IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000489001\9b7d422018.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000490001\a4769912c1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000491001\48bf814d33.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000492001\7617eef03d.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000493001\20b68761b3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000494001\572c19a989.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000495001\66c6d84346.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000496001\768041f87c.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\2SGVUOBNN8HUJ5IDUWDR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\4V88JM9ZW2IZ0ZQGW7B.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9ZQAVS2HIFCJRZ8VYRAJ0X35HFUX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\B9LAVL77AEHW335N4SC7G6A3335WY1I.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\GA69253C3MXNERTO3N2QC0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\KGMUJDGOAL6LWD7UD45LIZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\OCYPTLCO9AJSRPZ2BR0OXVLD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\PNQRGRK1HGQJXXIGW87D2O4ERYK64Y.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\TWGY675O6RDQPKG6OE4IM311M9A2JP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_e85b81c8-18b4-4550-809a-85196b54f80a.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_e85b81c8-18b4-4550-809a-85196b54f80a.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
There are 46 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\KGMUJDGOAL6LWD7UD45LIZ.exe
"C:\Users\user\AppData\Local\Temp\KGMUJDGOAL6LWD7UD45LIZ.exe"
malicious
C:\Users\user\AppData\Local\Temp\2SGVUOBNN8HUJ5IDUWDR.exe
"C:\Users\user\AppData\Local\Temp\2SGVUOBNN8HUJ5IDUWDR.exe"
malicious
C:\Users\user\AppData\Local\Temp\4V88JM9ZW2IZ0ZQGW7B.exe
"C:\Users\user\AppData\Local\Temp\4V88JM9ZW2IZ0ZQGW7B.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000489001\9b7d422018.exe
"C:\Users\user\AppData\Local\Temp\1000489001\9b7d422018.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000490001\a4769912c1.exe
"C:\Users\user\AppData\Local\Temp\1000490001\a4769912c1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000491001\48bf814d33.exe
"C:\Users\user\AppData\Local\Temp\1000491001\48bf814d33.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000489001\9b7d422018.exe
"C:\Users\user\AppData\Local\Temp\1000489001\9b7d422018.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000492001\7617eef03d.exe
"C:\Users\user\AppData\Local\Temp\1000492001\7617eef03d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000493001\20b68761b3.exe
"C:\Users\user\AppData\Local\Temp\1000493001\20b68761b3.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000490001\a4769912c1.exe
"C:\Users\user\AppData\Local\Temp\1000490001\a4769912c1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000494001\572c19a989.exe
"C:\Users\user\AppData\Local\Temp\1000494001\572c19a989.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000495001\66c6d84346.exe
"C:\Users\user\AppData\Local\Temp\1000495001\66c6d84346.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000491001\48bf814d33.exe
"C:\Users\user\AppData\Local\Temp\1000491001\48bf814d33.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000496001\768041f87c.exe
"C:\Users\user\AppData\Local\Temp\1000496001\768041f87c.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000492001\7617eef03d.exe
"C:\Users\user\AppData\Local\Temp\1000492001\7617eef03d.exe"
malicious
C:\Users\user\AppData\Local\Temp\GA69253C3MXNERTO3N2QC0.exe
"C:\Users\user\AppData\Local\Temp\GA69253C3MXNERTO3N2QC0.exe"
malicious
C:\Users\user\AppData\Local\Temp\OCYPTLCO9AJSRPZ2BR0OXVLD.exe
"C:\Users\user\AppData\Local\Temp\OCYPTLCO9AJSRPZ2BR0OXVLD.exe"
malicious
C:\Users\user\AppData\Local\Temp\TWGY675O6RDQPKG6OE4IM311M9A2JP.exe
"C:\Users\user\AppData\Local\Temp\TWGY675O6RDQPKG6OE4IM311M9A2JP.exe"
malicious
C:\Users\user\AppData\Local\Temp\PNQRGRK1HGQJXXIGW87D2O4ERYK64Y.exe
"C:\Users\user\AppData\Local\Temp\PNQRGRK1HGQJXXIGW87D2O4ERYK64Y.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd325a87-00e5-47e5-97be-85b91655ce72} 7760 "\\.\pipe\gecko-crash-server-pipe.7760" 16c7b66d510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4384 -parentBuildID 20230927232528 -prefsHandle 4408 -prefMapHandle 4404 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {812b1425-1beb-4690-8e96-5eb9044b2442} 7760 "\\.\pipe\gecko-crash-server-pipe.7760" 16c0d743810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5236 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4c456b6-f245-4b72-bb46-8227423c5a93} 7760 "\\.\pipe\gecko-crash-server-pipe.7760" 16c133cf110 utility
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.37/e2b1563c6670f193.phpv
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpa
unknown
malicious
dissapoiznw.store
malicious
http://185.215.113.37/e2b1563c6670f193.phpi
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phph
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
http://185.215.113.37CDDG
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpWindows
unknown
malicious
http://185.215.113.37/e2b1563c6670f193.phpLe
unknown
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
http://185.215.113.37/e2b1563c6670f193.phpp3
unknown
malicious
http://185.215.113.37
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://detectportal.firefox.com/
unknown
https://www.cloudflare.com/learning/acces
unknown
https://sergei-esenin.com/
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://185.215.113.16/steam/random.exe1395d7d2
unknown
https://sergei-esenin.com/Pu
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://github.com/mozilla-services/screenshots
unknown
https://steamcommunity.com/profiles/76561199724331900u
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://sergei-esenin.com/api4B
unknown
http://exslt.org/common
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
http://exslt.org/dates-and-times
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://checkout.steampowered.com/
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://www.iqiyi.com/
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://help.steampowered.com/en/
unknown
http://185.215.113.16/well/random.exeo
unknown
https://sergei-esenin.com/Ua
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://steamcommunity.com/workshop/
unknown
https://steamcommunity.com/6
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://identity.mozilla.com/apps/relay
unknown
https://steamcommunity.com/5
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://www.wykop.pl/
unknown
https://steamcommunity.com
unknown
https://www.olx.pl/
unknown
https://support.mozilla.org/
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://www.google.com/complete/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd883ccb3237fa39
unknown
https://api.steampowered.com/
unknown
https://monitor.firefox.com/
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
https://store.steampowered.com/mobile
unknown
https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
unknown
https://www.avito.ru/
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
unknown
https://spocs.getpocket.com
unknown
https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windows
unknown
https://www.cloudflare.com/learniMM
unknown
https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
http://www.videolan.org/x264.html
unknown
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://firefox-api-proxy.cdn.mozilla.net/
unknown
https://firefox-source-docs.mozilla.org/performance/scroll-linked_effects.html
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
172.67.206.204
malicious
steamcommunity.com
104.102.49.254
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.46
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.206.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 31 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
172.67.206.204
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious
142.250.186.46
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
185.215.113.16
unknown
Portugal
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 7 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9b7d422018.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
a4769912c1.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
48bf814d33.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
7617eef03d.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
20b68761b3.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
572c19a989.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
66c6d84346.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
768041f87c.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D81000
unkown
page execute and read and write
malicious
611000
unkown
page execute and read and write
malicious
4CF0000
direct allocation
page read and write
malicious
F7E000
heap
page read and write
malicious
5480000
direct allocation
page read and write
malicious
311000
unkown
page execute and read and write
malicious
EC1000
unkown
page execute and read and write
malicious
4CE0000
direct allocation
page read and write
malicious
4AD0000
direct allocation
page read and write
malicious
611000
unkown
page execute and read and write
malicious
451000
unkown
page execute and read and write
malicious
5120000
direct allocation
page read and write
malicious
F4E000
heap
page read and write
malicious
B7E000
heap
page read and write
malicious
5320000
direct allocation
page read and write
malicious
4E10000
direct allocation
page read and write
malicious
6BB000
heap
page read and write
malicious
4DE0000
direct allocation
page read and write
malicious
EC1000
unkown
page execute and read and write
malicious
4DB0000
direct allocation
page read and write
malicious
4D90000
direct allocation
page read and write
malicious
5C7D000
trusted library allocation
page read and write
16C7D347000
heap
page read and write
D50000
direct allocation
page read and write
1090000
heap
page read and write
7D4000
heap
page read and write
16C13774000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C085BB000
trusted library allocation
page read and write
13F7000
heap
page read and write
16C7D324000
heap
page read and write
4861000
heap
page read and write
D74000
heap
page read and write
591D000
trusted library allocation
page read and write
115B000
heap
page read and write
4981000
heap
page read and write
16C7D388000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C15AD8000
trusted library allocation
page read and write
16C0C7BC000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
1094000
heap
page read and write
1030000
direct allocation
page read and write
545A000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
16C7D33C000
heap
page read and write
5600000
direct allocation
page execute and read and write
16C0AFF2000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D331000
heap
page read and write
5376000
trusted library allocation
page read and write
45A1000
heap
page read and write
16C0CAEF000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
1D2CD000
stack
page read and write
16C7D388000
heap
page read and write
D74000
heap
page read and write
16C7D360000
heap
page read and write
58BB000
trusted library allocation
page read and write
1380000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D357000
heap
page read and write
7D4000
heap
page read and write
C5F000
heap
page read and write
16C7D388000
heap
page read and write
C90000
direct allocation
page read and write
4C15000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
4871000
heap
page read and write
5CD2000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
338E000
stack
page read and write
4651000
heap
page read and write
16C1502E000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0AF9E000
trusted library allocation
page read and write
13B9000
heap
page read and write
B5C000
stack
page read and write
13DA000
heap
page read and write
16C0C7D1000
trusted library allocation
page read and write
16C0C732000
trusted library allocation
page read and write
D74000
heap
page read and write
1CEDE000
stack
page read and write
16C0C84C000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
16C7F511000
trusted library allocation
page read and write
48AD000
trusted library allocation
page read and write
679000
unkown
page write copy
53B1000
trusted library allocation
page read and write
1094000
heap
page read and write
1CE9F000
stack
page read and write
5BB2000
trusted library allocation
page read and write
4A56000
trusted library allocation
page read and write
705000
heap
page read and write
13A3000
heap
page read and write
16C7F5DA000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7F5B5000
trusted library allocation
page read and write
475E000
stack
page read and write
16C7D324000
heap
page read and write
50D000
unkown
page execute and read and write
16C7D33C000
heap
page read and write
541F000
trusted library allocation
page read and write
16C1391A000
trusted library allocation
page read and write
16C0D8EE000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
5CB4000
trusted library allocation
page read and write
36DF000
stack
page read and write
16C0B23F000
trusted library allocation
page read and write
355F000
stack
page read and write
53A4000
trusted library allocation
page read and write
16C0C4FD000
trusted library allocation
page read and write
D74000
heap
page read and write
16C085E1000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
16C08ACF000
trusted library allocation
page read and write
4271000
heap
page read and write
16C7D357000
heap
page read and write
7D4000
heap
page read and write
16C7D35A000
heap
page read and write
16C7D332000
heap
page read and write
5665000
trusted library allocation
page read and write
116B000
heap
page read and write
784000
heap
page read and write
4871000
heap
page read and write
16C7D324000
heap
page read and write
7DE000
unkown
page execute and read and write
16C7D32D000
heap
page read and write
16C16FD1000
trusted library allocation
page read and write
378E000
stack
page read and write
4871000
heap
page read and write
16C137B2000
trusted library allocation
page read and write
16C0C7CB000
trusted library allocation
page read and write
16C0DDF7000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
5640000
direct allocation
page execute and read and write
16C7D360000
heap
page read and write
594C000
trusted library allocation
page read and write
16C138DC000
trusted library allocation
page read and write
1094000
heap
page read and write
2A1000
unkown
page execute and write copy
16C13BC5000
trusted library allocation
page read and write
16C7FBB4000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C15057000
trusted library allocation
page read and write
E04000
heap
page read and write
5384000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
16C7D388000
heap
page read and write
114F000
heap
page read and write
16C0C7D1000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C13B3A000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4910000
direct allocation
page read and write
16C0DDCB000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D35C000
heap
page read and write
13B3000
heap
page read and write
13BA000
heap
page read and write
4861000
heap
page read and write
16C7D35A000
heap
page read and write
54FA000
trusted library allocation
page read and write
16C0CED2000
trusted library allocation
page read and write
359E000
stack
page read and write
5C7D000
trusted library allocation
page read and write
350E000
stack
page read and write
16C7D345000
heap
page read and write
537D000
trusted library allocation
page read and write
16C0CBF9000
trusted library allocation
page read and write
16C0C6B3000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
91A000
unkown
page execute and read and write
53AA000
trusted library allocation
page read and write
16C1388F000
trusted library allocation
page read and write
16C137CD000
trusted library allocation
page read and write
16C0C4B9000
trusted library allocation
page read and write
2D00000
heap
page read and write
16C0CBFD000
trusted library allocation
page read and write
58C4000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4651000
heap
page read and write
16C13790000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
13EA000
heap
page read and write
16C7D345000
heap
page read and write
594C000
trusted library allocation
page read and write
690000
direct allocation
page read and write
45DF000
stack
page read and write
17F0000
heap
page read and write
31DF000
stack
page read and write
16C0ED8F000
trusted library allocation
page read and write
16C0EA41000
trusted library allocation
page read and write
461E000
stack
page read and write
378E000
stack
page read and write
5662000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
16C0CB65000
trusted library allocation
page read and write
16C08AF5000
trusted library allocation
page read and write
16C13469000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
5386000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
4C91000
heap
page read and write
4621000
heap
page read and write
D77000
heap
page read and write
16C7D356000
heap
page read and write
5384000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
16C0CED0000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
45A1000
heap
page read and write
5CC5000
trusted library allocation
page read and write
272000
unkown
page readonly
16C7D38D000
heap
page read and write
16C7D360000
heap
page read and write
16C0C74C000
trusted library allocation
page read and write
284B2307000
trusted library allocation
page read and write
16C0DDD0000
trusted library allocation
page read and write
16C13BFB000
trusted library allocation
page read and write
16C0DDD0000
trusted library allocation
page read and write
3D1F000
stack
page read and write
15C0000
direct allocation
page read and write
16C0EACA000
trusted library allocation
page read and write
16C133B9000
trusted library allocation
page read and write
16C134BD000
trusted library allocation
page read and write
16C7FA23000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D31E000
heap
page read and write
16C0C0E8000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
D74000
heap
page read and write
1176000
heap
page read and write
16C0C4FD000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0CA74000
trusted library allocation
page read and write
C6B000
heap
page read and write
4C91000
heap
page read and write
53BB000
trusted library allocation
page read and write
EC0000
unkown
page readonly
16C13BFB000
trusted library allocation
page read and write
16C7F451000
trusted library allocation
page read and write
16C7D329000
heap
page read and write
D75000
heap
page read and write
16C7D360000
heap
page read and write
480E000
stack
page read and write
16C7D35C000
heap
page read and write
16C7D324000
heap
page read and write
C90000
direct allocation
page read and write
338F000
stack
page read and write
53BB000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D380000
heap
page read and write
593B000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
5609000
stack
page read and write
5C93000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C7D357000
heap
page read and write
16C0EDA9000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
26808031000
heap
page read and write
4971000
heap
page read and write
690000
direct allocation
page read and write
CB4000
heap
page read and write
4651000
heap
page read and write
39CE000
stack
page read and write
16C0C4F1000
trusted library allocation
page read and write
1100000
heap
page read and write
16C7D360000
heap
page read and write
16C0C7BC000
trusted library allocation
page read and write
F1E000
stack
page read and write
D74000
heap
page read and write
5BB7000
trusted library allocation
page read and write
784000
heap
page read and write
16C7D324000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C16737000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
4FDF000
stack
page read and write
16C0CA96000
trusted library allocation
page read and write
16C0DD15000
trusted library allocation
page read and write
16C0D9B9000
trusted library allocation
page read and write
126F000
stack
page read and write
49DE000
stack
page read and write
16C7D350000
heap
page read and write
1371000
heap
page read and write
16C08E6A000
trusted library allocation
page read and write
16C0EA9E000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
16C7D34F000
heap
page read and write
44DE000
stack
page read and write
5D8F000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7FBB4000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C084FA000
trusted library allocation
page read and write
16C15A3A000
trusted library allocation
page read and write
4861000
heap
page read and write
268080B7000
heap
page read and write
16C7D35A000
heap
page read and write
16C1344C000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
5CAB000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
4390000
direct allocation
page read and write
29CB000
stack
page read and write
16C7D380000
heap
page read and write
9565000
heap
page read and write
16C0C82B000
trusted library allocation
page read and write
16C7D340000
heap
page read and write
16C0C724000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C7D354000
heap
page read and write
364E000
stack
page read and write
16C7D35C000
heap
page read and write
D3F000
stack
page read and write
16C7D345000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C08AFE000
trusted library allocation
page read and write
16C13464000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
5C90000
trusted library allocation
page read and write
16C0B3B9000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
16C0DFAF000
trusted library allocation
page read and write
16C7D326000
heap
page read and write
16C13BF5000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7FB7E000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C16488000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
110A000
unkown
page execute and read and write
16C1398A000
trusted library allocation
page read and write
16C0C85A000
trusted library allocation
page read and write
16C0C4D3000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0D8A1000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C137F1000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
D74000
heap
page read and write
C71000
heap
page read and write
16C7D380000
heap
page read and write
16C7D351000
heap
page read and write
17DF000
heap
page read and write
1D2EE000
stack
page read and write
81B000
unkown
page execute and write copy
1E4000
heap
page read and write
6FB000
heap
page read and write
16C0CB77000
trusted library allocation
page read and write
537A000
trusted library allocation
page read and write
16C164D0000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C0DEE8000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C7D33C000
heap
page read and write
16C7D38D000
heap
page read and write
5354000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
4871000
heap
page read and write
5679000
trusted library allocation
page read and write
16C0E961000
trusted library allocation
page read and write
16C7F52D000
trusted library allocation
page read and write
16C13456000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
26808026000
heap
page read and write
C6E000
heap
page read and write
16C7D357000
heap
page read and write
1094000
heap
page read and write
16C0C749000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C0B3A7000
trusted library allocation
page read and write
16C08475000
trusted library allocation
page read and write
16C086BE000
trusted library allocation
page read and write
16C08E6A000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
17E7000
heap
page read and write
16C0CAE4000
trusted library allocation
page read and write
5F7A000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
1398000
heap
page read and write
4871000
heap
page read and write
16C0AFBB000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0BBF0000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0C86F000
trusted library allocation
page read and write
5480000
direct allocation
page read and write
4861000
heap
page read and write
4790000
direct allocation
page read and write
16C1376B000
trusted library allocation
page read and write
268080AC000
heap
page read and write
4871000
heap
page read and write
53F3000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0BBF5000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0CA66000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
593C000
trusted library allocation
page read and write
1D5DD000
stack
page read and write
461E000
stack
page read and write
16C7D32E000
heap
page read and write
16C7D327000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
2680807B000
heap
page read and write
16C15BE0000
trusted library allocation
page read and write
16C0C5F8000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
16C0CFFA000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
16C0B7B6000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C0C85A000
trusted library allocation
page read and write
6E20000
trusted library allocation
page read and write
4FD000
stack
page read and write
16C1649A000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D324000
heap
page read and write
5C81000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
694E000
stack
page read and write
1408000
heap
page read and write
4971000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
4621000
heap
page read and write
59C9000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
16C13695000
trusted library allocation
page read and write
6011000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0CA9E000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
753000
heap
page read and write
13C2000
heap
page read and write
58EF000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C137FA000
trusted library allocation
page read and write
16C14FC5000
trusted library allocation
page read and write
16C08469000
trusted library allocation
page read and write
16C0DDF7000
trusted library allocation
page read and write
16C0B7C5000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
5348000
trusted library allocation
page read and write
16C0AF39000
trusted library allocation
page read and write
C70000
heap
page read and write
5443000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D34E000
heap
page read and write
53BD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
B70000
direct allocation
page read and write
1CD9F000
stack
page read and write
16C7D32D000
heap
page read and write
4861000
heap
page read and write
16C13937000
trusted library allocation
page read and write
1159000
heap
page read and write
617F000
trusted library allocation
page read and write
16C1379E000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
1E4000
heap
page read and write
1386000
heap
page read and write
16C7D32E000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
4871000
heap
page read and write
4E40000
direct allocation
page execute and read and write
16C7D356000
heap
page read and write
16C0B740000
trusted library allocation
page read and write
4971000
heap
page read and write
59BD000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C0DEA1000
trusted library allocation
page read and write
16C0CA7B000
trusted library allocation
page read and write
4871000
heap
page read and write
1B1000
unkown
page execute read
58FC000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
1168000
heap
page read and write
16C08A52000
trusted library allocation
page read and write
16C7F561000
trusted library allocation
page read and write
435F000
stack
page read and write
764000
heap
page read and write
454F000
stack
page read and write
5D51000
trusted library allocation
page read and write
16C139B1000
trusted library allocation
page read and write
4861000
heap
page read and write
16C0C868000
trusted library allocation
page read and write
4F9E000
stack
page read and write
2BE0000
direct allocation
page read and write
53B1000
trusted library allocation
page read and write
16C0B27B000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
26808032000
heap
page read and write
10F4000
heap
page read and write
5CCF000
trusted library allocation
page read and write
16C1373B000
trusted library allocation
page read and write
4991000
heap
page read and write
5386000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D382000
heap
page read and write
16C13BFB000
trusted library allocation
page read and write
16C0CA1F000
trusted library allocation
page read and write
16C7F586000
trusted library allocation
page read and write
16C0DEE2000
trusted library allocation
page read and write
16C0EFFD000
trusted library allocation
page read and write
16C138F5000
trusted library allocation
page read and write
16C0D9CC000
trusted library allocation
page read and write
16C0CCDF000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
4C8F000
stack
page read and write
53B6000
trusted library allocation
page read and write
16C0B392000
trusted library allocation
page read and write
16C08E84000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
16C7D335000
heap
page read and write
16C7D350000
heap
page read and write
4271000
heap
page read and write
5CB4000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C164D9000
trusted library allocation
page read and write
16C137C4000
trusted library allocation
