation
page read and write
164BBB9F000
trusted library allocation
page read and write
19C3CA73000
heap
page read and write
164BBE66000
trusted library allocation
page read and write
164BC7B6000
trusted library allocation
page read and write
164C6F46000
trusted library allocation
page read and write
164BBE3D000
trusted library allocation
page read and write
164BC8C6000
trusted library allocation
page read and write
164C49C0000
trusted library allocation
page read and write
164C2891000
trusted library allocation
page read and write
164BDFC4000
trusted library allocation
page read and write
19C3CA72000
heap
page read and write
164C60D8000
trusted library allocation
page read and write
23FEA621000
trusted library allocation
page read and write
164C6199000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
164C65A0000
trusted library allocation
page read and write
164B10FE000
heap
page read and write
164BA92B000
trusted library allocation
page read and write
2C90CE84000
heap
page read and write
23FEA233000
heap
page read and write
2C90CE23000
heap
page read and write
15E316B0000
heap
page read and write
164B76F1000
trusted library allocation
page read and write
164C289E000
trusted library allocation
page read and write
164BB17E000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164BCCA5000
trusted library allocation
page read and write
164B5AEF000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164BC9CD000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BD772000
trusted library allocation
page read and write
164BC4F3000
trusted library allocation
page read and write
164BB395000
trusted library allocation
page read and write
164BC497000
trusted library allocation
page read and write
164BBDEA000
trusted library allocation
page read and write
164BC56B000
trusted library allocation
page read and write
164C4148000
trusted library allocation
page read and write
164BDFC9000
trusted library allocation
page read and write
164B7062000
trusted library allocation
page read and write
164B73EB000
trusted library allocation
page read and write
164BB619000
trusted library allocation
page read and write
164BDFA3000
trusted library allocation
page read and write
164BA4D5000
trusted library allocation
page read and write
164BA166000
trusted library allocation
page read and write
164C4AFC000
trusted library allocation
page read and write
2C90C070000
heap
page read and write
20CD5A62000
trusted library allocation
page read and write
164BC51D000
trusted library allocation
page read and write
164C417C000
trusted library allocation
page read and write
164BB159000
trusted library allocation
page read and write
164BDADE000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164BC504000
trusted library allocation
page read and write
164BB1C0000
trusted library allocation
page read and write
164B1112000
heap
page read and write
164BC4F1000
trusted library allocation
page read and write
164BC43F000
trusted library allocation
page read and write
164C6F39000
trusted library allocation
page read and write
23FEAA40000
heap
page read and write
164BDDB4000
trusted library allocation
page read and write
164BC362000
trusted library allocation
page read and write
2C90CE31000
heap
page read and write
164B7952000
heap
page read and write
164BC0ED000
trusted library allocation
page read and write
164BBDE8000
trusted library allocation
page read and write
164BC497000
trusted library allocation
page read and write
164BBEE6000
trusted library allocation
page read and write
164BC0B8000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BBCA9000
trusted library allocation
page read and write
164BA9E0000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
164C608D000
trusted library allocation
page read and write
164BDFA4000
trusted library allocation
page read and write
164BDFF2000
trusted library allocation
page read and write
164BBC93000
trusted library allocation
page read and write
164B73F6000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164C6F22000
trusted library allocation
page read and write
164BA34C000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
164C289A000
trusted library allocation
page read and write
164BBEB2000
trusted library allocation
page read and write
164BBA8A000
trusted library allocation
page read and write
164BB4E7000
trusted library allocation
page read and write
2C90CDA9000
heap
page read and write
23FEA4B7000
trusted library allocation
page read and write
23FEA639000
trusted library allocation
page read and write
164C68AD000
heap
page read and write
164BB5FB000
trusted library allocation
page read and write
164BB4EF000
trusted library allocation
page read and write
164BCAF0000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164B73A5000
trusted library allocation
page read and write
164BBA86000
trusted library allocation
page read and write
164BBC69000
trusted library allocation
page read and write
164BA28F000
trusted library allocation
page read and write
164C28F3000
trusted library allocation
page read and write
164C60F6000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164B10D8000
heap
page read and write
164BA4AE000
trusted library allocation
page read and write
164C4AF9000
trusted library allocation
page read and write
164BCC59000
trusted library allocation
page read and write
164C26B1000
trusted library allocation
page read and write
164BA268000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C2696000
trusted library allocation
page read and write
164B7964000
heap
page read and write
164BC0D0000
trusted library allocation
page read and write
164BB1C0000
trusted library allocation
page read and write
164C60D2000
trusted library allocation
page read and write
164C60E0000
trusted library allocation
page read and write
164BCCC5000
trusted library allocation
page read and write
164BB5B0000
trusted library allocation
page read and write
164C610D000
trusted library allocation
page read and write
164C32CD000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
23FEA0F0000
unclassified section
page readonly
164BC4D1000
trusted library allocation
page read and write
164BBE9D000
trusted library allocation
page read and write
164C27D3000
trusted library allocation
page read and write
164C65F7000
trusted library allocation
page read and write
164BC3E7000
trusted library allocation
page read and write
164C65E6000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164BA44E000
trusted library allocation
page read and write
164C41E6000
trusted library allocation
page read and write
164C4ACA000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBEC6000
trusted library allocation
page read and write
164BB12D000
trusted library allocation
page read and write
164C47BE000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BBA97000
trusted library allocation
page read and write
164BBE5F000
trusted library allocation
page read and write
164BB17E000
trusted library allocation
