IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b121332-8ca4-4447-ba61-95885bc5b79e.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b121332-8ca4-4447-ba61-95885bc5b79e.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2188 -parentBuildID 20230927232528 -prefsHandle 2132 -prefMapHandle 2120 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc4e7c8c-39d6-4039-8dc5-649d81f9c684} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" 16a4796f110 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4076 -parentBuildID 20230927232528 -prefsHandle 4068 -prefMapHandle 4064 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7866af33-cb76-422c-a16c-6eb5313a9801} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" 16a58d1f410 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1384 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 2432 -prefsLen 33008 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbbb42d9-cfc3-4777-86f0-c93fa65d4b2c} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" 16a5b0b6710 utility

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://youtube.com/account?=https://accounts.google.cotm
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.120
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.23.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
52.222.236.120
services.addons.mozilla.org
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
142.250.184.206
youtube.com
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2D9FE236000
heap
page read and write
16A5740B000
heap
page read and write
16A4E733000
heap
page read and write
16A4E770000
heap
page read and write
13643466000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E738000
heap
page read and write
16A57E65000
trusted library allocation
page read and write
16A5F808000
trusted library allocation
page read and write
16A57414000
heap
page read and write
1364346A000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A5833C000
trusted library allocation
page read and write
16A58AF2000
trusted library allocation
page read and write
16A592E6000
trusted library allocation
page read and write
16A6364F000
trusted library allocation
page read and write
B2794BE000
stack
page read and write
16A57E9C000
trusted library allocation
page read and write
16A575A5000
trusted library allocation
page read and write
16A579B2000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A59960000
trusted library allocation
page read and write
16A589A6000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
2D9FE21D000
heap
page read and write
16A53676000
trusted library allocation
page read and write
16A6221D000
trusted library allocation
page read and write
16A5837C000
trusted library allocation
page read and write
16A594CA000
trusted library allocation
page read and write
16A639B5000
trusted library allocation
page read and write
16A59395000
trusted library allocation
page read and write
16A58F2B000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
18B18BA9000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
16A58A78000
trusted library allocation
page read and write
16A5A5E7000
trusted library allocation
page read and write
16A6225B000
trusted library allocation
page read and write
16A5FB5F000
trusted library allocation
page read and write
16A5FFC7000
trusted library allocation
page read and write
16A62533000
trusted library allocation
page read and write
18B18B29000
heap
page read and write
16A5FB7D000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E732000
heap
page read and write
16A58976000
trusted library allocation
page read and write
16A59339000
trusted library allocation
page read and write
16A54756000
trusted library allocation
page read and write
2D9FE570000
heap
page read and write
FA0000
trusted library allocation
page read and write
16A54B73000
trusted library allocation
page read and write
16A63E1B000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A598CE000
trusted library allocation
page read and write
16A54AB2000
trusted library allocation
page read and write
16A58A8F000
trusted library allocation
page read and write
29EE0C0D000
trusted library allocation
page read and write
16A59336000
trusted library allocation
page read and write
16A57B39000
trusted library allocation
page read and write
16A5A0C6000
trusted library allocation
page read and write
18B17E73000
trusted library allocation
page read and write
16A58AA4000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A62280000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E71C000
heap
page read and write
544000
heap
page read and write
16A4E6EA000
heap
page read and write
16A5C943000
trusted library allocation
page read and write
16A57EA3000
trusted library allocation
page read and write
16A598CC000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E71D000
heap
page read and write
16A5FCC5000
trusted library allocation
page read and write
16A53726000
trusted library allocation
page read and write
16A57A59000
trusted library allocation
page read and write
16A59202000
trusted library allocation
page read and write
16A59350000
trusted library allocation
page read and write
900000
heap
page read and write
16A54B65000
trusted library allocation
page read and write
16A5AF78000
trusted library allocation
page read and write
16A5A419000
trusted library allocation
page read and write
16A5FEB9000
trusted library allocation
page read and write
16A5B08A000
trusted library allocation
page read and write
16A624E4000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A62387000
trusted library allocation
page read and write
16A595FB000
trusted library allocation
page read and write
18B17E0A000
trusted library allocation
page read and write
16A599D7000
trusted library allocation
page read and write
16A58351000
trusted library allocation
page read and write
16A5916B000
trusted library allocation
page read and write
2D9FE400000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A575CB000
trusted library allocation
page read and write
16A61A70000
trusted library allocation
page read and write
16A6221A000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A56F49000
trusted library allocation
page read and write
1053000
heap
page read and write
16A56F77000
trusted library allocation
page read and write
16A58F52000
trusted library allocation
page read and write
16A5FB70000
trusted library allocation
page read and write
16A5C96D000
trusted library allocation
page read and write
16A58AB0000
trusted library allocation
page read and write
13643500000
heap
page read and write
16A4E72E000
heap
page read and write
16A4E769000
heap
page read and write
18B17FD4000
heap
page read and write
16A5957F000
trusted library allocation
page read and write
16A57EFD000
trusted library allocation
page read and write
16A63927000
trusted library allocation
page read and write
16A5C8A2000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A5FFF1000
trusted library allocation
page read and write
16A59373000
trusted library allocation
page read and write
16A5C884000
trusted library allocation
page read and write
16A5F738000
trusted library allocation
page read and write
136434DB000
trusted library allocation
page read and write
16A5A4C2000
trusted library allocation
page read and write
16A5FEF4000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A599D7000
trusted library allocation
page read and write
16A54A73000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A61AFE000
trusted library allocation
page read and write
16A5932A000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A4E71F000
heap
page read and write
16A4E70A000
heap
page read and write
29EE0A3C000
trusted library allocation
page read and write
16A5FE40000
trusted library allocation
page read and write
16A59A33000
trusted library allocation
page read and write
16A57B45000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A59355000
trusted library allocation
page read and write
16A58A9A000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A5B037000
trusted library allocation
page read and write
16A57EC2000
trusted library allocation
page read and write
16A59492000
trusted library allocation
page read and write
18B18ABD000
heap
page read and write
16A4E738000
heap
page read and write
16A56F32000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A6252E000
trusted library allocation
page read and write
16A57EC9000
trusted library allocation
page read and write
1040000
heap
page read and write
16A4E75E000
heap
page read and write
16A4E75D000
heap
page read and write
16A57A38000
trusted library allocation
page read and write
16A61832000
trusted library allocation
page read and write
16A5FFF5000
trusted library allocation
page read and write
16A62277000
trusted library allocation
page read and write
16A57B5D000
trusted library allocation
page read and write
16A59726000
trusted library allocation
page read and write
16A63960000
trusted library allocation
page read and write
16A57EAA000
trusted library allocation
page read and write
16A57E96000
trusted library allocation
page read and write
16A5FB28000
trusted library allocation
page read and write
16A5A0AC000
trusted library allocation
page read and write
A6C000
unkown
page write copy
16A54AE7000
trusted library allocation
page read and write
16A4E6FC000
heap
page read and write
16A5FB75000
trusted library allocation
page read and write
16A598C8000
trusted library allocation
page read and write
16A624A7000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A57EEC000
trusted library allocation
page read and write
16A57EF6000
trusted library allocation
page read and write
16A63E19000
trusted library allocation
page read and write
16A58B5C000
trusted library allocation
page read and write
16A61800000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A598B0000
trusted library allocation
page read and write
16A592BE000
trusted library allocation
page read and write
16A57BA8000
trusted library allocation
page read and write
16A603C4000
trusted library allocation
page read and write
16A58F42000
trusted library allocation
page read and write
16A5FBC3000
trusted library allocation
page read and write
16A63621000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
16A63969000
trusted library allocation
page read and write
16A599A8000
trusted library allocation
page read and write
16A4E701000
heap
page read and write
16A57EAA000
trusted library allocation
page read and write
16A622A9000
trusted library allocation
page read and write
16A621A4000
trusted library allocation
page read and write
16A5949C000
trusted library allocation
page read and write
16A58AC3000
trusted library allocation
page read and write
16A58944000
trusted library allocation
page read and write
16A58AA8000
trusted library allocation
page read and write
16A620E0000
trusted library allocation
page read and write
18B18AA9000
heap
page read and write
16A5B0CC000
trusted library allocation
page read and write
544000
heap
page read and write
16A530DF000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A56FE9000
trusted library allocation
page read and write
16A58BCC000
trusted library allocation
page read and write
16A57A45000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A5CE7C000
heap
page read and write
16A57958000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A59553000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5A0EC000
trusted library allocation
page read and write
16A594E7000
trusted library allocation
page read and write
16A5838A000
trusted library allocation
page read and write
2D9FE090000
heap
page read and write
16A58F42000
trusted library allocation
page read and write
16A5CA33000
trusted library allocation
page read and write
16A5941D000
trusted library allocation
page read and write
16A58A78000
trusted library allocation
page read and write
16A5F829000
trusted library allocation
page read and write
16A57B96000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
16A5F9D8000
trusted library allocation
page read and write
16A5FEF4000
trusted library allocation
page read and write
16A594A8000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A598CE000
trusted library allocation
page read and write
16A591A1000
trusted library allocation
page read and write
1ABEDB07000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5FB71000
trusted library allocation
page read and write
16A5970C000
trusted library allocation
page read and write
16A57570000
trusted library allocation
page read and write
16A5796D000
trusted library allocation
page read and write
16A58B53000
trusted library allocation
page read and write
16A53081000
trusted library allocation
page read and write
16A58F2B000
trusted library allocation
page read and write
16A591A1000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A58BDD000
trusted library allocation
page read and write
16A58325000
trusted library allocation
page read and write
16A593D6000
trusted library allocation
page read and write
16A58F42000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
8AF5DFE000
stack
page read and write
18B18B98000
heap
page read and write
18B17EC4000
trusted library allocation
page read and write
13643200000
trusted library allocation
page read and write
16A573EB000
heap
page read and write
18B18BA9000
heap
page read and write
16A58A24000
trusted library allocation
page read and write
16A591C3000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A599FE000
trusted library allocation
page read and write
16A592F8000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
A74000
unkown
page readonly
16A5F9BB000
trusted library allocation
page read and write
29EE0590000
unclassified section
page readonly
16A5C87F000
trusted library allocation
page read and write
16A58F18000
trusted library allocation
page read and write
16A5FBEA000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A5928D000
trusted library allocation
page read and write
16A5FCC6000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A57BA5000
trusted library allocation
page read and write
29EE0C81000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
A62000
unkown
page readonly
16A59F80000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A58AA8000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A594E7000
trusted library allocation
page read and write
16A6183C000
trusted library allocation
page read and write
16A5B0CC000
trusted library allocation
page read and write
16A59454000
trusted library allocation
page read and write
16A59366000
trusted library allocation
page read and write
16A57E6D000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A5938C000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A622B5000
trusted library allocation
page read and write
16A6032E000
trusted library allocation
page read and write
16A5CF01000
heap
page read and write
16A5AF89000
trusted library allocation
page read and write
2D9FFD3D000
heap
page read and write
16A4E738000
heap
page read and write
16A59944000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A599D7000
trusted library allocation
page read and write
16A4E6EE000
heap
page read and write
16A5917B000
trusted library allocation
page read and write
16A5FEFA000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A56F93000
trusted library allocation
page read and write
16A5FB12000
trusted library allocation
page read and write
16A5CE91000
heap
page read and write
16A56FAE000
trusted library allocation
page read and write
16A59458000
trusted library allocation
page read and write
16A594CB000
trusted library allocation
page read and write
16A573FB000
heap
page read and write
16A58F4B000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A583A8000
trusted library allocation
page read and write
16A59F69000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A58BCC000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A4E75B000
heap
page read and write
16A583EB000
trusted library allocation
page read and write
16A58AF2000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
B27943E000
stack
page read and write
16A58F83000
trusted library allocation
page read and write
16A58B58000
trusted library allocation
page read and write
16A61A89000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A57EE3000
trusted library allocation
page read and write
544000
heap
page read and write
16A4E738000
heap
page read and write
16A4E74B000
heap
page read and write
16A58AA4000
trusted library allocation
page read and write
16A58A08000
trusted library allocation
page read and write
16A594C7000
trusted library allocation
page read and write
1364370C000
trusted library allocation
page read and write
16A593A4000
trusted library allocation
page read and write
16A5FBEA000
trusted library allocation
page read and write
29EE0C0B000
trusted library allocation
page read and write
18B18ACA000
heap
page read and write
16A59588000
trusted library allocation
page read and write
16A58A88000
trusted library allocation
page read and write
16A5F9E2000
trusted library allocation
page read and write
16A4E717000
heap
page read and write
16A4E72A000
heap
page read and write
16A4E721000
heap
page read and write
16A583B0000
trusted library allocation
page read and write
1C0E000
stack
page read and write
16A575E6000
trusted library allocation
page read and write
16A5FAD7000
trusted library allocation
page read and write
16A57414000
heap
page read and write
16A59454000
trusted library allocation
page read and write
16A530F8000
trusted library allocation
page read and write
16A59913000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A57E98000
trusted library allocation
page read and write
29EE0C98000
trusted library allocation
page read and write
16A59DF8000
trusted library allocation
page read and write
16A59454000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A4E71B000
heap
page read and write
16A58A8F000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A4E75F000
heap
page read and write
2D9FE1A0000
heap
page read and write
16A599EB000
trusted library allocation
page read and write
16A54616000
trusted library allocation
page read and write
FFF29FF000
stack
page read and write
16A4E75B000
heap
page read and write
16A5915F000
trusted library allocation
page read and write
13642F70000
heap
page read and write
16A57A53000
trusted library allocation
page read and write
18B17CF2000
unclassified section
page read and write
16A598A4000
trusted library allocation
page read and write
16A58BDD000
trusted library allocation
page read and write
16A575DE000
trusted library allocation
page read and write
16A620E0000
trusted library allocation
page read and write
16A57A4B000
trusted library allocation
page read and write
16A59497000
trusted library allocation
page read and write
16A5FFDE000
trusted library allocation
page read and write
18B18B32000
heap
page read and write
16A4E74B000
heap
page read and write
1038000
heap
page read and write
16A530CA000
trusted library allocation
page read and write
16A599E7000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A6032E000
trusted library allocation
page read and write
16A59EA4000
trusted library allocation
page read and write
29EE0C00000
trusted library allocation
page read and write
16A59F76000
trusted library allocation
page read and write
16A58BF8000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A5FB45000
trusted library allocation
page read and write
16A5F890000
trusted library allocation
page read and write
16A57414000
heap
page read and write
16A5FCC1000
trusted library allocation
page read and write
16A54BC0000
trusted library allocation
page read and write
16A58F31000
trusted library allocation
page read and write
16A54A4E000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
18B18AA4000
heap
page read and write
16A4E729000
heap
page read and write
16A59944000
trusted library allocation
page read and write
16A58B55000
trusted library allocation
page read and write
16A537E0000
trusted library allocation
page read and write
16A591E8000
trusted library allocation
page read and write
16A5CE56000
heap
page read and write
16A5FB98000
trusted library allocation
page read and write
16A596AE000
trusted library allocation
page read and write
16A4E726000
heap
page read and write
16A579E7000
trusted library allocation
page read and write
16A54BB7000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A58A3F000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A59358000
trusted library allocation
page read and write
136434F6000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A58B5A000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5CA06000
trusted library allocation
page read and write
16A59454000
trusted library allocation
page read and write
16A583B7000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A592D5000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A4E70A000
heap
page read and write
16A59AB3000
trusted library allocation
page read and write
16A5837C000
trusted library allocation
page read and write
18B183C0000
heap
page read and write
16A594A1000
trusted library allocation
page read and write
16A57A81000
trusted library allocation
page read and write
16A60391000
trusted library allocation
page read and write
16A5F84D000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
B27B4FE000
unkown
page readonly
29EE0BC0000
heap
page read and write
16A5940C000
trusted library allocation
page read and write
16A5CA2E000
trusted library allocation
page read and write
16A5FEC2000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
520000
heap
page read and write
16A4E74B000
heap
page read and write
16A4E729000
heap
page read and write
16A4E713000
heap
page read and write
18B18AA0000
heap
page read and write
16A59416000
trusted library allocation
page read and write
13642F30000
heap
page read and write
16A4E75D000
heap
page read and write
16A537AF000
trusted library allocation
page read and write
16A57EA5000
trusted library allocation
page read and write
16A54AE7000
trusted library allocation
page read and write
16A59883000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A599A5000
trusted library allocation
page read and write
16A62183000
trusted library allocation
page read and write