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C08ECE000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
FBE000
heap
page read and write
16C13913000
trusted library allocation
page read and write
1380000
heap
page read and write
16C7D382000
heap
page read and write
16C0C484000
trusted library allocation
page read and write
16C085FA000
trusted library allocation
page read and write
16C0CA82000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
32DF000
stack
page read and write
268080AC000
heap
page read and write
D74000
heap
page read and write
16C7D35C000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C1644E000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C0DEBC000
trusted library allocation
page read and write
D74000
heap
page read and write
16C137D1000
trusted library allocation
page read and write
284B2077000
heap
page read and write
16C7F565000
trusted library allocation
page read and write
16C0BB12000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
16C7F488000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
7D4000
heap
page read and write
5C89000
trusted library allocation
page read and write
4871000
heap
page read and write
588C000
trusted library allocation
page read and write
7D4000
heap
page read and write
58E2000
trusted library allocation
page read and write
17E0000
heap
page read and write
16C0DEA1000
trusted library allocation
page read and write
16C7F50E000
trusted library allocation
page read and write
16C7FBB4000
trusted library allocation
page read and write
569F000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
16C136D1000
trusted library allocation
page read and write
16C0D9C8000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C13721000
trusted library allocation
page read and write
16C0B3A7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C08AF4000
trusted library allocation
page read and write
6F9000
heap
page read and write
6000000
trusted library allocation
page read and write
16C7FA76000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C0CABB000
trusted library allocation
page read and write
16C0B26D000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
58BF000
trusted library allocation
page read and write
4C91000
heap
page read and write
5668000
trusted library allocation
page read and write
16C0AFF2000
trusted library allocation
page read and write
16C16750000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7F488000
trusted library allocation
page read and write
1E4000
heap
page read and write
13B9000
heap
page read and write
16C7D356000
heap
page read and write
16C139E9000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
122B000
unkown
page execute and write copy
16C0CB48000
trusted library allocation
page read and write
F76000
unkown
page execute and read and write
592B000
trusted library allocation
page read and write
7D4000
heap
page read and write
4871000
heap
page read and write
16C7D34A000
heap
page read and write
16C0C471000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
5450000
remote allocation
page read and write
1094000
heap
page read and write
1E4000
heap
page read and write
53C3000
trusted library allocation
page read and write
63F8000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
4D94000
trusted library allocation
page read and write
16C13774000
trusted library allocation
page read and write
607C000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7D357000
heap
page read and write
16C0DBCD000
trusted library allocation
page read and write
16C0CCF9000
trusted library allocation
page read and write
16C0DFD9000
trusted library allocation
page read and write
135E000
stack
page read and write
16C7D388000
heap
page read and write
16C1371C000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0B38B000
trusted library allocation
page read and write
16C16F3F000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
16C7D321000
heap
page read and write
16C0B360000
trusted library allocation
page read and write
16C0EA60000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0D959000
trusted library allocation
page read and write
16C0BB08000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C13BEF000
trusted library allocation
page read and write
1142000
heap
page read and write
4871000
heap
page read and write
65CB000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D32D000
heap
page read and write
4CF0000
direct allocation
page read and write
5364000
trusted library allocation
page read and write
118A000
heap
page read and write
345E000
stack
page read and write
17C3000
heap
page read and write
764000
heap
page read and write
16C0E925000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C13885000
trusted library allocation
page read and write
16C136FC000
trusted library allocation
page read and write
16C0B7D8000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
59FE000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D350000
heap
page read and write
4CA0000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
3F2000
unkown
page execute and read and write
5F78000
trusted library allocation
page read and write
16C13BF1000
trusted library allocation
page read and write
16C164B2000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
4651000
heap
page read and write
806000
unkown
page execute and read and write
16C7D35A000
heap
page read and write
16C13943000
trusted library allocation
page read and write
16C0B7EA000
trusted library allocation
page read and write
4F1F000
stack
page read and write
16C164A9000
trusted library allocation
page read and write
16C0CA11000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
7D4000
heap
page read and write
16C7D354000
heap
page read and write
16C0D881000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
5F71000
trusted library allocation
page read and write
16C0BCEE000
trusted library allocation
page read and write
D74000
heap
page read and write
16C13BBF000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
16C0D9B2000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
16C0C692000
trusted library allocation
page read and write
657A000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D354000
heap
page read and write
16C0C48E000
trusted library allocation
page read and write
108A000
unkown
page execute and read and write
5CC7000
trusted library allocation
page read and write
3D5E000
stack
page read and write
16C7D345000
heap
page read and write
16C7D345000
heap
page read and write
16C0B761000
trusted library allocation
page read and write
2F5F000
stack
page read and write
16C7D360000
heap
page read and write
16C086C7000
trusted library allocation
page read and write
16C13BF5000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
5384000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
4651000
heap
page read and write
53A3000
trusted library allocation
page read and write
16C135F0000
trusted library allocation
page read and write
16C0B3C4000
trusted library allocation
page read and write
475E000
stack
page read and write
16C7D31E000
heap
page read and write
16C7D31E000
heap
page read and write
1EE8ACC1000
trusted library allocation
page execute read
16C7D382000
heap
page read and write
16C0DAD4000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
16C0AF94000
trusted library allocation
page read and write
16C13889000
trusted library allocation
page read and write
16C0EFA1000
trusted library allocation
page read and write
118A000
heap
page read and write
439E000
stack
page read and write
6E8000
heap
page read and write
4871000
heap
page read and write
4970000
direct allocation
page read and write
16C0B3E6000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
26807F8D000
heap
page read and write
10CE000
stack
page read and write
16C0CA2F000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
16C15006000
trusted library allocation
page read and write
16C0CCE8000
trusted library allocation
page read and write
6F9000
heap
page read and write
16C13815000
trusted library allocation
page read and write
4871000
heap
page read and write
495F000
stack
page read and write
16C0ED8B000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
58BB000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
16C0C746000
trusted library allocation
page read and write
16C0CCD3000
trusted library allocation
page read and write
16C14F6D000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16C0D882000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
10C4000
heap
page read and write
16C7D354000
heap
page read and write
5699000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
5372000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
53AB000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
16C13970000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
5690000
direct allocation
page execute and read and write
59E1000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
53BB000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C15B26000
trusted library allocation
page read and write
16C138EF000
trusted library allocation
page read and write
1E4000
heap
page read and write
26808031000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0CA9A000
trusted library allocation
page read and write
17FA000
heap
page read and write
700000
heap
page read and write
58E4000
trusted library allocation
page read and write
16C08A83000
trusted library allocation
page read and write
16C0CDA3000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
449F000
stack
page read and write
16C7D357000
heap
page read and write
16C7D332000
heap
page read and write
5CA5000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
53AB000
trusted library allocation
page read and write
1162000
heap
page read and write
4651000
heap
page read and write
4F60000
direct allocation
page execute and read and write
3D5E000
stack
page read and write
D74000
heap
page read and write
116F000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C135F9000
trusted library allocation
page read and write
4871000
heap
page read and write
1176000
heap
page read and write
5D50000
trusted library allocation
page read and write
31FE000
stack
page read and write
16C7D350000
heap
page read and write
4EAD000
trusted library allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C7D326000
heap
page read and write
2BE0000
direct allocation
page read and write
1572000
unkown
page execute and read and write
16C0CAF1000
trusted library allocation
page read and write
16C137B9000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C0C741000
trusted library allocation
page read and write
16C08C81000
heap
page read and write
53A7000
trusted library allocation
page read and write
16C13778000
trusted library allocation
page read and write
16C0B761000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
16C0EAE5000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
16C0CAA5000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5CDC000
trusted library allocation
page read and write
16C0CB7E000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
1C8E1900000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
16C0CAF2000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
53AB000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
16C14FAC000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
16C7D35A000
heap
page read and write
127E000
stack
page read and write
53B3000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
1178000
heap
page read and write
16C0B790000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C0DED8000
trusted library allocation
page read and write
16C134EB000
trusted library allocation
page read and write
16C0DDCB000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
16C0AF33000
trusted library allocation
page read and write
16C0C7AA000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C08A4E000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
26808084000
heap
page read and write
16C0B21E000
trusted library allocation
page read and write
16C085F1000
trusted library allocation
page read and write
7D4000
heap
page read and write
2680806A000
heap
page read and write
16C7D388000
heap
page read and write
4871000
heap
page read and write
56A0000
direct allocation
page execute and read and write
16C7D357000
heap
page read and write
B03000
unkown
page execute and write copy
2C30000
direct allocation
page read and write
764000
heap
page read and write
16C7D380000
heap
page read and write
5F77000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C14EC8000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
727000
heap
page read and write
16C0CB97000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
16C08A86000
trusted library allocation
page read and write
16C0C5CC000
trusted library allocation
page read and write
3A9E000
stack
page read and write
53DB000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4C50000
direct allocation
page execute and read and write
820000
direct allocation
page read and write
537A000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
26807F9F000
heap
page read and write
16C0C494000
trusted library allocation
page read and write
16C16F22000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4D01000
heap
page read and write
2680806D000
heap
page read and write
16C14F86000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
45A1000
heap
page read and write
16C0DE42000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
4861000
heap
page read and write
541E000
trusted library allocation
page read and write
16C7D32F000
heap
page read and write
16C0B773000
trusted library allocation
page read and write
1094000
heap
page read and write
1177000
heap
page read and write
16C08498000
trusted library allocation
page read and write
16C0C5EF000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
D8B000
heap
page read and write
16C08673000
trusted library allocation
page read and write
16C0CAA5000
trusted library allocation
page read and write
D80000
unkown
page read and write
16C137AD000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
16C13B21000
trusted library allocation
page read and write
16C14E87000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
16C7D380000
heap
page read and write
3A0F000
stack
page read and write
E04000
heap
page read and write
10F4000
heap
page read and write
C66000
heap
page read and write
16C7FE24000
trusted library allocation
page read and write
138E000
unkown
page execute and read and write
16C7D345000
heap
page read and write
4E00000
direct allocation
page read and write
16C7D35A000
heap
page read and write
421E000
stack
page read and write
3A9F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
13FC000
heap
page read and write
30DE000
stack
page read and write
16C7D356000
heap
page read and write
4DE0000
remote allocation
page read and write
16C0EA3D000
trusted library allocation
page read and write
13A3000
heap
page read and write
16C7D35C000
heap
page read and write
5D50000
trusted library allocation
page read and write
16C08E7E000
trusted library allocation
page read and write
16C7F5E1000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
16C7D337000
heap
page read and write
53B8000
trusted library allocation
page read and write
268080B7000
heap
page read and write
D74000
heap
page read and write
319F000
stack
page read and write
16C0CFAF000
trusted library allocation
page read and write
16C13BE1000
trusted library allocation
page read and write
34CF000
stack
page read and write
5385000
trusted library allocation
page read and write
784000
heap
page read and write
16C0DFB8000
trusted library allocation
page read and write
116B000
heap
page read and write
16C7D350000
heap
page read and write
7D4000
heap
page read and write
16C1392E000
trusted library allocation
page read and write
58E2000
trusted library allocation
page read and write
16C137C3000
trusted library allocation
page read and write
1094000
heap
page read and write
535C000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
5363000
trusted library allocation
page read and write
1E4000
heap
page read and write
5C92000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C0EFA1000
trusted library allocation
page read and write
16C15BF3000
trusted library allocation
page read and write
16C0CB65000
trusted library allocation
page read and write
16C7D394000
heap
page read and write
5CB4000
trusted library allocation
page read and write
16C7FB26000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
4301000
heap
page read and write
1177000
heap
page read and write
4861000
heap
page read and write
16C7D354000
heap
page read and write
16C0CAC3000
trusted library allocation
page read and write
16C0CF95000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
4CD7000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
4651000
heap
page read and write
3624000
heap
page read and write
53BB000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
16C16F5F000
trusted library allocation
page read and write
C71000
heap
page read and write
1772000
heap
page read and write
16C0DE93000
trusted library allocation
page read and write
16C136B9000
trusted library allocation
page read and write
D81000
unkown
page execute and write copy
331E000
stack
page read and write
59B1000
trusted library allocation
page read and write
16C0B712000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
1172000
heap
page read and write
1389000
heap
page read and write
16C13743000
trusted library allocation
page read and write
16C0DD58000
trusted library allocation
page read and write
16C7FB75000
trusted library allocation
page read and write
16C0C6AC000
trusted library allocation
page read and write
16C0E9D5000
trusted library allocation
page read and write
16C7FBB4000
trusted library allocation
page read and write
16C0D9CC000
trusted library allocation
page read and write
16C0BBEE000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
16C14FE4000
trusted library allocation
page read and write
DE9000
unkown
page write copy
4651000
heap
page read and write
16C15BCD000
trusted library allocation
page read and write
16C0BCEE000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C0EFD2000
trusted library allocation
page read and write
16C0CAD5000
trusted library allocation
page read and write
4301000
heap
page read and write
E04000
heap
page read and write
1424000
heap
page read and write
16C7D324000
heap
page read and write
2C30000
direct allocation
page read and write
16C15B93000
trusted library allocation
page read and write
929000
unkown
page execute and read and write
5CC8000
trusted library allocation
page read and write
16C138B8000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D345000
heap
page read and write
4861000
heap
page read and write
16C0AFB7000
trusted library allocation
page read and write
16C0CB7E000
trusted library allocation
page read and write
1424000
heap
page read and write
16C0CB65000
trusted library allocation
page read and write
4871000
heap
page read and write
2730000
direct allocation
page read and write
4D5F000
stack
page read and write
16C7D330000
heap
page read and write
16C15BE0000
trusted library allocation
page read and write
16C0CDC4000
trusted library allocation
page read and write
1094000
heap
page read and write
26807FBD000
heap
page read and write
16C08A8D000
trusted library allocation
page read and write
16C16AE3000
heap
page read and write
26807FA4000
heap
page read and write
16C0C7BC000
trusted library allocation
page read and write
1360000
heap
page read and write
2C30000
direct allocation
page read and write
4651000
heap
page read and write
16C1388D000
trusted library allocation
page read and write
284B22C0000
heap
page read and write
4871000
heap
page read and write
16C7D354000
heap
page read and write
537E000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7D31E000
heap
page read and write
16C7F50C000
trusted library allocation
page read and write
D74000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
16C0CAF1000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
16C7D382000
heap
page read and write
5F74000
trusted library allocation
page read and write
16C7FBB7000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
1094000
heap
page read and write
15C0000
direct allocation
page read and write
4651000
heap
page read and write
D74000
heap
page read and write
58CA000
trusted library allocation
page read and write
16C0B735000
trusted library allocation
page read and write
45DE000
stack
page read and write
16C16F3F000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
16C13BE3000
trusted library allocation
page read and write
16C0869D000
trusted library allocation
page read and write
13F6000
heap
page read and write
16C7FEC2000
trusted library allocation
page read and write
4621000
heap
page read and write
784000
heap
page read and write
16C7D365000
heap
page read and write
537D000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
335E000
stack
page read and write
593C000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
4D01000
heap
page read and write
16C0DDFB000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
16C0C484000
trusted library allocation
page read and write
1D78E000
stack
page read and write
3F4E000
stack
page read and write
4861000
heap
page read and write
16C7D334000
heap
page read and write
16C7D38D000
heap
page read and write
48CF000
stack
page read and write
5190000
direct allocation
page read and write
4981000
heap
page read and write
16C0EFE3000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4651000
heap
page read and write
5CD5000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C7D324000
heap
page read and write
16C086F8000
trusted library allocation
page read and write
16C0EF9D000
trusted library allocation
page read and write
BEB000
heap
page read and write
16C7D324000
heap
page read and write
16C13BF8000
trusted library allocation
page read and write
D74000
heap
page read and write
5661000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
16C13787000
trusted library allocation
page read and write
16C0CAA4000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
16C0C4D7000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
16C102E5000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
1424000
heap
page read and write
5BBA000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
16C08A8D000
trusted library allocation
page read and write
16C7D326000
heap
page read and write
16C7D324000
heap
page read and write
537B000
trusted library allocation
page read and write
16C0CB43000
trusted library allocation
page read and write
16C135EA000
trusted library allocation
page read and write
16C14FA3000
trusted library allocation
page read and write
F7A000
heap
page read and write
1408000
heap
page read and write
C71000
heap
page read and write
1E4000
heap
page read and write
1E4000
heap
page read and write
16C7D357000
heap
page read and write
5CEE000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
5E28000
trusted library allocation
page read and write
16C08AF4000
trusted library allocation
page read and write
784000
heap
page read and write
5386000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
2B9C000
stack
page read and write
820000
direct allocation
page read and write
DB1000
unkown
page execute and write copy
16C7D357000
heap
page read and write
16C0C7D1000
trusted library allocation
page read and write
1094000
heap
page read and write
5363000
trusted library allocation
page read and write
16C7F4F4000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0C707000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
16C0AFDD000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
16C15B96000
trusted library allocation
page read and write
4651000
heap
page read and write
268080B7000
heap
page read and write
16C7FC00000
trusted library allocation
page read and write
16C13790000
trusted library allocation
page read and write
16C0C431000
trusted library allocation
page read and write
16C0C4A6000
trusted library allocation
page read and write
4921000
heap
page read and write
4FE0000
direct allocation
page read and write
2F0F000
stack
page read and write
705000
heap
page read and write
16C0CA5F000
trusted library allocation
page read and write
16C16A01000
heap
page read and write
16C0AFA0000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C0CEF4000
trusted library allocation
page read and write
1094000
heap
page read and write
4F90000
direct allocation
page execute and read and write
16C084E4000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
4C91000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C0DDC2000
trusted library allocation
page read and write
58D5000
trusted library allocation
page read and write
24C000
unkown
page readonly
16C1366E000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
16C138FD000
trusted library allocation
page read and write
16C13910000
trusted library allocation
page read and write
16C0CAF1000
trusted library allocation
page read and write
16C164C7000
trusted library allocation
page read and write
1094000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4861000
heap
page read and write
60AD000
trusted library allocation
page read and write
679000
unkown
page write copy
59FE000
trusted library allocation
page read and write
16C0ED80000
trusted library allocation
page read and write
10F4000
heap
page read and write
16C7D354000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C7D336000
heap
page read and write
5378000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
388DEEB03000
trusted library allocation
page read and write
3D1E000
stack
page read and write
16C0CB71000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
13FC000
heap
page read and write
16C7F581000
trusted library allocation
page read and write
16C14F86000
trusted library allocation
page read and write
16C0C06F000
trusted library allocation
page read and write
16C0C857000
trusted library allocation
page read and write
E04000
heap
page read and write
784000
heap
page read and write
D74000
heap
page read and write
5679000
trusted library allocation
page read and write
409F000
stack
page read and write
4651000
heap
page read and write
16C0C751000
trusted library allocation
page read and write
4D01000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C0EFF5000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
16C0DECF000
trusted library allocation
page read and write
FA2000
unkown
page execute and read and write
16C7D380000
heap
page read and write
D74000
heap
page read and write
FC0000
heap
page read and write
16C7D31E000
heap
page read and write
820000
direct allocation
page read and write
5C7C000
trusted library allocation
page read and write
16C7F498000
trusted library allocation
page read and write
16C0AFFE000
trusted library allocation
page read and write
117A000
heap
page read and write
604F000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
E04000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C0BCEF000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C133EB000
trusted library allocation
page read and write
16C0B25D000
trusted library allocation
page read and write
6F6000
heap
page read and write
16C0CA5F000
trusted library allocation
page read and write
16C0B3BD000
trusted library allocation
page read and write
117B000
heap
page read and write
53F7000
trusted library allocation
page read and write
16C7D315000
heap
page read and write
16C13BBF000
trusted library allocation
page read and write
764000
unkown
page execute and write copy
53B7000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
1180000
heap
page read and write
1C92E000
stack
page read and write
16C0B3DD000
trusted library allocation
page read and write
16C137B9000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
2680802B000
heap
page read and write
2C30000
direct allocation
page read and write
16C0E9D7000
trusted library allocation
page read and write
E04000
heap
page read and write
5C88000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D357000
heap
page read and write
5CB4000
trusted library allocation
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
59BA000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
13A6000
heap
page read and write
16C7D388000
heap
page read and write
2B8E000
stack
page read and write
CB4000
heap
page read and write
16C7D325000
heap
page read and write
16C7D324000
heap
page read and write
5911000
trusted library allocation
page read and write
16C0869D000
trusted library allocation
page read and write
1366000
heap
page read and write
43A1000
heap
page read and write
33CE000
stack
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
16C7D331000
heap
page read and write
16C137D1000
trusted library allocation
page read and write
16C0B7B6000
trusted library allocation
page read and write
C00000
unkown
page execute and write copy
784000
heap
page read and write
439E000
stack
page read and write
59FE000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
440F000
stack
page read and write
1185000
heap
page read and write
53AD000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
92CF000
stack
page read and write
2A61D4F24000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
16C137DF000
trusted library allocation
page read and write
16C1377F000
trusted library allocation
page read and write
16C0C7DE000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
16C0C458000
trusted library allocation
page read and write
12BB000
unkown
page execute and write copy
16C0C41C000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
16C139AC000
trusted library allocation
page read and write
26808023000
heap
page read and write
5374000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7F479000
trusted library allocation