page read and write
164B72E8000
trusted library allocation
page read and write
164C60B3000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164C60BC000
trusted library allocation
page read and write
164BA42E000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164BDFB3000
trusted library allocation
page read and write
164BCB21000
trusted library allocation
page read and write
164BC0D0000
trusted library allocation
page read and write
164BBC8D000
trusted library allocation
page read and write
164B7360000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164B10BB000
heap
page read and write
164C6117000
trusted library allocation
page read and write
164BBA42000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164B10FE000
heap
page read and write
164B10B9000
heap
page read and write
164B10B5000
heap
page read and write
164BA186000
trusted library allocation
page read and write
164C65B5000
trusted library allocation
page read and write
164BC326000
trusted library allocation
page read and write
2C90CE3D000
heap
page read and write
164BA9FA000
trusted library allocation
page read and write
164C6E68000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164B10B5000
heap
page read and write
164C6056000
trusted library allocation
page read and write
164BB4FA000
trusted library allocation
page read and write
164C60F9000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164B10E3000
heap
page read and write
164B10C3000
heap
page read and write
164C61D2000
trusted library allocation
page read and write
164BDFAC000
trusted library allocation
page read and write
164BBAE5000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164BBE48000
trusted library allocation
page read and write
DA0000
unkown
page write copy
164B7686000
trusted library allocation
page read and write
164BB4C8000
trusted library allocation
page read and write
2C90C366000
trusted library allocation
page read and write
164BDB3E000
trusted library allocation
page read and write
164B109C000
heap
page read and write
164BDFEB000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBEF1000
trusted library allocation
page read and write
164BCAEB000
trusted library allocation
page read and write
164BC553000
trusted library allocation
page read and write
164B79BA000
heap
page read and write
164C5A00000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164BB540000
trusted library allocation
page read and write
164BB5EE000
trusted library allocation
page read and write
164B73A1000
trusted library allocation
page read and write
20CD5C00000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
164BDFC9000
trusted library allocation
page read and write
164BBE86000
trusted library allocation
page read and write
164BB18D000
trusted library allocation
page read and write
164C2862000
trusted library allocation
page read and write
FBC837E000
unkown
page readonly
164BC4C7000
trusted library allocation
page read and write
2C90CE2F000
heap
page read and write
164C28F3000
trusted library allocation
page read and write
164B7342000
trusted library allocation
page read and write
164C477F000
trusted library allocation
page read and write
164C6025000
trusted library allocation
page read and write
164BA9A2000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164BB5D5000
trusted library allocation
page read and write
164BA2CE000
trusted library allocation
page read and write
164BA3CF000
trusted library allocation
page read and write
164BB3CD000
trusted library allocation
page read and write
164BC426000
trusted library allocation
page read and write
164BB4C7000
trusted library allocation
page read and write
164BB353000
trusted library allocation
page read and write
164B10BB000
heap
page read and write
164B7669000
trusted library allocation
page read and write
164C2677000
trusted library allocation
page read and write
164C4A85000
trusted library allocation
page read and write
23FEA45B000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
15E31680000
heap
page read and write
2C90CE7B000
heap
page read and write
164C61EC000
trusted library allocation
page read and write
2C90C020000
heap
page read and write
20CD573F000
unclassified section
page read and write
164BD8DB000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C6140000
trusted library allocation
page read and write
164C617D000
trusted library allocation
page read and write
164BC443000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
164BB878000
trusted library allocation
page read and write
164C62A8000
trusted library allocation
page read and write
164B79C4000
heap
page read and write
164B10C2000
heap
page read and write
164BA926000
trusted library allocation
page read and write
164BC424000
trusted library allocation
page read and write
164C2842000
trusted library allocation
page read and write
164BBD4D000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
19C3CA85000
heap
page read and write
164B10D3000
heap
page read and write
164BC443000
trusted library allocation
page read and write
164BDFA3000
trusted library allocation
page read and write
164B70F1000
trusted library allocation
page read and write
20CD56E6000
heap
page read and write
164C32F7000
trusted library allocation
page read and write
164BA347000
trusted library allocation
page read and write
164BD6EF000
trusted library allocation
page read and write
164BB1C0000
trusted library allocation
page read and write
164BB126000
trusted library allocation
page read and write
164BA4ED000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164C6F2B000
trusted library allocation
page read and write
164BB5DF000
trusted library allocation
page read and write
20CD565A000
remote allocation
page execute read
164BDBAF000
trusted library allocation
page read and write
164C60C0000
trusted library allocation
page read and write
164BCC7C000
trusted library allocation
page read and write
164C68C1000
heap
page read and write
164BB51A000
trusted library allocation
page read and write
164C6245000
trusted library allocation
page read and write
164BB599000
trusted library allocation
page read and write
164C41CA000
trusted library allocation
page read and write
164BC2A6000
trusted library allocation
page read and write
2C90CE7B000
heap
page read and write
164BA9F5000
trusted library allocation
page read and write
2C90CDA0000
heap
page read and write
19C3B107000
trusted library allocation
page read and write
164C4B01000
trusted library allocation
page read and write
164BB1BA000
trusted library allocation
page read and write
164BBA97000
trusted library allocation
page read and write
164BB145000
trusted library allocation
page read and write
164BCB3E000
trusted library allocation
page read and write
164BC0D6000
trusted library allocation
page read and write
23FEA464000
trusted library allocation
page read and write
164C27DD000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC41A000
trusted library allocation
page read and write