16A5932C000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A57569000
trusted library allocation
page read and write
16A5A3A7000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E70A000
heap
page read and write
16A5FB1F000
trusted library allocation
page read and write
16A639A4000
trusted library allocation
page read and write
B277BFE000
stack
page read and write
16A4E74B000
heap
page read and write
16A4E75B000
heap
page read and write
16A4E702000
heap
page read and write
16A4E713000
heap
page read and write
16A4E731000
heap
page read and write
16A4E76A000
heap
page read and write
16A57E8E000
trusted library allocation
page read and write
16A593D6000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A4E6F2000
heap
page read and write
16A60391000
trusted library allocation
page read and write
16A583F7000
trusted library allocation
page read and write
16A57E3C000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A54A25000
trusted library allocation
page read and write
16A58A5A000
trusted library allocation
page read and write
16A5FBEA000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5999D000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E709000
heap
page read and write
16A4E739000
heap
page read and write
18B18B84000
heap
page read and write
16A4E6F2000
heap
page read and write
16A4E71B000
heap
page read and write
104B000
heap
page read and write
16A622B5000
trusted library allocation
page read and write
16A58EF4000
trusted library allocation
page read and write
16A5938A000
trusted library allocation
page read and write
16A58A25000
trusted library allocation
page read and write
16A56F8A000
trusted library allocation
page read and write
16A57BFE000
trusted library allocation
page read and write
18B18BB7000
heap
page read and write
16A4E704000
heap
page read and write
18B18B31000
heap
page read and write
16A58ACF000
trusted library allocation
page read and write
18B18B28000
heap
page read and write
16A5946C000
trusted library allocation
page read and write
16A57EA6000
trusted library allocation
page read and write
16A53800000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
58E000
stack
page read and write
18B18B28000
heap
page read and write
16A5742C000
heap
page read and write
16A5746A000
heap
page read and write
16A598B8000
trusted library allocation
page read and write
16A58FF5000
trusted library allocation
page read and write
16A62405000
trusted library allocation
page read and write
16A622F2000
trusted library allocation
page read and write
16A5A4D4000
trusted library allocation
page read and write
16A5FEBF000
trusted library allocation
page read and write
16A58A5A000
trusted library allocation
page read and write
16A5FB12000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A5921A000
trusted library allocation
page read and write
18B18BA9000
heap
page read and write
16A57974000
trusted library allocation
page read and write
16A57B5B000
trusted library allocation
page read and write
16A59A46000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E75B000
heap
page read and write
18B17C8A000
heap
page read and write
16A5FE52000
trusted library allocation
page read and write
18B18ADC000
heap
page read and write
36F1000
heap
page read and write
16A58A5A000
trusted library allocation
page read and write
16A4E722000
heap
page read and write
16A594F5000
trusted library allocation
page read and write
16A5FB45000
trusted library allocation
page read and write
16A621AC000
trusted library allocation
page read and write
16A5FB96000
trusted library allocation
page read and write
16A58A78000
trusted library allocation
page read and write
16A5946C000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A58AF6000
trusted library allocation
page read and write
16A5C941000
trusted library allocation
page read and write
16A59A13000
trusted library allocation
page read and write
16A621A4000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A59454000
trusted library allocation
page read and write
16A598B0000
trusted library allocation
page read and write
18B18A9C000
heap
page read and write
16A57E17000
trusted library allocation
page read and write
16A57996000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A58BC3000
trusted library allocation
page read and write
16A583C8000
trusted library allocation
page read and write
16A62E00000
trusted library allocation
page read and write
16A603EE000
trusted library allocation
page read and write
16A5FFFC000
trusted library allocation
page read and write
16A591D6000
trusted library allocation
page read and write
16A575BE000
trusted library allocation
page read and write
16A591AC000
trusted library allocation
page read and write
16A603E5000
trusted library allocation
page read and write
16A4E72B000
heap
page read and write
16A5C557000
trusted library allocation
page read and write
16A58A08000
trusted library allocation
page read and write
16A58F1B000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5AF12000
trusted library allocation
page read and write
16A59458000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A603CC000
trusted library allocation
page read and write
16A58F3E000
trusted library allocation
page read and write
16A5797E000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A5B0C4000
trusted library allocation
page read and write
16A5FB74000
trusted library allocation
page read and write
16A599E8000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A4E74B000
heap
page read and write
16A5FB10000
trusted library allocation
page read and write
13642E80000
unclassified section
page readonly
16A5835B000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A5956B000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A593A9000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A58FA9000
trusted library allocation
page read and write
16A594E6000
trusted library allocation
page read and write
16A5FE2F000
trusted library allocation
page read and write
16A5FB92000
trusted library allocation
page read and write
16A4E6EE000
heap
page read and write
16A4E75D000
heap
page read and write
16A58FEB000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A547D2000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
18B17E63000
trusted library allocation
page read and write
16A599DE000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A59747000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A4E768000
heap
page read and write
16A603E5000
trusted library allocation
page read and write
136433A4000
heap
page read and write
16A639C6000
trusted library allocation
page read and write
9A1000
unkown
page execute read
16A63E1B000
trusted library allocation
page read and write
16A5FACC000
trusted library allocation
page read and write
16A59366000
trusted library allocation
page read and write
16A57ED0000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A593B0000
trusted library allocation
page read and write
16A4E76A000
heap
page read and write
16A583B0000
trusted library allocation
page read and write
16A53090000
trusted library allocation
page read and write
16A573E7000
heap
page read and write
16A4E721000
heap
page read and write
16A58BE0000
trusted library allocation
page read and write
16A620F5000
trusted library allocation
page read and write
16A6229A000
trusted library allocation
page read and write
16A5751C000
trusted library allocation
page read and write
16A58B96000
trusted library allocation
page read and write
16A597D5000
trusted library allocation
page read and write
16A583F7000
trusted library allocation
page read and write
16A5941D000
trusted library allocation
page read and write
16A5FE4E000
trusted library allocation
page read and write
16A5A47A000
trusted library allocation
page read and write
16A57B94000
trusted library allocation
page read and write
29EE0CE9000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A623C8000
trusted library allocation
page read and write
16A59391000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E702000
heap
page read and write
16A59963000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E70F000
heap
page read and write
16A62036000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5914B000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A4E724000
heap
page read and write
16A59954000
trusted library allocation
page read and write
16A61A4D000
trusted library allocation
page read and write
16A5FC94000
trusted library allocation
page read and write
16A592E6000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E769000
heap
page read and write
16A4E72E000
heap
page read and write
16A5893D000
trusted library allocation
page read and write
16A4E742000
heap
page read and write
16A5FCCC000
trusted library allocation
page read and write
16A622BC000
trusted library allocation
page read and write
8AF457E000
unkown
page readonly
16A4E702000
heap
page read and write
544000
heap
page read and write
16A4E75D000
heap
page read and write
16A4E74B000
heap
page read and write
16A6398C000
trusted library allocation
page read and write
16A5FCBF000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
16A5F847000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A58BFB000
trusted library allocation
page read and write
18B18B6A000
heap
page read and write
16A59960000
trusted library allocation
page read and write
18B18B28000
heap
page read and write
16A4E733000
heap
page read and write
1037000
heap
page read and write
16A4E778000
heap
page read and write
16A54AE1000
trusted library allocation
page read and write
16A59409000
trusted library allocation
page read and write
16A5FFD1000
trusted library allocation
page read and write
16A599C1000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
18B17B10000
unclassified section
page readonly
16A599AE000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A5F885000
trusted library allocation
page read and write
13643470000
trusted library allocation
page read and write
13642FE2000
unclassified section
page read and write
16A4E765000
heap
page read and write
16A583B4000
trusted library allocation
page read and write
16A58BDC000
trusted library allocation
page read and write
16A58A76000
trusted library allocation
page read and write
16A5995D000
trusted library allocation
page read and write
29EE0A1D000
trusted library allocation
page read and write
16A5FB96000
trusted library allocation
page read and write
16A4E763000
heap
page read and write
16A599FE000
trusted library allocation
page read and write
16A57A8B000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A575AE000
trusted library allocation
page read and write
16A5FB78000
trusted library allocation
page read and write
16A6037F000
trusted library allocation
page read and write
16A591AC000
trusted library allocation
page read and write
16A57939000
trusted library allocation
page read and write
16A599DD000
trusted library allocation
page read and write
16A598AD000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
29EE0500000
unclassified section
page readonly
16A54923000
trusted library allocation
page read and write
16A537E0000
trusted library allocation
page read and write
16A589B9000
trusted library allocation
page read and write
16A4E723000
heap
page read and write
16A5FCBF000
trusted library allocation
page read and write
16A54A98000
trusted library allocation
page read and write
13643413000
trusted library allocation
page read and write
16A57E78000
trusted library allocation
page read and write
16A56FE4000
trusted library allocation
page read and write
16A575AE000
trusted library allocation
page read and write
16A5A49D000
trusted library allocation
page read and write
16A598A2000
trusted library allocation
page read and write
16A5F9DD000
trusted library allocation
page read and write
36F1000
heap
page read and write
16A4E702000
heap
page read and write
16A59996000
trusted library allocation
page read and write
16A5C87B000
trusted library allocation
page read and write
16A5F892000
trusted library allocation
page read and write
16A58F5E000
trusted library allocation
page read and write
16A56F1E000
trusted library allocation
page read and write
16A5CE55000
heap
page read and write
16A5F8C8000
trusted library allocation
page read and write
16A5B047000
trusted library allocation
page read and write
16A597F3000
trusted library allocation
page read and write
16A59ECB000
trusted library allocation
page read and write
16A5B0D3000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A58F6B000
trusted library allocation
page read and write
16A59358000
trusted library allocation
page read and write
16A57EEC000
trusted library allocation
page read and write
16A594E1000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A599E0000
trusted library allocation
page read and write
16A599A0000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A591FA000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A62183000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5FCE1000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A58B5F000
trusted library allocation
page read and write
16A62441000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A599E4000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E723000
heap
page read and write
16A4E768000
heap
page read and write
16A598AB000
trusted library allocation
page read and write
16A537AF000
trusted library allocation
page read and write
16A60337000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
18B18B20000
heap
page read and write
16A4E72E000
heap
page read and write
16A5FB94000
trusted library allocation
page read and write
16A579CD000
trusted library allocation
page read and write
16A57E17000
trusted library allocation
page read and write
18B18B61000
heap
page read and write
16A59574000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A5A3B1000
trusted library allocation
page read and write
16A59475000
trusted library allocation
page read and write
16A575B8000
trusted library allocation
page read and write
16A59E9F000
trusted library allocation
page read and write
16A5FE37000
trusted library allocation
page read and write
16A599E0000
trusted library allocation
page read and write
16A5FB1D000
trusted library allocation
page read and write
16A575C7000
trusted library allocation
page read and write
16A62038000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
16A60341000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A5F997000
trusted library allocation
page read and write
16A599CD000
trusted library allocation
page read and write
16A5FB9B000
trusted library allocation
page read and write
16A59416000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A58F45000
trusted library allocation
page read and write
16A4E723000
heap
page read and write
16A5F817000
trusted library allocation
page read and write
16A5FCA8000
trusted library allocation
page read and write
16A5FB84000
trusted library allocation
page read and write
16A4E70C000
heap
page read and write
16A59391000
trusted library allocation
page read and write
16A5FB71000
trusted library allocation
page read and write
16A592E4000
trusted library allocation
page read and write
16A594F9000
trusted library allocation
page read and write
B27ACFE000
stack
page read and write
16A4E731000
heap
page read and write
16A4E765000
heap
page read and write
16A5F87C000
trusted library allocation
page read and write
16A5F88E000
trusted library allocation
page read and write
16A59395000
trusted library allocation
page read and write
16A598AB000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A59A9D000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A639CA000
trusted library allocation
page read and write
16A59FC4000
trusted library allocation
page read and write
36B04FC03000
trusted library allocation
page read and write
16A5740C000
heap
page read and write
16A5FAE0000
trusted library allocation
page read and write
16A57E96000
trusted library allocation
page read and write
16A575B6000
trusted library allocation
page read and write
16A583F3000
trusted library allocation
page read and write
16A530B3000
trusted library allocation
page read and write
16A61A8F000
trusted library allocation
page read and write
16A583F7000
trusted library allocation
page read and write
16A573FA000
heap
page read and write
16A59982000
trusted library allocation
page read and write
18B18B20000
heap
page read and write
16A618A8000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A4E738000
heap
page read and write
16A4E719000
heap
page read and write
16A58A94000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A4E6FB000
heap
page read and write
16A4E729000
heap
page read and write
35311BE000
unkown
page readonly
16A599B4000
trusted library allocation
page read and write
16A5936E000
trusted library allocation
page read and write
16A58BC3000
trusted library allocation
page read and write
2D9FE170000
heap
page read and write
16A4E7BC000
heap
page read and write
16A4E732000
heap
page read and write
16A63E33000
trusted library allocation
page read and write
16A58A1F000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A575A5000
trusted library allocation
page read and write
18B18B3D000
heap
page read and write
16A4E702000
heap
page read and write
16A4E6EC000
heap
page read and write
16A575E6000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A593A6000
trusted library allocation
page read and write
1030000
heap
page read and write
16A4E75D000
heap
page read and write
18B18BA9000
heap
page read and write
16A575A7000
trusted library allocation
page read and write
16A594E2000
trusted library allocation
page read and write
16A62280000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A58FF8000
trusted library allocation
page read and write
16A58AA4000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E6EC000
heap
page read and write
16A4E76B000
heap
page read and write
16A4E738000
heap
page read and write
16A5FB10000
trusted library allocation
page read and write
16A598A6000
trusted library allocation
page read and write
16A53623000
trusted library allocation
page read and write
16A5AFCE000
trusted library allocation
page read and write
16A54B6B000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A57E9C000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5F88C000
trusted library allocation
page read and write
16A58AC3000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A57428000
heap
page read and write
16A603CC000
trusted library allocation
page read and write
16A583B0000
trusted library allocation
page read and write
16A4E713000
heap
page read and write
18B17CF0000
unclassified section
page read and write
16A4E738000
heap
page read and write
16A58BF6000
trusted library allocation
page read and write
16A53790000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A5FE7E000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
13642F0B000
remote allocation
page execute read
16A4E74B000
heap
page read and write
16A4E74B000
heap
page read and write
16A57E77000
trusted library allocation
page read and write
16A5F853000
trusted library allocation
page read and write
16A5957D000
trusted library allocation
page read and write
16A547AD000
trusted library allocation
page read and write
18B18A40000
heap
page read and write
16A58AC3000
trusted library allocation
page read and write
16A546C9000
trusted library allocation
page read and write
16A4E785000
heap
page read and write
16A58FB0000
trusted library allocation
page read and write
16A5B0E5000
trusted library allocation
page read and write
16A62486000
trusted library allocation
page read and write
16A5932F000
trusted library allocation
page read and write
16A5FBEA000
trusted library allocation
page read and write
16A620FE000
trusted library allocation
page read and write
16A5FB69000
trusted library allocation
page read and write
16A5379A000
trusted library allocation
page read and write
18B18BB9000
heap
page read and write
16A4E721000
heap
page read and write
18B183A0000
heap
page read and write
16A4E702000
heap
page read and write
16A57428000
heap
page read and write
16A5A4F6000
trusted library allocation
page read and write
16A620C8000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A58F5E000
trusted library allocation
page read and write
16A57533000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A573FD000
heap
page read and write
16A5899A000
trusted library allocation
page read and write
16A4E766000
heap
page read and write
16A63630000
trusted library allocation
page read and write
1ABEDB0A000
trusted library allocation
page read and write
16A5FBDD000
trusted library allocation
page read and write
18B18B31000
heap
page read and write
16A4E70A000
heap
page read and write
16A4E731000
heap
page read and write
16A4E74B000
heap
page read and write
16A57EC2000
trusted library allocation
page read and write
16A58BE0000
trusted library allocation
page read and write
16A5A48C000
trusted library allocation
page read and write
16A59319000
trusted library allocation
page read and write
16A5741A000
heap
page read and write
16A4E70A000
heap
page read and write
16A4E70F000
heap
page read and write
16A4E70F000
heap
page read and write
16A5AF70000
trusted library allocation
page read and write
16A594F9000
trusted library allocation
page read and write
16A5476F000
trusted library allocation
page read and write
16A5FEA1000
trusted library allocation
page read and write
16A5F8E0000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A5FB94000
trusted library allocation
page read and write
18B18AA0000
heap
page read and write
16A58AAC000
trusted library allocation
page read and write
16A58FF5000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A592F8000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A575C9000
trusted library allocation
page read and write
16A57A81000
trusted library allocation
page read and write
16A59379000
trusted library allocation
page read and write
16A591C1000
trusted library allocation
page read and write
16A58F47000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
2D9FE207000
heap
page read and write
16A58BCC000
trusted library allocation
page read and write
16A594DD000
trusted library allocation
page read and write
16A58A52000
trusted library allocation
page read and write
16A5F7D8000
trusted library allocation