page read and write
16C0DFA6000
trusted library allocation
page read and write
13CD000
heap
page read and write
13FB000
heap
page read and write
536D000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
3E9D000
stack
page read and write
3C1000
unkown
page execute and read and write
16C7D31E000
heap
page read and write
5374000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0C79A000
trusted library allocation
page read and write
16C086EB000
trusted library allocation
page read and write
1094000
heap
page read and write
4861000
heap
page read and write
1094000
heap
page read and write
16C7D345000
heap
page read and write
16C7D340000
heap
page read and write
4FF1000
heap
page read and write
16C7D32E000
heap
page read and write
16C0BCC3000
trusted library allocation
page read and write
EFD000
stack
page read and write
4960000
heap
page read and write
16C1388B000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
C4F000
heap
page read and write
16C0C4DD000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
16C13BE3000
trusted library allocation
page read and write
16C7D307000
heap
page read and write
16C0D954000
trusted library allocation
page read and write
D74000
heap
page read and write
690000
direct allocation
page read and write
535C000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
F7D000
unkown
page execute and read and write
16C0ED34000
trusted library allocation
page read and write
D74000
heap
page read and write
61FA000
trusted library allocation
page read and write
E8D000
heap
page read and write
16C7D360000
heap
page read and write
4871000
heap
page read and write
5384000
trusted library allocation
page read and write
1C8E15D0000
heap
page read and write
16C7D360000
heap
page read and write
4271000
heap
page read and write
16C7D332000
heap
page read and write
4C91000
heap
page read and write
16C7D388000
heap
page read and write
16C0CAB3000
trusted library allocation
page read and write
91CD000
stack
page read and write
D84000
heap
page read and write
16C08EA5000
trusted library allocation
page read and write
16C08E9E000
trusted library allocation
page read and write
16C0B3DE000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
339F000
stack
page read and write
16C16F8C000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0EAEC000
trusted library allocation
page read and write
16C0C73D000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C7D345000
heap
page read and write
16C0AF96000
trusted library allocation
page read and write
16C13930000
trusted library allocation
page read and write
16C7F58A000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
5666000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
6F4000
heap
page read and write
16C0C0BD000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
16C0C7CF000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
4910000
direct allocation
page execute and read and write
16C0EDCC000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C0CB93000
trusted library allocation
page read and write
D74000
heap
page read and write
53FC000
trusted library allocation
page read and write
16C0B27E000
trusted library allocation
page read and write
16C7F476000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
16C0EA54000
trusted library allocation
page read and write
418F000
stack
page read and write
16C1351A000
trusted library allocation
page read and write
4860000
heap
page read and write
5CA4000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C16FD1000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
4E20000
heap
page read and write
1094000
heap
page read and write
535D000
trusted library allocation
page read and write
16C0EAEA000
trusted library allocation
page read and write
4EBC000
trusted library allocation
page read and write
2680803D000
heap
page read and write
16C0BB10000
trusted library allocation
page read and write
16C0DD1B000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
2FCF000
stack
page read and write
58BB000
trusted library allocation
page read and write
4871000
heap
page read and write
431F000
stack
page read and write
16C164A6000
trusted library allocation
page read and write
16C137CD000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
16C13974000
trusted library allocation
page read and write
4D01000
heap
page read and write
16C7FEB1000
trusted library allocation
page read and write
328F000
stack
page read and write
4CC1000
trusted library allocation
page read and write
C6B57FE000
stack
page read and write
5371000
trusted library allocation
page read and write
16C7F543000
trusted library allocation
page read and write
16C0D9F3000
trusted library allocation
page read and write
64C1000
trusted library allocation
page read and write
16C13732000
trusted library allocation
page read and write
16C135EA000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
C56000
heap
page read and write
16C0B3BD000
trusted library allocation
page read and write
16C08A88000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
268080B7000
heap
page read and write
5600000
direct allocation
page execute and read and write
4871000
heap
page read and write
16C13774000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
16C0C74C000
trusted library allocation
page read and write
425E000
stack
page read and write
10BC000
heap
page read and write
16C0B7FA000
trusted library allocation
page read and write
1389000
heap
page read and write
17A0000
heap
page read and write
16C0B393000
trusted library allocation
page read and write
1E4000
heap
page read and write
D74000
heap
page read and write
16C0B3CF000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
16C7D38A000
heap
page read and write
16C0CAEF000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
16C0B223000
trusted library allocation
page read and write
16C0DFDB000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D388000
heap
page read and write
16C7D31E000
heap
page read and write
538B000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0DDFA000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16C08ECE000
trusted library allocation
page read and write
2680802B000
heap
page read and write
D74000
heap
page read and write
16C0CCE8000
trusted library allocation
page read and write
388F000
stack
page read and write
16C7D345000
heap
page read and write
5E83000
trusted library allocation
page read and write
E04000
heap
page read and write
16C15BF0000
trusted library allocation
page read and write
81C000
unkown
page execute and write copy
319F000
stack
page read and write
6960000
heap
page read and write
16C0EAC1000
trusted library allocation
page read and write
16C0DEA8000
trusted library allocation
page read and write
1398000
heap
page read and write
16C0B7EF000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
3A9F000
stack
page read and write
16C0B73B000
trusted library allocation
page read and write
5F77000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
284000
unkown
page readonly
16C7D382000
heap
page read and write
16C0CB73000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
3A5F000
stack
page read and write
53A4000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
5C99000
trusted library allocation
page read and write
16C0E9F6000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
E04000
heap
page read and write
16C7D340000
heap
page read and write
5903000
trusted library allocation
page read and write
340E000
stack
page read and write
16C1390C000
trusted library allocation
page read and write
58D4000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
912000
unkown
page execute and read and write
305F000
stack
page read and write
1C8E1907000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0C78A000
trusted library allocation
page read and write
40DE000
stack
page read and write
4C91000
heap
page read and write
16C7F4EF000
trusted library allocation
page read and write
4C91000
heap
page read and write
D74000
heap
page read and write
5E99000
trusted library allocation
page read and write
350E000
stack
page read and write
16C13790000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7D33C000
heap
page read and write
5E95000
trusted library allocation
page read and write
16C0E9F3000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7F52D000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0B274000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
679000
unkown
page write copy
5349000
trusted library allocation
page read and write
4301000
heap
page read and write
16C7D332000
heap
page read and write
7D4000
heap
page read and write
268080AC000
heap
page read and write
B50000
direct allocation
page read and write
16C0EAE0000
trusted library allocation
page read and write
16C0D1DF000
trusted library allocation
page read and write
16C08C81000
heap
page read and write
4CF0000
direct allocation
page read and write
63F3000
trusted library allocation
page read and write
1094000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
16C0C4E0000
trusted library allocation
page read and write
451000
unkown
page execute and write copy
5354000
trusted library allocation
page read and write
1160000
heap
page read and write
5BB4000
trusted library allocation
page read and write
16C0DFDB000
trusted library allocation
page read and write
16C135DD000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
116F000
heap
page read and write
4871000
heap
page read and write
16C1366E000
trusted library allocation
page read and write
64E1000
trusted library allocation
page read and write
16C7F4F4000
trusted library allocation
page read and write
16C138DE000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
1D44F000
stack
page read and write
16C0AF33000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
592F000
trusted library allocation
page read and write
26807FEA000
heap
page read and write
10C4000
heap
page read and write
4E00000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C0B24A000
trusted library allocation
page read and write
16C0CDD8000
trusted library allocation
page read and write
4971000
heap
page read and write
32CE000
stack
page read and write
16C08478000
trusted library allocation
page read and write
369F000
stack
page read and write
16C08A88000
trusted library allocation
page read and write
16C15AF6000
trusted library allocation
page read and write
3E5E000
stack
page read and write
2C50000
heap
page read and write
16C7D382000
heap
page read and write
16C16488000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
16C13774000
trusted library allocation
page read and write
180A000
heap
page read and write
4621000
heap
page read and write
268080B7000
heap
page read and write
16C164EF000
trusted library allocation
page read and write
16C08722000
trusted library allocation
page read and write
16C0BBFA000
trusted library allocation
page read and write
1573000
unkown
page execute and write copy
16C7D388000
heap
page read and write
5CCD000
trusted library allocation
page read and write
2B40000
direct allocation
page read and write
16C7F5E1000
trusted library allocation
page read and write
16C0D8CB000
trusted library allocation
page read and write
1380000
heap
page read and write
16C7F511000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
13C0000
heap
page read and write
D74000
heap
page read and write
16C138BC000
trusted library allocation
page read and write
16C0AF9A000
trusted library allocation
page read and write
284B2070000
heap
page read and write
16C0C7E6000
trusted library allocation
page read and write
4820000
remote allocation
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
16C139B0000
trusted library allocation
page read and write
16C0D89C000
trusted library allocation
page read and write
6033000
trusted library allocation
page read and write
1D30E000
stack
page read and write
4871000
heap
page read and write
16C0B3BD000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C08ACB000
trusted library allocation
page read and write
1177000
heap
page read and write
5375000
trusted library allocation
page read and write
4651000
heap
page read and write
16C085F7000
trusted library allocation
page read and write
16C13BE6000
trusted library allocation
page read and write
2F9E000
stack
page read and write
16C15BF3000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
5CEE000
trusted library allocation
page read and write
16C15B24000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
4871000
heap
page read and write
16C0CAEF000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
1094000
heap
page read and write
117A000
heap
page read and write
591B000
trusted library allocation
page read and write
16C0C792000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0B33B000
trusted library allocation
page read and write
16C0DD1E000
trusted library allocation
page read and write
10F4000
heap
page read and write
16C08A50000
trusted library allocation
page read and write
16C0CA49000
trusted library allocation
page read and write
1424000
heap
page read and write
16C13BC5000
trusted library allocation
page read and write
16C0B3D9000
trusted library allocation
page read and write
4861000
heap
page read and write
53C3000
trusted library allocation
page read and write
3D1F000
stack
page read and write
16C0B24E000
trusted library allocation
page read and write
16C164D0000
trusted library allocation
page read and write
1D554000
heap
page read and write
4651000
heap
page read and write
538D000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4271000
heap
page read and write
16C7D332000
heap
page read and write
16C0CA75000
trusted library allocation
page read and write
26808026000
heap
page read and write
117F000
heap
page read and write
1166000
heap
page read and write
16C1392E000
trusted library allocation
page read and write
26808099000
heap
page read and write
5C8A000
trusted library allocation
page read and write
16C14EC8000
trusted library allocation
page read and write
4DE0000
direct allocation
page read and write
16C7D330000
heap
page read and write
16C7D354000
heap
page read and write
705000
heap
page read and write
4861000
heap
page read and write
460000
unkown
page readonly
53DF000
trusted library allocation
page read and write
16C1372B000
trusted library allocation
page read and write
16C0BCF1000
trusted library allocation
page read and write
16C7FBF9000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
58CD000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
6ED000
heap
page read and write
538C000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C13818000
trusted library allocation
page read and write
16C0CB81000
trusted library allocation
page read and write
5914000
trusted library allocation
page read and write
5EEF000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
4CF0000
direct allocation
page read and write
FBE000
stack
page read and write
16C14F05000
trusted library allocation
page read and write
13C6000
heap
page read and write
16C08E5A000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0CB75000
trusted library allocation
page read and write
13C2000
heap
page read and write
566D000
trusted library allocation
page read and write
601E000
trusted library allocation
page read and write
16C137C8000
trusted library allocation
page read and write
16C7F5E9000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C0CA34000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C13433000
trusted library allocation
page read and write
371E000
stack
page read and write
D3F000
heap
page read and write
16C139AA000
trusted library allocation
page read and write
16C0CB56000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
16C0B7DA000
trusted library allocation
page read and write
16C0B775000
trusted library allocation
page read and write
705000
heap
page read and write
1094000
heap
page read and write
16C7D345000
heap
page read and write
16C08AF1000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D38D000
heap
page read and write
17DF000
heap
page read and write
784000
heap
page read and write
4271000
heap
page read and write
16C7D32D000
heap
page read and write
16C0DD75000
trusted library allocation
page read and write
4E0000
unkown
page execute and write copy
16C7D382000
heap
page read and write
4CF0000
direct allocation
page read and write
592F000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
5C7F000
trusted library allocation
page read and write
16C0B3DD000
trusted library allocation
page read and write
16C16498000
trusted library allocation
page read and write
16C7D334000
heap
page read and write
5E6B000
trusted library allocation
page read and write
16C0D9E5000
trusted library allocation
page read and write
16C08A63000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
7620000
heap
page read and write
16C7D360000
heap
page read and write
16C7D345000
heap
page read and write
1374000
heap
page read and write
CB4000
heap
page read and write
58FB000
trusted library allocation
page read and write
16C164D9000
trusted library allocation
page read and write
16C1343C000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
16C0B27B000
trusted library allocation
page read and write
4871000
heap
page read and write
5462000
trusted library allocation
page read and write
1D16E000
stack
page read and write
4C91000
heap
page read and write
53ED000
trusted library allocation
page read and write
16C133B7000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
16C0CABC000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
2EDB000
stack
page read and write
16C15A4F000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
16C0CCFE000
trusted library allocation
page read and write
F71000
unkown
page execute and read and write
16C0CAC3000
trusted library allocation
page read and write
5310000
direct allocation
page execute and read and write
D3B000
stack
page read and write
CB4000
heap
page read and write
4F70000
direct allocation
page execute and read and write
180A000
heap
page read and write
1D3CD000
stack
page read and write
16C0DDCB000
trusted library allocation
page read and write
116B000
heap
page read and write
16C0CB91000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
5CC5000
trusted library allocation
page read and write
16C08E70000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0B3BF000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
5FAD000
trusted library allocation
page read and write
16C0CB73000
trusted library allocation
page read and write
16C0E94D000
trusted library allocation
page read and write
7D4000
heap
page read and write
16C7D38C000
heap
page read and write
2BE0000
direct allocation
page read and write
16C7D332000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C0DDB2000
trusted library allocation
page read and write
16C0EA92000
trusted library allocation
page read and write
16C0B7EF000
trusted library allocation
page read and write
4651000
heap
page read and write
53A9000
trusted library allocation
page read and write
13FB000
heap
page read and write
3E0E000
stack
page read and write
1094000
heap
page read and write
2BE0000
direct allocation
page read and write
16C7F54A000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C0CBCC000
trusted library allocation
page read and write
16C1339F000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
16C13727000
trusted library allocation
page read and write
4C00000
direct allocation
page execute and read and write
5436000
trusted library allocation
page read and write
16C0DD1B000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
55BC000
trusted library allocation
page read and write
16C138EA000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
4E1E000
stack
page read and write
592C000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
59FE000
trusted library allocation
page read and write
13FC000
heap
page read and write
3C8E000
stack
page read and write
59FE000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
16C1390A000
trusted library allocation
page read and write
17F5000
heap
page read and write
16C7D38C000
heap
page read and write
4E96000
trusted library allocation
page read and write
784000
heap
page read and write
16C7D357000
heap
page read and write
5CB4000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
567A000
trusted library allocation
page read and write
16C13883000
trusted library allocation
page read and write
16C0EFE9000
trusted library allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
1374000
heap
page read and write
16C7D327000
heap
page read and write
5350000
trusted library allocation
page read and write
16C086EB000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
5F79000
trusted library allocation
page read and write
16C0EFEF000
trusted library allocation
page read and write
16C13447000
trusted library allocation
page read and write
57AB000
stack
page read and write
16C084EF000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
1374000
heap
page read and write
36DE000
stack
page read and write
16C0EDE9000
trusted library allocation
page read and write
53C3000
trusted library allocation
page read and write
13DA000
heap
page read and write
4C10000
direct allocation
page execute and read and write
BC5000
heap
page read and write
3FDE000
stack
page read and write
820000
direct allocation
page read and write
4651000
heap
page read and write
16C13530000
trusted library allocation
page read and write
16C0CBF9000
trusted library allocation
page read and write
16C139B3000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
16C0CB73000
trusted library allocation
page read and write
1C8E190A000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
16C7D350000
heap
page read and write
16C0DEAD000
trusted library allocation
page read and write
16C13967000
trusted library allocation
page read and write
16C0C7E6000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0CAF5000
trusted library allocation
page read and write
418E000
stack
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0ED98000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C139E0000
trusted library allocation
page read and write
1401000
heap
page read and write
5CA4000
trusted library allocation
page read and write
16C0DED8000
trusted library allocation
page read and write
16C7D352000
heap
page read and write
16C134C3000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
16C0C0FC000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
16C134ED000
trusted library allocation
page read and write
16C7D32F000
heap
page read and write
16C7D354000
heap
page read and write
535D000
trusted library allocation
page read and write
16C0C751000
trusted library allocation
page read and write
445F000
stack
page read and write
16C7D32E000
heap
page read and write
16C13524000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
13F3000
heap
page read and write
1CD9E000
stack
page read and write
6C5000
heap
page read and write
16C7FBB7000
trusted library allocation
page read and write
4651000
heap
page read and write
4FF1000
heap
page read and write
5D52000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
16C7D360000
heap
page read and write
16C134B8000
trusted library allocation
page read and write
16C0C7DF000
trusted library allocation
page read and write
6F9000
heap
page read and write
4861000
heap
page read and write
1177000
heap
page read and write
2A0000
unkown
page read and write
534D000
trusted library allocation
page read and write
16C7F5E1000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C7D34D000
heap
page read and write
16C7D35A000
heap
page read and write
16C7D38D000
heap
page read and write
16C13BC1000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
95B000
unkown
page execute and write copy
16C7D354000
heap
page read and write
16C137C6000
trusted library allocation
page read and write
FFD000
heap
page read and write
16C0C7BF000
trusted library allocation
page read and write
C6D000
heap
page read and write
43A1000
heap
page read and write
4C91000
heap
page read and write
16C13424000
trusted library allocation
page read and write
16C14EA2000
trusted library allocation
page read and write
16C0B7C8000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
678C000
trusted library allocation
page read and write
16C7D32F000
heap
page read and write
4970000
direct allocation
page read and write
16C0EFED000
trusted library allocation
page read and write
114E000
heap
page read and write
1374000
heap
page read and write
16C7D350000
heap
page read and write
16C7D38A000
heap
page read and write
16C7D356000
heap
page read and write
7D4000
heap
page read and write
304E000
stack
page read and write
45A1000
heap
page read and write
58BB000
trusted library allocation
page read and write
1398000
heap
page read and write
16C0CB66000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D360000
heap
page read and write
59B7000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
CA5000
heap
page read and write
16C7D35A000
heap
page read and write
16C7D354000
heap
page read and write
2730000
direct allocation
page read and write
3E5F000
stack
page read and write
1C8E31A0000
heap
page read and write
6044000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
91E000
unkown
page execute and read and write
16C138F5000
trusted library allocation
page read and write
5CCD000
trusted library allocation
page read and write
3D70000
heap
page read and write
16C0B27B000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
53C3000
trusted library allocation
page read and write
16C134BD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C08665000
trusted library allocation
page read and write
16C0CA1F000
trusted library allocation
page read and write
45A1000
heap
page read and write
5359000
trusted library allocation
page read and write
16C7D33D000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0C65C000
trusted library allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
16C0EDF8000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
17E8000
heap
page read and write
16C7D35C000
heap
page read and write
4F4F000
stack
page read and write
16C7D31E000
heap
page read and write
16C7D337000
heap
page read and write
16C0DFFA000
trusted library allocation
page read and write
16C0DAD2000
trusted library allocation
page read and write
16C0C8C8000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
535C000
trusted library allocation
page read and write
4271000
heap
page read and write
1094000
heap
page read and write
DE9000
unkown
page write copy
3E5E000
stack
page read and write
1099000
unkown
page execute and read and write
4651000
heap
page read and write
16C0C0D4000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
784000
heap
page read and write
16C7D35A000
heap
page read and write
5C94000
trusted library allocation
page read and write
16C0C451000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D345000
heap
page read and write
16C08A5A000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
16C0C4DB000
trusted library allocation
page read and write
6F1000
heap
page read and write
16C7D345000
heap
page read and write
16C7D35C000
heap
page read and write
16C7D332000
heap
page read and write
535C000
trusted library allocation
page read and write
16C0CB77000
trusted library allocation
page read and write
16C137CD000
trusted library allocation
page read and write
16C7F565000
trusted library allocation
page read and write
324F000
stack
page read and write
593C000
trusted library allocation
page read and write
16C16429000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
4651000
heap
page read and write
5C9F000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C08E1F000
trusted library allocation
page read and write
16C0EAEC000
trusted library allocation
page read and write
16C0CB6E000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
1168000
heap
page read and write
1E4000
heap
page read and write
616E000
trusted library allocation
page read and write
4BEB000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D35C000
heap
page read and write
179C000
heap
page read and write
2F5F000
stack
page read and write
16C137AD000
trusted library allocation
page read and write
3280000
heap
page read and write
16C0ED9A000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
53CC000
trusted library allocation
page read and write
16C7D331000
heap
page read and write
16C137FA000
trusted library allocation
page read and write
140B000
heap
page read and write
16C134E9000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
16C134DE000
trusted library allocation
page read and write
16C7FE3E000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
1408000
heap
page read and write
16C7D31E000
heap
page read and write
16C7FE12000
trusted library allocation
page read and write
1C8E14F0000
heap
page read and write
16C134C5000
trusted library allocation
page read and write
16C137F1000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
418E000
stack
page read and write
16C164A9000
trusted library allocation
page read and write
1B0000
unkown
page readonly
16C0DEC6000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
16C7D304000
heap
page read and write
D74000
heap
page read and write
6081000
trusted library allocation
page read and write
16C0CAFA000
trusted library allocation
page read and write
1172000
heap
page read and write
1000000
direct allocation
page read and write
46DF000
stack
page read and write
16C15B9B000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
16C0C474000
trusted library allocation
page read and write
16C136B8000
trusted library allocation
page read and write
16C0B779000
trusted library allocation
page read and write
13C2000
heap
page read and write
3ECF000
stack
page read and write
5392000
trusted library allocation
page read and write
26808084000
heap