164C60BA000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BC4CB000
trusted library allocation
page read and write
164BA26C000
trusted library allocation
page read and write
164B7969000
heap
page read and write
164BCB80000
trusted library allocation
page read and write
164BC0E5000
trusted library allocation
page read and write
164C4A89000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
2C90BDF0000
unclassified section
page readonly
164B10C8000
heap
page read and write
164B10CC000
heap
page read and write
2C90CE31000
heap
page read and write
164B10D1000
heap
page read and write
164BDDEB000
trusted library allocation
page read and write
164C6F33000
trusted library allocation
page read and write
164BBE5C000
trusted library allocation
page read and write
164BB471000
trusted library allocation
page read and write
164BA297000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164B9D8B000
trusted library allocation
page read and write
164BB6E5000
trusted library allocation
page read and write
164BBEE5000
trusted library allocation
page read and write
164C6E3E000
trusted library allocation
page read and write
164BB6F9000
trusted library allocation
page read and write
164BC334000
trusted library allocation
page read and write
164BA9E9000
trusted library allocation
page read and write
164C267B000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164BD8AD000
trusted library allocation
page read and write
164B10BA000
heap
page read and write
164C32EA000
trusted library allocation
page read and write
164BA172000
trusted library allocation
page read and write
164B110D000
heap
page read and write
164BDFE1000
trusted library allocation
page read and write
164BC9C8000
trusted library allocation
page read and write
164BC75C000
trusted library allocation
page read and write
164C268B000
trusted library allocation
page read and write
164B10A4000
heap
page read and write
164BC5C7000
trusted library allocation
page read and write
164C6457000
trusted library allocation
page read and write
164BC267000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BB3D8000
trusted library allocation
page read and write
164BC0D2000
trusted library allocation
page read and write
164B7698000
trusted library allocation
page read and write
164BC3E0000
trusted library allocation
page read and write
164BBE92000
trusted library allocation
page read and write
164BBEE0000
trusted library allocation
page read and write
164C6E41000
trusted library allocation
page read and write
164C49B6000
trusted library allocation
page read and write
164C61D2000
trusted library allocation
page read and write
164BB6E1000
trusted library allocation
page read and write
164BCAB2000
trusted library allocation
page read and write
164BDE7F000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
2C90CDCD000
heap
page read and write
164BB10C000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164C2553000
trusted library allocation
page read and write
164BB4CD000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BB18F000
trusted library allocation
page read and write
164BC426000
trusted library allocation
page read and write
164BA438000
trusted library allocation
page read and write
164BA2F1000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164B10B9000
heap
page read and write
23FEA5E4000
heap
page read and write
164B110C000
heap
page read and write
164B796A000
heap
page read and write
2C90CDA3000
heap
page read and write
164BDE4E000
trusted library allocation
page read and write
164C32F7000
trusted library allocation
page read and write
164C6459000
trusted library allocation
page read and write
690907B000
stack
page read and write
164BC4F0000
trusted library allocation
page read and write
164BC2F0000
trusted library allocation
page read and write
23FEA617000
trusted library allocation
page read and write
164BC0FE000
trusted library allocation
page read and write
164BCBF2000
trusted library allocation
page read and write
164BB87F000
trusted library allocation
page read and write
164B7949000
heap
page read and write
164BBE92000
trusted library allocation
page read and write
164B794B000
heap
page read and write
164B10BE000
heap
page read and write
164BA9C3000
trusted library allocation
page read and write
164BA18D000
trusted library allocation
page read and write
164BCAB0000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B733E000
trusted library allocation
page read and write
164BBA18000
trusted library allocation
page read and write
164BC2A0000
trusted library allocation
page read and write
164BD7A1000
trusted library allocation
page read and write
164BDFE5000
trusted library allocation
page read and write
164BCAB0000
trusted library allocation
page read and write
164BDF2C000
trusted library allocation
page read and write
164C6265000
trusted library allocation
page read and write
164C2682000
trusted library allocation
page read and write
164B1101000
heap
page read and write
15C4000
heap
page read and write
164B10D8000
heap
page read and write
164BC431000
trusted library allocation
page read and write
2C90C3B4000
trusted library allocation
page read and write
164BBB89000
trusted library allocation
page read and write
164BA3C9000
trusted library allocation
page read and write
164BB15F000
trusted library allocation
page read and write
164C600E000
trusted library allocation
page read and write
164BB15C000
trusted library allocation
page read and write
164BBE9E000
trusted library allocation
page read and write
164C6131000
trusted library allocation
page read and write
164BD7A9000
trusted library allocation
page read and write
164BC94A000
trusted library allocation
page read and write
164BCAA4000
trusted library allocation
page read and write
164C26DB000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B10E3000
heap
page read and write
164B9DD0000
trusted library allocation
page read and write
69077D8000
stack
page read and write
164B10FC000
heap
page read and write
21EF000
stack
page read and write
164B7964000
heap
page read and write
164BCB8F000
trusted library allocation
page read and write
164BB15F000
trusted library allocation
page read and write
164BBD79000
trusted library allocation
page read and write
164B60F6000
trusted library allocation
page read and write
164BBC55000
trusted library allocation
page read and write
164C6851000
heap
page read and write
164BBEC2000
trusted library allocation
page read and write
164BB4EF000
trusted library allocation
page read and write
164B768D000
trusted library allocation
page read and write
1FE9B7E000
stack
page read and write
164C32DE000
trusted library allocation
page read and write
164BBA1F000
trusted library allocation
page read and write
164BBEBE000
trusted library allocation
page read and write
164BC7A9000
trusted library allocation
page read and write
20CD5AF4000
trusted library allocation
page read and write
164BB4F4000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164B7964000