page read and write
8AF2BD8000
stack
page read and write
16A59351000
trusted library allocation
page read and write
16A53782000
trusted library allocation
page read and write
16A58BD7000
trusted library allocation
page read and write
16A597FD000
trusted library allocation
page read and write
16A63625000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
18B18B84000
heap
page read and write
16A59954000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
16A4E6EC000
heap
page read and write
16A58BA6000
trusted library allocation
page read and write
16A58363000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A54BAB000
trusted library allocation
page read and write
16A5FCEA000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
18B18BB7000
heap
page read and write
16A4E765000
heap
page read and write
16A59388000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A4E76C000
heap
page read and write
16A5FFC9000
trusted library allocation
page read and write
16A59326000
trusted library allocation
page read and write
16A5F6EE000
trusted library allocation
page read and write
16A58B5A000
trusted library allocation
page read and write
16A59981000
trusted library allocation
page read and write
16A5799C000
trusted library allocation
page read and write
16A5F8C0000
trusted library allocation
page read and write
18B18B98000
heap
page read and write
16A5FBB9000
trusted library allocation
page read and write
16A59366000
trusted library allocation
page read and write
16A5F732000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
2D9FE575000
heap
page read and write
16A57569000
trusted library allocation
page read and write
16A59963000
trusted library allocation
page read and write
16A54A73000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A58966000
trusted library allocation
page read and write
16A4E773000
heap
page read and write
16A603D5000
trusted library allocation
page read and write
1ABED780000
heap
page read and write
16A5F6C4000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A603A0000
trusted library allocation
page read and write
16A593B0000
trusted library allocation
page read and write
16A63948000
trusted library allocation
page read and write
2D9FE230000
heap
page read and write
16A62506000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A575C9000
trusted library allocation
page read and write
16A575A5000
trusted library allocation
page read and write
16A5C8C8000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A594D8000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A5FB94000
trusted library allocation
page read and write
16A59423000
trusted library allocation
page read and write
16A5929C000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5C514000
trusted library allocation
page read and write
1ABED870000
heap
page read and write
16A4E765000
heap
page read and write
16A58F52000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A4E713000
heap
page read and write
16A623E5000
trusted library allocation
page read and write
16A4E76D000
heap
page read and write
16A60323000
trusted library allocation
page read and write
16A5F920000
trusted library allocation
page read and write
18B17E81000
trusted library allocation
page read and write
18B18617000
trusted library allocation
page read and write
16A57EDB000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A575AB000
trusted library allocation
page read and write
16A4E768000
heap
page read and write
16A58FA9000
trusted library allocation
page read and write
A70000
unkown
page write copy
16A5A5F9000
trusted library allocation
page read and write
16A5B09D000
trusted library allocation
page read and write
16A4E773000
heap
page read and write
16A5F6EA000
trusted library allocation
page read and write
16A5FB61000
trusted library allocation
page read and write
16A5A0EE000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A573E7000
heap
page read and write
18B18B31000
heap
page read and write
3531BD8000
stack
page read and write
16A4E74B000
heap
page read and write
16A4E75B000
heap
page read and write
16A57ACB000
trusted library allocation
page read and write
16A62407000
trusted library allocation
page read and write
16A59AD0000
trusted library allocation
page read and write
16A5CE8A000
heap
page read and write
16A5FB6C000
trusted library allocation
page read and write
16A583BB000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E72A000
heap
page read and write
16A599A5000
trusted library allocation
page read and write
16A59461000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E72E000
heap
page read and write
16A57BD1000
trusted library allocation
page read and write
16A599E8000
trusted library allocation
page read and write
16A621A9000
trusted library allocation
page read and write
16A54B46000
trusted library allocation
page read and write
13642E90000
unclassified section
page readonly
16A58B63000
trusted library allocation
page read and write
16A59358000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A58B69000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A58A76000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E75B000
heap
page read and write
16A5FCC3000
trusted library allocation
page read and write
16A54A6B000
trusted library allocation
page read and write
16A57B5B000
trusted library allocation
page read and write
16A5FEC2000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A58334000
trusted library allocation
page read and write
16A54B27000
trusted library allocation
page read and write
16A5919B000
trusted library allocation
page read and write
16A59998000
trusted library allocation
page read and write
16A598CC000
trusted library allocation
page read and write
16A54ABA000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A4E70A000
heap
page read and write
16A57A4E000
trusted library allocation
page read and write
29EE0C2E000
trusted library allocation
page read and write
16A5834D000
trusted library allocation
page read and write
3532BFE000
stack
page read and write
16A596B3000
trusted library allocation
page read and write
16A6220E000
trusted library allocation
page read and write
16A591D8000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5F885000
trusted library allocation
page read and write
16A61A20000
trusted library allocation
page read and write
18B17E12000
trusted library allocation
page read and write
16A5971B000
trusted library allocation
page read and write
16A593D6000
trusted library allocation
page read and write
16A599DD000
trusted library allocation
page read and write
16A5933B000
trusted library allocation
page read and write
16A58BCC000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A58356000
trusted library allocation
page read and write
16A5FFC7000
trusted library allocation
page read and write
16A4E718000
heap
page read and write
16A4E733000
heap
page read and write
16A4E739000
heap
page read and write
16A4E76E000
heap
page read and write
16A4E706000
heap
page read and write
16A594DB000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A4E725000
heap
page read and write
16A58BC9000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A5FB16000
trusted library allocation
page read and write
16A4E6FA000
heap
page read and write
16A5756F000
trusted library allocation
page read and write
16A59A29000
trusted library allocation
page read and write
16A5756F000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A573FB000
heap
page read and write
16A4E75B000
heap
page read and write
16A57EAB000
trusted library allocation
page read and write
16A530C0000
trusted library allocation
page read and write
16A5A5E7000
trusted library allocation
page read and write
16A575BE000
trusted library allocation
page read and write
16A624C5000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A5B0E5000
trusted library allocation
page read and write
16A5B0A8000
trusted library allocation
page read and write
16A5B0D8000
trusted library allocation
page read and write
18B18AA3000
heap
page read and write
16A4E719000
heap
page read and write
16A4E702000
heap
page read and write
16A58B69000
trusted library allocation
page read and write
16A621DB000
trusted library allocation
page read and write
16A5C8E5000
trusted library allocation
page read and write
16A56FDB000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E75E000
heap
page read and write
16A56FF6000
trusted library allocation
page read and write
16A573AB000
heap
page read and write
18B17C20000
heap
page read and write
16A57A66000
trusted library allocation
page read and write
18B1851B000
unkown
page execute read
16A59FB8000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A6364D000
trusted library allocation
page read and write
16A5F773000
trusted library allocation
page read and write
16A4E778000
heap
page read and write
16A4E732000
heap
page read and write
16A59434000
trusted library allocation
page read and write
2D9FE23A000
heap
page read and write
16A6399B000
trusted library allocation
page read and write
16A5FB5B000
trusted library allocation
page read and write
8AF4DFE000
stack
page read and write
16A5B05B000
trusted library allocation
page read and write
16A59454000
trusted library allocation
page read and write
16A592B1000
trusted library allocation
page read and write
16A61A9F000
trusted library allocation
page read and write
16A621F6000
trusted library allocation
page read and write
16A58ACF000
trusted library allocation
page read and write
16A5B033000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A57E92000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A58A92000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5AFC8000
trusted library allocation
page read and write
16A594CA000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A5F9C0000
trusted library allocation
page read and write
16A5A469000
trusted library allocation
page read and write
18B17C40000
heap
page read and write
16A4E72E000
heap
page read and write
16A4E700000
heap
page read and write
16A5F853000
trusted library allocation
page read and write
16A5741A000
heap
page read and write
16A5FE33000
trusted library allocation
page read and write
1054000
heap
page read and write
29EE0CBA000
trusted library allocation
page read and write
16A57A5D000
trusted library allocation
page read and write
16A58BC1000
trusted library allocation
page read and write
16A5F8D5000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A596C5000
trusted library allocation
page read and write
16A54A65000
trusted library allocation
page read and write
16A54BFA000
trusted library allocation
page read and write
E8E000
stack
page read and write
16A4E721000
heap
page read and write
16A6032E000
trusted library allocation
page read and write
16A596D6000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A56F53000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
18B17D00000
trusted library allocation
page read and write
16A54BF1000
trusted library allocation
page read and write
16A594C1000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A57A62000
trusted library allocation
page read and write
16A58BE7000
trusted library allocation
page read and write
16A621DB000
trusted library allocation
page read and write
16A58A8F000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A4E75D000
heap
page read and write
16A4E74B000
heap
page read and write
16A54B27000
trusted library allocation
page read and write
16A61A3A000
trusted library allocation
page read and write
18B18BB7000
heap
page read and write
16A4E71F000
heap
page read and write
16A58F16000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A57ED0000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
8AF3BFE000
stack
page read and write
16A4E713000
heap
page read and write
16A598B5000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A4E71B000
heap
page read and write
16A4E76D000
heap
page read and write
16A4E719000
heap
page read and write
16A5F8B6000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A603A0000
trusted library allocation
page read and write
16A598B5000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A599B2000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
18B184D0000
trusted library section
page readonly
16A4E75F000
heap
page read and write
16A4E725000
heap
page read and write
16A5FB92000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A58E63000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A57562000
trusted library allocation
page read and write
16A592E4000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5F6CC000
trusted library allocation
page read and write
16A537AB000
trusted library allocation
page read and write
16A5FB23000
trusted library allocation
page read and write
16A63E24000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E733000
heap
page read and write
5CE000
stack
page read and write
16A5FB84000
trusted library allocation
page read and write
16A57B4B000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E76B000
heap
page read and write
16A5FECB000
trusted library allocation
page read and write
16A575E6000
trusted library allocation
page read and write
2D9FE236000
heap
page read and write
16A622E4000
trusted library allocation
page read and write
13643050000
heap
page read and write
16A5A100000
trusted library allocation
page read and write
1364345F000
trusted library allocation
page read and write
16A56FAE000
trusted library allocation
page read and write
16A596A6000
trusted library allocation
page read and write
16A4E75F000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
16A5FF45000
trusted library allocation
page read and write
16A573FD000
heap
page read and write
16A63E0F000
trusted library allocation
page read and write
16A58F45000
trusted library allocation
page read and write
16A603D5000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E74B000
heap
page read and write
16A583F7000
trusted library allocation
page read and write
16A5A0E5000
trusted library allocation
page read and write
29EE0BC4000
heap
page read and write
16A54ABA000
trusted library allocation
page read and write
2D9FE222000
heap
page read and write
16A57ACB000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5741D000
heap
page read and write
16A4E702000
heap
page read and write
16A4E72E000
heap
page read and write
16A5FBDD000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A599A5000
trusted library allocation
page read and write
29EE0CB0000
trusted library allocation
page read and write
16A5957D000
trusted library allocation
page read and write
16A59349000
trusted library allocation
page read and write
8AF44FE000
unkown
page readonly
16A536FB000
trusted library allocation
page read and write
16A58B67000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A597FD000
trusted library allocation
page read and write
18B17B30000
heap
page read and write
16A58398000
trusted library allocation
page read and write
16A5FCB5000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A57E5F000
trusted library allocation
page read and write
16A5938F000
trusted library allocation
page read and write
16A5FB6C000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
13642FD0000
heap
page read and write
16A622B0000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E74B000
heap
page read and write
16A5FCB5000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A583B4000
trusted library allocation
page read and write
102F000
heap
page read and write
16A593DA000
trusted library allocation
page read and write
16A5FBEE000
trusted library allocation
page read and write
16A62045000
trusted library allocation
page read and write
16A56F53000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
16A4E717000
heap
page read and write
16A595A4000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E768000
heap
page read and write
16A575CD000
trusted library allocation
page read and write
16A5A476000
trusted library allocation
page read and write
16A57B99000
trusted library allocation
page read and write
16A575AE000
trusted library allocation
page read and write
16A5927C000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
16A5957F000
trusted library allocation
page read and write
16A5F88E000
trusted library allocation
page read and write
16A57963000
trusted library allocation
page read and write
16A603CC000
trusted library allocation
page read and write
16A59355000
trusted library allocation
page read and write
16A59196000
trusted library allocation
page read and write
16A59366000
trusted library allocation
page read and write
136433A0000
heap
page read and write
16A4E772000
heap
page read and write
16A57428000
heap
page read and write
16A4E721000
heap
page read and write
16A62213000
trusted library allocation
page read and write
16A5B0D8000
trusted library allocation
page read and write
16A57404000
heap
page read and write
16A4E70A000
heap
page read and write
16A4E6F2000
heap
page read and write
16A58DC1000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
1018000
heap
page read and write
16A58B99000
trusted library allocation
page read and write
16A4E70C000
heap
page read and write
16A5833C000
trusted library allocation
page read and write
16A54A65000
trusted library allocation
page read and write
16A594DB000
trusted library allocation
page read and write
16A5FB78000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A58ACF000
trusted library allocation
page read and write
16A4E742000
heap
page read and write
16A4E75E000
heap
page read and write
16A4E739000
heap
page read and write
16A58A25000
trusted library allocation
page read and write
16A62277000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5924C000
trusted library allocation
page read and write
16A54B29000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A61AFE000
trusted library allocation
page read and write
16A5947A000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A5991A000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5FFF8000
trusted library allocation
page read and write
16A61A5B000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A58F7E000
trusted library allocation
page read and write
16A5FB88000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A58F3E000
trusted library allocation
page read and write
16A54780000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A59475000
trusted library allocation
page read and write
16A591FA000
trusted library allocation
page read and write
16A57E9C000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A61816000
trusted library allocation
page read and write
16A575C9000
trusted library allocation
page read and write
16A60337000
trusted library allocation
page read and write
16A58BAB000
trusted library allocation
page read and write
18B17E2F000
trusted library allocation
page read and write
16A5F716000
trusted library allocation
page read and write
16A57B5E000
trusted library allocation
page read and write
16A58F14000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A59963000
trusted library allocation
page read and write
16A5797C000
trusted library allocation
page read and write
16A56F34000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A57EC2000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5FB08000
trusted library allocation
page read and write
16A5938E000
trusted library allocation
page read and write
16A54A54000
trusted library allocation
page read and write
16A4E777000
heap
page read and write
16A5CE46000
heap
page read and write
16A5FE7E000
trusted library allocation
page read and write
18B18B3D000
heap
page read and write
16A4E721000
heap
page read and write
16A58CAA000
trusted library allocation
page read and write
18B18AEA000
heap
page read and write
16A59366000
trusted library allocation
page read and write
16A57A8C000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A54B29000
trusted library allocation
page read and write
16A59A9D000
trusted library allocation
page read and write
540000
heap
page read and write
16A5B09A000
trusted library allocation
page read and write
16A57EC2000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A57A1D000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A59395000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
136434A2000
trusted library allocation
page read and write
16A592D5000
trusted library allocation
page read and write
16A58DF2000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
18B18B23000
heap
page read and write
16A59379000
trusted library allocation
page read and write
16A5FEBF000
trusted library allocation
page read and write
16A6203D000
trusted library allocation
page read and write
544000
heap
page read and write
16A63661000
trusted library allocation
page read and write
16A54BC3000
trusted library allocation
page read and write
16A57533000
trusted library allocation
page read and write
B27A4FE000
unkown
page readonly
8AF443B000
stack
page read and write
16A5FB0C000
trusted library allocation
page read and write
16A58959000
trusted library allocation
page read and write
16A5A4BC000
trusted library allocation
page read and write
16A591A6000
trusted library allocation
page read and write
16A5F775000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
B278BFE000
stack
page read and write
16A4E75B000
heap
page read and write
16A58AA8000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A5919E000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A591FD000
trusted library allocation
page read and write
16A593D6000
trusted library allocation
page read and write
16A57EF1000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A53098000
trusted library allocation
page read and write
18B184C0000
heap
page read and write
16A583A4000
trusted library allocation
page read and write
16A58BC1000
trusted library allocation
page read and write
16A579C8000
trusted library allocation
page read and write
16A5AFB5000
trusted library allocation
page read and write
16A58BC3000
trusted library allocation
page read and write
16A5F7D1000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A603EE000
trusted library allocation
page read and write
16A5934D000
trusted library allocation
page read and write
16A5F8C8000
trusted library allocation
page read and write
16A5998B000
trusted library allocation
page read and write
16A622D4000
trusted library allocation