page read and write
311000
unkown
page execute and write copy
16C0AF39000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
1094000
heap
page read and write
754000
unkown
page execute and write copy
5600000
direct allocation
page execute and read and write
16C08A41000
trusted library allocation
page read and write
5670000
direct allocation
page execute and read and write
16C13725000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
450000
unkown
page read and write
16C0AF5B000
trusted library allocation
page read and write
16C0BCFA000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
26807FAC000
heap
page read and write
399E000
stack
page read and write
16C0CA07000
trusted library allocation
page read and write
16C164E1000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D31E000
heap
page read and write
16C7F5DA000
trusted library allocation
page read and write
16C0DD9D000
trusted library allocation
page read and write
3D71000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
16C0C741000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
100E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
16C138C1000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C0B350000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
4C91000
heap
page read and write
5388000
trusted library allocation
page read and write
16C0CA15000
trusted library allocation
page read and write
2B50000
direct allocation
page execute and read and write
16C0CB65000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C7D32D000
heap
page read and write
16C7D31D000
heap
page read and write
1239000
unkown
page execute and read and write
4C91000
heap
page read and write
16C7D31E000
heap
page read and write
4871000
heap
page read and write
16C0CA78000
trusted library allocation
page read and write
6B0000
heap
page read and write
1781000
heap
page read and write
16C14E7B000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
5C81000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C0DAD4000
trusted library allocation
page read and write
4861000
heap
page read and write
C90000
direct allocation
page read and write
5480000
direct allocation
page read and write
1E4000
heap
page read and write
535C000
trusted library allocation
page read and write
16C0C4D3000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
53B9000
trusted library allocation
page read and write
16C08A9D000
trusted library allocation
page read and write
16C7FEDC000
trusted library allocation
page read and write
118A000
heap
page read and write
16C7D345000
heap
page read and write
5ECC000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
4D01000
heap
page read and write
53D3000
trusted library allocation
page read and write
16C135DA000
trusted library allocation
page read and write
11FE000
stack
page read and write
16C7D332000
heap
page read and write
4390000
direct allocation
page read and write
16C7D31D000
heap
page read and write
16C1373A000
trusted library allocation
page read and write
16C0EDCC000
trusted library allocation
page read and write
16C0DFF1000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
4A20000
direct allocation
page read and write
16C7D324000
heap
page read and write
3A0E000
stack
page read and write
4861000
heap
page read and write
764000
heap
page read and write
61EB000
trusted library allocation
page read and write
16C08A33000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16C0CE91000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
E04000
heap
page read and write
16C0CB0B000
trusted library allocation
page read and write
16C0DFE9000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
16C08AC8000
trusted library allocation
page read and write
6203000
trusted library allocation
page read and write
5650000
direct allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
16C7D330000
heap
page read and write
16C7D357000
heap
page read and write
D74000
heap
page read and write
5425000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
16C7D327000
heap
page read and write
16C0DDCB000
trusted library allocation
page read and write
39CF000
stack
page read and write
1C8E31B7000
heap
page read and write
16C0EFED000
trusted library allocation
page read and write
26807FA0000
heap
page read and write
16C7D350000
heap
page read and write
16C0C756000
trusted library allocation
page read and write
16C7F568000
trusted library allocation
page read and write
16C0C8F7000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16C0DEB2000
trusted library allocation
page read and write
705000
heap
page read and write
16C0CAAC000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
4C1C000
trusted library allocation
page read and write
16C1343E000
trusted library allocation
page read and write
13B8000
heap
page read and write
16C7D35A000
heap
page read and write
16C0B3E1000
trusted library allocation
page read and write
16C0EAAC000
trusted library allocation
page read and write
16C0C7D1000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
16C0CAFA000
trusted library allocation
page read and write
35DE000
stack
page read and write
6EA000
heap
page read and write
4651000
heap
page read and write
D74000
heap
page read and write
1D550000
heap
page read and write
B50000
direct allocation
page read and write
4C91000
heap
page read and write
5E72000
trusted library allocation
page read and write
16C0D9AB000
trusted library allocation
page read and write
489E000
stack
page read and write
5341000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
4C91000
heap
page read and write
536D000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
116B000
heap
page read and write
16C7D350000
heap
page read and write
16C134C8000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
2BE0000
direct allocation
page read and write
16C0DEDC000
trusted library allocation
page read and write
16C1377F000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C08AC0000
trusted library allocation
page read and write
D75000
heap
page read and write
1188000
heap
page read and write
610000
unkown
page readonly
16C0B3A7000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
5C8C000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
499F000
stack
page read and write
593C000
trusted library allocation
page read and write
16C0C7BF000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
610000
unkown
page read and write
16C0CB23000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D324000
heap
page read and write
611000
unkown
page execute and write copy
11BF000
stack
page read and write
16C0EFD2000
trusted library allocation
page read and write
16C16D00000
trusted library allocation
page read and write
16C0CAA1000
trusted library allocation
page read and write
16C1377D000
trusted library allocation
page read and write
16C0AFB0000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C0CCF7000
trusted library allocation
page read and write
16C084EF000
trusted library allocation
page read and write
929000
unkown
page execute and write copy
16C0C7E8000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
449F000
stack
page read and write
16C7D35A000
heap
page read and write
4871000
heap
page read and write
58CD000
trusted library allocation
page read and write
16C0DDF4000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
784000
heap
page read and write
16C0C42A000
trusted library allocation
page read and write
26808062000
heap
page read and write
284000
unkown
page readonly
16C0CAAC000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
16C7D33D000
heap
page read and write
16C0844F000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
D75000
heap
page read and write
5CE2000
trusted library allocation
page read and write
16C085E7000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
59E9000
trusted library allocation
page read and write
3D71000
heap
page read and write
16C7D35A000
heap
page read and write
13FD000
heap
page read and write
53AB000
trusted library allocation
page read and write
133A000
stack
page read and write
527E000
trusted library allocation
page read and write
16C13883000
trusted library allocation
page read and write
16C13650000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
D20000
direct allocation
page execute and read and write
705000
heap
page read and write
16C0DFAD000
trusted library allocation
page read and write
16C139B3000
trusted library allocation
page read and write
16C15033000
trusted library allocation
page read and write
16C0DAC6000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
58BB000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D327000
heap
page read and write
16C13727000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
5CBD000
trusted library allocation
page read and write
CFE000
heap
page read and write
16C084F8000
trusted library allocation
page read and write
16C1344C000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
C5C000
heap
page read and write
16C135DD000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
16C0DDC2000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
536D000
trusted library allocation
page read and write
16C7F583000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
16C133DF000
trusted library allocation
page read and write
16C0AFA5000
trusted library allocation
page read and write
16C7F485000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C0BCF4000
trusted library allocation
page read and write
5AB000
unkown
page execute and write copy
16C1391A000
trusted library allocation
page read and write
16C138CF000
trusted library allocation
page read and write
16C7D351000
heap
page read and write
16C7D332000
heap
page read and write
16C7D32D000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
4F00000
direct allocation
page execute and read and write
53BB000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
1C8E14E7000
heap
page read and write
16C7D327000
heap
page read and write
16C7D354000
heap
page read and write
16C0DAC8000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
5CB4000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
395F000
stack
page read and write
16C13972000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D324000
heap
page read and write
58F6000
trusted library allocation
page read and write
16C0C7DE000
trusted library allocation
page read and write
4F5000
stack
page read and write
C6B4FFC000
stack
page read and write
4651000
heap
page read and write
16C086BE000
trusted library allocation
page read and write
BD0000
heap
page read and write
16C7D327000
heap
page read and write
5341000
trusted library allocation
page read and write
5E5C000
trusted library allocation
page read and write
651B000
trusted library allocation
page read and write
16C0C4E2000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
D74000
heap
page read and write
16C08EA5000
trusted library allocation
page read and write
1010000
unkown
page execute and write copy
16C13596000
trusted library allocation
page read and write
16C0EA79000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C7D360000
heap
page read and write
BCF000
heap
page read and write
16C0EA60000
trusted library allocation
page read and write
16C0B7C0000
trusted library allocation
page read and write
16C0B274000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C135FD000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C084EA000
trusted library allocation
page read and write
16C0C4F4000
trusted library allocation
page read and write
12CA000
heap
page read and write
16C138D7000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
16C135F2000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
16C0C87D000
trusted library allocation
page read and write
16C0C7E4000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
12AE000
stack
page read and write
D1C000
heap
page read and write
1374000
heap
page read and write
5D5F000
trusted library allocation
page read and write
16C0C80B000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
4D9E000
stack
page read and write
1094000
heap
page read and write
4651000
heap
page read and write
16C085D2000
trusted library allocation
page read and write
16C7F498000
trusted library allocation
page read and write
D3F000
heap
page read and write
4E10000
direct allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
43A1000
heap
page read and write
538D000
trusted library allocation
page read and write
16C13B19000
trusted library allocation
page read and write
16C1391C000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7FA71000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
13CB000
heap
page read and write
16C0DD4F000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D34E000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
16C0ED80000
trusted library allocation
page read and write
E04000
heap
page read and write
16C1362A000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
4861000
heap
page read and write
16C0EA6C000
trusted library allocation
page read and write
4301000
heap
page read and write
16C0BCEC000
trusted library allocation
page read and write
4A10000
remote allocation
page read and write
4301000
heap
page read and write
F6E000
stack
page read and write
16C0AFDF000
trusted library allocation
page read and write
16C08A63000
trusted library allocation
page read and write
16C0DFCA000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
13CC000
unkown
page execute and write copy
5361000
trusted library allocation
page read and write
16C0DDFA000
trusted library allocation
page read and write
E04000
heap
page read and write
16C7D360000
heap
page read and write
16C0CAF1000
trusted library allocation
page read and write
6BA000
heap
page read and write
2C3F000
stack
page read and write
16C0EA30000
trusted library allocation
page read and write
16C134EB000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
16C15BF3000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
2C4E000
stack
page read and write
16C0CCF2000
trusted library allocation
page read and write
16C1649D000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
16C0DB00000
trusted library allocation
page read and write
1CC5F000
stack
page read and write
16C0B7FE000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
EFD000
stack
page read and write
16C0B227000
trusted library allocation
page read and write
16C08ECE000
trusted library allocation
page read and write
3ADE000
stack
page read and write
16C7D345000
heap
page read and write
16C0C4F1000
trusted library allocation
page read and write
16C0C7A1000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
16C13798000
trusted library allocation
page read and write
D74000
heap
page read and write
784000
heap
page read and write
16C0AFB4000
trusted library allocation
page read and write
16C08AF5000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
16C7D35C000
heap
page read and write
16C0C72D000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
16C7D38C000
heap
page read and write
53A4000
trusted library allocation
page read and write
13CE000
heap
page read and write
16C7D327000
heap
page read and write
284B1FD0000
heap
page read and write
53CC000
trusted library allocation
page read and write
16C0EFF5000
trusted library allocation
page read and write
16C7D33C000
heap
page read and write
5EA6000
trusted library allocation
page read and write
16C1686D000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
535C000
trusted library allocation
page read and write
591D000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
7D4000
heap
page read and write
16C0EDE3000
trusted library allocation
page read and write
16C139B0000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
5E81000
trusted library allocation
page read and write
16C0AFB1000
trusted library allocation
page read and write
955C000
stack
page read and write
13B4000
unkown
page execute and read and write
16C15ACA000
trusted library allocation
page read and write
170E000
stack
page read and write
80D000
unkown
page execute and read and write
784000
heap
page read and write
16C7D324000
heap
page read and write
2E0F000
stack
page read and write
16C0CB73000
trusted library allocation
page read and write
16C135E7000
trusted library allocation
page read and write
16C137FA000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C0DD17000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0CAF1000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C7D324000
heap
page read and write
10C4000
heap
page read and write
5360000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
4A4E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
16C7D38C000
heap
page read and write
16C7D331000
heap
page read and write
16C7D380000
heap
page read and write
16C0CA66000
trusted library allocation
page read and write
16C7F47F000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
6E6000
heap
page read and write
E48000
heap
page read and write
3E5F000
stack
page read and write
4F20000
direct allocation
page execute and read and write
C71000
heap
page read and write
5F3F000
trusted library allocation
page read and write
1C8E14B9000
heap
page read and write
D74000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
5E02000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
D74000
heap
page read and write
16C14F6D000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
16C0E961000
trusted library allocation
page read and write
117A000
heap
page read and write
16C0AF9A000
trusted library allocation
page read and write
D74000
heap
page read and write
5918000
trusted library allocation
page read and write
4651000
heap
page read and write
D74000
heap
page read and write
4651000
heap
page read and write
16C0EF9D000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
16C1349E000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
26808031000
heap
page read and write
12BB000
unkown
page execute and write copy
B50000
direct allocation
page read and write
6E6000
heap
page read and write
1C8E14E5000
heap
page read and write
4271000
heap
page read and write
16C1648F000
trusted library allocation
page read and write
16C0DDF7000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
16C7D360000
heap
page read and write
16C7D380000
heap
page read and write
16C13596000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
172A000
heap
page read and write
16C7D356000
heap
page read and write
1573000
unkown
page execute and write copy
16C7D34E000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C0B389000
trusted library allocation
page read and write
16C0C0D4000
trusted library allocation
page read and write
16C7D330000
heap
page read and write
4F30000
direct allocation
page execute and read and write
16C0BB05000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
4971000
heap
page read and write
690000
direct allocation
page read and write
26807FAC000
heap
page read and write
5E68000
trusted library allocation
page read and write
D75000
heap
page read and write
10C4000
heap
page read and write
4871000
heap
page read and write
58E9000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
C51000
heap
page read and write
16C0DEF0000
trusted library allocation
page read and write
7D4000
heap
page read and write
5389000
trusted library allocation
page read and write
16C08A98000
trusted library allocation
page read and write
130E000
stack
page read and write
5F75000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0E9D5000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
4FE0000
direct allocation
page read and write
16C0E967000
trusted library allocation
page read and write
16C137C4000
trusted library allocation
page read and write
16C137C8000
trusted library allocation
page read and write
2E9E000
stack
page read and write
16C7D33C000
heap
page read and write
16C7F47F000
trusted library allocation
page read and write
16C0D9AF000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
4C2B000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
16C13476000
trusted library allocation
page read and write
16C0BBF5000
trusted library allocation
page read and write
16C13BC1000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
539B000
trusted library allocation
page read and write
16C7D33D000
heap
page read and write
52A0000
direct allocation
page execute and read and write
542C000
trusted library allocation
page read and write
16C7D334000
heap
page read and write
4651000
heap
page read and write
16C0C70A000
trusted library allocation
page read and write
7D4000
heap
page read and write
4651000
heap
page read and write
16C7D32E000
heap
page read and write
5350000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
454E000
stack
page read and write
16C7D388000
heap
page read and write
16C0B790000
trusted library allocation
page read and write
74E000
heap
page read and write
5C87000
trusted library allocation
page read and write
DB0000
unkown
page readonly
16C0BBFE000
trusted library allocation
page read and write
1164000
heap
page read and write
129F000
stack
page read and write
17F0000
heap
page read and write
4F80000
direct allocation
page execute and read and write
16C0EDB1000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
4870000
heap
page read and write
1424000
heap
page read and write
5378000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
16C13BF1000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C7F534000
trusted library allocation
page read and write
16C0CA25000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
16C0EA74000
trusted library allocation
page read and write
AF5000
stack
page read and write
820000
direct allocation
page read and write
16C0CE3F000
trusted library allocation
page read and write
16C0C476000
trusted library allocation
page read and write
6D6F000
stack
page read and write
6008000
trusted library allocation
page read and write
16C0CB9B000
trusted library allocation
page read and write
5C82000
trusted library allocation
page read and write
3A2E000
stack
page read and write
16C0C751000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C15BF0000
trusted library allocation
page read and write
478F000
stack
page read and write
16C7D31E000
heap
page read and write
594C000
trusted library allocation
page read and write
C55000
heap
page read and write
16C0CB81000
trusted library allocation
page read and write
16C13BEF000
trusted library allocation
page read and write
784000
heap
page read and write
115A000
heap
page read and write
BC0000
heap
page read and write
16C138CF000
trusted library allocation
page read and write
945C000
stack
page read and write
16C7D35A000
heap
page read and write
D74000
heap
page read and write
4E1F000
stack
page read and write
16C0CCF7000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
535D000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0DEDA000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
16C0BBF3000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
4FF1000
heap
page read and write
4A20000
direct allocation
page read and write
16C7D334000
heap
page read and write
16C0B250000
trusted library allocation
page read and write
D74000
heap
page read and write
2730000
direct allocation
page read and write
53AF000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
16C0C74C000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
D74000
heap
page read and write
92A000
unkown
page execute and write copy
16C7D31E000
heap
page read and write
4390000
direct allocation
page read and write
16C7D34E000
heap
page read and write
6B6F000
stack
page read and write
929000
unkown
page execute and write copy
16C7F534000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D31E000
heap
page read and write
53AA000
trusted library allocation
page read and write
16C0C7DE000
trusted library allocation
page read and write
16C086A6000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
459F000
stack
page read and write
1094000
heap
page read and write
5600000
direct allocation
page execute and read and write
4F15000
trusted library allocation
page read and write
16C0EA0E000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
4871000
heap
page read and write
E04000
heap
page read and write
16C7FAFE000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
5354000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
4861000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0ED43000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C0B3A7000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C0C73D000
trusted library allocation
page read and write
16C0C749000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
2C10000
heap
page read and write
280000
unkown
page write copy
2E5F000
stack
page read and write
71F07FF000
stack
page read and write
16C7D350000
heap
page read and write
FD8000
heap
page read and write
16C7D380000
heap
page read and write
4861000
heap
page read and write
C49000
heap
page read and write
369F000
stack
page read and write
16C7D345000
heap
page read and write
34CF000
stack
page read and write
6050000
trusted library allocation
page read and write
16C0B3E7000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C13469000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C7F481000
trusted library allocation
page read and write
16C7D336000
heap
page read and write
16C13494000
trusted library allocation
page read and write
16C1678A000
trusted library allocation
page read and write
16C7FB9E000
trusted library allocation
page read and write
1400000
heap
page read and write
784000
heap
page read and write
4CB1000
trusted library allocation
page read and write
55BF000
stack
page read and write
1424000
heap
page read and write
16C7D357000
heap
page read and write
4301000
heap
page read and write
16C7D354000
heap
page read and write
40DF000
stack
page read and write
58B4000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
16C0CCE8000
trusted library allocation
page read and write
16C0CB44000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
3B9F000
stack
page read and write
16C134DE000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0CDEF000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
FCA000
heap
page read and write
5E27000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
5D5D000
trusted library allocation
page read and write
16C134E9000
trusted library allocation
page read and write
16C7F5DA000
trusted library allocation
page read and write
16C0B7EA000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
EF5000
stack
page read and write
1E4000
heap
page read and write
16C7D354000
heap
page read and write
16C0AFFE000
trusted library allocation
page read and write
16C0DAC8000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0B39C000
trusted library allocation
page read and write
16C0BB10000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
D10000
direct allocation
page read and write
16C7D35C000
heap
page read and write
16C0D933000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
16C7FBB6000
trusted library allocation
page read and write
38CE000
stack
page read and write
59E9000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
16C0DEDC000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
AC9000
unkown
page execute and read and write
B50000
direct allocation
page read and write
7D4000
heap
page read and write
4C91000
heap
page read and write
16C7D335000
heap
page read and write
4910000
direct allocation
page read and write
592C000
trusted library allocation
page read and write
16C0CE09000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
300F000
stack
page read and write
16C137B0000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
D32000
heap
page read and write
16C0ED91000
trusted library allocation
page read and write
610000
unkown
page readonly
16C084EA000
trusted library allocation
page read and write
4900000
direct allocation
page execute and read and write
16C7D35A000
heap
page read and write
4651000
heap
page read and write
16C7D33C000
heap
page read and write
16C0ED98000
trusted library allocation
page read and write
16C0CEC7000
trusted library allocation
page read and write
16C16478000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
774000
unkown
page execute and write copy
16C7D382000
heap
page read and write
16C7D332000
heap
page read and write
4651000
heap
page read and write
1424000
heap
page read and write
16C7D388000
heap
page read and write
16C7D38A000
heap
page read and write
16C7D34E000
heap
page read and write
5D54000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
16C0DB6A000
trusted library allocation
page read and write
690000
direct allocation
page read and write
16C7FB13000
trusted library allocation
page read and write
58EF000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
4861000
heap
page read and write
5426000
trusted library allocation
page read and write
26807F9C000
heap
page read and write
4C5E000
stack
page read and write
314E000
stack
page read and write
16C137BC000
trusted library allocation
page read and write
13F3000
heap
page read and write
16C7D380000
heap
page read and write
16C0EFE3000
trusted library allocation
page read and write
16C0C7F3000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C7FBF9000
trusted library allocation
page read and write
16C0EDFB000
trusted library allocation
page read and write
16C13416000
trusted library allocation
page read and write
4971000
heap
page read and write
1374000
heap
page read and write
480000
unkown
page readonly
16C085E5000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
16C0EF9F000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0CCDF000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D345000
heap
page read and write
591A000
trusted library allocation
page read and write
16C134D6000
trusted library allocation