heap
page read and write
164BBEB2000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
164BBAE5000
trusted library allocation
page read and write
164C65BD000
trusted library allocation
page read and write
164C27CF000
trusted library allocation
page read and write
164BB310000
trusted library allocation
page read and write
164BD6A7000
trusted library allocation
page read and write
164BC2AF000
trusted library allocation
page read and write
164BC316000
trusted library allocation
page read and write
164BDFC9000
trusted library allocation
page read and write
164C41B7000
trusted library allocation
page read and write
164BCAAC000
trusted library allocation
page read and write
2C90CE84000
heap
page read and write
164BA17A000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164BBE61000
trusted library allocation
page read and write
20CD5A11000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164B617E000
trusted library allocation
page read and write
164B73BC000
trusted library allocation
page read and write
164C2545000
trusted library allocation
page read and write
164B110D000
heap
page read and write
164B10C8000
heap
page read and write
164BDF65000
trusted library allocation
page read and write
164BDEAC000
trusted library allocation
page read and write
164BDF25000
trusted library allocation
page read and write
164B10C2000
heap
page read and write
164BA33A000
trusted library allocation
page read and write
15C4000
heap
page read and write
164BB1C2000
trusted library allocation
page read and write
164B110D000
heap
page read and write
164B10D8000
heap
page read and write
164B10C3000
heap
page read and write
15C4000
heap
page read and write
164BA17E000
trusted library allocation
page read and write
164BB565000
trusted library allocation
page read and write
164BA93A000
trusted library allocation
page read and write
162A000
heap
page read and write
164BBEC6000
trusted library allocation
page read and write
6908FFE000
unkown
page readonly
164BDE8E000
trusted library allocation
page read and write
164BCB45000
trusted library allocation
page read and write
2C90C3EF000
trusted library allocation
page read and write
164B7062000
trusted library allocation
page read and write
164BDFA3000
trusted library allocation
page read and write
164BDE8E000
trusted library allocation
page read and write
164BA26F000
trusted library allocation
page read and write
164B10C1000
heap
page read and write
164BA9F4000
trusted library allocation
page read and write
164BDFAC000
trusted library allocation
page read and write
164B1107000
heap
page read and write
164C28F7000
trusted library allocation
page read and write
164BC1E6000
trusted library allocation
page read and write
164C49B1000
trusted library allocation
page read and write
164BCA71000
trusted library allocation
page read and write
690A1FE000
unkown
page readonly
15C0000
heap
page read and write
164C28AC000
trusted library allocation
page read and write
164BDE4A000
trusted library allocation
page read and write
164BBE99000
trusted library allocation
page read and write
164BBE4D000
trusted library allocation
page read and write
164B9DDB000
trusted library allocation
page read and write
164BB5D5000
trusted library allocation
page read and write
164C60BA000
trusted library allocation
page read and write
164BB1B6000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BB18F000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
23FEA2AA000
heap
page read and write
164BC53F000
trusted library allocation
page read and write
164C28A5000
trusted library allocation
page read and write
164B110E000
heap
page read and write
164C6F33000
trusted library allocation
page read and write
164B768C000
trusted library allocation
page read and write
164C6140000
trusted library allocation
page read and write
164B6200000
trusted library allocation
page read and write
19C3B2C0000
heap
page read and write
164B7381000
trusted library allocation
page read and write
164BDEE2000
trusted library allocation
page read and write
164BDE44000
trusted library allocation
page read and write
164C60F9000
trusted library allocation
page read and write
164BC0ED000
trusted library allocation
page read and write
164C602A000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164B10BE000
heap
page read and write
FBC93FE000
unkown
page readonly
162A000
heap
page read and write
164B5AEF000
trusted library allocation
page read and write
164BC0E5000
trusted library allocation
page read and write
164BE080000
trusted library allocation
page read and write
DF4000
heap
page read and write
164B10E3000
heap
page read and write
20CD5830000
heap
page read and write
164C3E58000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
2C90C361000
trusted library allocation
page read and write
164BA9F6000
trusted library allocation
page read and write
2C90CE7B000
heap
page read and write
164BC0FC000
trusted library allocation
page read and write
164BC970000
trusted library allocation
page read and write
164BA292000
trusted library allocation
page read and write
164BB11D000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BCB4A000
trusted library allocation
page read and write
164BB5C3000
trusted library allocation
page read and write
164B10B0000
heap
page read and write
164B10C3000
heap
page read and write
164BA2B5000
trusted library allocation
page read and write
164C286B000
trusted library allocation
page read and write
164B73C4000
trusted library allocation
page read and write
164C6006000
trusted library allocation
page read and write
164BD775000
trusted library allocation
page read and write
164BB629000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
164B7381000
trusted library allocation
page read and write
164BC4F0000
trusted library allocation
page read and write
164BB6E5000
trusted library allocation
page read and write
164BC07D000
trusted library allocation
page read and write
164BB171000
trusted library allocation
page read and write
164BBDBF000
trusted library allocation
page read and write
2C90CE62000
heap
page read and write
164B5A90000
trusted library allocation
page read and write
164BA11F000
trusted library allocation
page read and write
2C90CEB7000
heap
page read and write
164BBEE0000
trusted library allocation
page read and write
2C90C32F000
trusted library allocation
page read and write
164B7952000
heap
page read and write
164B10C1000
heap
page read and write
164B9D34000
trusted library allocation
page read and write
164B10A2000
heap
page read and write
164C6022000
trusted library allocation
page read and write
164BA96A000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BC4F8000
trusted library allocation
page read and write
164C26F6000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BDFC9000
trusted library allocation
page read and write
164BCCB2000
trusted library allocation
page read and write
164BDFE1000
trusted library allocation
page read and write