page read and write
16A4E747000
heap
page read and write
16A4E732000
heap
page read and write
16A5741D000
heap
page read and write
16A58386000
trusted library allocation
page read and write
16A60391000
trusted library allocation
page read and write
544000
heap
page read and write
16A598CC000
trusted library allocation
page read and write
16A583F7000
trusted library allocation
page read and write
16A57EE1000
trusted library allocation
page read and write
16A56FA7000
trusted library allocation
page read and write
18B17E78000
trusted library allocation
page read and write
16A592C7000
trusted library allocation
page read and write
16A599E7000
trusted library allocation
page read and write
16A59EC9000
trusted library allocation
page read and write
16A5CA57000
trusted library allocation
page read and write
16A596C1000
trusted library allocation
page read and write
16A59AAC000
trusted library allocation
page read and write
16A57E0C000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A5FBD8000
trusted library allocation
page read and write
16A592C7000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A591F0000
trusted library allocation
page read and write
16A5940F000
trusted library allocation
page read and write
16A593A6000
trusted library allocation
page read and write
16A5C51B000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A622CE000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
29EE0A32000
trusted library allocation
page read and write
16A547DA000
trusted library allocation
page read and write
16A603E5000
trusted library allocation
page read and write
16A538C3000
trusted library allocation
page read and write
16A599E0000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A5F9EB000
trusted library allocation
page read and write
16A5B02F000
trusted library allocation
page read and write
16A57436000
heap
page read and write
16A4E772000
heap
page read and write
16A4E773000
heap
page read and write
16A5F8BE000
trusted library allocation
page read and write
16A599EB000
trusted library allocation
page read and write
16A599B9000
trusted library allocation
page read and write
16A621F0000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A57A9C000
trusted library allocation
page read and write
16A58B63000
trusted library allocation
page read and write
16A599FE000
trusted library allocation
page read and write
16A5F981000
trusted library allocation
page read and write
16A5AFF9000
trusted library allocation
page read and write
A62000
unkown
page readonly
16A4E70F000
heap
page read and write
16A54BC3000
trusted library allocation
page read and write
16A57A88000
trusted library allocation
page read and write
16A592EE000
trusted library allocation
page read and write
16A620D7000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A547A8000
trusted library allocation
page read and write
16A5FB94000
trusted library allocation
page read and write
16A603A0000
trusted library allocation
page read and write
16A5FE47000
trusted library allocation
page read and write
16A58A25000
trusted library allocation
page read and write
16A603FE000
trusted library allocation
page read and write
16A62289000
trusted library allocation
page read and write
16A5FB9D000
trusted library allocation
page read and write
16A57974000
trusted library allocation
page read and write
16A5991A000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A575F1000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
18B17CFF000
unclassified section
page read and write
16A5FCD9000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A5754D000
trusted library allocation
page read and write
16A57428000
heap
page read and write
16A4E721000
heap
page read and write
16A4E72E000
heap
page read and write
13642F50000
heap
page read and write
16A5F7E2000
trusted library allocation
page read and write
16A590E6000
trusted library allocation
page read and write
16A58BD2000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A575DE000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A57A6F000
trusted library allocation
page read and write
353343E000
unkown
page readonly
16A58F7E000
trusted library allocation
page read and write
16A5B01E000
trusted library allocation
page read and write
16A6213F000
trusted library allocation
page read and write
16A5FCEE000
trusted library allocation
page read and write
29EE0750000
heap
page readonly
16A5FB61000
trusted library allocation
page read and write
16A594CA000
trusted library allocation
page read and write
16A60365000
trusted library allocation
page read and write
16A4E75F000
heap
page read and write
16A58F42000
trusted library allocation
page read and write
16A53780000
trusted library allocation
page read and write
16A60337000
trusted library allocation
page read and write
16A54BB4000
trusted library allocation
page read and write
16A591E8000
trusted library allocation
page read and write
16A63B93000
trusted library allocation
page read and write
16A5A337000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A5999A000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A54BFA000
trusted library allocation
page read and write
16A5B08A000
trusted library allocation
page read and write
16A57EC9000
trusted library allocation
page read and write
16A573FA000
heap
page read and write
16A4E719000
heap
page read and write
B2783FE000
unkown
page readonly
13643430000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A61A51000
trusted library allocation
page read and write
16A4E763000
heap
page read and write
16A591A8000
trusted library allocation
page read and write
16A622C0000
trusted library allocation
page read and write
2A1BD171000
trusted library allocation
page execute read
16A59391000
trusted library allocation
page read and write
16A5FB9B000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A5FB43000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A594E4000
trusted library allocation
page read and write
16A58BA6000
trusted library allocation
page read and write
16A4E763000
heap
page read and write
16A54B77000
trusted library allocation
page read and write
29EE0570000
remote allocation
page read and write
16A5F812000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A4E738000
heap
page read and write
16A575AE000
trusted library allocation
page read and write
16A58B4B000
trusted library allocation
page read and write
16A59351000
trusted library allocation
page read and write
16A54671000
trusted library allocation
page read and write
16A5AFC2000
trusted library allocation
page read and write
16A622DE000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A57A4C000
trusted library allocation
page read and write
16A5938A000
trusted library allocation
page read and write
16A603A0000
trusted library allocation
page read and write
16A5932C000
trusted library allocation
page read and write
16A591DD000
trusted library allocation
page read and write
16A5F99E000
trusted library allocation
page read and write
18B17EEB000
trusted library allocation
page read and write
16A583C8000
trusted library allocation
page read and write
16A583A6000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E713000
heap
page read and write
16A5FB92000
trusted library allocation
page read and write
18B17E76000
trusted library allocation
page read and write
16A5FE46000
trusted library allocation
page read and write
16A57CED000
trusted library allocation
page read and write
16A5932E000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
8AF44BD000
stack
page read and write
29EE06F0000
heap
page read and write
16A621F0000
trusted library allocation
page read and write
16A4E7BD000
heap
page read and write
16A5FCCC000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A58AB0000
trusted library allocation
page read and write
18B18AA0000
heap
page read and write
16A57A9C000
trusted library allocation
page read and write
16A58CF9000
trusted library allocation
page read and write
16A59561000
trusted library allocation
page read and write
16A5947A000
trusted library allocation
page read and write
16A58F47000
trusted library allocation
page read and write
16A621DB000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A4E765000
heap
page read and write
16A575A5000
trusted library allocation
page read and write
16A5FCC6000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A53790000
trusted library allocation
page read and write
16A6032E000
trusted library allocation
page read and write
16A5FBCF000
trusted library allocation
page read and write
16A54B6F000
trusted library allocation
page read and write
16A594DB000
trusted library allocation
page read and write
16A57414000
heap
page read and write
16A4E709000
heap
page read and write
16A4E76F000
heap
page read and write
1033000
heap
page read and write
18B18B7B000
heap
page read and write
16A58F45000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A4E738000
heap
page read and write
16A4E75B000
heap
page read and write
16A4E74B000
heap
page read and write
16A5A0EC000
trusted library allocation
page read and write
16A59187000
trusted library allocation
page read and write
18B18B28000
heap
page read and write
16A59982000
trusted library allocation
page read and write
16A5309E000
trusted library allocation
page read and write
16A57EE7000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A4E709000
heap
page read and write
2A1BD1F7000
trusted library allocation
page execute read
16A5FB9D000
trusted library allocation
page read and write
16A4E768000
heap
page read and write
16A599D6000
trusted library allocation
page read and write
16A592E9000
trusted library allocation
page read and write
16A57BA8000
trusted library allocation
page read and write
16A575E2000
trusted library allocation
page read and write
16A6224E000
trusted library allocation
page read and write
16A595A4000
trusted library allocation
page read and write
16A583AA000
trusted library allocation
page read and write
16A622A1000
trusted library allocation
page read and write
16A537D0000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
16A589C5000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A593DA000
trusted library allocation
page read and write
18B18B98000
heap
page read and write
16A54A29000
trusted library allocation
page read and write
16A591BE000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A530C7000
trusted library allocation
page read and write
16A5B0C4000
trusted library allocation
page read and write
16A57B86000
trusted library allocation
page read and write
16A4E6EE000
heap
page read and write
16A592E9000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A6037A000
trusted library allocation
page read and write
16A594BB000
trusted library allocation
page read and write
16A57A8B000
trusted library allocation
page read and write
16A5FB75000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
13643424000
trusted library allocation
page read and write
16A4E715000
heap
page read and write
16A4E702000
heap
page read and write
16A5931E000
trusted library allocation
page read and write
16A599A1000
trusted library allocation
page read and write
16A5CE60000
heap
page read and write
16A594E1000
trusted library allocation
page read and write
16A5FB43000
trusted library allocation
page read and write
16A57A5D000
trusted library allocation
page read and write
16A5FC98000
trusted library allocation
page read and write
16A57428000
heap
page read and write
16A4E6F2000
heap
page read and write
16A57427000
heap
page read and write
16A4E75B000
heap
page read and write
16A4E75B000
heap
page read and write
16A5AFED000
trusted library allocation
page read and write
16A5947C000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A57EF3000
trusted library allocation
page read and write
16A59ACF000
trusted library allocation
page read and write
16A547D2000
trusted library allocation
page read and write
16A5FB75000
trusted library allocation
page read and write
16A61802000
trusted library allocation
page read and write
16A622F3000
trusted library allocation
page read and write
16A5FBDF000
trusted library allocation
page read and write
16A5759A000
trusted library allocation
page read and write
16A57569000
trusted library allocation
page read and write
16A57570000
trusted library allocation
page read and write
16A5F91A000
trusted library allocation
page read and write
16A63962000
trusted library allocation
page read and write
16A57562000
trusted library allocation
page read and write
16A6213F000
trusted library allocation
page read and write
16A5A0DE000
trusted library allocation
page read and write
16A5A0D1000
trusted library allocation
page read and write
18B18AA9000
heap
page read and write
16A4E75D000
heap
page read and write
18B17C80000
heap
page read and write
35333FE000
unkown
page readonly
18B18609000
trusted library allocation
page read and write
16A58F31000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
29EE0C5B000
trusted library allocation
page read and write
18B17E49000
trusted library allocation
page read and write
18B17E6F000
trusted library allocation
page read and write
16A5FBC3000
trusted library allocation
page read and write
16A591A6000
trusted library allocation
page read and write
16A59472000
trusted library allocation
page read and write
16A60365000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A58F35000
trusted library allocation
page read and write
16A575DE000
trusted library allocation
page read and write
16A4E6FB000
heap
page read and write
16A599BC000
trusted library allocation
page read and write
16A58B5C000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5795C000
trusted library allocation
page read and write
16A59096000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
29EE0C23000
trusted library allocation
page read and write
16A621E4000
trusted library allocation
page read and write
16A575BE000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5F905000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A59963000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A57E9C000
trusted library allocation
page read and write
29EE0726000
heap
page read and write
16A5FFC5000
trusted library allocation
page read and write
16A63E19000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A59366000
trusted library allocation
page read and write
16A591F1000
trusted library allocation
page read and write
16A596CD000
trusted library allocation
page read and write
16A58FBE000
trusted library allocation
page read and write
16A5F840000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A5971D000
trusted library allocation
page read and write
16A6392B000
trusted library allocation
page read and write
16A575E6000
trusted library allocation
page read and write
16A594D2000
trusted library allocation
page read and write
16A5FB9B000
trusted library allocation
page read and write
16A57A81000
trusted library allocation
page read and write
16A54B55000
trusted library allocation
page read and write
16A5FBC7000
trusted library allocation
page read and write
16A5833F000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5F8D0000
trusted library allocation
page read and write
16A57B60000
trusted library allocation
page read and write
16A4E727000
heap
page read and write
16A5954E000
trusted library allocation
page read and write
3533C3E000
stack
page read and write
16A5B087000
trusted library allocation
page read and write
16A5FB80000
trusted library allocation
page read and write
16A57E45000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A639AA000
trusted library allocation
page read and write
16A5833F000
trusted library allocation
page read and write
16A594A4000
trusted library allocation
page read and write
18B18510000
unkown
page execute read
16A4E74B000
heap
page read and write
16A589F1000
trusted library allocation
page read and write
16A5A4EE000
trusted library allocation
page read and write
16A57E78000
trusted library allocation
page read and write
B276BD8000
stack
page read and write
16A591A8000
trusted library allocation
page read and write
16A59146000
trusted library allocation
page read and write
16A57BF9000
trusted library allocation
page read and write
16A5F8CD000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
18B18BB7000
heap
page read and write
16A621A4000
trusted library allocation
page read and write
16A53800000
trusted library allocation
page read and write
16A4E71C000
heap
page read and write
16A4E6F8000
heap
page read and write
16A4E76F000
heap
page read and write
16A603D5000
trusted library allocation
page read and write
16A4E701000
heap
page read and write
16A621A4000
trusted library allocation
page read and write
16A5AF85000
trusted library allocation
page read and write
18B18A9F000
heap
page read and write
16A57AA2000
trusted library allocation
page read and write
16A5799A000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A58A5A000
trusted library allocation
page read and write
104B000
heap
page read and write
16A63B1C000
trusted library allocation
page read and write
18B17AA0000
unclassified section
page readonly
18B18BB7000
heap
page read and write
16A59339000
trusted library allocation
page read and write
16A594B4000
trusted library allocation
page read and write
A74000
unkown
page readonly
16A4E723000
heap
page read and write
16A547C5000
trusted library allocation
page read and write
16A5792F000
trusted library allocation
page read and write
16A5FBDF000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A5937F000
trusted library allocation
page read and write
16A57557000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5F9B8000
trusted library allocation
page read and write
16A59A46000
trusted library allocation
page read and write
16A58F1E000
trusted library allocation
page read and write
16A58F34000
trusted library allocation
page read and write
16A599E0000
trusted library allocation
page read and write
E6B000
stack
page read and write
16A547B1000
trusted library allocation
page read and write
16A575A0000
trusted library allocation
page read and write
16A58AEC000
trusted library allocation
page read and write
16A5F9F6000
trusted library allocation
page read and write
16A4E7AB000
heap
page read and write
16A636D7000
trusted library allocation
page read and write
16A5FB6C000
trusted library allocation
page read and write
16A4E76D000
heap
page read and write
16A4E721000
heap
page read and write
16A59432000
trusted library allocation
page read and write
16A58F1F000
trusted library allocation
page read and write
16A57414000
heap
page read and write
29EE06FA000
heap
page read and write
16A5942D000
trusted library allocation
page read and write
29EE06C0000
heap
page read and write
1044000
heap
page read and write
16A4E72A000
heap
page read and write
16A5CE21000
heap
page read and write
16A58F4B000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A60383000
trusted library allocation
page read and write
16A61A38000
trusted library allocation
page read and write
16A59579000
trusted library allocation
page read and write
16A622FE000
trusted library allocation
page read and write
16A58BE0000
trusted library allocation
page read and write
16A575F1000
trusted library allocation
page read and write
18B18B7B000
heap
page read and write
18B18B98000
heap
page read and write
16A5AF8F000
trusted library allocation
page read and write
16A594A3000
trusted library allocation
page read and write
16A5F6D0000
trusted library allocation
page read and write
18B18B21000
heap
page read and write
18B18B23000
heap
page read and write
A3C000
unkown
page readonly
16A58AEC000
trusted library allocation
page read and write
18B18ABD000
heap
page read and write
16A583F7000
trusted library allocation
page read and write
16A622B2000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A58F45000
trusted library allocation
page read and write
16A5AF87000
trusted library allocation
page read and write
16A59430000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
16A58A94000
trusted library allocation
page read and write
16A5942D000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A57A41000
trusted library allocation
page read and write
16A58F2B000
trusted library allocation
page read and write
2D9FE40A000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A58A9F000
trusted library allocation
page read and write
16A58A76000
trusted library allocation
page read and write
16A5A0F5000
trusted library allocation
page read and write
18B18ACD000
heap
page read and write
16A58B69000
trusted library allocation
page read and write
16A57529000
trusted library allocation
page read and write
16A5FE52000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A599E2000
trusted library allocation
page read and write
18B18AAC000
heap
page read and write
16A57E64000
trusted library allocation
page read and write
16A4E6FA000
heap
page read and write
16A58FB7000
trusted library allocation
page read and write
16A59395000
trusted library allocation
page read and write
16A6215C000
trusted library allocation
page read and write
13642EF0000
remote allocation
page read and write
16A5972C000
trusted library allocation
page read and write
16A57EAA000
trusted library allocation
page read and write
16A58379000
trusted library allocation
page read and write
16A599E2000
trusted library allocation
page read and write
16A5947C000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A58FA9000
trusted library allocation
page read and write
21D01FF000
stack
page read and write
16A597D8000
trusted library allocation
page read and write
16A4E76B000
heap
page read and write
16A5F9D6000
trusted library allocation
page read and write
16A59949000
trusted library allocation
page read and write
16A59AAC000
trusted library allocation
page read and write
1ABED890000
heap
page read and write
16A58A11000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
2D9FE232000
heap
page read and write
16A4E70A000
heap
page read and write
16A59391000
trusted library allocation
page read and write
16A621AC000
trusted library allocation
page read and write
18B17E67000
trusted library allocation
page read and write
16A575BE000
trusted library allocation
page read and write
16A537E0000
trusted library allocation
page read and write
16A583F7000
trusted library allocation
page read and write
29EE0C72000