page read and write
6BF000
heap
page read and write
5310000
direct allocation
page execute and read and write
5363000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
7D4000
heap
page read and write
16C0CB75000
trusted library allocation
page read and write
1400000
heap
page read and write
284B1EC0000
heap
page read and write
53A7000
trusted library allocation
page read and write
1010000
unkown
page execute and write copy
16C7D360000
heap
page read and write
16C13456000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
784000
heap
page read and write
16C7D345000
heap
page read and write
16C0C4A7000
trusted library allocation
page read and write
DEB000
unkown
page execute and read and write
16C15B24000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C0B2CC000
trusted library allocation
page read and write
16C137B9000
trusted library allocation
page read and write
4861000
heap
page read and write
6F9000
heap
page read and write
16C13576000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0B28D000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C14F43000
trusted library allocation
page read and write
16C7FB82000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
5376000
trusted library allocation
page read and write
16C0CB7E000
trusted library allocation
page read and write
13FF000
heap
page read and write
5CB1000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
13CB000
unkown
page execute and write copy
16C7D34A000
heap
page read and write
5360000
trusted library allocation
page read and write
16C13BF1000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0D95C000
trusted library allocation
page read and write
C4F000
heap
page read and write
5CA6000
trusted library allocation
page read and write
1094000
heap
page read and write
57E0000
remote allocation
page read and write
16C0B7F4000
trusted library allocation
page read and write
4861000
heap
page read and write
3A9E000
stack
page read and write
5E81000
trusted library allocation
page read and write
71F27FE000
stack
page read and write
16C7D35A000
heap
page read and write
4C91000
heap
page read and write
58BB000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D332000
heap
page read and write
16C0C428000
trusted library allocation
page read and write
4FC3000
trusted library allocation
page read and write
16C164F6000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
16C0C746000
trusted library allocation
page read and write
1094000
heap
page read and write
5D5D000
trusted library allocation
page read and write
4E81000
heap
page read and write
5460000
heap
page read and write
4C91000
heap
page read and write
5354000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D38D000
heap
page read and write
10C4000
heap
page read and write
16C7D38D000
heap
page read and write
16C0C0FC000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D32B000
heap
page read and write
16C084E8000
trusted library allocation
page read and write
16C0B2B6000
trusted library allocation
page read and write
3297000
heap
page read and write
310F000
stack
page read and write
16C7FEB5000
trusted library allocation
page read and write
16C0ED98000
trusted library allocation
page read and write
16C0DDF4000
trusted library allocation
page read and write
485E000
stack
page read and write
4871000
heap
page read and write
D80000
unkown
page readonly
7D4000
heap
page read and write
16C7D354000
heap
page read and write
2F00000
heap
page read and write
16C0C7E6000
trusted library allocation
page read and write
16C134B8000
trusted library allocation
page read and write
918C000
stack
page read and write
4D01000
heap
page read and write
16C134AE000
trusted library allocation
page read and write
16C169A8000
trusted library allocation
page read and write
310000
unkown
page readonly
26807FBF000
heap
page read and write
16C0CA51000
trusted library allocation
page read and write
4621000
heap
page read and write
1C40000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
16C0DFE4000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
16C0C4F1000
trusted library allocation
page read and write
16C0C85A000
trusted library allocation
page read and write
16C13BE6000
trusted library allocation
page read and write
16C0AF4E000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
B9C000
stack
page read and write
16C0B220000
trusted library allocation
page read and write
26807FAC000
heap
page read and write
5D5F000
trusted library allocation
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
5CA4000
trusted library allocation
page read and write
378F000
stack
page read and write
4971000
heap
page read and write
5680000
direct allocation
page execute and read and write
16C7D328000
heap
page read and write
16C0D983000
trusted library allocation
page read and write
16C086F6000
trusted library allocation
page read and write
4301000
heap
page read and write
535C000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C13597000
trusted library allocation
page read and write
16C139E0000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0CCF4000
trusted library allocation
page read and write
16C0C7D6000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
10FD000
heap
page read and write
820000
direct allocation
page read and write
1094000
heap
page read and write
4970000
direct allocation
page read and write
16C7D35C000
heap
page read and write
16C086AA000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
40DF000
stack
page read and write
BF6000
heap
page read and write
5CD4000
trusted library allocation
page read and write
9C2000
unkown
page execute and read and write
16C0B775000
trusted library allocation
page read and write
16C0CB71000
trusted library allocation
page read and write
7CB1000
heap
page read and write
16C15A4C000
trusted library allocation
page read and write
16C0CAEA000
trusted library allocation
page read and write
16C164CF000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
1168000
heap
page read and write
16C0CB9B000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
5D54000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
16C0DEDA000
trusted library allocation
page read and write
16C0BBFB000
trusted library allocation
page read and write
1C8E17B0000
heap
page read and write
16C0D9C8000
trusted library allocation
page read and write
16C0B2B6000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D388000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C15A34000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
16C138EF000
trusted library allocation
page read and write
16C7F565000
trusted library allocation
page read and write
16C0C8C8000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
58C7000
trusted library allocation
page read and write
744000
unkown
page execute and write copy
10C4000
heap
page read and write
414F000
stack
page read and write
16C1358D000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C7D38A000
heap
page read and write
5353000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0E958000
trusted library allocation
page read and write
481F000
stack
page read and write
B20000
heap
page read and write
16C7D380000
heap
page read and write
D74000
heap
page read and write
5CAB000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C7F4A6000
trusted library allocation
page read and write
16C15001000
trusted library allocation
page read and write
16C13743000
trusted library allocation
page read and write
17E0000
heap
page read and write
5D1E000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0D9E9000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
16C7D387000
heap
page read and write
49B0000
direct allocation
page execute and read and write
16C08674000
trusted library allocation
page read and write
6E9000
heap
page read and write
5BB4000
trusted library allocation
page read and write
16C0DEF0000
trusted library allocation
page read and write
16C1349A000
trusted library allocation
page read and write
16C1377D000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C7D345000
heap
page read and write
4861000
heap
page read and write
58D7000
trusted library allocation
page read and write
16C1398A000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
53D4000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
16C0CCCB000
trusted library allocation
page read and write
16C0CB81000
trusted library allocation
page read and write
16C08669000
trusted library allocation
page read and write
16C085E0000
trusted library allocation
page read and write
138D000
heap
page read and write
4880000
heap
page read and write
16C7D389000
heap
page read and write
535D000
trusted library allocation
page read and write
4871000
heap
page read and write
38CE000
stack
page read and write
16C0C4D9000
trusted library allocation
page read and write
C63000
heap
page read and write
1D54F000
stack
page read and write
16C0AF62000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0C7C7000
trusted library allocation
page read and write
DBE000
stack
page read and write
16C7D354000
heap
page read and write
1E4000
heap
page read and write
690000
direct allocation
page read and write
593C000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C084E8000
trusted library allocation
page read and write
44DE000
stack
page read and write
16C0CFA1000
trusted library allocation
page read and write
D74000
heap
page read and write
538D000
trusted library allocation
page read and write
16C0B274000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
16C0CB75000
trusted library allocation
page read and write
68C000
heap
page read and write
16C7D360000
heap
page read and write
16C7D365000
heap
page read and write
53D3000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
2730000
direct allocation
page read and write
4F40000
direct allocation
page execute and read and write
16C7D350000
heap
page read and write
7CC0000
heap
page read and write
16C0B3B2000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
53E3000
trusted library allocation
page read and write
6F7000
heap
page read and write
1E4000
heap
page read and write
4390000
direct allocation
page read and write
16C134B2000
trusted library allocation
page read and write
4C91000
heap
page read and write
4CB0000
heap
page read and write
1CFDF000
stack
page read and write
58E6000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
16C0CBFD000
trusted library allocation
page read and write
4871000
heap
page read and write
16C137B9000
trusted library allocation
page read and write
16C0C4A1000
trusted library allocation
page read and write
16C0CA4E000
trusted library allocation
page read and write
5DFB000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
58B5000
trusted library allocation
page read and write
11FF000
stack
page read and write
16C7F5AD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D38A000
heap
page read and write
16C0E9D7000
trusted library allocation
page read and write
ACB000
unkown
page execute and write copy
16C7D332000
heap
page read and write
1294000
unkown
page execute and write copy
4C05000
trusted library allocation
page read and write
1094000
heap
page read and write
16C15033000
trusted library allocation
page read and write
1374000
heap
page read and write
1182000
heap
page read and write
16C0CAFC000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D356000
heap
page read and write
16C137B0000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
4F90000
direct allocation
page execute and read and write
5CD1000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
58B9000
trusted library allocation
page read and write
458E000
stack
page read and write
16C139B8000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C7D332000
heap
page read and write
1D0AE000
stack
page read and write
26807FA0000
heap
page read and write
4F60000
direct allocation
page execute and read and write
16C1376B000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
1C8E14B0000
heap
page read and write
16C7D345000
heap
page read and write
16C7FE8E000
trusted library allocation
page read and write
4861000
heap
page read and write
5351000
trusted library allocation
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
E04000
heap
page read and write
16C0D8B6000
trusted library allocation
page read and write
1CBAD000
stack
page read and write
16C7D35C000
heap
page read and write
16C7F54B000
trusted library allocation
page read and write
16C0CDBE000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
15C0000
direct allocation
page read and write
16C08E84000
trusted library allocation
page read and write
2ACF000
stack
page read and write
1E4000
heap
page read and write
53AB000
trusted library allocation
page read and write
70E000
heap
page read and write
16C0CA29000
trusted library allocation
page read and write
16C0CB55000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
16C0DFE0000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
1094000
heap
page read and write
16C164F6000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C7D332000
heap
page read and write
16C0C861000
trusted library allocation
page read and write
643C000
trusted library allocation
page read and write
15BE000
stack
page read and write
64B7000
trusted library allocation
page read and write
16C14F4D000
trusted library allocation
page read and write
1D44E000
stack
page read and write
5310000
direct allocation
page execute and read and write
1094000
heap
page read and write
4F80000
direct allocation
page execute and read and write
BA0000
unkown
page readonly
CA0000
direct allocation
page read and write
16C7D336000
heap
page read and write
16C7D382000
heap
page read and write
4861000
heap
page read and write
5922000
trusted library allocation
page read and write
16C0C722000
trusted library allocation
page read and write
71B000
heap
page read and write
4871000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C0CB60000
trusted library allocation
page read and write
16C0B7BD000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
59B7000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C13666000
trusted library allocation
page read and write
16C7D334000
heap
page read and write
5CA7000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
16C0CAAC000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
F00000
heap
page read and write
4860000
direct allocation
page execute and read and write
1D1EE000
stack
page read and write
16C0D95F000
trusted library allocation
page read and write
1374000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C0CBFD000
trusted library allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
16C7D35B000
heap
page read and write
4871000
heap
page read and write
16C0DD9F000
trusted library allocation
page read and write
16C138F9000
trusted library allocation
page read and write
10F4000
heap
page read and write
16C7D38C000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C0DDEE000
trusted library allocation
page read and write
4FE0000
direct allocation
page read and write
1572000
unkown
page execute and read and write
10E6000
heap
page read and write
4871000
heap
page read and write
16C139F4000
trusted library allocation
page read and write
16C0B3EA000
trusted library allocation
page read and write
D74000
heap
page read and write
60AE000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0B3CD000
trusted library allocation
page read and write
1C40000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
16C7F498000
trusted library allocation
page read and write
116B000
heap
page read and write
49B0000
direct allocation
page execute and read and write
9561000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C0CB65000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0CFF3000
trusted library allocation
page read and write
323C000
stack
page read and write
16C0C8F7000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C1368D000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
5CB4000
trusted library allocation
page read and write
16C7F5B5000
trusted library allocation
page read and write
16C164F6000
trusted library allocation
page read and write
16C7FBE2000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D35A000
heap
page read and write
5CD5000
trusted library allocation
page read and write
404F000
stack
page read and write
5914000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
13E5000
heap
page read and write
16C7D356000
heap
page read and write
40DE000
stack
page read and write
16C7D38D000
heap
page read and write
16C7FE2C000
trusted library allocation
page read and write
1370000
heap
page read and write
4C40000
direct allocation
page execute and read and write
5442000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
5C9F000
trusted library allocation
page read and write
4C91000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
16C0DAD2000
trusted library allocation
page read and write
13C5000
heap
page read and write
5F74000
trusted library allocation
page read and write
16C1640C000
trusted library allocation
page read and write
268080B7000
heap
page read and write
16C7D31D000
heap
page read and write
16C13725000
trusted library allocation
page read and write
16C134E9000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7F498000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
5294000
trusted library allocation
page read and write
D74000
heap
page read and write
12BB000
unkown
page execute and write copy
5388000
trusted library allocation
page read and write
1094000
heap
page read and write
4651000
heap
page read and write
784000
heap
page read and write
1183000
heap
page read and write
591A000
trusted library allocation
page read and write
5F75000
trusted library allocation
page read and write
16C0DEA8000
trusted library allocation
page read and write
4B80000
direct allocation
page execute and read and write
2A1000
unkown
page execute and write copy
537B000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
16C0C82B000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0D9E9000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16C7D315000
heap
page read and write
16C0AF92000
trusted library allocation
page read and write
16C15B1E000
trusted library allocation
page read and write
17C3000
heap
page read and write
705000
heap
page read and write
4861000
heap
page read and write
16C0B7B6000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
481000
unkown
page execute and write copy
16C7D354000
heap
page read and write
59B1000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
EFE000
stack
page read and write
C90000
direct allocation
page read and write
16C7D354000
heap
page read and write
16C7D354000
heap
page read and write
58BB000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D31E000
heap
page read and write
53CD000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
F7D000
unkown
page execute and read and write
16C135D3000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
31DE000
stack
page read and write
16C7D338000
heap
page read and write
16C0DD8C000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
7D4000
heap
page read and write
16C7D332000
heap
page read and write
428F000
stack
page read and write
16C0BB17000
trusted library allocation
page read and write
16C086EB000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
4911000
heap
page read and write
46CE000
stack
page read and write
16C7D354000
heap
page read and write
16C0B362000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
690000
direct allocation
page read and write
16C0E9ED000
trusted library allocation
page read and write
12AB000
unkown
page execute and write copy
2CBE000
stack
page read and write
607D000
trusted library allocation
page read and write
5666000
trusted library allocation
page read and write
D74000
heap
page read and write
117A000
heap
page read and write
58BD000
trusted library allocation
page read and write
16C0CAA4000
trusted library allocation
page read and write
16C13885000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C7D33A000
heap
page read and write
16C133E6000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
16C08AC8000
trusted library allocation
page read and write
16C13582000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
16C0C857000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
CB4000
heap
page read and write
16C7F543000
trusted library allocation
page read and write
12AB000
unkown
page execute and write copy
1408000
heap
page read and write
16C7D345000
heap
page read and write
115B000
heap
page read and write
EC0000
unkown
page readonly
10F4000
heap
page read and write
16C0CB04000
trusted library allocation
page read and write
59E1000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
62AA000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D356000
heap
page read and write
5944000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
16C13727000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
6150000
trusted library allocation
page read and write
16C13BFE000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
B02000
unkown
page execute and read and write
26808020000
heap
page read and write
CA0000
direct allocation
page read and write
5C86000
trusted library allocation
page read and write
4A10000
remote allocation
page read and write
16C7D35A000
heap
page read and write
16C167AC000
trusted library allocation
page read and write
BF0000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
16C0C7E6000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C084F8000
trusted library allocation
page read and write
4EDE000
stack
page read and write
16C7FB1A000
trusted library allocation
page read and write
1166000
heap
page read and write
16C0D8D3000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
6060000
trusted library allocation
page read and write
2C4E000
stack
page read and write
E04000
heap
page read and write
16C7D332000
heap
page read and write
2C30000
direct allocation
page read and write
53EC000
trusted library allocation
page read and write
482000
unkown
page execute and write copy
16C0BCFE000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C7D337000
heap
page read and write
2C5F000
stack
page read and write
16C7D38A000
heap
page read and write
540D000
trusted library allocation
page read and write
D50000
direct allocation
page read and write
16C0DB05000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C139AE000
trusted library allocation
page read and write
16C0CB55000
trusted library allocation
page read and write
16C0BBEC000
trusted library allocation
page read and write
16C0C8FA000
trusted library allocation
page read and write
95B000
unkown
page execute and read and write
16C0B399000
trusted library allocation
page read and write
7D4000
heap
page read and write
4861000
heap
page read and write
6157000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
705000
heap
page read and write
16C0B3E8000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C0C7BC000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
16C0B347000
trusted library allocation
page read and write
C64000
heap
page read and write
16C134C5000
trusted library allocation
page read and write
16C7D33C000
heap
page read and write
5410000
trusted library allocation
page read and write
16C0B3B2000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
5EDF000
trusted library allocation
page read and write
1CB5E000
stack
page read and write
16C0C86F000
trusted library allocation
page read and write
2B0E000
stack
page read and write
8AF000
stack
page read and write
16C0B75A000
trusted library allocation
page read and write
16C7F56F000
trusted library allocation
page read and write
16C0EDF3000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
5C7F000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D31E000
heap
page read and write
314F000
stack
page read and write
4301000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D31E000
heap
page read and write
1000000
direct allocation
page read and write
5408000
trusted library allocation
page read and write
16C0C7E4000
trusted library allocation
page read and write
16C085FE000
trusted library allocation
page read and write
16C1373E000
trusted library allocation
page read and write
5E37000
trusted library allocation
page read and write
16C7D32A000
heap
page read and write
16C7D345000
heap
page read and write
64FA000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
16C0B360000
trusted library allocation
page read and write
D19000
heap
page read and write
16C7D357000
heap
page read and write
16C0DFE4000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0C7D6000
trusted library allocation
page read and write
16C0B3DE000
trusted library allocation
page read and write
16C16884000
trusted library allocation
page read and write
3B4E000
stack
page read and write
D74000
heap
page read and write
16C0B779000
trusted library allocation
page read and write
D55000
stack
page read and write
D74000
heap
page read and write
5944000
trusted library allocation
page read and write
16C7F5AD000
trusted library allocation
page read and write
16C0CA07000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
16C0B3EA000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
E94000
unkown
page execute and write copy
53C8000
trusted library allocation
page read and write
16C16767000
trusted library allocation
page read and write
610000
unkown
page read and write
10C4000
heap
page read and write
16C7D380000
heap
page read and write
58D5000
trusted library allocation
page read and write
16C0DFF1000
trusted library allocation
page read and write
D74000
heap
page read and write
611000
unkown
page execute and write copy
16C0D89B000
trusted library allocation
page read and write
D74000
heap
page read and write
4271000
heap
page read and write
49B0000
direct allocation
page execute and read and write
1E4000
heap
page read and write
537A000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
BE4000
heap
page read and write
16C0E967000
trusted library allocation
page read and write
D74000
heap
page read and write
495A000
trusted library allocation
page read and write
16C08A8F000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
115B000
heap
page read and write
16C7F44D000
trusted library allocation
page read and write
16C08CC8000
heap
page read and write
16C0DE93000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
5F72000
trusted library allocation
page read and write
16C0DDE3000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
16C7D325000
heap
page read and write
26808028000
heap
page read and write
16C7D382000
heap
page read and write
16C7D34E000
heap
page read and write
5FBA000
trusted library allocation
page read and write
16C134F0000
trusted library allocation
page read and write
16C164E4000
trusted library allocation
page read and write
16C0C7C7000
trusted library allocation
page read and write
16C0B253000
trusted library allocation
page read and write
116F000
heap
page read and write
764000
heap
page read and write
537B000
trusted library allocation
page read and write
2BCB000
stack
page read and write
1C8E31B0000
heap
page read and write
16C7D380000
heap
page read and write
53A1000
trusted library allocation
page read and write
16C08A8D000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C08E88000
trusted library allocation
page read and write
16C08A61000
trusted library allocation
page read and write
16C0CCFC000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D381000
heap
page read and write
16C15BE0000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
E04000
heap
page read and write
5C78000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
1374000
heap
page read and write
5392000
trusted library allocation
page read and write
C6B4FFF000
stack
page read and write
371E000
stack
page read and write
16C0C863000
trusted library allocation
page read and write
16C134E5000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
16C7D382000
heap
page read and write
16C0AFB3000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
16C139AF000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
16C0CA9A000
trusted library allocation
page read and write
3BDE000
stack
page read and write
16C0B3F7000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C7D336000
heap
page read and write
16C7D332000
heap
page read and write
13BF000
heap
page read and write
1E4000
heap
page read and write
59FE000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
1E4000
heap
page read and write
5375000
trusted library allocation
page read and write
16C7D33D000
heap
page read and write
D82000
unkown
page execute and write copy
425E000
stack
page read and write
3D8F000
stack
page read and write
65A0000
trusted library allocation
page read and write
16C13593000
trusted library allocation
page read and write
490E000
stack
page read and write
16C7D382000
heap
page read and write
4C91000
heap
page read and write
4720000
trusted library allocation
page read and write
16C15300000
trusted library allocation
page read and write
64B5000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
58B9000
trusted library allocation
page read and write
16C086E5000
trusted library allocation
page read and write
13B6000
heap
page read and write
16C7F498000
trusted library allocation
page read and write
16C7D336000
heap
page read and write
16C0CA9A000
trusted library allocation
page read and write
4651000
heap
page read and write
58C1000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
16C7D331000
heap
page read and write
16C0AFB4000
trusted library allocation
page read and write
605B000
trusted library allocation
page read and write
284B2100000
trusted library allocation
page read and write
4B4F000
stack
page read and write
5CDD000
trusted library allocation
page read and write