164BC9D7000
trusted library allocation
page read and write
164BCCB4000
trusted library allocation
page read and write
20CD5C07000
trusted library allocation
page read and write
164BD6DE000
trusted library allocation
page read and write
7CDA5FE000
stack
page read and write
164B7968000
heap
page read and write
164BC54E000
trusted library allocation
page read and write
164BDE44000
trusted library allocation
page read and write
164B76A9000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164BB322000
trusted library allocation
page read and write
164BA181000
trusted library allocation
page read and write
164BBE86000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164C60D1000
trusted library allocation
page read and write
164B7652000
trusted library allocation
page read and write
164C41E6000
trusted library allocation
page read and write
164B7950000
heap
page read and write
164B765A000
trusted library allocation
page read and write
164BBA3C000
trusted library allocation
page read and write
164C32EF000
trusted library allocation
page read and write
2C90C3C7000
trusted library allocation
page read and write
164BB80A000
trusted library allocation
page read and write
2C90C900000
trusted library allocation
page read and write
164B79B1000
heap
page read and write
69087FE000
stack
page read and write
164BC6BB000
trusted library allocation
page read and write
164BACCD000
trusted library allocation
page read and write
2C90CE2F000
heap
page read and write
3ACED9A1000
trusted library allocation
page execute read
164C257F000
trusted library allocation
page read and write
164BC55D000
trusted library allocation
page read and write
1625000
heap
page read and write
164BA184000
trusted library allocation
page read and write
164B7388000
trusted library allocation
page read and write
1622000
heap
page read and write
20CD5890000
unclassified section
page readonly
164BCB62000
trusted library allocation
page read and write
1FE8B7E000
stack
page read and write
164B10AD000
heap
page read and write
164BCB40000
trusted library allocation
page read and write
20CD583A000
heap
page read and write
164C2553000
trusted library allocation
page read and write
164C25CF000
trusted library allocation
page read and write
7CDADFF000
stack
page read and write
164C41F1000
trusted library allocation
page read and write
164C626F000
trusted library allocation
page read and write
164C6E74000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B61A8000
trusted library allocation
page read and write
164BA16E000
trusted library allocation
page read and write
2C90CE84000
heap
page read and write
164BB4EE000
trusted library allocation
page read and write
164BDECE000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C28FD000
trusted library allocation
page read and write
164BB579000
trusted library allocation
page read and write
164B797A000
heap
page read and write
164BC587000
trusted library allocation
page read and write
164BC43E000
trusted library allocation
page read and write
164C60F0000
trusted library allocation
page read and write
164BA265000
trusted library allocation
page read and write
164B10D1000
heap
page read and write
164C65BD000
trusted library allocation
page read and write
164BDF50000
trusted library allocation
page read and write
20CD5660000
unclassified section
page readonly
164B1101000
heap
page read and write
164C28F3000
trusted library allocation
page read and write
164BC45A000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
2C90BF90000
heap
page read and write
164BB6AF000
trusted library allocation
page read and write
164BA4ED000
trusted library allocation
page read and write
164BA4F1000
trusted library allocation
page read and write
164B10BE000
heap
page read and write
15E31A0A000
trusted library allocation
page read and write
164BD692000
trusted library allocation
page read and write
164BB807000
trusted library allocation
page read and write
164BDF36000
trusted library allocation
page read and write
20CD5D00000
trusted library allocation
page read and write
164BA2C1000
trusted library allocation
page read and write
20CD5720000
heap
page readonly
164BC0A2000
trusted library allocation
page read and write
164C65CF000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164BA951000
trusted library allocation
page read and write
164B9DF8000
trusted library allocation
page read and write
164BBA1F000
trusted library allocation
page read and write
164BBEBE000
trusted library allocation
page read and write
164C60F0000
trusted library allocation
page read and write
23FEA481000
trusted library allocation
page read and write
164BBA86000
trusted library allocation
page read and write
164C263C000
trusted library allocation
page read and write
164BDF23000
trusted library allocation
page read and write
164BA2D3000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BDDB6000
trusted library allocation
page read and write
164C60DB000
trusted library allocation
page read and write
164BD799000
trusted library allocation
page read and write
164BDF71000
trusted library allocation
page read and write
164BA4CB000
trusted library allocation
page read and write
164BBA8A000
trusted library allocation
page read and write
164BDF2C000
trusted library allocation
page read and write
164BA9E0000
trusted library allocation
page read and write
164B72E7000
trusted library allocation
page read and write
164BC4EC000
trusted library allocation
page read and write
164BD721000
trusted library allocation
page read and write
164BA2F0000
trusted library allocation
page read and write
164B70D9000
trusted library allocation
page read and write
164BA19E000
trusted library allocation
page read and write
164BDFAC000
trusted library allocation
page read and write
164BB614000
trusted library allocation
page read and write
164C2668000
trusted library allocation
page read and write
164BBA4D000
trusted library allocation
page read and write
164BDE6B000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
1620000
heap
page read and write
164C2512000
trusted library allocation
page read and write
164BC590000
trusted library allocation
page read and write
164BBE43000
trusted library allocation
page read and write
164BBBBE000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B10CC000
heap
page read and write
164BA378000
trusted library allocation
page read and write
164BB1C3000
trusted library allocation
page read and write
164BB0CB000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164C4A61000
trusted library allocation
page read and write
164BDB84000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
1DEE000
stack
page read and write
164C6F2B000
trusted library allocation
page read and write
164BBBEB000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
161F000
heap
page read and write
164B10C3000
heap
page read and write
164B10AE000
heap
page read and write
164BB14C000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