trusted library allocation
page read and write
8AF55FE000
unkown
page readonly
16A4E72E000
heap
page read and write
16A599A5000
trusted library allocation
page read and write
104B000
heap
page read and write
16A4E72E000
heap
page read and write
16A4E765000
heap
page read and write
16A4E71B000
heap
page read and write
16A4E704000
heap
page read and write
8AF65FE000
unkown
page readonly
16A5F915000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A592C7000
trusted library allocation
page read and write
16A5791D000
trusted library allocation
page read and write
16A58FB7000
trusted library allocation
page read and write
16A58CE6000
trusted library allocation
page read and write
16A54BA0000
trusted library allocation
page read and write
29EE0C03000
trusted library allocation
page read and write
8AF447E000
unkown
page readonly
16A4E75E000
heap
page read and write
16A58F52000
trusted library allocation
page read and write
16A5F6F2000
trusted library allocation
page read and write
16A591A1000
trusted library allocation
page read and write
16A58A0B000
trusted library allocation
page read and write
36F1000
heap
page read and write
16A54BC3000
trusted library allocation
page read and write
16A583C3000
trusted library allocation
page read and write
16A57922000
trusted library allocation
page read and write
16A58BEA000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A5CED8000
heap
page read and write
16A54BF0000
trusted library allocation
page read and write
16A5FE40000
trusted library allocation
page read and write
16A6366D000
trusted library allocation
page read and write
16A59730000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A5927E000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A54B65000
trusted library allocation
page read and write
16A593B1000
trusted library allocation
page read and write
16A58373000
trusted library allocation
page read and write
16A57B99000
trusted library allocation
page read and write
16A5932F000
trusted library allocation
page read and write
16A59350000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A58392000
trusted library allocation
page read and write
16A5FFF8000
trusted library allocation
page read and write
16A54A6B000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A598CE000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A5926A000
trusted library allocation
page read and write
16A5A3E3000
trusted library allocation
page read and write
18B18B61000
heap
page read and write
1ABED95F000
heap
page read and write
16A4E6F2000
heap
page read and write
16A5B093000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A57A8B000
trusted library allocation
page read and write
16A5AF93000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A62265000
trusted library allocation
page read and write
16A594E1000
trusted library allocation
page read and write
16A57B52000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5F892000
trusted library allocation
page read and write
16A59A74000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
103D000
heap
page read and write
16A599CF000
trusted library allocation
page read and write
16A599F8000
trusted library allocation
page read and write
16A63697000
trusted library allocation
page read and write
16A5CEAD000
heap
page read and write
16A4E732000
heap
page read and write
16A5A494000
trusted library allocation
page read and write
16A5A471000
trusted library allocation
page read and write
16A599DD000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E733000
heap
page read and write
16A58F31000
trusted library allocation
page read and write
180E000
stack
page read and write
13642FE0000
unclassified section
page read and write
16A57E58000
trusted library allocation
page read and write
16A603D5000
trusted library allocation
page read and write
16A59443000
trusted library allocation
page read and write
16A60391000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A54ABA000
trusted library allocation
page read and write
16A58B8B000
trusted library allocation
page read and write
16A53671000
trusted library allocation
page read and write
16A57E92000
trusted library allocation
page read and write
16A4E715000
heap
page read and write
16A5A4CC000
trusted library allocation
page read and write
16A547A8000
trusted library allocation
page read and write
16A4E70D000
heap
page read and write
16A57562000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A4E732000
heap
page read and write
16A57E51000
trusted library allocation
page read and write
16A599E2000
trusted library allocation
page read and write
16A5C557000
trusted library allocation
page read and write
16A57637000
trusted library allocation
page read and write
29EE08B0000
heap
page read and write
16A54BA0000
trusted library allocation
page read and write
16A621A9000
trusted library allocation
page read and write
16A5FBCF000
trusted library allocation
page read and write
16A598CA000
trusted library allocation
page read and write
18B18BB7000
heap
page read and write
16A5FB20000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A63B37000
trusted library allocation
page read and write
16A62220000
trusted library allocation
page read and write
16A57510000
trusted library allocation
page read and write
16A54AE7000
trusted library allocation
page read and write
16A639C1000
trusted library allocation
page read and write
16A5FBDD000
trusted library allocation
page read and write
16A63B8A000
trusted library allocation
page read and write
16A57414000
heap
page read and write
16A59FA0000
trusted library allocation
page read and write
16A5AF96000
trusted library allocation
page read and write
16A58CF1000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5FB1D000
trusted library allocation
page read and write
16A5920A000
trusted library allocation
page read and write
16A5FCA4000
trusted library allocation
page read and write
16A573B9000
heap
page read and write
16A5954B000
trusted library allocation
page read and write
16A59A33000
trusted library allocation
page read and write
16A4E742000
heap
page read and write
16A4E72E000
heap
page read and write
1ABEDC00000
heap
page read and write
16A4E6EA000
heap
page read and write
16A59434000
trusted library allocation
page read and write
16A596A9000
trusted library allocation
page read and write
16A636D9000
trusted library allocation
page read and write
16A603FE000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A592EE000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A621F0000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A5AFF3000
trusted library allocation
page read and write
16A58F24000
trusted library allocation
page read and write
16A57EE0000
trusted library allocation
page read and write
16A594E2000
trusted library allocation
page read and write
16A58F7E000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A58BAB000
trusted library allocation
page read and write
16A57E8E000
trusted library allocation
page read and write
16A59355000
trusted library allocation
page read and write
16A5F8E6000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A573FB000
heap
page read and write
16A5C9A3000
trusted library allocation
page read and write
16A5956B000
trusted library allocation
page read and write
B2760AC000
stack
page read and write
16A59495000
trusted library allocation
page read and write
18B17E5F000
trusted library allocation
page read and write
16A621F0000
trusted library allocation
page read and write
16A58AA4000
trusted library allocation
page read and write
16A537AB000
trusted library allocation
page read and write
16A5AF39000
trusted library allocation
page read and write
16A5AF32000
trusted library allocation
page read and write
16A57E39000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A4E71F000
heap
page read and write
18B18B3D000
heap
page read and write
16A5FBD8000
trusted library allocation
page read and write
16A603EE000
trusted library allocation
page read and write
16A58FBE000
trusted library allocation
page read and write
35310FE000
stack
page read and write
16A4E75D000
heap
page read and write
16A4E701000
heap
page read and write
16A591C5000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A4E72E000
heap
page read and write
16A58B47000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A4E74B000
heap
page read and write
16A4E76E000
heap
page read and write
16A4E702000
heap
page read and write
16A4E75B000
heap
page read and write
16A4E768000
heap
page read and write
16A5FB87000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A4E76E000
heap
page read and write
16A60341000
trusted library allocation
page read and write
16A5FB9D000
trusted library allocation
page read and write
16A60373000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A57E64000
trusted library allocation
page read and write
16A5FB61000
trusted library allocation
page read and write
16A5AF1F000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E765000
heap
page read and write
2D9FFD20000
heap
page read and write
16A5C557000
trusted library allocation
page read and write
16A58AFE000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E74B000
heap
page read and write
29EE0CC8000
trusted library allocation
page read and write
16A59432000
trusted library allocation
page read and write
16A63B67000
trusted library allocation
page read and write
16A5925A000
trusted library allocation
page read and write
16A58F1F000
trusted library allocation
page read and write
18B18B99000
heap
page read and write
16A4E702000
heap
page read and write
16A597FA000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
353113E000
unkown
page readonly
16A5B03F000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E75B000
heap
page read and write
13643411000
trusted library allocation
page read and write
16A58A5A000
trusted library allocation
page read and write
1364345D000
trusted library allocation
page read and write
16A621AC000
trusted library allocation
page read and write
2D9FE23A000
heap
page read and write
16A599FE000
trusted library allocation
page read and write
16A5FB80000
trusted library allocation
page read and write
16A56FD4000
trusted library allocation
page read and write
16A599DD000
trusted library allocation
page read and write
16A59EA2000
trusted library allocation
page read and write
16A54A73000
trusted library allocation
page read and write
16A58F47000
trusted library allocation
page read and write
16A59474000
trusted library allocation
page read and write
16A575B8000
trusted library allocation
page read and write
13642FEF000
unclassified section
page read and write
16A4E702000
heap
page read and write
16A599C8000
trusted library allocation
page read and write
16A5972C000
trusted library allocation
page read and write
16A57BC5000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
13643607000
trusted library allocation
page read and write
16A58BB5000
trusted library allocation
page read and write
16A4E744000
heap
page read and write
16A5B201000
trusted library allocation
page read and write
16A4E701000
heap
page read and write
16A5F865000
trusted library allocation
page read and write
16A57580000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A63E3F000
trusted library allocation
page read and write
16A56FC4000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
18B18533000
unkown
page execute read
16A636D5000
trusted library allocation
page read and write
16A54BC3000
trusted library allocation
page read and write
29EE08B3000
heap
page read and write
16A5931E000
trusted library allocation
page read and write
16A599E0000
trusted library allocation
page read and write
18B18B6A000
heap
page read and write
16A5A100000
trusted library allocation
page read and write
16A54A6B000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A58F45000
trusted library allocation
page read and write
16A57EA0000
trusted library allocation
page read and write
16A5972C000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A4E6EA000
heap
page read and write
29EE0C7B000
trusted library allocation
page read and write
16A59590000
trusted library allocation
page read and write
18B18AA9000
heap
page read and write
13643010000
unclassified section
page readonly
16A4E728000
heap
page read and write
16A54B7E000
trusted library allocation
page read and write
16A575B8000
trusted library allocation
page read and write
16A59434000
trusted library allocation
page read and write
16A5CA01000
trusted library allocation
page read and write
16A58BC9000
trusted library allocation
page read and write
16A57A43000
trusted library allocation
page read and write
16A621A9000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A547C2000
trusted library allocation
page read and write
16A59ACF000
trusted library allocation
page read and write
16A5741A000
heap
page read and write
16A59345000
trusted library allocation
page read and write
16A61A1F000
trusted library allocation
page read and write
16A58FA9000
trusted library allocation
page read and write
16A58F35000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A4E721000
heap
page read and write
16A59568000
trusted library allocation
page read and write
16A594A4000
trusted library allocation
page read and write
16A5A4F1000
trusted library allocation
page read and write
16A59187000
trusted library allocation
page read and write
16A596A9000
trusted library allocation
page read and write
16A58F35000
trusted library allocation
page read and write
16A5753B000
trusted library allocation
page read and write
16A5A0CB000
trusted library allocation
page read and write
16A61600000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E738000
heap
page read and write
16A4E6F2000
heap
page read and write
16A594E8000
trusted library allocation
page read and write
16A596A6000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
5F0000
heap
page read and write
16A573EB000
heap
page read and write
16A62290000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
1ABED950000
heap
page read and write
29EE076F000
unclassified section
page read and write
16A4E74B000
heap
page read and write
16A575F0000
trusted library allocation
page read and write
16A5C907000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A598B5000
trusted library allocation
page read and write
16A57ECE000
trusted library allocation
page read and write
16A62289000
trusted library allocation
page read and write
16A58FF5000
trusted library allocation
page read and write
16A59960000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A5CEA9000
heap
page read and write
16A4E72E000
heap
page read and write
16A58AF2000
trusted library allocation
page read and write
16A54BFA000
trusted library allocation
page read and write
16A59368000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A63952000
trusted library allocation
page read and write
18B17EF5000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A599DD000
trusted library allocation
page read and write
16A62292000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A59434000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A4E6F2000
heap
page read and write
16A4E76E000
heap
page read and write
16A57428000
heap
page read and write
9A0000
unkown
page readonly
16A599D5000
trusted library allocation
page read and write
16A583A8000
trusted library allocation
page read and write
16A4E75F000
heap
page read and write
16A5AF18000
trusted library allocation
page read and write
16A4E785000
heap
page read and write
18B18370000
trusted library allocation
page read and write
16A61A9F000
trusted library allocation
page read and write
16A597BB000
trusted library allocation
page read and write
16A575A7000
trusted library allocation
page read and write
16A5FCE1000
trusted library allocation
page read and write
16A54A98000
trusted library allocation
page read and write
16A622A9000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A58B63000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
16A5FB84000
trusted library allocation
page read and write
16A5F989000
trusted library allocation
page read and write
16A5F9DF000
trusted library allocation
page read and write
16A57A62000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A5A0DE000
trusted library allocation
page read and write
16A5362F000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A4E742000
heap
page read and write
16A57B5B000
trusted library allocation
page read and write
16A5F6DC000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E703000
heap
page read and write
16A54B34000
trusted library allocation
page read and write
16A624A3000
trusted library allocation
page read and write
16A598AB000
trusted library allocation
page read and write
16A58BDA000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
16A4E70F000
heap
page read and write
16A4E6EA000
heap
page read and write
8AF43FE000
unkown
page readonly
E7F000
stack
page read and write
16A5A3E3000
trusted library allocation
page read and write
16A54A7F000
trusted library allocation
page read and write
18B17E9F000
trusted library allocation
page read and write
16A58A9C000
trusted library allocation
page read and write
16A59983000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A4E75D000
heap
page read and write
16A594DB000
trusted library allocation
page read and write
16A575C2000
trusted library allocation
page read and write
18B17FD0000
heap
page read and write
16A5FAF6000
trusted library allocation
page read and write
16A59207000
trusted library allocation
page read and write
16A57996000
trusted library allocation
page read and write
16A59800000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A579D8000
trusted library allocation
page read and write
16A5F867000
trusted library allocation
page read and write
2D9FE300000
trusted library allocation
page read and write
16A57427000
heap
page read and write
B2794FE000
unkown
page readonly
16A4E738000
heap
page read and write
16A58AA8000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A57E39000
trusted library allocation
page read and write
16A592B5000
trusted library allocation
page read and write
16A597D8000
trusted library allocation
page read and write
16A57B60000
trusted library allocation
page read and write
18B17E10000
trusted library allocation
page read and write
16A59458000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A58F42000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E6EC000
heap
page read and write
16A57E3F000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A57A62000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A54A65000
trusted library allocation
page read and write
16A59391000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A621DE000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A5FBC7000
trusted library allocation
page read and write
16A58E71000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A5FEA1000
trusted library allocation
page read and write
16A59358000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E731000
heap
page read and write
16A63E1B000
trusted library allocation
page read and write
16A5A484000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A5B0F1000
trusted library allocation
page read and write
16A57B5E000
trusted library allocation
page read and write
16A58A25000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A54A65000
trusted library allocation
page read and write
16A597B7000
trusted library allocation
page read and write
16A5FCC1000
trusted library allocation
page read and write
2D9FFE30000
heap
page read and write
29EE0C79000
trusted library allocation
page read and write
16A61A53000
trusted library allocation
page read and write
16A57EC2000
trusted library allocation
page read and write
16A5C542000
trusted library allocation
page read and write
16A58F7E000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A5949C000
trusted library allocation
page read and write
16A4E724000
heap
page read and write
16A5F85F000
trusted library allocation
page read and write
16A5955A000
trusted library allocation
page read and write
16A58A9A000
trusted library allocation
page read and write
16A5F6E0000
trusted library allocation
page read and write
16A594F9000
trusted library allocation
page read and write
16A4E76E000
heap
page read and write
16A590A3000
trusted library allocation
page read and write
16A58F42000
trusted library allocation
page read and write
16A5FADD000
trusted library allocation
page read and write
16A57E9C000
trusted library allocation
page read and write
16A5FF3A000
trusted library allocation
page read and write
16A59F99000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
18B18B26000
heap
page read and write
16A4E769000
heap
page read and write
16A536FE000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E772000
heap
page read and write
16A594E1000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
16A57A43000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A54BAB000
trusted library allocation
page read and write
29EE0C64000
trusted library allocation
page read and write
16A59982000
trusted library allocation
page read and write
16A56FE4000
trusted library allocation
page read and write
16A59336000
trusted library allocation
page read and write
16A57A41000
trusted library allocation
page read and write
16A5C986000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A575B8000
trusted library allocation
page read and write
16A59986000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E720000
heap
page read and write
16A4E74B000
heap
page read and write
16A5942F000
trusted library allocation
page read and write
16A57976000
trusted library allocation
page read and write
16A57402000
heap
page read and write
16A5FE49000
trusted library allocation
page read and write
16A636E1000
trusted library allocation
page read and write
16A5A0F5000
trusted library allocation
page read and write
16A59954000
trusted library allocation
page read and write
16A59391000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A598CE000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
18B18600000
trusted library allocation
page read and write
16A5792F000
trusted library allocation
page read and write
16A5F8EF000
trusted library allocation
page read and write
16A6031E000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A4E70C000