705000
heap
page read and write
53FC000
trusted library allocation
page read and write
16C0D9E5000
trusted library allocation
page read and write
1D414000
heap
page read and write
1EC000
stack
page read and write
5D55000
trusted library allocation
page read and write
6EA000
heap
page read and write
7D4000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
53F1000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D382000
heap
page read and write
16C0B362000
trusted library allocation
page read and write
2A0000
unkown
page readonly
16C138EA000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C7D34E000
heap
page read and write
2BDE000
stack
page read and write
566B000
trusted library allocation
page read and write
1C8E31B1000
heap
page read and write
4C91000
heap
page read and write
16C0DFE0000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
16C7F5E1000
trusted library allocation
page read and write
16C0C768000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
16C7F44D000
trusted library allocation
page read and write
16C0CB44000
trusted library allocation
page read and write
4C91000
heap
page read and write
268080B9000
heap
page read and write
13C2000
heap
page read and write
59B1000
trusted library allocation
page read and write
16C13397000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
16C0CA5A000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
16C137CD000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16C16496000
trusted library allocation
page read and write
4A10000
remote allocation
page read and write
784000
heap
page read and write
16C7D382000
heap
page read and write
1CDDE000
stack
page read and write
1D0000
heap
page read and write
16C134C1000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
4C91000
heap
page read and write
5F8E000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0CB77000
trusted library allocation
page read and write
16C7D3B7000
heap
page read and write
16C13BF8000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
300000
unkown
page execute and write copy
16C7D32D000
heap
page read and write
592B000
trusted library allocation
page read and write
CB4000
heap
page read and write
4D01000
heap
page read and write
820000
direct allocation
page read and write
16C7D394000
heap
page read and write
D74000
heap
page read and write
67B000
unkown
page execute and read and write
5C08000
trusted library allocation
page read and write
16C0ED5F000
trusted library allocation
page read and write
1408000
heap
page read and write
16C0AF92000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C137D1000
trusted library allocation
page read and write
2680806A000
heap
page read and write
58D2000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D38A000
heap
page read and write
2D4F000
stack
page read and write
16C7D357000
heap
page read and write
16C0EA86000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
2C0F000
stack
page read and write
16C0C4B7000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7F58A000
trusted library allocation
page read and write
4921000
heap
page read and write
485E000
stack
page read and write
D74000
heap
page read and write
16C7FF60000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
16C0CAA5000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
16C7FBCF000
trusted library allocation
page read and write
468F000
stack
page read and write
E04000
heap
page read and write
16C7D388000
heap
page read and write
16C084F8000
trusted library allocation
page read and write
DA0000
direct allocation
page execute and read and write
4651000
heap
page read and write
53EC000
trusted library allocation
page read and write
2680802B000
heap
page read and write
16C7D35C000
heap
page read and write
784000
heap
page read and write
16C1368D000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
D74000
heap
page read and write
177F000
heap
page read and write
16C0C42F000
trusted library allocation
page read and write
350F000
stack
page read and write
16C7FBCE000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D34E000
heap
page read and write
540D000
trusted library allocation
page read and write
16C0B26D000
trusted library allocation
page read and write
95C000
unkown
page execute and write copy
116F000
heap
page read and write
16C7D345000
heap
page read and write
16C0BB08000
trusted library allocation
page read and write
1E4000
heap
page read and write
D74000
heap
page read and write
16C13BDE000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
705000
heap
page read and write
4FE0000
direct allocation
page read and write
16C7D380000
heap
page read and write
7D4000
heap
page read and write
16C0AF74000
trusted library allocation
page read and write
4A0F000
stack
page read and write
16C139AE000
trusted library allocation
page read and write
52AE000
stack
page read and write
16C0D9F0000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
16C7D350000
heap
page read and write
16C0CCDF000
trusted library allocation
page read and write
16C138F3000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4910000
direct allocation
page execute and read and write
D74000
heap
page read and write
E6F000
heap
page read and write
16C0CAF1000
trusted library allocation
page read and write
4861000
heap
page read and write
16C0CA82000
trusted library allocation
page read and write
17DF000
heap
page read and write
5355000
trusted library allocation
page read and write
300F000
stack
page read and write
10C4000
heap
page read and write
16C7F569000
trusted library allocation
page read and write
16C0AF94000
trusted library allocation
page read and write
16C0C782000
trusted library allocation
page read and write
16C0EAEC000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
305F000
stack
page read and write
16C0866D000
trusted library allocation
page read and write
16C7D31D000
heap
page read and write
4F30000
direct allocation
page execute and read and write
449E000
stack
page read and write
5CD7000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
71F37FF000
stack
page read and write
5CB6000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0CEC5000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
3CDF000
stack
page read and write
16C7D327000
heap
page read and write
16C7D354000
heap
page read and write
5E3F000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C0B24C000
trusted library allocation
page read and write
48E0000
direct allocation
page execute and read and write
16C7D32E000
heap
page read and write
16C0C0DB000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
6E6000
heap
page read and write
5919000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
12DC000
heap
page read and write
16C7D380000
heap
page read and write
4651000
heap
page read and write
16C0CB45000
trusted library allocation
page read and write
4C91000
heap
page read and write
E84000
unkown
page execute and write copy
16C0B3CD000
trusted library allocation
page read and write
16C0C4E2000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
16C0C424000
trusted library allocation
page read and write
16C0B33D000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0CA5A000
trusted library allocation
page read and write
1399000
heap
page read and write
16C7D388000
heap
page read and write
16C0EAB6000
trusted library allocation
page read and write
D74000
heap
page read and write
560C000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
3CD000
unkown
page execute and read and write
16C139B3000
trusted library allocation
page read and write
4301000
heap
page read and write
5C8A000
trusted library allocation
page read and write
16C15B1E000
trusted library allocation
page read and write
16C08AC8000
trusted library allocation
page read and write
1CC9E000
stack
page read and write
1400000
heap
page read and write
10F4000
heap
page read and write
16C7D304000
heap
page read and write
16C0C4D7000
trusted library allocation
page read and write
16C0CA41000
trusted library allocation
page read and write
16C7F498000
trusted library allocation
page read and write
16C138F1000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D354000
heap
page read and write
16C7D312000
heap
page read and write
D74000
heap
page read and write
16C1373E000
trusted library allocation
page read and write
16C138DE000
trusted library allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C0CACC000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0DBBC000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0CBF9000
trusted library allocation
page read and write
16C16466000
trusted library allocation
page read and write
16C7D320000
heap
page read and write
5381000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
566A000
trusted library allocation
page read and write
16C0CB44000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
16C14FA7000
trusted library allocation
page read and write
1D34E000
stack
page read and write
5C94000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7F479000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
16C7FBE3000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0C73D000
trusted library allocation
page read and write
16C0AF62000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D326000
heap
page read and write
5E48000
trusted library allocation
page read and write
26807FA3000
heap
page read and write
16C7D354000
heap
page read and write
5360000
trusted library allocation
page read and write
610000
unkown
page readonly
16C134DE000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
4651000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
16C13433000
trusted library allocation
page read and write
5470000
direct allocation
page execute and read and write
4651000
heap
page read and write
16C7D357000
heap
page read and write
53D4000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0C0DB000
trusted library allocation
page read and write
16C084E8000
trusted library allocation
page read and write
7D4000
heap
page read and write
16C7D324000
heap
page read and write
4B0C000
stack
page read and write
16C13576000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D324000
heap
page read and write
16C7D360000
heap
page read and write
16C0EA4B000
trusted library allocation
page read and write
CB4000
heap
page read and write
58B9000
trusted library allocation
page read and write
123B000
unkown
page execute and write copy
4F60000
direct allocation
page execute and read and write
D74000
heap
page read and write
4621000
heap
page read and write
16C7D324000
heap
page read and write
16C7D382000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
D74000
heap
page read and write
594C000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C0DD9D000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C08E82000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
16C7D35C000
heap
page read and write
16C7F4A1000
trusted library allocation
page read and write
13A7000
heap
page read and write
16C7D345000
heap
page read and write
16C7D357000
heap
page read and write
16C137C1000
trusted library allocation
page read and write
43CF000
stack
page read and write
5E47000
trusted library allocation
page read and write
4D1B000
stack
page read and write
331E000
stack
page read and write
16C7D357000
heap
page read and write
16C7FAF6000
trusted library allocation
page read and write
13C2000
heap
page read and write
53C9000
trusted library allocation
page read and write
16C137F1000
trusted library allocation
page read and write
1C8E14CF000
heap
page read and write
16C7D332000
heap
page read and write
54BE000
stack
page read and write
1094000
heap
page read and write
16C0CA29000
trusted library allocation
page read and write
16C13432000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
1172000
heap
page read and write
1094000
heap
page read and write
16C0E9E5000
trusted library allocation
page read and write
16C134EB000
trusted library allocation
page read and write
EBF000
stack
page read and write
16C7D354000
heap
page read and write
4D30000
remote allocation
page read and write
54A0000
direct allocation
page execute and read and write
16C0CB81000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C13B3F000
trusted library allocation
page read and write
4971000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C13721000
trusted library allocation
page read and write
D10000
direct allocation
page read and write
16C0B75C000
trusted library allocation
page read and write
17DF000
heap
page read and write
16C0B33B000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
16C0CBB4000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
16C7D345000
heap
page read and write
16C0DAC4000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
534C000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D336000
heap
page read and write
349E000
stack
page read and write
53AB000
trusted library allocation
page read and write
16C7D327000
heap
page read and write
16C13596000
trusted library allocation
page read and write
16C0B7AE000
trusted library allocation
page read and write
16C0DEAD000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
16C0DDE1000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
16C7FBE3000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
690000
direct allocation
page read and write
1D6DC000
stack
page read and write
1C8E1855000
heap
page read and write
16C7D32C000
heap
page read and write
53D3000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C16491000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
16C0AF8C000
trusted library allocation
page read and write
16C0EAC1000
trusted library allocation
page read and write
3620000
heap
page read and write
4970000
direct allocation
page read and write
1424000
heap
page read and write
10C4000
heap
page read and write
16C086C1000
trusted library allocation
page read and write
16C137D1000
trusted library allocation
page read and write
117A000
heap
page read and write
16C0CB91000
trusted library allocation
page read and write
13A7000
heap
page read and write
16C0CB7A000
trusted library allocation
page read and write
16C0C782000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
4DE0000
remote allocation
page read and write
328E000
stack
page read and write
5341000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
601D000
trusted library allocation
page read and write
309E000
stack
page read and write
6013000
trusted library allocation
page read and write
16C7F5E1000
trusted library allocation
page read and write
16C7F56F000
trusted library allocation
page read and write
690000
direct allocation
page read and write
16C084EB000
trusted library allocation
page read and write
13D2000
heap
page read and write
16C0DEFA000
trusted library allocation
page read and write
16C164C1000
trusted library allocation
page read and write
784000
heap
page read and write
4910000
direct allocation
page read and write
16C7D334000
heap
page read and write
2680802B000
heap
page read and write
4861000
heap
page read and write
53AA000
trusted library allocation
page read and write
16C0ED6F000
trusted library allocation
page read and write
16C08A88000
trusted library allocation
page read and write
24C000
unkown
page readonly
4C91000
heap
page read and write
16C7D331000
heap
page read and write
6E9000
heap
page read and write
16C7D350000
heap
page read and write
16C7D31E000
heap
page read and write
16C7D357000
heap
page read and write
6081000
trusted library allocation
page read and write
4871000
heap
page read and write
5C92000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
1380000
heap
page read and write
16C0EDFB000
trusted library allocation
page read and write
D74000
heap
page read and write
7D4000
heap
page read and write
395F000
stack
page read and write
1094000
heap
page read and write
C66000
heap
page read and write
4910000
direct allocation
page execute and read and write
5CBE000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C7D382000
heap
page read and write
5CBD000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0ED89000
trusted library allocation
page read and write
16C13BF5000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
127F000
stack
page read and write
16C15BE0000
trusted library allocation
page read and write
16C0B7F4000
trusted library allocation
page read and write
16C0DD9D000
trusted library allocation
page read and write
16C0C6B8000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D324000
heap
page read and write
16C137AD000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0C6CF000
trusted library allocation
page read and write
16C133F9000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7FED6000
trusted library allocation
page read and write
16C1398C000
trusted library allocation
page read and write
16C0AF92000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
360F000
stack
page read and write
16C1377B000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
5AF9000
trusted library allocation
page read and write
16C0C7BC000
trusted library allocation
page read and write
16C0CBFD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
1172000
heap
page read and write
16C7D357000
heap
page read and write
16C0EADE000
trusted library allocation
page read and write
16C0CB73000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
45DF000
stack
page read and write
592B000
trusted library allocation
page read and write
16C0B265000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
7D4000
heap
page read and write
44A0000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
13E5000
heap
page read and write
16C7D354000
heap
page read and write
16C7D357000
heap
page read and write
16C7F4B7000
trusted library allocation
page read and write
E04000
heap
page read and write
16C7D388000
heap
page read and write
16C7FEDF000
trusted library allocation
page read and write
16C0DD19000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
609E000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
1B8E000
stack
page read and write
4971000
heap
page read and write
16C14F41000
trusted library allocation
page read and write
13E5000
heap
page read and write
58D2000
trusted library allocation
page read and write
16C0D9EB000
trusted library allocation
page read and write
16C08E5C000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
108E000
stack
page read and write
16C7D35C000
heap
page read and write
16C164FE000
trusted library allocation
page read and write
2D07000
heap
page read and write
16C7D35C000
heap
page read and write
16C7F561000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
117F000
heap
page read and write
D74000
heap
page read and write
16C7F47F000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
2D5F000
stack
page read and write
16C7D356000
heap
page read and write
16C7D388000
heap
page read and write
16C0C754000
trusted library allocation
page read and write
16C086F6000
trusted library allocation
page read and write
4E11000
direct allocation
page read and write
16C0B362000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C7FED2000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
16C0C4DD000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C0CB7E000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
16C15B53000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
16C13917000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
3E9E000
stack
page read and write
16C7D34D000
heap
page read and write
53B3000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C086DC000
trusted library allocation
page read and write
345F000
stack
page read and write
D74000
heap
page read and write
16C7D337000
heap
page read and write
27C000
unkown
page write copy
16C7D354000
heap
page read and write
16C7D360000
heap
page read and write
5120000
direct allocation
page read and write
1030000
direct allocation
page read and write
16C7D356000
heap
page read and write
45A1000
heap
page read and write
16C0B751000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C0CBB4000
trusted library allocation
page read and write
16C0DDF7000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
4871000
heap
page read and write
E04000
heap
page read and write
53D3000
trusted library allocation
page read and write
4871000
heap
page read and write
13B2000
heap
page read and write
16C0C7A6000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
16C0CAF7000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
16C0C404000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
4F50000
direct allocation
page execute and read and write
139E000
heap
page read and write
69A000
unkown
page execute and read and write
16C0C7D6000
trusted library allocation
page read and write
16C08C77000
heap
page read and write
4CC8000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
16C0B7B6000
trusted library allocation
page read and write
16C0DDC2000
trusted library allocation
page read and write
10C4000
heap
page read and write
2C00000
direct allocation
page read and write
16C7D345000
heap
page read and write
536D000
trusted library allocation
page read and write
16C7D327000
heap
page read and write
1390000
heap
page read and write
11DB000
stack
page read and write
58BB000
trusted library allocation
page read and write
784000
heap
page read and write
32DF000
stack
page read and write
1374000
heap
page read and write
5D20000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
592C000
trusted library allocation
page read and write
BA1000
unkown
page execute and write copy
16C138B3000
trusted library allocation
page read and write
16C0DDE1000
trusted library allocation
page read and write
94D000
unkown
page execute and read and write
16C0B235000
trusted library allocation
page read and write
16C0ED62000
trusted library allocation
page read and write
16C139F4000
trusted library allocation
page read and write
16C0CA82000
trusted library allocation
page read and write
16C08E6A000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
391F000
stack
page read and write
310000
unkown
page readonly
2D5F000
stack
page read and write
16C7F5DA000
trusted library allocation
page read and write
16C13798000
trusted library allocation
page read and write
16C7D327000
heap
page read and write
3DCF000
stack
page read and write
4651000
heap
page read and write
16C1378B000
trusted library allocation
page read and write
26807F9C000
heap
page read and write
53AD000
trusted library allocation
page read and write
944000
unkown
page execute and read and write
16C0CB8E000
trusted library allocation
page read and write
820000
direct allocation
page read and write
1094000
heap
page read and write
4790000
direct allocation
page read and write
B2C000
stack
page read and write
16C7D334000
heap
page read and write
5945000
trusted library allocation
page read and write
12AB000
unkown
page execute and read and write
16C7D357000
heap
page read and write
5E68000
trusted library allocation
page read and write
16C0C705000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
16C7D347000
heap
page read and write
16C0CA25000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C13B06000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
13CB000
unkown
page execute and read and write
4DE0000
direct allocation
page read and write
16C7D35C000
heap
page read and write
53BB000
trusted library allocation
page read and write
4650000
heap
page read and write
16C7F4B3000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
16C134AE000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
16C0C76C000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
16C13B06000
trusted library allocation
page read and write
16C0DD3F000
trusted library allocation
page read and write
16C7F49E000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
594C000
trusted library allocation
page read and write
16C15057000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
6033000
trusted library allocation
page read and write
16C0DBE7000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
16C0CB75000
trusted library allocation
page read and write
16C164CC000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
593C000
trusted library allocation
page read and write
16C0C8C8000
trusted library allocation
page read and write
5E17000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
5937000
trusted library allocation
page read and write
16C1376B000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D32E000
heap
page read and write
5679000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
16C0CC43000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
53A5000
trusted library allocation
page read and write
65A7000
trusted library allocation
page read and write
16C0EDE9000
trusted library allocation
page read and write
16C08C8A000
heap
page read and write
13B4000
unkown
page execute and read and write
4BA0000
direct allocation
page execute and read and write
61EF000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
16C0CBF9000
trusted library allocation
page read and write
16C0CD00000
trusted library allocation
page read and write
6558000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
1094000
heap
page read and write
16C0BBCF000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
67B000
unkown
page execute and read and write
1158000
heap
page read and write
16C7D357000
heap
page read and write
4651000
heap
page read and write
16C168F1000
trusted library allocation
page read and write
61C3000
trusted library allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
26808061000
heap
page read and write
16C7D32E000
heap
page read and write
5F75000
trusted library allocation
page read and write
16C7D38A000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
4871000
heap
page read and write
42F0000
direct allocation
page read and write
16C0C8C8000
trusted library allocation
page read and write
4861000
heap
page read and write
5F72000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
1166000
heap
page read and write
16C0B3C9000
trusted library allocation
page read and write
10F4000
heap
page read and write
16C0B26D000
trusted library allocation
page read and write
16C0CB26000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
16C0C4B9000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C0C72D000
trusted library allocation
page read and write
4A90000
remote allocation
page read and write
4860000
direct allocation
page execute and read and write
16C0BBF0000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0AF62000
trusted library allocation
page read and write
3B9F000
stack
page read and write
535C000
trusted library allocation
page read and write
16C1398F000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
116B000
heap
page read and write
55FC000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
5CB4000
trusted library allocation
page read and write
172E000
heap
page read and write
13DA000
heap
page read and write
5F72000
trusted library allocation
page read and write
4651000
heap
page read and write
2E8F000
stack
page read and write
16C139AA000
trusted library allocation
page read and write
471E000
stack
page read and write
16C137FA000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
784000
heap
page read and write
16C7D33D000
heap
page read and write
16C0D8B6000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D360000
heap
page read and write
16C139F8000
trusted library allocation
page read and write
16C0DD13000
trusted library allocation
page read and write
16C0B263000
trusted library allocation
page read and write
16C13725000
trusted library allocation
page read and write
16C7FB18000
trusted library allocation
page read and write
16C15AE6000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
1D01F000
stack
page read and write
16C14EE5000
trusted library allocation
page read and write
D74000
heap
page read and write
16C139F8000
trusted library allocation
page read and write
16C7D334000
heap
page read and write
1094000
heap
page read and write
5665000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0ED40000
trusted library allocation
page read and write
1E4000
heap
page read and write
4DEE000
stack
page read and write
16C0CA72000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D34E000
heap
page read and write
16C139AC000
trusted library allocation
page read and write
10DB000
heap
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
42F0000
direct allocation
page read and write
5C7D000
trusted library allocation
page read and write
61A7000
trusted library allocation
page read and write
4861000
heap
page read and write
5873000
trusted library allocation
page read and write
16C0DDE4000
trusted library allocation
page read and write
16C0DFF6000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
4F50000
direct allocation
page execute and read and write
16C0DD19000
trusted library allocation
page read and write
16C086F6000
trusted library allocation
page read and write
16C1373E000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
16C7D33A000
heap
page read and write
1094000
heap
page read and write
16C134BF000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
16C0CA6C000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D353000
heap
page read and write
5384000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
12BE000
stack
page read and write
16C0C4E2000
trusted library allocation
page read and write
4271000
heap
page read and write
16C7D332000
heap
page read and write
16C1363B000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
5E83000
trusted library allocation
page read and write
1099000
unkown
page execute and write copy
4FF1000
heap
page read and write
8DE000
unkown
page execute and read and write
5CC6000
trusted library allocation
page read and write
690000
direct allocation