15C4000
heap
page read and write
164BCC50000
trusted library allocation
page read and write
164BE983000
trusted library allocation
page read and write
164BBD7F000
trusted library allocation
page read and write
164B72B0000
trusted library allocation
page read and write
164BBA57000
trusted library allocation
page read and write
164C4AB4000
trusted library allocation
page read and write
690A1BE000
stack
page read and write
164B10B4000
heap
page read and write
D6C000
unkown
page readonly
164B10E3000
heap
page read and write
164B10E3000
heap
page read and write
164BBDE0000
trusted library allocation
page read and write
164BBEC2000
trusted library allocation
page read and write
164BBFF8000
trusted library allocation
page read and write
2C90CEA9000
heap
page read and write
164BDEE2000
trusted library allocation
page read and write
164BD6E8000
trusted library allocation
page read and write
164B72B3000
trusted library allocation
page read and write
164BDF9E000
trusted library allocation
page read and write
164BB159000
trusted library allocation
page read and write
164BB4FA000
trusted library allocation
page read and write
164C252F000
trusted library allocation
page read and write
164BC498000
trusted library allocation
page read and write
164BC49E000
trusted library allocation
page read and write
164C7196000
trusted library allocation
page read and write
164BA29A000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BBFC0000
trusted library allocation
page read and write
164BACC5000
trusted library allocation
page read and write
164BBE9E000
trusted library allocation
page read and write
164BBA63000
trusted library allocation
page read and write
164B76F4000
trusted library allocation
page read and write
164BD6A1000
trusted library allocation
page read and write
15C4000
heap
page read and write
164C65CF000
trusted library allocation
page read and write
164BD791000
trusted library allocation
page read and write
164C286B000
trusted library allocation
page read and write
164BBD85000
trusted library allocation
page read and write
164BBADD000
trusted library allocation
page read and write
1670003F000
trusted library allocation
page read and write
1FE81FE000
unkown
page readonly
164C640B000
trusted library allocation
page read and write
164BD699000
trusted library allocation
page read and write
164C4A61000
trusted library allocation
page read and write
164C71E1000
trusted library allocation
page read and write
164C65D5000
trusted library allocation
page read and write
164C28BC000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BC0AA000
trusted library allocation
page read and write
164BACCD000
trusted library allocation
page read and write
164B7389000
trusted library allocation
page read and write
2C90CEA9000
heap
page read and write
164B10B1000
heap
page read and write
164C6E60000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164BC291000
trusted library allocation
page read and write
164C61A9000
trusted library allocation
page read and write
164C612E000
trusted library allocation
page read and write
164BDB45000
trusted library allocation
page read and write
164BA326000
trusted library allocation
page read and write
164BBABC000
trusted library allocation
page read and write
164B10D2000
heap
page read and write
164C28FB000
trusted library allocation
page read and write
164BCB88000
trusted library allocation
page read and write
2C90CD40000
heap
page read and write
164BB6F9000
trusted library allocation
page read and write
164BCC7C000
trusted library allocation
page read and write
164BB1BB000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164C4B24000
trusted library allocation
page read and write
164B10B2000
heap
page read and write
23FEA300000
trusted library allocation
page read and write
164BBBB1000
trusted library allocation
page read and write
2C90C2D0000
unkown
page execute read
164BA3F3000
trusted library allocation
page read and write
164BB6DF000
trusted library allocation
page read and write
164C611B000
trusted library allocation
page read and write
164B1104000
heap
page read and write
164BBDE8000
trusted library allocation
page read and write
164C26F0000
trusted library allocation
page read and write
2C90C7B1000
heap
page read and write
164C2632000
trusted library allocation
page read and write
164BB52C000
trusted library allocation
page read and write
164B10D6000
heap
page read and write
164BCB97000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BA2D6000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164B110D000
heap
page read and write
164BB616000
trusted library allocation
page read and write
164BBEBC000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BB1E6000
trusted library allocation
page read and write
2C90CE3D000
heap
page read and write
164C47F9000
trusted library allocation
page read and write
164C412B000
trusted library allocation
page read and write
164C28F8000
trusted library allocation
page read and write
164BBEC6000
trusted library allocation
page read and write
164C60F9000
trusted library allocation
page read and write
164BA2F5000
trusted library allocation
page read and write
164C41F9000
trusted library allocation
page read and write
164B10BB000
heap
page read and write
164BA18E000
trusted library allocation
page read and write
164B1112000
heap
page read and write
164B10FC000
heap
page read and write
164BC349000
trusted library allocation
page read and write
2C90C3CE000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164C27E5000
trusted library allocation
page read and write
164BC4EC000
trusted library allocation
page read and write
164BBCEC000
trusted library allocation
page read and write
164BB18F000
trusted library allocation
page read and write
164C6F36000
trusted library allocation
page read and write
164BD8CB000
trusted library allocation
page read and write
164B10E5000
heap
page read and write
164B10FD000
heap
page read and write
164BA2BF000
trusted library allocation
page read and write
164BB52A000
trusted library allocation
page read and write
164BC424000
trusted library allocation
page read and write
164BB5ED000
trusted library allocation
page read and write
164BC2DB000
trusted library allocation
page read and write
164BC450000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
2C90CE20000
heap
page read and write
164C65E6000
trusted library allocation
page read and write
164C60B6000
trusted library allocation
page read and write
164C6034000
trusted library allocation
page read and write
164BA2EF000
trusted library allocation
page read and write
164BDF8C000
trusted library allocation
page read and write
164BC43F000
trusted library allocation
page read and write
164BBED2000
trusted library allocation
page read and write
164BC0F3000
trusted library allocation
page read and write
164BB10F000
trusted library allocation
page read and write
164B702F000
trusted library allocation
page read and write
164BC0D2000