heap
page read and write
16A4E70F000
heap
page read and write
16A4E725000
heap
page read and write
16A5A0CD000
trusted library allocation
page read and write
16A5FFF5000
trusted library allocation
page read and write
16A59495000
trusted library allocation
page read and write
16A5FBB9000
trusted library allocation
page read and write
16A4E723000
heap
page read and write
16A59952000
trusted library allocation
page read and write
16A54BC8000
trusted library allocation
page read and write
16A4E713000
heap
page read and write
16A61080000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E732000
heap
page read and write
16A57648000
trusted library allocation
page read and write
16A5916B000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
29EE0CCA000
trusted library allocation
page read and write
16A59358000
trusted library allocation
page read and write
16A59963000
trusted library allocation
page read and write
16A5FFC5000
trusted library allocation
page read and write
16A603EE000
trusted library allocation
page read and write
16A4E785000
heap
page read and write
16A6203B000
trusted library allocation
page read and write
16A599A5000
trusted library allocation
page read and write
16A62448000
trusted library allocation
page read and write
16A58F3E000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A4E75D000
heap
page read and write
16A599FE000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A58F3A000
trusted library allocation
page read and write
18B18BB7000
heap
page read and write
16A583F7000
trusted library allocation
page read and write
16A63E24000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A4E71B000
heap
page read and write
16A4E704000
heap
page read and write
FFF11FB000
stack
page read and write
16A54AB2000
trusted library allocation
page read and write
16A5AFDC000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A62220000
trusted library allocation
page read and write
16A594E7000
trusted library allocation
page read and write
16A5FB84000
trusted library allocation
page read and write
16A4E769000
heap
page read and write
13643700000
trusted library allocation
page read and write
16A620D7000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5FCE6000
trusted library allocation
page read and write
16A5FBDD000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
F80000
heap
page read and write
16A58E7D000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A57EFD000
trusted library allocation
page read and write
16A58A70000
trusted library allocation
page read and write
16A5FCEF000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E738000
heap
page read and write
16A58B47000
trusted library allocation
page read and write
16A597B9000
trusted library allocation
page read and write
16A5A0E5000
trusted library allocation
page read and write
16A4E763000
heap
page read and write
16A57ED8000
trusted library allocation
page read and write
16A57403000
heap
page read and write
16A57427000
heap
page read and write
353117D000
stack
page read and write
35311FE000
stack
page read and write
B276168000
stack
page read and write
18B17E86000
trusted library allocation
page read and write
16A4E76B000
heap
page read and write
16A621F1000
trusted library allocation
page read and write
A6C000
unkown
page read and write
16A57427000
heap
page read and write
16A4E75B000
heap
page read and write
16A57403000
heap
page read and write
16A583EB000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A57E94000
trusted library allocation
page read and write
16A58F31000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A59349000
trusted library allocation
page read and write
16A58F1F000
trusted library allocation
page read and write
18B18B98000
heap
page read and write
16A579B8000
trusted library allocation
page read and write
16A5A44C000
trusted library allocation
page read and write
16A57800000
trusted library allocation
page read and write
16A58F3D000
trusted library allocation
page read and write
E4E000
stack
page read and write
16A5CE21000
heap
page read and write
16A59369000
trusted library allocation
page read and write
16A639C6000
trusted library allocation
page read and write
16A59332000
trusted library allocation
page read and write
16A59564000
trusted library allocation
page read and write
16A58F52000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A53713000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A57403000
heap
page read and write
16A57EA3000
trusted library allocation
page read and write
16A6221A000
trusted library allocation
page read and write
18B18B6A000
heap
page read and write
16A5A0C4000
trusted library allocation
page read and write
16A5FB69000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A57564000
trusted library allocation
page read and write
16A575C7000
trusted library allocation
page read and write
16A59475000
trusted library allocation
page read and write
16A5371E000
trusted library allocation
page read and write
16A4E772000
heap
page read and write
16A4E74B000
heap
page read and write
16A4E74B000
heap
page read and write
16A4E733000
heap
page read and write
16A4E725000
heap
page read and write
16A58A5A000
trusted library allocation
page read and write
16A596A3000
trusted library allocation
page read and write
16A599BC000
trusted library allocation
page read and write
16A5939D000
trusted library allocation
page read and write
16A54B49000
trusted library allocation
page read and write
16A59391000
trusted library allocation
page read and write
16A57E96000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A5942D000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A58B63000
trusted library allocation
page read and write
16A4E703000
heap
page read and write
16A5FBD2000
trusted library allocation
page read and write
16A58F45000
trusted library allocation
page read and write
16A536F6000
trusted library allocation
page read and write
16A594E7000
trusted library allocation
page read and write
16A594F9000
trusted library allocation
page read and write
16A57B34000
trusted library allocation
page read and write
16A5FB69000
trusted library allocation
page read and write
13643449000
trusted library allocation
page read and write
16A59427000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A58A92000
trusted library allocation
page read and write
21CF9FF000
stack
page read and write
18B18B20000
heap
page read and write
16A5A0F9000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
1364305A000
heap
page read and write
16A4E765000
heap
page read and write
16A4E71B000
heap
page read and write
16A4E75B000
heap
page read and write
16A5FB92000
trusted library allocation
page read and write
29EE0CA3000
trusted library allocation
page read and write
16A5C300000
trusted library allocation
page read and write
16A57E3E000
trusted library allocation
page read and write
16A575A7000
trusted library allocation
page read and write
16A57B87000
trusted library allocation
page read and write
16A5794B000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A4E71C000
heap
page read and write
1010000
heap
page read and write
16A61ABD000
trusted library allocation
page read and write
16A5995E000
trusted library allocation
page read and write
16A58BC9000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A5CE21000
heap
page read and write
16A58BC3000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5FCEA000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
18B18AA9000
heap
page read and write
16A4E75E000
heap
page read and write
16A58F35000
trusted library allocation
page read and write
16A5F7D5000
trusted library allocation
page read and write
16A57A54000
trusted library allocation
page read and write
16A5C557000
trusted library allocation
page read and write
16A5A488000
trusted library allocation
page read and write
16A57EC2000
trusted library allocation
page read and write
16A5B047000
trusted library allocation
page read and write
16A593A2000
trusted library allocation
page read and write
16A59215000
trusted library allocation
page read and write
16A54A73000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A59418000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A639CA000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
29EE0C10000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A58BC1000
trusted library allocation
page read and write
16A61200000
trusted library allocation
page read and write
16A598DF000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
18B18AAC000
heap
page read and write
16A57A5D000
trusted library allocation
page read and write
16A58CB5000
trusted library allocation
page read and write
16A57EC9000
trusted library allocation
page read and write
16A57414000
heap
page read and write
29EE0A04000
trusted library allocation
page read and write
16A5928A000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5F7EA000
trusted library allocation
page read and write
16A573FB000
heap
page read and write
16A4E70F000
heap
page read and write
16A5377D000
trusted library allocation
page read and write
16A61ABD000
trusted library allocation
page read and write
16A5FB80000
trusted library allocation
page read and write
18B18AAC000
heap
page read and write
8AF453E000
stack
page read and write
16A579D8000
trusted library allocation
page read and write
18B18AF9000
heap
page read and write
16A5CE67000
heap
page read and write
16A5F90E000
trusted library allocation
page read and write
16A592E9000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
B27616B000
stack
page read and write
16A4E76B000
heap
page read and write
16A58F31000
trusted library allocation
page read and write
16A4E7BC000
heap
page read and write
16A636DB000
trusted library allocation
page read and write
16A5F817000
trusted library allocation
page read and write
353443E000
unkown
page readonly
1364347B000
trusted library allocation
page read and write
16A4E71C000
heap
page read and write
16A59777000
trusted library allocation
page read and write
16A592E6000
trusted library allocation
page read and write
16A5FBC3000
trusted library allocation
page read and write
16A57E8E000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A4E725000
heap
page read and write
16A4E732000
heap
page read and write
16A5AFC4000
trusted library allocation
page read and write
16A58AAF000
trusted library allocation
page read and write
16A575F1000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A56F34000
trusted library allocation
page read and write
18B18AE1000
heap
page read and write
16A59A8B000
trusted library allocation
page read and write
16A57BFE000
trusted library allocation
page read and write
16A5FB45000
trusted library allocation
page read and write
16A594E9000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A59351000
trusted library allocation
page read and write
16A58A9F000
trusted library allocation
page read and write
1364348F000
trusted library allocation
page read and write
16A58F9E000
trusted library allocation
page read and write
16A58F52000
trusted library allocation
page read and write
16A4E718000
heap
page read and write
16A5FE4B000
trusted library allocation
page read and write
16A57415000
heap
page read and write
16A57EA0000
trusted library allocation
page read and write
1035000
heap
page read and write
FFF21FE000
stack
page read and write
16A59367000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A575CD000
trusted library allocation
page read and write
16A5799D000
trusted library allocation
page read and write
16A63937000
trusted library allocation
page read and write
16A5955A000
trusted library allocation
page read and write
16A5934E000
trusted library allocation
page read and write
16A597FA000
trusted library allocation
page read and write
16A58B67000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E769000
heap
page read and write
16A575AE000
trusted library allocation
page read and write
16A57EA3000
trusted library allocation
page read and write
16A5F700000
trusted library allocation
page read and write
13643477000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A4E725000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
16A58F31000
trusted library allocation
page read and write
13643405000
trusted library allocation
page read and write
16A5A0F7000
trusted library allocation
page read and write
16A5F989000
trusted library allocation
page read and write
16A5FEBA000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A4E75B000
heap
page read and write
16A58F2E000
trusted library allocation
page read and write
16A598CE000
trusted library allocation
page read and write
18B18A9C000
heap
page read and write
16A5F80B000
trusted library allocation
page read and write
18B18A8D000
heap
page read and write
16A4E74B000
heap
page read and write
16A59FD7000
trusted library allocation
page read and write
16A58BC1000
trusted library allocation
page read and write
16A5FBED000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A4E6FA000
heap
page read and write
16A4E76F000
heap
page read and write
16A54BCF000
trusted library allocation
page read and write
16A5917A000
trusted library allocation
page read and write
16A599A1000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A621A9000
trusted library allocation
page read and write
13643400000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A583F3000
trusted library allocation
page read and write
16A5F727000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A599E5000
trusted library allocation
page read and write
16A59140000
trusted library allocation
page read and write
16A58F7E000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5CE21000
heap
page read and write
16A594CA000
trusted library allocation
page read and write
18B17EC7000
trusted library allocation
page read and write
16A59913000
trusted library allocation
page read and write
16A59196000
trusted library allocation
page read and write
16A598B5000
trusted library allocation
page read and write
16A58A52000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A4E71F000
heap
page read and write
18B18B29000
heap
page read and write
16A5FF43000
trusted library allocation
page read and write
16A59579000
trusted library allocation
page read and write
16A5F89A000
trusted library allocation
page read and write
16A56FA1000
trusted library allocation
page read and write
16A57B39000
trusted library allocation
page read and write
18B17EBF000
trusted library allocation
page read and write
16A5F804000
trusted library allocation
page read and write
16A599C8000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A597FA000
trusted library allocation
page read and write
16A594CA000
trusted library allocation
page read and write
16A5CE91000
heap
page read and write
16A4E706000
heap
page read and write
16A4E729000
heap
page read and write
16A5F939000
trusted library allocation
page read and write
16A583C8000
trusted library allocation
page read and write
16A58AF2000
trusted library allocation
page read and write
16A4E723000
heap
page read and write
16A4E732000
heap
page read and write
18B18B84000
heap
page read and write
16A573B5000
heap
page read and write
16A57EF0000
trusted library allocation
page read and write
16A59391000
trusted library allocation
page read and write
16A5999D000
trusted library allocation
page read and write
18B18ACA000
heap
page read and write
16A59374000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
13643474000
trusted library allocation
page read and write
16A59371000
trusted library allocation
page read and write
16A59EAE000
trusted library allocation
page read and write
16A56F5F000
trusted library allocation
page read and write
16A58A8B000
trusted library allocation
page read and write
16A5940C000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A6215C000
trusted library allocation
page read and write
16A59733000
trusted library allocation
page read and write
16A5B09D000
trusted library allocation
page read and write
13642F10000
unclassified section
page readonly
29EE05B0000
heap
page read and write
16A575DE000
trusted library allocation
page read and write
16A5AF28000
trusted library allocation
page read and write
16A592EE000
trusted library allocation
page read and write
18B18ABF000
heap
page read and write
16A5479C000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
136434C4000
trusted library allocation
page read and write
16A4E733000
heap
page read and write
16A57B4D000
trusted library allocation
page read and write
16A5FE52000
trusted library allocation
page read and write
16A5934D000
trusted library allocation
page read and write
18B17E7A000
trusted library allocation
page read and write
16A5B0A8000
trusted library allocation
page read and write
16A636A2000
trusted library allocation
page read and write
16A59A52000
trusted library allocation
page read and write
16A4E709000
heap
page read and write
16A589FC000
trusted library allocation
page read and write
16A59A2A000
trusted library allocation
page read and write
16A5A5F2000
trusted library allocation
page read and write
136434B2000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A57993000
trusted library allocation
page read and write
16A58F2B000
trusted library allocation
page read and write
16A5F837000
trusted library allocation
page read and write
16A57922000
trusted library allocation
page read and write
16A57EC9000
trusted library allocation
page read and write
16A62217000
trusted library allocation
page read and write
16A4E6EE000
heap
page read and write
16A58BB8000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E75D000
heap
page read and write
16A575E6000
trusted library allocation
page read and write
18B18520000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
21CF1FF000
stack
page read and write
16A5FB80000
trusted library allocation
page read and write
16A594E7000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A4E7AB000
heap
page read and write
16A5F8D5000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A621FD000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A4E702000
heap
page read and write
353543E000
unkown
page readonly
16A4E765000
heap
page read and write
16A583B7000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A57529000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A599E8000
trusted library allocation
page read and write
16A62213000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5F69F000
trusted library allocation
page read and write
16A599B2000
trusted library allocation
page read and write
16A4E770000
heap
page read and write
16A58B67000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
2D9FE200000
heap
page read and write
16A5A4EC000
trusted library allocation
page read and write
16A58A8F000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A58B55000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A5F981000
trusted library allocation
page read and write
16A61AE6000
trusted library allocation
page read and write
16A59952000
trusted library allocation
page read and write
16A5C302000
trusted library allocation
page read and write
2D9FE236000
heap
page read and write
544000
heap
page read and write
16A57AA2000
trusted library allocation
page read and write
16A56F4D000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A59332000
trusted library allocation
page read and write
16A4E76D000
heap
page read and write
16A5740C000
heap
page read and write
16A583B0000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A5939D000
trusted library allocation
page read and write
18B17FD6000
heap
page read and write
16A60325000
trusted library allocation
page read and write
16A5756F000
trusted library allocation
page read and write
16A59954000
trusted library allocation
page read and write
16A63000000
trusted library allocation
page read and write
16A58F42000
trusted library allocation
page read and write
16A53726000
trusted library allocation
page read and write
16A59326000
trusted library allocation
page read and write
2D9FE23A000
heap
page read and write
18B18B98000
heap
page read and write
16A54A75000
trusted library allocation
page read and write
16A54AF7000
trusted library allocation
page read and write
16A4E727000
heap
page read and write
16A54B7E000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A59574000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A57B8C000
trusted library allocation
page read and write
16A63665000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A621A9000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A4E75B000
heap
page read and write
16A639AC000
trusted library allocation
page read and write
16A58F42000
trusted library allocation
page read and write
16A5FB6C000
trusted library allocation
page read and write
16A599FE000
trusted library allocation
page read and write
16A59355000
trusted library allocation
page read and write
16A5C94D000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A57427000
heap
page read and write
16A5FE50000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A58A52000
trusted library allocation
page read and write
16A58A12000
trusted library allocation
page read and write
16A537AF000
trusted library allocation
page read and write
16A621A4000
trusted library allocation
page read and write
16A5FFC9000
trusted library allocation
page read and write
16A58A76000
trusted library allocation
page read and write
16A6220E000
trusted library allocation
page read and write
16A603FE000
trusted library allocation
page read and write
16A57EA0000
trusted library allocation
page read and write
16A583B4000
trusted library allocation
page read and write
16A62501000
trusted library allocation
page read and write
16A57EE0000
trusted library allocation
page read and write
16A58AB0000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A56FF9000
trusted library allocation
page read and write
530000
heap
page read and write
16A5740B000
heap
page read and write
16A58F68000
trusted library allocation
page read and write
103A000
heap
page read and write
16A4E704000
heap
page read and write
16A5756F000
trusted library allocation
page read and write
16A599F0000
trusted library allocation
page read and write
16A58EFB000
trusted library allocation
page read and write
16A592E4000
trusted library allocation
page read and write