page read and write
5CD5000
trusted library allocation
page read and write
16C0CA96000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
16C085BB000
trusted library allocation
page read and write
501000
unkown
page execute and read and write
16C7D332000
heap
page read and write
16C7FBB6000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
4651000
heap
page read and write
16C13937000
trusted library allocation
page read and write
16C0C841000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
5FE5000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
4271000
heap
page read and write
2730000
direct allocation
page read and write
13A3000
heap
page read and write
409F000
stack
page read and write
536F000
trusted library allocation
page read and write
16C08A42000
trusted library allocation
page read and write
16C15BF3000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
4651000
heap
page read and write
16C7D33D000
heap
page read and write
5D5C000
trusted library allocation
page read and write
4971000
heap
page read and write
16C0B27F000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C0855F000
trusted library allocation
page read and write
58FB000
trusted library allocation
page read and write
16C137AD000
trusted library allocation
page read and write
16C0CEA2000
trusted library allocation
page read and write
16C0B732000
trusted library allocation
page read and write
6023000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
DA0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
16C0C699000
trusted library allocation
page read and write
17C000
stack
page read and write
16C1348D000
trusted library allocation
page read and write
16C0B7EF000
trusted library allocation
page read and write
1374000
heap
page read and write
16C0DEB2000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C0C4F8000
trusted library allocation
page read and write
784000
heap
page read and write
16C0CA2F000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
16C7D352000
heap
page read and write
16C7D357000
heap
page read and write
16C134C1000
trusted library allocation
page read and write
16C15A55000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4981000
heap
page read and write
16C1388F000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D34E000
heap
page read and write
5F1E000
trusted library allocation
page read and write
78B000
unkown
page execute and write copy
16C7D388000
heap
page read and write
3A5F000
stack
page read and write
53BB000
trusted library allocation
page read and write
6A0000
heap
page read and write
4FE0000
direct allocation
page read and write
16C0C6B1000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C7FB6A000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
16C0B3CD000
trusted library allocation
page read and write
16C1343E000
trusted library allocation
page read and write
431F000
stack
page read and write
1158000
heap
page read and write
16C0B3BD000
trusted library allocation
page read and write
16C0DAFA000
trusted library allocation
page read and write
16C1345E000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
16C0C0BD000
trusted library allocation
page read and write
16C7F463000
trusted library allocation
page read and write
16C0B3DD000
trusted library allocation
page read and write
16C0C495000
trusted library allocation
page read and write
1404000
heap
page read and write
3B8E000
stack
page read and write
16C7D328000
heap
page read and write
68E000
heap
page read and write
1E4000
heap
page read and write
16C086BC000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
2BE0000
direct allocation
page read and write
5C7D000
trusted library allocation
page read and write
4301000
heap
page read and write
4DC0000
trusted library allocation
page read and write
4301000
heap
page read and write
16C0B337000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
16C08CE8000
heap
page read and write
16C7D32D000
heap
page read and write
58B9000
trusted library allocation
page read and write
B70000
direct allocation
page read and write
16C0AF7C000
trusted library allocation
page read and write
16C0C67A000
trusted library allocation
page read and write
4D01000
heap
page read and write
5375000
trusted library allocation
page read and write
1C8E1700000
heap
page read and write
1E4000
heap
page read and write
1EE8ABFD000
trusted library allocation
page execute read
16C0ED1E000
trusted library allocation
page read and write
16C164AE000
trusted library allocation
page read and write
16C0B287000
trusted library allocation
page read and write
13BC000
heap
page read and write
4CA7000
heap
page read and write
1094000
heap
page read and write
16C0CAA1000
trusted library allocation
page read and write
16C134C1000
trusted library allocation
page read and write
16C0CCD4000
trusted library allocation
page read and write
116F000
heap
page read and write
16C7D35A000
heap
page read and write
16C14F05000
trusted library allocation
page read and write
1182000
heap
page read and write
454E000
stack
page read and write
16C7D31E000
heap
page read and write
C5D000
heap
page read and write
37CE000
stack
page read and write
4C91000
heap
page read and write
3F0E000
stack
page read and write
16C7FBCF000
trusted library allocation
page read and write
16C16700000
trusted library allocation
page read and write
F40000
heap
page read and write
16C7D332000
heap
page read and write
16C7D345000
heap
page read and write
2730000
direct allocation
page read and write
5362000
trusted library allocation
page read and write
13F6000
heap
page read and write
16C7D354000
heap
page read and write
5BB1000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C0B36F000
trusted library allocation
page read and write
16C16FF6000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
16C7D345000
heap
page read and write
B59000
stack
page read and write
16C0CA1D000
trusted library allocation
page read and write
16C0EACA000
trusted library allocation
page read and write
16C13BFE000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
3F9F000
stack
page read and write
5F72000
trusted library allocation
page read and write
16C08C8F000
heap
page read and write
537B000
trusted library allocation
page read and write
16C0C7D1000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
16C13934000
trusted library allocation
page read and write
12A4000
unkown
page execute and write copy
5391000
trusted library allocation
page read and write
D74000
heap
page read and write
5C78000
trusted library allocation
page read and write
6AE000
unkown
page execute and read and write
5600000
direct allocation
page execute and read and write
53C3000
trusted library allocation
page read and write
5E82000
trusted library allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C0B7D8000
trusted library allocation
page read and write
5F0F000
trusted library allocation
page read and write
16C0C4A8000
trusted library allocation
page read and write
16C13785000
trusted library allocation
page read and write
179F000
heap
page read and write
16C0BBFB000
trusted library allocation
page read and write
16C13BBF000
trusted library allocation
page read and write
4651000
heap
page read and write
1047000
heap
page read and write
1D06D000
stack
page read and write
5CA4000
trusted library allocation
page read and write
13E7000
heap
page read and write
B30000
heap
page read and write
76B000
unkown
page execute and write copy
16C0D879000
trusted library allocation
page read and write
16C0C476000
trusted library allocation
page read and write
16C0B391000
trusted library allocation
page read and write
820000
direct allocation
page read and write
16C0B368000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7FB26000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D356000
heap
page read and write
5374000
trusted library allocation
page read and write
1720000
heap
page read and write
D74000
heap
page read and write
16C0CA86000
trusted library allocation
page read and write
2680803D000
heap
page read and write
16C7D360000
heap
page read and write
16C0C7C2000
trusted library allocation
page read and write
61E000
stack
page read and write
16C0BCE5000
trusted library allocation
page read and write
E04000
heap
page read and write
16C7D357000
heap
page read and write
4871000
heap
page read and write
7D4000
heap
page read and write
1E4000
heap
page read and write
26807FA9000
heap
page read and write
4861000
heap
page read and write
341F000
stack
page read and write
16C7D336000
heap
page read and write
FC5000
heap
page read and write
16C15B53000
trusted library allocation
page read and write
16C16FB9000
trusted library allocation
page read and write
4860000
direct allocation
page execute and read and write
16C08A83000
trusted library allocation
page read and write
568F000
trusted library allocation
page read and write
11EF000
stack
page read and write
53A1000
trusted library allocation
page read and write
16C15AE8000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
D74000
heap
page read and write
53EE000
trusted library allocation
page read and write
16C7D308000
heap
page read and write
D74000
heap
page read and write
16C7D32E000
heap
page read and write
16C0DEC6000
trusted library allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C0CCF4000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
390E000
stack
page read and write
110A000
unkown
page execute and read and write
912000
unkown
page execute and read and write
16C7D35C000
heap
page read and write
1D03E000
stack
page read and write
16C0CA9A000
trusted library allocation
page read and write
16C0CAEE000
trusted library allocation
page read and write
16C0ED5D000
trusted library allocation
page read and write
7D4000
heap
page read and write
364E000
stack
page read and write
16C0EDC7000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
D74000
heap
page read and write
16C0DD6B000
trusted library allocation
page read and write
4651000
heap
page read and write
16C137C4000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
4621000
heap
page read and write
620000
heap
page read and write
13C5000
heap
page read and write
16C7D380000
heap
page read and write
16C7FBCF000
trusted library allocation
page read and write
16C0C727000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C0CB88000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
17C3000
heap
page read and write
16C13725000
trusted library allocation
page read and write
16C0EDC7000
trusted library allocation
page read and write
1094000
heap
page read and write
908B000
stack
page read and write
16C7D35A000
heap
page read and write
C5C000
stack
page read and write
53DA000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C7D326000
heap
page read and write
16C137A0000
trusted library allocation
page read and write
16C7D336000
heap
page read and write
5CDA000
trusted library allocation
page read and write
140C000
heap
page read and write
16C7D350000
heap
page read and write
16C7D33C000
heap
page read and write
16C7D354000
heap
page read and write
42F0000
direct allocation
page read and write
16C0CB66000
trusted library allocation
page read and write
3BDE000
stack
page read and write
16C0EA86000
trusted library allocation
page read and write
47CF000
stack
page read and write
16C7D325000
heap
page read and write
16C7D360000
heap
page read and write
16C7D34E000
heap
page read and write
16C0CAD4000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
117E000
stack
page read and write
4C10000
direct allocation
page execute and read and write
D32000
heap
page read and write
16C0B37F000
trusted library allocation
page read and write
16C0B2F6000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
58B9000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
16C7F47C000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
929000
unkown
page execute and write copy
16C0CB8B000
trusted library allocation
page read and write
16C08E77000
trusted library allocation
page read and write
16C0C7D6000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D380000
heap
page read and write
16C0C74C000
trusted library allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
16C0DDEE000
trusted library allocation
page read and write
2680806A000
heap
page read and write
3C1E000
stack
page read and write
5D50000
trusted library allocation
page read and write
16C0EF9F000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
6FB000
unkown
page execute and read and write
16C0EA28000
trusted library allocation
page read and write
10D0000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C0B389000
trusted library allocation
page read and write
16C7D394000
heap
page read and write
16C0CA2C000
trusted library allocation
page read and write
1C8E1600000
trusted library allocation
page read and write
4651000
heap
page read and write
16C164C6000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D347000
heap
page read and write
52F0000
direct allocation
page execute and read and write
16C7D345000
heap
page read and write
16C0AF63000
trusted library allocation
page read and write
3DCE000
stack
page read and write
16C7D357000
heap
page read and write
58C6000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C7D31E000
heap
page read and write
16C7D324000
heap
page read and write
16C7D360000
heap
page read and write
16C0C48A000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
4D50000
trusted library allocation
page read and write
D74000
heap
page read and write
539F000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
16C0BBF5000
trusted library allocation
page read and write
C4E000
heap
page read and write
16C7D38D000
heap
page read and write
C57000
heap
page read and write
16C7F481000
trusted library allocation
page read and write
16C0DEB7000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
42CE000
stack
page read and write
D74000
heap
page read and write
58B9000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
16C0C4DD000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
16C0B3EA000
trusted library allocation
page read and write
16C0BB0C000
trusted library allocation
page read and write
F94000
heap
page read and write
191E000
stack
page read and write
16C08E88000
trusted library allocation
page read and write
16C14FC5000
trusted library allocation
page read and write
1166000
heap
page read and write
16C7D380000
heap
page read and write
16C7D381000
heap
page read and write
16C0D9A7000
trusted library allocation
page read and write
16C1391A000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
1424000
heap
page read and write
16C7D350000
heap
page read and write
16C7D332000
heap
page read and write
CA0000
direct allocation
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C7D34C000
heap
page read and write
16C7D345000
heap
page read and write
2B5F000
stack
page read and write
16C0DF8A000
trusted library allocation
page read and write
16C0DD53000
trusted library allocation
page read and write
16C0CA4E000
trusted library allocation
page read and write
E04000
heap
page read and write
4D30000
remote allocation
page read and write
D74000
heap
page read and write
16C135F2000
trusted library allocation
page read and write
16C13790000
trusted library allocation
page read and write
D05000
heap
page read and write
16C134B2000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
53B8000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D32D000
heap
page read and write
54F4000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
16C7F55D000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C7D341000
heap
page read and write
1094000
heap
page read and write
D74000
heap
page read and write
16C0ED5F000
trusted library allocation
page read and write
16C7D351000
heap
page read and write
58B4000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
16C0B3C3000
trusted library allocation
page read and write
16C0B7D8000
trusted library allocation
page read and write
1E4000
heap
page read and write
4B70000
direct allocation
page execute and read and write
16C138C1000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
10C4000
heap
page read and write
4BAF000
trusted library allocation
page read and write
16C08AC8000
trusted library allocation
page read and write
91A000
unkown
page execute and read and write
3A4E000
stack
page read and write
4E80000
direct allocation
page execute and read and write
4FE000
stack
page read and write
2C0E000
stack
page read and write
16C0BBEE000
trusted library allocation
page read and write
1177000
heap
page read and write
6479000
trusted library allocation
page read and write
13FA000
heap
page read and write
7CC000
stack
page read and write
70D000
heap
page read and write
5D58000
trusted library allocation
page read and write
4C91000
heap
page read and write
5396000
trusted library allocation
page read and write
116E000
heap
page read and write
16C7D360000
heap
page read and write
4D01000
heap
page read and write
16C13B31000
trusted library allocation
page read and write
6EF000
heap
page read and write
284B1FA0000
heap
page read and write
16C7D38D000
heap
page read and write
16C0C7BF000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C08A88000
trusted library allocation
page read and write
16C138D4000
trusted library allocation
page read and write
4301000
heap
page read and write
81B000
unkown
page execute and write copy
59B1000
trusted library allocation
page read and write
16C0AF4E000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
16C15BF3000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
690E000
stack
page read and write
58BB000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
16C7D38D000
heap
page read and write
53AB000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
13E1000
heap
page read and write
16C0EA92000
trusted library allocation
page read and write
1D3D0000
heap
page read and write
16C0EA6C000
trusted library allocation
page read and write
16C7D31D000
heap
page read and write
537D000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
609E000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
16C0C754000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
4D01000
heap
page read and write
D74000
heap
page read and write
5AB000
unkown
page execute and write copy
526E000
trusted library allocation
page read and write
43A1000
heap
page read and write
13C7000
heap
page read and write
53F4000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
16C0C841000
trusted library allocation
page read and write
4860000
direct allocation
page execute and read and write
16C7D31D000
heap
page read and write
3F0F000
stack
page read and write
12A4000
unkown
page execute and write copy
4F30000
direct allocation
page execute and read and write
16C0D9B2000
trusted library allocation
page read and write
16C0866B000
trusted library allocation
page read and write
C71000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
16C0C45C000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
53B9000
trusted library allocation
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
AC9000
unkown
page execute and read and write
16C0C87C000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
16C14F41000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
16C7D356000
heap
page read and write
820000
direct allocation
page read and write
3B4E000
stack
page read and write
4C91000
heap
page read and write
16C0B39D000
trusted library allocation
page read and write
D74000
heap
page read and write
5BB3000
trusted library allocation
page read and write
360F000
stack
page read and write
16C7D31E000
heap
page read and write
16C0C0F4000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C1373B000
trusted library allocation
page read and write
359F000
stack
page read and write
311000
unkown
page execute and write copy
4651000
heap
page read and write
16C7D38D000
heap
page read and write
16C0EAC4000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16C134A0000
trusted library allocation
page read and write
428F000
stack
page read and write
58B9000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
5393000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D360000
heap
page read and write
16C7D33C000
heap
page read and write
355F000
stack
page read and write
16C13581000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
16C0C80B000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0B7FA000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7FBB7000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
16C13881000
trusted library allocation
page read and write
6CF000
heap
page read and write
536D000
trusted library allocation
page read and write
16C0CB60000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0C4EE000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C7D38C000
heap
page read and write
83B000
unkown
page execute and read and write
B50000
direct allocation
page read and write
CA0000
direct allocation
page read and write
5699000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C17283000
trusted library allocation
page read and write
16C0CE52000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0DDE3000
trusted library allocation
page read and write
16C13887000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4970000
direct allocation
page read and write
16C0B274000
trusted library allocation
page read and write
268080AC000
heap
page read and write
16C7D348000
heap
page read and write
5350000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0C733000
trusted library allocation
page read and write
16C0CBA5000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
16C0B7B6000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
41CE000
stack
page read and write
717000
heap
page read and write
15C0000
direct allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
16C0C474000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
5CCD000
trusted library allocation
page read and write
E04000
heap
page read and write
550000
heap
page read and write
16C16478000
trusted library allocation
page read and write
16C13BE1000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
53BB000
trusted library allocation
page read and write
D74000
heap
page read and write
BF0000
heap
page read and write
26808084000
heap
page read and write
116F000
heap
page read and write
16C13969000
trusted library allocation
page read and write
26807FBD000
heap
page read and write
16C7D35A000
heap
page read and write
16C0B3BF000
trusted library allocation
page read and write
4971000
heap
page read and write
16C0C7E4000
trusted library allocation
page read and write
16C1381C000
trusted library allocation
page read and write
16C08A90000
trusted library allocation
page read and write
BA0000
heap
page read and write
4910000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
16C134A9000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
4871000
heap
page read and write
16C7D356000
heap
page read and write
4651000
heap
page read and write
4CA0000
heap
page read and write
16C7D360000
heap
page read and write
118A000
heap
page read and write
440E000
stack
page read and write
16C0CB81000
trusted library allocation
page read and write
13BD000
unkown
page execute and read and write
5432000
trusted library allocation
page read and write
16C15B8C000
trusted library allocation
page read and write
16C0CA9A000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
535D000
trusted library allocation
page read and write
16C0E9C6000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
784000
heap
page read and write
594C000
trusted library allocation
page read and write
16C7D353000
heap
page read and write
16C08E5F000
trusted library allocation
page read and write
16C138D6000
trusted library allocation
page read and write
4660000
heap
page read and write
16C0C492000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D382000
heap
page read and write
16C7D324000
heap
page read and write
16C0B740000
trusted library allocation
page read and write
D74000
heap
page read and write
5F76000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
2A0000
unkown
page readonly
53A1000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
706000
heap
page read and write
16C0BBFD000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0C063000
trusted library allocation
page read and write
16C13746000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
1000000
direct allocation
page read and write
784000
heap
page read and write
1177000
heap
page read and write
63EF000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0CB2B000
trusted library allocation
page read and write
16C15001000
trusted library allocation
page read and write
16C0C4D3000
trusted library allocation
page read and write
16C0C7E8000
trusted library allocation
page read and write
16C7D337000
heap
page read and write
536F000
trusted library allocation
page read and write
16C138F3000
trusted library allocation
page read and write
16C0CA04000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
16C0CB24000
trusted library allocation
page read and write
705000
heap
page read and write
16C08A36000
trusted library allocation
page read and write
1CA6E000
stack
page read and write
5EDF000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
16C7D325000
heap
page read and write
61FE000
trusted library allocation
page read and write
1094000
heap
page read and write
4301000
heap
page read and write
58DA000
trusted library allocation
page read and write
705000
heap
page read and write
16C0B3EC000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C7F56D000
trusted library allocation
page read and write
4651000
heap
page read and write
421E000
stack
page read and write
60B0000
trusted library allocation
page read and write
16C0DECF000
trusted library allocation
page read and write
1094000
heap
page read and write
6520000
trusted library allocation
page read and write
16C7D3B1000
heap
page read and write
16C0EA1A000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
36DF000
stack
page read and write
16C7D382000
heap
page read and write
16C7D360000
heap
page read and write
6E4000
heap
page read and write
16C15AF8000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7F6E8000
trusted library allocation
page read and write
16C0DDFA000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
4C91000
heap
page read and write
4B8E000
stack
page read and write
16C136D7000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
4C91000
heap
page read and write
1094000
heap
page read and write
53A4000
trusted library allocation
page read and write
13CB000
unkown
page execute and write copy
5524000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
117A000
heap
page read and write
16C0DEBC000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
16C0868D000
trusted library allocation
page read and write
D74000
heap
page read and write
5661000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D31E000
heap
page read and write
2C30000
direct allocation
page read and write
16C7D38D000
heap
page read and write
FBF000
heap
page read and write
16C7D345000
heap
page read and write
15C0000
direct allocation
page read and write
16C7D360000
heap
page read and write
16C13658000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
534F000
trusted library allocation
page read and write
16C0ED27000
trusted library allocation
page read and write
16C13BCA000
trusted library allocation
page read and write
4871000
heap
page read and write
16C7D35A000
heap
page read and write
16C0CB33000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
16C0C7BF000
trusted library allocation
page read and write
16C0B26D000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
45A1000
heap
page read and write
1D59E000
stack
page read and write
16C7D380000
heap
page read and write
16C7D380000
heap
page read and write
4910000
direct allocation
page read and write
35DE000
stack
page read and write
1094000
heap
page read and write
1094000
heap
page read and write
16C7D38D000
heap
page read and write
1094000
heap
page read and write
762A000
heap
page read and write
16C7D357000
heap
page read and write
53E0000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
4C91000
heap
page read and write
532000
unkown
page execute and read and write
16C0DDF4000
trusted library allocation
page read and write
16C0C857000
trusted library allocation
page read and write
7CC0000
heap
page read and write
13DA000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
5668000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C0B262000
trusted library allocation
page read and write
D74000
heap
page read and write
42F0000
direct allocation
page read and write
16C0D96B000
trusted library allocation
page read and write
16C1388D000
trusted library allocation
page read and write
16C0ED43000
trusted library allocation
page read and write
26807F49000
heap
page read and write
5365000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C7D35A000
heap
page read and write
1CEDE000
stack
page read and write
1CCAE000
stack
page read and write
D36000
heap
page read and write
16C0CBA5000
trusted library allocation
page read and write
1B1000
unkown
page execute read
3C4F000
stack
page read and write
7DB0000
heap
page read and write
16C0C8C8000
trusted library allocation
page read and write
16C13889000
trusted library allocation
page read and write
4861000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
16C0C74E000
trusted library allocation
page read and write
26808020000
heap
page read and write
E04000
heap
page read and write
16C7D328000
heap
page read and write
16C7D380000
heap
page read and write
1E4000
heap
page read and write
3ECF000
stack
page read and write
16C0D9BC000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
26807FA0000
heap
page read and write