trusted library allocation
page read and write
164BC9A5000
trusted library allocation
page read and write
20CD5753000
heap
page read and write
164C64B9000
trusted library allocation
page read and write
2C90C300000
trusted library allocation
page read and write
164BB4EF000
trusted library allocation
page read and write
164BB1E6000
trusted library allocation
page read and write
164BC0FC000
trusted library allocation
page read and write
20CD5680000
heap
page read and write
164BB576000
trusted library allocation
page read and write
164C604C000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164B9D12000
trusted library allocation
page read and write
164B73BC000
trusted library allocation
page read and write
164BB6CD000
trusted library allocation
page read and write
164BC364000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B10D5000
heap
page read and write
164BC5E9000
trusted library allocation
page read and write
164BB6CD000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164BBDBF000
trusted library allocation
page read and write
2C90CDAC000
heap
page read and write
164B10FC000
heap
page read and write
164C28A8000
trusted library allocation
page read and write
164BACC7000
trusted library allocation
page read and write
164BA39C000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164C2862000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164B73EB000
trusted library allocation
page read and write
164BDE50000
trusted library allocation
page read and write
164C27BD000
trusted library allocation
page read and write
164C61EC000
trusted library allocation
page read and write
164BC387000
trusted library allocation
page read and write
164BACC3000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
2C90CEB7000
heap
page read and write
C50000
heap
page read and write
164B73C1000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164C2873000
trusted library allocation
page read and write
164BB4DA000
trusted library allocation
page read and write
164B7952000
heap
page read and write
2C90CD9C000
heap
page read and write
164BDE5D000
trusted library allocation
page read and write
164BB599000
trusted library allocation
page read and write
164BA263000
trusted library allocation
page read and write
164BDF5F000
trusted library allocation
page read and write
164BB179000
trusted library allocation
page read and write
164C2896000
trusted library allocation
page read and write
164BBDE2000
trusted library allocation
page read and write
164BA46E000
trusted library allocation
page read and write
164C47C3000
trusted library allocation
page read and write
19C3CA77000
heap
page read and write
164B9D72000
trusted library allocation
page read and write
164B10C3000
heap
page read and write
164B738C000
trusted library allocation
page read and write
164BBEA8000
trusted library allocation
page read and write
164BA172000
trusted library allocation
page read and write
164BA36A000
trusted library allocation
page read and write
164BB6ED000
trusted library allocation
page read and write
164BCBC4000
trusted library allocation
page read and write
164C2579000
trusted library allocation
page read and write
690A0FE000
unkown
page readonly
164BDFC9000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BCAA6000
trusted library allocation
page read and write
164BA155000
trusted library allocation
page read and write
164BBDAC000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164BDFF4000
trusted library allocation
page read and write
164C6F3B000
trusted library allocation
page read and write
164BB171000
trusted library allocation
page read and write
164B798E000
heap
page read and write
164C65B7000
trusted library allocation
page read and write
164BC453000
trusted library allocation
page read and write
D92000
unkown
page readonly
164BB5F5000
trusted library allocation
page read and write
164BB5D6000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164B10B4000
heap
page read and write
164BC484000
trusted library allocation
page read and write
164C618C000
trusted library allocation
page read and write
2C90CEB7000
heap
page read and write
164B10B5000
heap
page read and write
164BB199000
trusted library allocation
page read and write
164BBAE5000
trusted library allocation
page read and write
20CD56E4000
heap
page read and write
164BDA77000
trusted library allocation
page read and write
23FEA0D0000
remote allocation
page read and write
164BB17E000
trusted library allocation
page read and write
15E316E7000
heap
page read and write
164BA2FE000
trusted library allocation
page read and write
164B10AE000
heap
page read and write
164B10C3000
heap
page read and write
164BACDB000
trusted library allocation
page read and write
164BD64A000
trusted library allocation
page read and write
164BDB37000
trusted library allocation
page read and write
164BBEE0000
trusted library allocation
page read and write
164BBA26000
trusted library allocation
page read and write
164BBA92000
trusted library allocation
page read and write
164BDF23000
trusted library allocation
page read and write
164BCCE2000
trusted library allocation
page read and write
164BBDDE000
trusted library allocation
page read and write
164C60A1000
trusted library allocation
page read and write
164BCAA2000
trusted library allocation
page read and write
164BDDD3000
trusted library allocation
page read and write
2C90CDEA000
heap
page read and write
164BBDBF000
trusted library allocation
page read and write
164B10E3000
heap
page read and write
164C6025000
trusted library allocation
page read and write
164B10CB000
heap
page read and write
15C4000
heap
page read and write
164BBDEA000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BB8DB000
trusted library allocation
page read and write
164B10EA000
heap
page read and write
164B10BD000
heap
page read and write
164BF302000
trusted library allocation
page read and write
164B10D3000
heap
page read and write
164B10C8000
heap
page read and write
1FE937E000
unkown
page readonly
2C90CDE8000
heap
page read and write
164B10AD000
heap
page read and write
164BA43D000
trusted library allocation
page read and write
164BC788000
trusted library allocation
page read and write
164BC8BD000
trusted library allocation
page read and write
164C2542000
trusted library allocation
page read and write
15E31800000
trusted library allocation
page read and write
164BA476000
trusted library allocation
page read and write
164BA926000
trusted library allocation
page read and write
164BC40A000
trusted library allocation
page read and write
164BB17E000
trusted library allocation
page read and write
164B7381000
trusted library allocation
page read and write
164C32F7000
trusted library allocation
page read and write
164C623D000
trusted library allocation
page read and write
164B7964000
heap
page read and write
2C90CE98000
heap
page read and write
164C6896000
heap
page read and write
32827FF000
stack
page read and write
164C61C1000
trusted library allocation