16A57B91000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A4E72E000
heap
page read and write
16A537A3000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5FE4B000
trusted library allocation
page read and write
16A4E706000
heap
page read and write
16A57A8C000
trusted library allocation
page read and write
16A58F4B000
trusted library allocation
page read and write
16A57EA6000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E738000
heap
page read and write
16A58FA9000
trusted library allocation
page read and write
18B17E23000
trusted library allocation
page read and write
16A57AA2000
trusted library allocation
page read and write
16A5B03F000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A5F6E4000
trusted library allocation
page read and write
16A599B2000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E72E000
heap
page read and write
16A530D2000
trusted library allocation
page read and write
16A5F8E0000
trusted library allocation
page read and write
16A5934D000
trusted library allocation
page read and write
16A5FB9B000
trusted library allocation
page read and write
16A5F9DE000
trusted library allocation
page read and write
16A58BC9000
trusted library allocation
page read and write
16A5FE35000
trusted library allocation
page read and write
16A59198000
trusted library allocation
page read and write
29EE0C96000
trusted library allocation
page read and write
16A5B033000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A58AEC000
trusted library allocation
page read and write
16A49242000
heap
page read and write
16A620A8000
trusted library allocation
page read and write
16A5B037000
trusted library allocation
page read and write
18B18B7B000
heap
page read and write
16A594A8000
trusted library allocation
page read and write
16A575BE000
trusted library allocation
page read and write
16A58BE0000
trusted library allocation
page read and write
18B18AE8000
heap
page read and write
16A5CF01000
heap
page read and write
16A62557000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A4E721000
heap
page read and write
16A5A3B1000
trusted library allocation
page read and write
16A59ED6000
trusted library allocation
page read and write
16A59319000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
9A0000
unkown
page readonly
16A57E84000
trusted library allocation
page read and write
16A59E43000
trusted library allocation
page read and write
16A59443000
trusted library allocation
page read and write
18B17EC2000
trusted library allocation
page read and write
16A624AC000
trusted library allocation
page read and write
16A57427000
heap
page read and write
16A58BE2000
trusted library allocation
page read and write
16A6252C000
trusted library allocation
page read and write
29EE0A0E000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E71B000
heap
page read and write
16A5FCD9000
trusted library allocation
page read and write
16A54A4E000
trusted library allocation
page read and write
16A6225B000
trusted library allocation
page read and write
16A575CD000
trusted library allocation
page read and write
16A599C3000
trusted library allocation
page read and write
16A595A4000
trusted library allocation
page read and write
16A5947A000
trusted library allocation
page read and write
16A59725000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E75F000
heap
page read and write
18B17E65000
trusted library allocation
page read and write
16A5F9B2000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
1364341A000
trusted library allocation
page read and write
16A57520000
trusted library allocation
page read and write
16A596A6000
trusted library allocation
page read and write
16A575B8000
trusted library allocation
page read and write
16A58F0C000
trusted library allocation
page read and write
16A5492A000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5A0F7000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A57EA3000
trusted library allocation
page read and write
16A4E769000
heap
page read and write
16A57A86000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
2D9FFD37000
heap
page read and write
16A57E10000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
29EE0762000
unclassified section
page read and write
16A59DF2000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A57BFE000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A57CD9000
trusted library allocation
page read and write
16A5AFBE000
trusted library allocation
page read and write
16A5466C000
trusted library allocation
page read and write
16A5FB94000
trusted library allocation
page read and write
16A597C9000
trusted library allocation
page read and write
29EE0900000
trusted library allocation
page read and write
16A63635000
trusted library allocation
page read and write
16A5F88C000
trusted library allocation
page read and write
16A4E773000
heap
page read and write
16A4E732000
heap
page read and write
16A5A4B2000
trusted library allocation
page read and write
16A5CE65000
heap
page read and write
16A59991000
trusted library allocation
page read and write
16A54BCF000
trusted library allocation
page read and write
13643403000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A57B3B000
trusted library allocation
page read and write
16A598C8000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A58A5A000
trusted library allocation
page read and write
16A61AD7000
trusted library allocation
page read and write
16A5833F000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A58FF5000
trusted library allocation
page read and write
16A5FB12000
trusted library allocation
page read and write
16A5FB75000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5915F000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A59A25000
trusted library allocation
page read and write
16A57EA3000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A6037F000
trusted library allocation
page read and write
16A59FD0000
trusted library allocation
page read and write
16A54B85000
trusted library allocation
page read and write
16A4E713000
heap
page read and write
16A56F64000
trusted library allocation
page read and write
16A530C3000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A5998B000
trusted library allocation
page read and write
13643600000
trusted library allocation
page read and write
16A58BAB000
trusted library allocation
page read and write
2D9FE407000
trusted library allocation
page read and write
136434B6000
trusted library allocation
page read and write
16A58F31000
trusted library allocation
page read and write
16A4E75F000
heap
page read and write
16A4E71C000
heap
page read and write
16A58BF6000
trusted library allocation
page read and write
136433A6000
heap
page read and write
16A4E72E000
heap
page read and write
16A54A75000
trusted library allocation
page read and write
16A5954B000
trusted library allocation
page read and write
16A5A0EE000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
1ABED959000
heap
page read and write
16A5B0CE000
trusted library allocation
page read and write
16A56F5F000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
18B18B62000
heap
page read and write
16A4E75D000
heap
page read and write
1ABEDA00000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A5F8C0000
trusted library allocation
page read and write
16A58392000
trusted library allocation
page read and write
16A63663000
trusted library allocation
page read and write
16A58DD9000
trusted library allocation
page read and write
16A58F35000
trusted library allocation
page read and write
16A57E37000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A57EA6000
trusted library allocation
page read and write
16A58F47000
trusted library allocation
page read and write
16A620CB000
trusted library allocation
page read and write
16A6217E000
trusted library allocation
page read and write
16A583AE000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A54A75000
trusted library allocation
page read and write
16A59495000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5946A000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5914B000
trusted library allocation
page read and write
16A5F763000
trusted library allocation
page read and write
16A60360000
trusted library allocation
page read and write
16A592D5000
trusted library allocation
page read and write
16A6037F000
trusted library allocation
page read and write
16A5FED2000
trusted library allocation
page read and write
544000
heap
page read and write
16A4E702000
heap
page read and write
16A54AB2000
trusted library allocation
page read and write
16A59EF6000
trusted library allocation
page read and write
16A6037D000
trusted library allocation
page read and write
16A638F8000
trusted library allocation
page read and write
16A59205000
trusted library allocation
page read and write
16A590E2000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A62295000
trusted library allocation
page read and write
16A583FA000
trusted library allocation
page read and write
16A5996B000
trusted library allocation
page read and write
16A594D5000
trusted library allocation
page read and write
16A583C8000
trusted library allocation
page read and write
16A5B0D3000
trusted library allocation
page read and write
16A57403000
heap
page read and write
16A63BAC000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A5C90C000
trusted library allocation
page read and write
16A60323000
trusted library allocation
page read and write
16A5B087000
trusted library allocation
page read and write
16A57B49000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A5F890000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E703000
heap
page read and write
16A4E75D000
heap
page read and write
16A57EDB000
trusted library allocation
page read and write
16A59A84000
trusted library allocation
page read and write
16A63B05000
trusted library allocation
page read and write
16A583F3000
trusted library allocation
page read and write
16A5F999000
trusted library allocation
page read and write
13642FC0000
heap
page readonly
16A4E738000
heap
page read and write
16A58F31000
trusted library allocation
page read and write
16A5949C000
trusted library allocation
page read and write
16A573FD000
heap
page read and write
16A598A8000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A599FE000
trusted library allocation
page read and write
16A621AC000
trusted library allocation
page read and write
239E2871E000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A58F7E000
trusted library allocation
page read and write
16A590A7000
trusted library allocation
page read and write
16A63B50000
trusted library allocation
page read and write
16A5F73B000
trusted library allocation
page read and write
16A59369000
trusted library allocation
page read and write
FFF31FF000
stack
page read and write
29EE0A20000
trusted library allocation
page read and write
16A58B96000
trusted library allocation
page read and write
16A56F32000
trusted library allocation
page read and write
16A5AF80000
trusted library allocation
page read and write
16A599C3000
trusted library allocation
page read and write
16A58A0B000
trusted library allocation
page read and write
16A5996B000
trusted library allocation
page read and write
16A5796D000
trusted library allocation
page read and write
29EE0510000
unclassified section
page readonly
16A4E725000
heap
page read and write
18B18B31000
heap
page read and write
16A5FB7B000
trusted library allocation
page read and write
16A5FB9B000
trusted library allocation
page read and write
16A4E770000
heap
page read and write
16A54B3C000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A5FBDD000
trusted library allocation
page read and write
16A596A3000
trusted library allocation
page read and write
18B1860F000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A583F3000
trusted library allocation
page read and write
16A598B0000
trusted library allocation
page read and write
16A59596000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A4E765000
heap
page read and write
16A5FC87000
trusted library allocation
page read and write
16A5CE6E000
heap
page read and write
16A58F6E000
trusted library allocation
page read and write
13643482000
trusted library allocation
page read and write
16A5F9BE000
trusted library allocation
page read and write
16A58F4B000
trusted library allocation
page read and write
16A5F7DA000
trusted library allocation
page read and write
16A5FF32000
trusted library allocation
page read and write
18B18A49000
heap
page read and write
16A575F1000
trusted library allocation
page read and write
1033000
heap
page read and write
16A4E75D000
heap
page read and write
16A591FD000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A57EC9000
trusted library allocation
page read and write
16A622B2000
trusted library allocation
page read and write
16A58351000
trusted library allocation
page read and write
16A5FB43000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A575A5000
trusted library allocation
page read and write
16A58A94000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A575C9000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A58A92000
trusted library allocation
page read and write
FFF39FF000
stack
page read and write
16A57AA2000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E6F2000
heap
page read and write
16A58957000
trusted library allocation
page read and write
16A58B58000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A5945D000
trusted library allocation
page read and write
16A57403000
heap
page read and write
16A58BE6000
trusted library allocation
page read and write
16A4E76B000
heap
page read and write
16A58F47000
trusted library allocation
page read and write
16A5FB61000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5FE97000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A4E6EC000
heap
page read and write
16A4E74B000
heap
page read and write
16A5FB57000
trusted library allocation
page read and write
16A53775000
trusted library allocation
page read and write
16A57ED7000
trusted library allocation
page read and write
16A4E6EA000
heap
page read and write
16A5FB28000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A58A94000
trusted library allocation
page read and write
16A594D8000
trusted library allocation
page read and write
16A58F68000
trusted library allocation
page read and write
16A60341000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A5CA2C000
trusted library allocation
page read and write
18B18AA0000
heap
page read and write
16A583A8000
trusted library allocation
page read and write
16A58FB4000
trusted library allocation
page read and write
16A62265000
trusted library allocation
page read and write
16A59663000
trusted library allocation
page read and write
16A60344000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A5FB92000
trusted library allocation
page read and write
16A547C5000
trusted library allocation
page read and write
16A583E7000
trusted library allocation
page read and write
16A589AE000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A4E72E000
heap
page read and write
16A57E58000
trusted library allocation
page read and write
16A57B91000
trusted library allocation
page read and write
18B18AA0000
heap
page read and write
16A594B4000
trusted library allocation
page read and write
18B18BA9000
heap
page read and write
16A603CC000
trusted library allocation
page read and write
16A583F0000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A59963000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5949C000
trusted library allocation
page read and write
16A61AFE000
trusted library allocation
page read and write
16A54B60000
trusted library allocation
page read and write
16A5CE21000
heap
page read and write
16A5937E000
trusted library allocation
page read and write
16A5F92A000
trusted library allocation
page read and write
29EE0A11000
trusted library allocation
page read and write
16A59557000
trusted library allocation
page read and write
16A583F3000
trusted library allocation
page read and write
16A57EA0000
trusted library allocation
page read and write
16A59408000
trusted library allocation
page read and write
16A59E9C000
trusted library allocation
page read and write
16A5FAE0000
trusted library allocation
page read and write
16A62043000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A5C516000
trusted library allocation
page read and write
16A4E768000
heap
page read and write
16A599EB000
trusted library allocation
page read and write
16A599FC000
trusted library allocation
page read and write
16A59594000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A4E6EC000
heap
page read and write
16A4E76E000
heap
page read and write
16A4E6F8000
heap
page read and write
16A58F38000
trusted library allocation
page read and write
16A530EF000
trusted library allocation
page read and write
16A5FBDD000
trusted library allocation
page read and write
16A599FE000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A57BE7000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E70F000
heap
page read and write
16A5F812000
trusted library allocation
page read and write
16A4E725000
heap
page read and write
16A4E71B000
heap
page read and write
16A4E75B000
heap
page read and write
16A4E739000
heap
page read and write
16A4E75F000
heap
page read and write
B2793FE000
unkown
page readonly
16A58BF8000
trusted library allocation
page read and write
16A54A4E000
trusted library allocation
page read and write
16A4E6F2000
heap
page read and write
16A5938C000
trusted library allocation
page read and write
18B18B84000
heap
page read and write
16A5B014000
trusted library allocation
page read and write
16A5929E000
trusted library allocation
page read and write
16A6240C000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A59ED6000
trusted library allocation
page read and write
16A60323000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5FC99000
trusted library allocation
page read and write
16A59A74000
trusted library allocation
page read and write
16A4E6F8000
heap
page read and write
18B17E5C000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
16A593A6000
trusted library allocation
page read and write
16A57E9C000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5792B000
trusted library allocation
page read and write
16A61400000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A5FB96000
trusted library allocation
page read and write
16A59588000
trusted library allocation
page read and write
16A58F49000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A4E75B000
heap
page read and write
16A59391000
trusted library allocation
page read and write
16A597CC000
trusted library allocation
page read and write
16A59280000
trusted library allocation
page read and write
16A4E72B000
heap
page read and write
16A5FAF6000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A57E10000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
18B18B40000
heap
page read and write
16A599CD000
trusted library allocation
page read and write
16A58F52000
trusted library allocation
page read and write
16A530EF000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A58A78000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A4E76B000
heap
page read and write
16A59551000
trusted library allocation
page read and write
16A4E712000
heap
page read and write
16A57E53000
trusted library allocation
page read and write
16A5371E000
trusted library allocation
page read and write
16A58F10000
trusted library allocation
page read and write
16A5C9AC000
trusted library allocation
page read and write
16A5379C000
trusted library allocation
page read and write
16A4E717000
heap
page read and write
16A57ED0000
trusted library allocation
page read and write
16A58F6B000
trusted library allocation
page read and write
29EE06A0000
heap
page read and write
16A599CF000
trusted library allocation
page read and write
16A5FCEC000
trusted library allocation
page read and write
16A58BD7000
trusted library allocation
page read and write
16A5947C000
trusted library allocation
page read and write
16A57E48000
trusted library allocation
page read and write
16A4E75E000
heap
page read and write
18B18BA9000
heap
page read and write
16A575DE000
trusted library allocation
page read and write
16A5896C000
trusted library allocation
page read and write
16A575E6000
trusted library allocation
page read and write
16A599F4000
trusted library allocation
page read and write
16A599F6000
trusted library allocation
page read and write
16A599E4000
trusted library allocation
page read and write
16A599E5000
trusted library allocation
page read and write
16A4E770000
heap
page read and write
16A621AC000
trusted library allocation
page read and write
18B17E03000
trusted library allocation
page read and write
16A5F8E6000
trusted library allocation
page read and write
16A620F2000
trusted library allocation
page read and write
16A57993000
trusted library allocation
page read and write
B27947E000
unkown
page readonly
16A59432000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A5F8BE000
trusted library allocation
page read and write
16A5999C000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A4E6FD000
heap
page read and write
16A57ED0000
trusted library allocation
page read and write
16A4E71F000
heap
page read and write
16A57AA2000
trusted library allocation
page read and write
16A56F19000
trusted library allocation
page read and write
544000
heap
page read and write
16A5FEA4000
trusted library allocation
page read and write
16A61A58000
trusted library allocation
page read and write
16A58308000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A58BB5000
trusted library allocation
page read and write
1055000
heap
page read and write
16A58F2B000
trusted library allocation
page read and write
16A596FD000
trusted library allocation
page read and write
16A60341000
trusted library allocation
page read and write
16A58BF8000
trusted library allocation
page read and write
9A1000
unkown
page execute read
16A4E733000
heap
page read and write
16A575F0000
trusted library allocation
page read and write
16A5B0CE000
trusted library allocation
page read and write
16A575E2000
trusted library allocation
page read and write
16A61A8F000
trusted library allocation
page read and write
16A5F846000
trusted library allocation
page read and write
16A5FB06000