page read and write
164B10CC000
heap
page read and write
164C2527000
trusted library allocation
page read and write
164BB531000
trusted library allocation
page read and write
2C90C2F0000
trusted library allocation
page read and write
164BC495000
trusted library allocation
page read and write
164BC375000
trusted library allocation
page read and write
164BCADD000
trusted library allocation
page read and write
164BB14E000
trusted library allocation
page read and write
164BACCD000
trusted library allocation
page read and write
164BA18D000
trusted library allocation
page read and write
164BC441000
trusted library allocation
page read and write
164BC0A5000
trusted library allocation
page read and write
164BDDAE000
trusted library allocation
page read and write
164BDFEB000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164C65AD000
trusted library allocation
page read and write
164B794C000
heap
page read and write
164BC9F2000
trusted library allocation
page read and write
164BDD45000
trusted library allocation
page read and write
164BB12A000
trusted library allocation
page read and write
13DB000
stack
page read and write
164BBD79000
trusted library allocation
page read and write
164BDFF8000
trusted library allocation
page read and write
164BBE99000
trusted library allocation
page read and write
164C6595000
trusted library allocation
page read and write
164B9DE4000
trusted library allocation
page read and write
164B10D8000
heap
page read and write
164BA356000
trusted library allocation
page read and write
164B739D000
trusted library allocation
page read and write
164C6E15000
trusted library allocation
page read and write
164C289E000
trusted library allocation
page read and write
164BCB1E000
trusted library allocation
page read and write
164B10C8000
heap
page read and write
164B10E3000
heap
page read and write
164B10D2000
heap
page read and write
164B72F1000
trusted library allocation
page read and write
164B10AD000
heap
page read and write
164BBA8D000
trusted library allocation
page read and write
164BC1AE000
trusted library allocation
page read and write
164C26CD000
trusted library allocation
page read and write
164BACCA000
trusted library allocation
page read and write
164C625C000
trusted library allocation
page read and write
164BB528000
trusted library allocation
page read and write
164BBE48000
trusted library allocation
page read and write
164C61B4000
trusted library allocation
page read and write
FBC69D8000
stack
page read and write
164B10CB000
heap
page read and write
164BB112000
trusted library allocation
page read and write
164B72C7000
trusted library allocation
page read and write
2C90C0B0000
heap
page read and write
164B10E3000
heap
page read and write
164BA2D3000
trusted library allocation
page read and write
1FE823E000
stack
page read and write
164B9DE4000
trusted library allocation
page read and write
164BCA0F000
trusted library allocation
page read and write
164BB515000
trusted library allocation
page read and write
164BC4D1000
trusted library allocation
page read and write
164BBEB2000
trusted library allocation
page read and write
164C266D000
trusted library allocation
page read and write
164BA356000
trusted library allocation
page read and write
164BA1A5000
trusted library allocation
page read and write
164BB1EC000
trusted library allocation
page read and write
164BC389000
trusted library allocation
page read and write
1FE82BD000
stack
page read and write
164B10AE000
heap
page read and write
164B10C8000
heap
page read and write
164B1112000
heap
page read and write
164C26BA000
trusted library allocation
page read and write
164BCBFC000
trusted library allocation
page read and write
164BBDE4000
trusted library allocation
page read and write
2C90C36F000
trusted library allocation
page read and write
164BC273000
trusted library allocation
page read and write
164BA9E0000
trusted library allocation
page read and write
164BA26C000
trusted library allocation
page read and write
164BB57D000
trusted library allocation
page read and write
164BA4FD000
trusted library allocation
page read and write
164BA484000
trusted library allocation
page read and write
164C61C1000
trusted library allocation
page read and write
164BDA70000
trusted library allocation
page read and write
164BBDEC000
trusted library allocation
page read and write
164BDE3B000
trusted library allocation
page read and write
164BBED2000
trusted library allocation
page read and write
164BC277000
trusted library allocation
page read and write
164BDF2C000
trusted library allocation
page read and write
164BBEBB000
trusted library allocation
page read and write
164B10B4000
heap
page read and write
164BA92F000
trusted library allocation
page read and write
164B10D9000
heap
page read and write
164B7968000
heap
page read and write
19C3ADB0000
heap
page read and write
164B739A000
trusted library allocation
page read and write
164BD7F1000
trusted library allocation
page read and write
164BDEDC000
trusted library allocation
page read and write
164BCCDA000
trusted library allocation
page read and write
164B10FC000
heap
page read and write
164BBA66000
trusted library allocation
page read and write
164BDE75000
trusted library allocation
page read and write
164C6020000
trusted library allocation
page read and write
164BDEC7000
trusted library allocation
page read and write
164BBA8D000
trusted library allocation
page read and write
164BD791000
trusted library allocation
page read and write
164BA40F000
trusted library allocation
page read and write
2C90CEB7000
heap
page read and write
164BBDDE000
trusted library allocation
page read and write
164BB5FB000
trusted library allocation
page read and write
164BC8C1000
trusted library allocation
page read and write
20CD5A80000
trusted library allocation
page read and write
164BC41A000
trusted library allocation
page read and write
164BDF2A000
trusted library allocation
page read and write
164BB5F2000
trusted library allocation
page read and write
164C41CD000
trusted library allocation
page read and write
164BA28F000
trusted library allocation
page read and write
164C2660000
trusted library allocation
page read and write
164B10B5000
heap
page read and write
164BA247000
trusted library allocation
page read and write
164B7433000
trusted library allocation
page read and write
164BB4FA000
trusted library allocation
page read and write
690A17E000
unkown
page readonly
164B7964000
heap
page read and write
164BDEA3000
trusted library allocation
page read and write
164C28E0000
trusted library allocation
page read and write
164C64B5000
trusted library allocation
page read and write
164BB6EA000
trusted library allocation
page read and write
164B10C9000
heap
page read and write
164B10AE000
heap
page read and write
164BC4F8000
trusted library allocation
page read and write
164B73C7000
trusted library allocation
page read and write
There are 3566 hidden memdumps, click here to show them.