trusted library allocation
page read and write
16A5FB69000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
904000
heap
page read and write
16A5C542000
trusted library allocation
page read and write
16A58A8B000
trusted library allocation
page read and write
16A5B00C000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A57506000
trusted library allocation
page read and write
16A58F3E000
trusted library allocation
page read and write
18B18B6D000
heap
page read and write
16A594D8000
trusted library allocation
page read and write
16A58B7A000
trusted library allocation
page read and write
16A57EEC000
trusted library allocation
page read and write
16A583C8000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
13642FD3000
heap
page read and write
16A58325000
trusted library allocation
page read and write
16A575E2000
trusted library allocation
page read and write
16A59A52000
trusted library allocation
page read and write
16A58A94000
trusted library allocation
page read and write
16A5A46D000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A547E2000
trusted library allocation
page read and write
16A593D6000
trusted library allocation
page read and write
29EE0770000
heap
page read and write
16A5B0FD000
trusted library allocation
page read and write
18B17A90000
unclassified section
page readonly
16A58F3E000
trusted library allocation
page read and write
16A58F36000
trusted library allocation
page read and write
239E28724000
trusted library allocation
page read and write
16A57EE4000
trusted library allocation
page read and write
16A57EAA000
trusted library allocation
page read and write
16A53766000
trusted library allocation
page read and write
16A54B4A000
trusted library allocation
page read and write
16A597F5000
trusted library allocation
page read and write
16A56F84000
trusted library allocation
page read and write
16A5A464000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A58398000
trusted library allocation
page read and write
16A58F86000
trusted library allocation
page read and write
16A592BA000
trusted library allocation
page read and write
16A57EA6000
trusted library allocation
page read and write
16A57B9F000
trusted library allocation
page read and write
104B000
heap
page read and write
16A592EB000
trusted library allocation
page read and write
16A58DB8000
trusted library allocation
page read and write
16A598DF000
trusted library allocation
page read and write
16A573FB000
heap
page read and write
13643603000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A4E773000
heap
page read and write
16A4E74B000
heap
page read and write
29EE0C6E000
trusted library allocation
page read and write
29EE0C12000
trusted library allocation
page read and write
16A58F45000
trusted library allocation
page read and write
16A575E2000
trusted library allocation
page read and write
16A53718000
trusted library allocation
page read and write
B2760EE000
unkown
page readonly
16A603E5000
trusted library allocation
page read and write
16A5FB26000
trusted library allocation
page read and write
16A5FE44000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A622E4000
trusted library allocation
page read and write
18B18390000
heap
page read and write
16A5C9E4000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E738000
heap
page read and write
16A54BC8000
trusted library allocation
page read and write
16A4923A000
heap
page read and write
16A58FB7000
trusted library allocation
page read and write
16A5FCA4000
trusted library allocation
page read and write
16A5FB9D000
trusted library allocation
page read and write
16A58F4B000
trusted library allocation
page read and write
16A5B093000
trusted library allocation
page read and write
16A63E3B000
trusted library allocation
page read and write
16A59198000
trusted library allocation
page read and write
16A59432000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A575C7000
trusted library allocation
page read and write
16A636DF000
trusted library allocation
page read and write
16A57E96000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A621DE000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E72E000
heap
page read and write
16A5FE38000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A58ACF000
trusted library allocation
page read and write
FFF11FF000
stack
page read and write
16A593A2000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A58B9C000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
136434A9000
trusted library allocation
page read and write
16A58B51000
trusted library allocation
page read and write
16A58AEC000
trusted library allocation
page read and write
16A575C7000
trusted library allocation
page read and write
16A58373000
trusted library allocation
page read and write
16A589D2000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A591B6000
trusted library allocation
page read and write
16A58375000
trusted library allocation
page read and write
16A57B3B000
trusted library allocation
page read and write
16A59345000
trusted library allocation
page read and write
16A592F8000
trusted library allocation
page read and write
16A59470000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E719000
heap
page read and write
16A54BA0000
trusted library allocation
page read and write
16A591A6000
trusted library allocation
page read and write
16A57E0C000
trusted library allocation
page read and write
16A58F1E000
trusted library allocation
page read and write
16A622A1000
trusted library allocation
page read and write
16A5FFD1000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A4E719000
heap
page read and write
16A4E721000
heap
page read and write
16A5B09A000
trusted library allocation
page read and write
16A597FA000
trusted library allocation
page read and write
16A547B2000
trusted library allocation
page read and write
16A4E71B000
heap
page read and write
18B18B31000
heap
page read and write
16A62443000
trusted library allocation
page read and write
16A4E732000
heap
page read and write
16A4E718000
heap
page read and write
16A593A4000
trusted library allocation
page read and write
16A57A86000
trusted library allocation
page read and write
16A4E729000
heap
page read and write
16A58BAB000
trusted library allocation
page read and write
16A5FEBD000
trusted library allocation
page read and write
16A5741D000
heap
page read and write
16A5B05B000
trusted library allocation
page read and write
16A58DD5000
trusted library allocation
page read and write
16A579F5000
trusted library allocation
page read and write
16A575C6000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
18B17CD0000
heap
page readonly
16A4E70F000
heap
page read and write
16A60337000
trusted library allocation
page read and write
16A61A44000
trusted library allocation
page read and write
16A58F7C000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A4E732000
heap
page read and write
16A4E709000
heap
page read and write
16A4E71C000
heap
page read and write
16A4E75B000
heap
page read and write
16A598AE000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A57EA0000
trusted library allocation
page read and write
16A5FB7A000
trusted library allocation
page read and write
29EE0760000
unclassified section
page read and write
16A4E725000
heap
page read and write
16A599FC000
trusted library allocation
page read and write
16A6391D000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
18B18AA0000
heap
page read and write
16A623A3000
trusted library allocation
page read and write
16A537A3000
trusted library allocation
page read and write
1ABEDB00000
trusted library allocation
page read and write
16A58BE0000
trusted library allocation
page read and write
16A59432000
trusted library allocation
page read and write
29EE0C47000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
B279CFE000
stack
page read and write
16A4E738000
heap
page read and write
16A57A8A000
trusted library allocation
page read and write
16A5FE48000
trusted library allocation
page read and write
16A595AD000
trusted library allocation
page read and write
16A593B0000
trusted library allocation
page read and write
3534C3E000
stack
page read and write
16A59564000
trusted library allocation
page read and write
16A591E8000
trusted library allocation
page read and write
16A57EA5000
trusted library allocation
page read and write
16A594F0000
trusted library allocation
page read and write
16A57414000
heap
page read and write
29EE0583000
remote allocation
page execute read
16A4E71B000
heap
page read and write
16A4E72A000
heap
page read and write
16A4E76D000
heap
page read and write
16A598CE000
trusted library allocation
page read and write
16A4E76E000
heap
page read and write
16A4E75D000
heap
page read and write
16A59434000
trusted library allocation
page read and write
16A57ED8000
trusted library allocation
page read and write
16A4E713000
heap
page read and write
16A4E72E000
heap
page read and write
16A5741D000
heap
page read and write
18B18AA0000
heap
page read and write
16A599EF000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A57EA0000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A594CA000
trusted library allocation
page read and write
16A5999D000
trusted library allocation
page read and write
16A54B63000
trusted library allocation
page read and write
16A4E70A000
heap
page read and write
16A59351000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5908C000
trusted library allocation
page read and write
16A4E6EE000
heap
page read and write
16A5AFB7000
trusted library allocation
page read and write
16A5FB10000
trusted library allocation
page read and write
16A58BB8000
trusted library allocation
page read and write
16A58BED000
trusted library allocation
page read and write
16A59596000
trusted library allocation
page read and write
16A59EEF000
trusted library allocation
page read and write
16A4E6EC000
heap
page read and write
16A57A9C000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A5FB96000
trusted library allocation
page read and write
16A5971B000
trusted library allocation
page read and write
16A58F38000
trusted library allocation
page read and write
16A58AA8000
trusted library allocation
page read and write
16A5C9C5000
trusted library allocation
page read and write
16A57428000
heap
page read and write
16A5FBCF000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A5AFEA000
trusted library allocation
page read and write
16A57EF4000
trusted library allocation
page read and write
16A4E719000
heap
page read and write
16A57AA2000
trusted library allocation
page read and write
16A59326000
trusted library allocation
page read and write
16A5FB82000
trusted library allocation
page read and write
16A58F2B000
trusted library allocation
page read and write
16A58309000
trusted library allocation
page read and write
16A59978000
trusted library allocation
page read and write
E5E000
stack
page read and write
16A598B5000
trusted library allocation
page read and write
16A5C5C7000
trusted library allocation
page read and write
29EE0D00000
heap
page read and write
16A583B4000
trusted library allocation
page read and write
16A639B6000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A594E5000
trusted library allocation
page read and write
16A5378D000
trusted library allocation
page read and write
29EE0CA6000
trusted library allocation
page read and write
13642FF0000
heap
page read and write
16A4E75B000
heap
page read and write
16A63673000
trusted library allocation
page read and write
16A589F5000
trusted library allocation
page read and write
FFF19FE000
stack
page read and write
29EE0C67000
trusted library allocation
page read and write
16A59958000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A5B0F1000
trusted library allocation
page read and write
16A4E765000
heap
page read and write
16A5376A000
trusted library allocation
page read and write
16A58F6E000
trusted library allocation
page read and write
16A537E4000
trusted library allocation
page read and write
16A59950000
trusted library allocation
page read and write
16A583A6000
trusted library allocation
page read and write
16A59555000
trusted library allocation
page read and write
16A4E76B000
heap
page read and write
36F0000
heap
page read and write
16A621F0000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
18B18A41000
heap
page read and write
29EE0CB7000
trusted library allocation
page read and write
21CF1FC000
stack
page read and write
16A4E75B000
heap
page read and write
16A4E72E000
heap
page read and write
16A5C948000
trusted library allocation
page read and write
16A5511D000
trusted library allocation
page read and write
18B17EB2000
trusted library allocation
page read and write
16A579B8000
trusted library allocation
page read and write
16A58F35000
trusted library allocation
page read and write
16A592EB000
trusted library allocation
page read and write
16A57E98000
trusted library allocation
page read and write
16A5742E000
heap
page read and write
16A59180000
trusted library allocation
page read and write
16A58BCD000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A592EB000
trusted library allocation
page read and write
18B18B26000
heap
page read and write
16A636D3000
trusted library allocation
page read and write
16A56FF2000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E72E000
heap
page read and write
16A57E5B000
trusted library allocation
page read and write
16A5A0D3000
trusted library allocation
page read and write
104B000
heap
page read and write
16A4E739000
heap
page read and write
29EE0C5D000
trusted library allocation
page read and write
16A589C3000
trusted library allocation
page read and write
B2761EE000
unkown
page readonly
16A4E70A000
heap
page read and write
16A6036A000
trusted library allocation
page read and write
16A5FECB000
trusted library allocation
page read and write
16A4E72E000
heap
page read and write
16A58F7C000
trusted library allocation
page read and write
16A4E704000
heap
page read and write
16A58F79000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A4E71B000
heap
page read and write
4BA000
stack
page read and write
16A575A7000
trusted library allocation
page read and write
16A589B6000
trusted library allocation
page read and write
2A1BD221000
trusted library allocation
page execute read
16A4E74B000
heap
page read and write
16A58F3F000
trusted library allocation
page read and write
16A5947D000
trusted library allocation
page read and write
16A57ED9000
trusted library allocation
page read and write
16A58AC3000
trusted library allocation
page read and write
16A59979000
trusted library allocation
page read and write
16A58A92000
trusted library allocation
page read and write
16A58F52000
trusted library allocation
page read and write
16A57569000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A57ACB000
trusted library allocation
page read and write
16A589D0000
trusted library allocation
page read and write
16A59454000
trusted library allocation
page read and write
16A4E75B000
heap
page read and write
16A596A9000
trusted library allocation
page read and write
16A57413000
heap
page read and write
16A579B2000
trusted library allocation
page read and write
16A57E94000
trusted library allocation
page read and write
16A59DFA000
trusted library allocation
page read and write
16A5CE8A000
heap
page read and write
16A4E724000
heap
page read and write
16A4E732000
heap
page read and write
18B17E89000
trusted library allocation
page read and write
16A599DE000
trusted library allocation
page read and write
18B18B31000
heap
page read and write
16A58BA6000
trusted library allocation
page read and write
16A621A2000
trusted library allocation
page read and write
16A4E723000
heap
page read and write
16A4E75D000
heap
page read and write
16A59454000
trusted library allocation
page read and write
16A599B9000
trusted library allocation
page read and write
16A4E72A000
heap
page read and write
16A573FD000
heap
page read and write
16A54A75000
trusted library allocation
page read and write
16A58B4D000
trusted library allocation
page read and write
16A57427000
heap
page read and write
29EE0790000
unclassified section
page readonly
16A4E6F2000
heap
page read and write
16A5FCC3000
trusted library allocation
page read and write
18B17E00000
trusted library allocation
page read and write
16A622C6000
trusted library allocation
page read and write
16A599E7000
trusted library allocation
page read and write
16A621DE000
trusted library allocation
page read and write
16A593A4000
trusted library allocation
page read and write
16A5A5F5000
trusted library allocation
page read and write
16A591E5000
trusted library allocation
page read and write
16A58F79000
trusted library allocation
page read and write
16A547F2000
trusted library allocation
page read and write
16A5933B000
trusted library allocation
page read and write
16A59590000
trusted library allocation
page read and write
16A57ACB000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5F997000
trusted library allocation
page read and write
16A593AB000
trusted library allocation
page read and write
16A4E720000
heap
page read and write
16A4E6FC000
heap
page read and write
16A59AB7000
trusted library allocation
page read and write
16A594D8000
trusted library allocation
page read and write
16A575CD000
trusted library allocation
page read and write
16A597D5000
trusted library allocation
page read and write
16A5F9D0000
trusted library allocation
page read and write
103B000
heap
page read and write
16A5FBD7000
trusted library allocation
page read and write
16A4E75D000
heap
page read and write
16A4E738000
heap
page read and write
16A537D0000
trusted library allocation
page read and write
16A57EE1000
trusted library allocation
page read and write
18B184B0000
trusted library allocation
page read and write
16A57A9C000
trusted library allocation
page read and write
16A63E0F000
trusted library allocation
page read and write
16A6036A000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A599F6000
trusted library allocation
page read and write
1364340C000
trusted library allocation
page read and write
16A5AF68000
trusted library allocation
page read and write
16A58FF5000
trusted library allocation
page read and write
16A5F82E000
trusted library allocation
page read and write
18B17B0C000
remote allocation
page execute read
16A5A5FB000
trusted library allocation
page read and write
16A4E731000
heap
page read and write
16A594F9000
trusted library allocation
page read and write
16A5938C000
trusted library allocation
page read and write
16A599D5000
trusted library allocation
page read and write
A3C000
unkown
page readonly
16A599A7000
trusted library allocation
page read and write
16A5797E000
trusted library allocation
page read and write
16A596A9000
trusted library allocation
page read and write
16A5792B000
trusted library allocation
page read and write
16A6244D000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A5C905000
trusted library allocation
page read and write
16A4E70F000
heap
page read and write
16A4E70A000
heap
page read and write
18B18B3D000
heap
page read and write
16A58F47000
trusted library allocation
page read and write
16A5F7A0000
trusted library allocation
page read and write
16A5AF42000
trusted library allocation
page read and write
16A6224E000
trusted library allocation
page read and write
16A58A78000
trusted library allocation
page read and write
16A6246D000
trusted library allocation
page read and write
16A63E24000
trusted library allocation
page read and write
16A4E76B000
heap
page read and write
16A5FBDB000
trusted library allocation
page read and write
16A57ED0000
trusted library allocation
page read and write
16A5740B000
heap
page read and write
16A4E75B000
heap
page read and write
16A5B02F000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A5FBEA000
trusted library allocation
page read and write
16A57980000
trusted library allocation
page read and write
16A4E74B000
heap
page read and write
16A5915B000
trusted library allocation
page read and write
18B18B3D000
heap
page read and write
16A639C1000
trusted library allocation
page read and write
16A59FAA000
trusted library allocation
page read and write
16A58B8B000
trusted library allocation
page read and write
16A4E713000
heap
page read and write
16A5F6D8000
trusted library allocation
page read and write
16A4E738000
heap
page read and write
16A4E731000
heap
page read and write
16A57A62000
trusted library allocation
page read and write
18B18A9C000
heap
page read and write
16A58A11000
trusted library allocation
page read and write
16A57B94000
trusted library allocation
page read and write
16A63667000
trusted library allocation
page read and write
16A4E702000
heap
page read and write
16A58F6B000
trusted library allocation
page read and write
29EE0BC6000
heap
page read and write
16A54A98000
trusted library allocation
page read and write
16A589AB000
trusted library allocation
page read and write
16A58F47000
trusted library allocation
page read and write
16A583BB000
trusted library allocation
page read and write
16A57EC9000
trusted library allocation
page read and write
16A57A5C000
trusted library allocation
page read and write
16A599C1000
trusted library allocation
page read and write
16A636DD000
trusted library allocation
page read and write
29EE0A00000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A4E738000
heap
page read and write
16A60369000
trusted library allocation
page read and write
16A5AF48000
trusted library allocation
page read and write
16A58ECE000
trusted library allocation
page read and write
16A583EB000
trusted library allocation
page read and write
16A5F98F000
trusted library allocation
page read and write
16A5FEFA000
trusted library allocation
page read and write
16A4E739000
heap
page read and write
16A4E719000
heap
page read and write
16A5B0FD000
trusted library allocation
page read and write
16A59240000
trusted library allocation
page read and write
16A4E721000
heap
page read and write
16A54B5B000
trusted library allocation
page read and write
16A58F3E000
trusted library allocation
page read and write
16A599E4000
trusted library allocation
page read and write
16A5C9A7000
trusted library allocation
page read and write
16A5FB6E000
trusted library allocation
page read and write
16A57EA0000
trusted library allocation
page read and write
There are 3801 hidden memdumps, click here to show them.