58DC000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
4651000
heap
page read and write
536D000
trusted library allocation
page read and write
16C164BE000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
16C7D332000
heap
page read and write
16C7D35A000
heap
page read and write
16C0B380000
trusted library allocation
page read and write
16C0CB93000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
16C0C863000
trusted library allocation
page read and write
16C0B787000
trusted library allocation
page read and write
1386000
heap
page read and write
16C0DDE3000
trusted library allocation
page read and write
114F000
heap
page read and write
10F4000
heap
page read and write
16C7D32E000
heap
page read and write
4651000
heap
page read and write
16C7D382000
heap
page read and write
6C6F000
stack
page read and write
784000
heap
page read and write
D74000
heap
page read and write
16C7D331000
heap
page read and write
16C7D354000
heap
page read and write
5C75000
trusted library allocation
page read and write
16C0CB6D000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C13785000
trusted library allocation
page read and write
16C0B39C000
trusted library allocation
page read and write
16C0DFCA000
trusted library allocation
page read and write
4871000
heap
page read and write
4971000
heap
page read and write
16C0CB9B000
trusted library allocation
page read and write
D70000
heap
page read and write
16C0CEA6000
trusted library allocation
page read and write
16C0CBA5000
trusted library allocation
page read and write
16C14EA3000
trusted library allocation
page read and write
5F75000
trusted library allocation
page read and write
341F000
stack
page read and write
395E000
stack
page read and write
321E000
stack
page read and write
4970000
direct allocation
page read and write
59C9000
trusted library allocation
page read and write
4961000
heap
page read and write
16C13666000
trusted library allocation
page read and write
16C0C822000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
4AB0000
heap
page read and write
5F70000
trusted library allocation
page read and write
16C0B39F000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
17F0000
heap
page read and write
3BDF000
stack
page read and write
764000
heap
page read and write
5000000
direct allocation
page execute and read and write
5EA2000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
1168000
heap
page read and write
E04000
heap
page read and write
16C0D9A7000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C0C733000
trusted library allocation
page read and write
16C0B235000
trusted library allocation
page read and write
C4F000
heap
page read and write
7D4000
heap
page read and write
16C08E8E000
trusted library allocation
page read and write
16C0B3E6000
trusted library allocation
page read and write
B70000
heap
page read and write
16C0CB43000
trusted library allocation
page read and write
109A000
unkown
page execute and write copy
16C13B2F000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
16C137DA000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
16C7D349000
heap
page read and write
16C0C0D7000
trusted library allocation
page read and write
16C0CB24000
trusted library allocation
page read and write
139E000
heap
page read and write
15C0000
direct allocation
page read and write
16C7F586000
trusted library allocation
page read and write
16C138DE000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
1D13F000
stack
page read and write
16C0B7FA000
trusted library allocation
page read and write
16C0C464000
trusted library allocation
page read and write
16C0E9C6000
trusted library allocation
page read and write
16C0B394000
trusted library allocation
page read and write
4271000
heap
page read and write
16C0AF8A000
trusted library allocation
page read and write
4861000
heap
page read and write
D74000
heap
page read and write
16C7D380000
heap
page read and write
16C0EA89000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0EDB1000
trusted library allocation
page read and write
D36000
heap
page read and write
58D0000
trusted library allocation
page read and write
16C0BBFA000
trusted library allocation
page read and write
45DE000
stack
page read and write
16C7F498000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
5D71000
trusted library allocation
page read and write
4C91000
heap
page read and write
310F000
stack
page read and write
16C0B3BD000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D381000
heap
page read and write
16C16F1F000
trusted library allocation
page read and write
584000
unkown
page execute and write copy
4871000
heap
page read and write
16C7D388000
heap
page read and write
16C7F572000
trusted library allocation
page read and write
16C0B3A7000
trusted library allocation
page read and write
3ADE000
stack
page read and write
E82000
heap
page read and write
16C7D389000
heap
page read and write
1094000
heap
page read and write
690000
direct allocation
page read and write
16C138D6000
trusted library allocation
page read and write
16C0CAFA000
trusted library allocation
page read and write
16C0AF62000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
53AD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C08AF4000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
16C133E2000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
16C0DFD9000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
1094000
heap
page read and write
4971000
heap
page read and write
16C7D324000
heap
page read and write
5393000
trusted library allocation
page read and write
16C0B245000
trusted library allocation
page read and write
5678000
trusted library allocation
page read and write
1C8E14B7000
heap
page read and write
535D000
trusted library allocation
page read and write
2E5E000
stack
page read and write
116B000
heap
page read and write
4621000
heap
page read and write
5442000
trusted library allocation
page read and write
16C15BAD000
trusted library allocation
page read and write
16C0AFF2000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
16C7FB9E000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
53BB000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
16C7D328000
heap
page read and write
26807FA0000
heap
page read and write
16C7F4C2000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
5374000
trusted library allocation
page read and write
16C137B9000
trusted library allocation
page read and write
4921000
heap
page read and write
16C0C4A1000
trusted library allocation
page read and write
16C0C7E1000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0CBFA000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
404E000
stack
page read and write
4861000
heap
page read and write
16C0C46F000
trusted library allocation
page read and write
D74000
heap
page read and write
535C000
trusted library allocation
page read and write
16C0EF79000
trusted library allocation
page read and write
16C7D348000
heap
page read and write
16C0DDE3000
trusted library allocation
page read and write
10DF000
heap
page read and write
5DFA000
trusted library allocation
page read and write
7D4000
heap
page read and write
EAB000
unkown
page execute and write copy
490F000
stack
page read and write
4860000
direct allocation
page execute and read and write
594C000
trusted library allocation
page read and write
16C7D331000
heap
page read and write
16C7D35C000
heap
page read and write
16C7D382000
heap
page read and write
16C0C81E000
trusted library allocation
page read and write
784000
heap
page read and write
16C7D360000
heap
page read and write
4CF0000
direct allocation
page read and write
594C000
trusted library allocation
page read and write
4D30000
remote allocation
page read and write
16C15ADF000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
5CBD000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
16C134D6000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C138D6000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
1E4000
heap
page read and write
1030000
direct allocation
page read and write
16C7D360000
heap
page read and write
26807F9C000
heap
page read and write
16C7D32D000
heap
page read and write
26808098000
heap
page read and write
13B8000
heap
page read and write
543D000
trusted library allocation
page read and write
D74000
heap
page read and write
16C139B3000
trusted library allocation
page read and write
16C08E3C000
trusted library allocation
page read and write
16C0C7BF000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
4971000
heap
page read and write
16C7D345000
heap
page read and write
16C0B73D000
trusted library allocation
page read and write
16C0CE8B000
trusted library allocation
page read and write
13E7000
heap
page read and write
16C0EAA8000
trusted library allocation
page read and write
16C13790000
trusted library allocation
page read and write
1094000
heap
page read and write
4871000
heap
page read and write
435E000
stack
page read and write
16C139B7000
trusted library allocation
page read and write
16C08AFE000
trusted library allocation
page read and write
D74000
heap
page read and write
16C16421000
trusted library allocation
page read and write
16C0EAB6000
trusted library allocation
page read and write
EC1000
unkown
page execute and write copy
116F000
heap
page read and write
F4A000
heap
page read and write
5350000
trusted library allocation
page read and write
16C138E7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
5F7D000
trusted library allocation
page read and write
16C7D31D000
heap
page read and write
16C0DFC3000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
71F1FFE000
stack
page read and write
16C08AF4000
trusted library allocation
page read and write
16C15BCD000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C0DDB2000
trusted library allocation
page read and write
16C134C8000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D35A000
heap
page read and write
4861000
heap
page read and write
E00000
heap
page read and write
1166000
heap
page read and write
5D25000
trusted library allocation
page read and write
525000
heap
page read and write
16C0E9E1000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C135EB000
trusted library allocation
page read and write
2680807B000
heap
page read and write
16C137B0000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
5484000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4271000
heap
page read and write
55F0000
direct allocation
page execute and read and write
16C0CBEC000
trusted library allocation
page read and write
16C13776000
trusted library allocation
page read and write
16C08A5F000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D357000
heap
page read and write
4651000
heap
page read and write
4E70000
direct allocation
page execute and read and write
354E000
stack
page read and write
53A3000
trusted library allocation
page read and write
4911000
heap
page read and write
16C1388B000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
5450000
remote allocation
page read and write
D75000
heap
page read and write
16C0D943000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
D74000
heap
page read and write
5CE5000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C086BC000
trusted library allocation
page read and write
1094000
heap
page read and write
16C16A5B000
heap
page read and write
16C7FEB5000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16C16705000
trusted library allocation
page read and write
4665000
heap
page read and write
7D4000
heap
page read and write
4871000
heap
page read and write
16C164D0000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
538F000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
4830000
direct allocation
page execute and read and write
26807FA0000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C0CBF9000
trusted library allocation
page read and write
16C0C754000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
81B000
unkown
page execute and read and write
464F000
stack
page read and write
4861000
heap
page read and write
16C13BE3000
trusted library allocation
page read and write
16C0D9AF000
trusted library allocation
page read and write
16C134C5000
trusted library allocation
page read and write
16C0B3B0000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0B3F2000
trusted library allocation
page read and write
1166000
heap
page read and write
16C7FAF6000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
16C7D339000
heap
page read and write
16C0B2AF000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C0CB04000
trusted library allocation
page read and write
1188000
heap
page read and write
16C0ED1C000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
1094000
heap
page read and write
16C7D360000
heap
page read and write
16C0DAFC000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
1424000
heap
page read and write
5415000
trusted library allocation
page read and write
16C0B3B9000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
4FE0000
direct allocation
page read and write
536D000
trusted library allocation
page read and write
16C15B26000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0C772000
trusted library allocation
page read and write
16C0CB73000
trusted library allocation
page read and write
16C0AF13000
trusted library allocation
page read and write
104E000
unkown
page execute and read and write
4FF0000
heap
page read and write
16C1368B000
trusted library allocation
page read and write
16C0EFA8000
trusted library allocation
page read and write
6F9000
heap
page read and write
16C0C7C2000
trusted library allocation
page read and write
13C2000
heap
page read and write
310000
unkown
page read and write
1370000
heap
page read and write
16C0EAC4000
trusted library allocation
page read and write
284B230A000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
16C137C3000
trusted library allocation
page read and write
16C0DDB2000
trusted library allocation
page read and write
404E000
stack
page read and write
16C7D360000
heap
page read and write
16C7D356000
heap
page read and write
53EF000
trusted library allocation
page read and write
16C0CF9D000
trusted library allocation
page read and write
16C7F561000
trusted library allocation
page read and write
16C0C48D000
trusted library allocation
page read and write
4271000
heap
page read and write
16C7D354000
heap
page read and write
1177000
heap
page read and write
16C14F0C000
trusted library allocation
page read and write
4670000
heap
page read and write
1162000
heap
page read and write
1094000
heap
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C134F0000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
55A000
unkown
page execute and read and write
16C139AC000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0C79A000
trusted library allocation
page read and write
16C137EF000
trusted library allocation
page read and write
F7E000
stack
page read and write
16C7D350000
heap
page read and write
16C0CA0E000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0AF04000
trusted library allocation
page read and write
16C13754000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C08E89000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D356000
heap
page read and write
16C7D35A000
heap
page read and write
16C0CCE8000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
138E000
unkown
page execute and read and write
16C0CB73000
trusted library allocation
page read and write
16C084E4000
trusted library allocation
page read and write
3BDF000
stack
page read and write
1A1E000
stack
page read and write
16C0CB45000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C139AA000
trusted library allocation
page read and write
16C0BBC3000
trusted library allocation
page read and write
117F000
heap
page read and write
7D4000
heap
page read and write
6075000
trusted library allocation
page read and write
114D000
heap
page read and write
16C0BCEF000
trusted library allocation
page read and write
D74000
heap
page read and write
53BB000
trusted library allocation
page read and write
16C1377B000
trusted library allocation
page read and write
4301000
heap
page read and write
5391000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C0CDE6000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D31E000
heap
page read and write
16C084EF000
trusted library allocation
page read and write
16C137BE000
trusted library allocation
page read and write
71F07FB000
stack
page read and write
3C8F000
stack
page read and write
16C7D380000
heap
page read and write
E04000
heap
page read and write
5F78000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C168CE000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
37DF000
stack
page read and write
16C7D337000
heap
page read and write
16C7D352000
heap
page read and write
16C7D354000
heap
page read and write
16C138EA000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
5668000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
16C7D33E000
heap
page read and write
16C0D964000
trusted library allocation
page read and write
4E03000
trusted library allocation
page read and write
1094000
heap
page read and write
37DF000
stack
page read and write
4CF0000
direct allocation
page read and write
16C0C48A000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
16C0E9D7000
trusted library allocation
page read and write
399E000
stack
page read and write
4651000
heap
page read and write
16C7D331000
heap
page read and write
537D000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D325000
heap
page read and write
4F50000
direct allocation
page execute and read and write
16C7D35A000
heap
page read and write
16C7D324000
heap
page read and write
16C7D38C000
heap
page read and write
16C7D350000
heap
page read and write
41DF000
stack
page read and write
3A0E000
stack
page read and write
5D1D000
trusted library allocation
page read and write
4C91000
heap
page read and write
9C3000
unkown
page execute and write copy
1424000
heap
page read and write
16C7F485000
trusted library allocation
page read and write
1E0000
heap
page read and write
4C0F000
stack
page read and write
26807FE1000
heap
page read and write
16C0ED8D000
trusted library allocation
page read and write
6517000
trusted library allocation
page read and write
16C0B3BD000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D356000
heap
page read and write
CB4000
heap
page read and write
5C71000
trusted library allocation
page read and write
16C0CB60000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
16C0DD19000
trusted library allocation
page read and write
16C0D9F3000
trusted library allocation
page read and write
16C0C81A000
trusted library allocation
page read and write
16C134B8000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0D9C8000
trusted library allocation
page read and write
1373000
heap
page read and write
16C17223000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C0AFBB000
trusted library allocation
page read and write
F3E000
stack
page read and write
16C7FB66000
trusted library allocation
page read and write
16C0ED62000
trusted library allocation
page read and write
3FDE000
stack
page read and write
1153000
heap
page read and write
54E1000
direct allocation
page read and write
5424000
trusted library allocation
page read and write
4971000
heap
page read and write
16C084EA000
trusted library allocation
page read and write
113F000
stack
page read and write
16C0C8F8000
trusted library allocation
page read and write
679000
unkown
page write copy
16C0EAAC000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
16C0CE9C000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
4861000
heap
page read and write
5C78000
trusted library allocation
page read and write
16C0CA5A000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D34E000
heap
page read and write
764000
heap
page read and write
4C10000
direct allocation
page execute and read and write
16C7F572000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
16C1390A000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D335000
heap
page read and write
4301000
heap
page read and write
1094000
heap
page read and write
42F0000
direct allocation
page read and write
16C0B29D000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
555E000
trusted library allocation
page read and write
16C0D9DF000
trusted library allocation
page read and write
16C086DD000
trusted library allocation
page read and write
140C000
heap
page read and write
16C7D35C000
heap
page read and write
16C7D354000
heap
page read and write
117A000
heap
page read and write
4970000
direct allocation
page read and write
535C000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C7D345000
heap
page read and write
BC0000
heap
page read and write
1C8E14D4000
heap
page read and write
541B000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C0EAE0000
trusted library allocation
page read and write
16C164A6000
trusted library allocation
page read and write
D80000
direct allocation
page execute and read and write
16C7D380000
heap
page read and write
16C0AF4E000
trusted library allocation
page read and write
E04000
heap
page read and write
16C7D334000
heap
page read and write
1094000
heap
page read and write
820000
direct allocation
page read and write
13E3000
heap
page read and write
5C94000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
53C4000
trusted library allocation
page read and write
16C0AF74000
trusted library allocation
page read and write
70A000
heap
page read and write
4920000
heap
page read and write
16C7D360000
heap
page read and write
5660000
direct allocation
page execute and read and write
16C7D34E000
heap
page read and write
16C0B293000
trusted library allocation
page read and write
60DC000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
1094000
heap
page read and write
10F0000
heap
page read and write
5341000
trusted library allocation
page read and write
16C16F0F000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
16C0CECA000
trusted library allocation
page read and write
16C0B281000
trusted library allocation
page read and write
C4F000
heap
page read and write
16C0DBD5000
trusted library allocation
page read and write
135A000
heap
page read and write
4E50000
direct allocation
page execute and read and write
4B58000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
784000
heap
page read and write
16C16200000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0DBAE000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D354000
heap
page read and write
4651000
heap
page read and write
16C0C423000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
53AB000
trusted library allocation
page read and write
4651000
heap
page read and write
1374000
heap
page read and write
16C0C72E000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
16C7D320000
heap
page read and write
16C7D3AE000
heap
page read and write
4271000
heap
page read and write
4FE0000
direct allocation
page read and write
5384000
trusted library allocation
page read and write
16C0BCF8000
trusted library allocation
page read and write
16C0C767000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C08A36000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
16C0DDFA000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
4F1C000
trusted library allocation
page read and write
4651000
heap
page read and write
5409000
trusted library allocation
page read and write
16C7FE6B000
trusted library allocation
page read and write
3F0E000
stack
page read and write
16C7F5E9000
trusted library allocation
page read and write
6206000
trusted library allocation
page read and write
5C9E000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
1082000
unkown
page execute and read and write
5C92000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
4871000
heap
page read and write
16C0C7E6000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0B368000
trusted library allocation
page read and write
16C0C4A1000
trusted library allocation
page read and write
5190000
direct allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C08AF4000
trusted library allocation
page read and write
16C0DAEA000
trusted library allocation
page read and write
16C16F8C000
trusted library allocation
page read and write
16C1689E000
trusted library allocation
page read and write
16C13721000
trusted library allocation
page read and write
16C16793000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
45A1000
heap
page read and write
116B000
heap
page read and write
1E4000
heap
page read and write
16C13BEF000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
2880000
direct allocation
page read and write
16C0DDFA000
trusted library allocation
page read and write
16C0B73B000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
1094000
heap
page read and write
16C7D356000
heap
page read and write
16C7D357000
heap
page read and write
1094000
heap
page read and write
16C0B217000
trusted library allocation
page read and write
D60000
direct allocation
page execute and read and write
16C13689000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
5D51000
trusted library allocation
page read and write
16C1348D000
trusted library allocation
page read and write
16C135FD000
trusted library allocation
page read and write
13EA000
heap
page read and write
4271000
heap
page read and write
16C7D388000
heap
page read and write
16C7D35C000
heap
page read and write
3E1F000
stack
page read and write
4651000
heap
page read and write
16C7D382000
heap
page read and write
16C7D380000
heap
page read and write
16C7D328000
heap
page read and write
5BB4000
trusted library allocation
page read and write
3D1E000
stack
page read and write
FF6000
heap
page read and write
16C7D353000
heap
page read and write
2BE0000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
5450000
remote allocation
page read and write
16C1376B000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
16C0866D000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
4D01000
heap
page read and write
10F4000
heap
page read and write
16C7D34E000
heap
page read and write
16C7D354000
heap
page read and write
68A000
heap
page read and write
690000
direct allocation
page read and write
16C0B33D000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
16C086C1000
trusted library allocation
page read and write
16C086DD000
trusted library allocation
page read and write
4A90000
remote allocation
page read and write
16C7D380000
heap
page read and write
53B7000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
411E000
stack
page read and write
43A1000
heap
page read and write
16C0DEE8000
trusted library allocation
page read and write
16C1398A000
trusted library allocation
page read and write
16C08A4E000
trusted library allocation
page read and write
705000
heap
page read and write
16C7F485000
trusted library allocation
page read and write
16C1391C000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
4BA0000
direct allocation
page execute and read and write
CA0000
direct allocation
page read and write
16C7D382000
heap
page read and write
16C0C8FA000
trusted library allocation
page read and write
6A1000
heap
page read and write
16C7D332000
heap
page read and write
53B0000
trusted library allocation
page read and write
16C0DADD000
trusted library allocation
page read and write
495F000
stack
page read and write
13E7000
heap
page read and write
1094000
heap
page read and write
16C7F54F000
trusted library allocation
page read and write
E87000
heap
page read and write
16C0C782000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
615F000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C0ED87000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
111E000
unkown
page execute and read and write
5353000
trusted library allocation
page read and write
16C7D394000
heap
page read and write
1168000
heap
page read and write
16C7D345000
heap
page read and write
546C000
trusted library allocation
page read and write
16C0CCF2000
trusted library allocation
page read and write
16C134BD000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C0ED4C000
trusted library allocation
page read and write
5464000
heap
page read and write
445F000
stack
page read and write
4871000
heap
page read and write
4271000
heap
page read and write
16C0CA86000
trusted library allocation
page read and write
16C0B3A7000
trusted library allocation
page read and write
16C138DE000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
D21000
unkown
page execute and write copy
5630000
direct allocation
page execute and read and write
16C139AE000
trusted library allocation
page read and write
16C7FB1E000
trusted library allocation
page read and write
16C0D9B9000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7FBAF000
trusted library allocation
page read and write
16C137E1000
trusted library allocation
page read and write
16C0DD1B000
trusted library allocation
page read and write
16C0B100000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D382000
heap
page read and write
690000
direct allocation
page read and write
16C0CABC000
trusted library allocation
page read and write
1E4000
heap
page read and write
16C0C760000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
1E4000
heap
page read and write
5D57000
trusted library allocation
page read and write
6575000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D38D000
heap
page read and write
3CDF000
stack
page read and write
6052000
trusted library allocation
page read and write
16C15006000
trusted library allocation
page read and write
16C137C6000
trusted library allocation
page read and write
16C0EAA8000
trusted library allocation
page read and write
16C137D1000
trusted library allocation
page read and write
16C08A8D000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
117F000
heap
page read and write
45A1000
heap
page read and write
16C0C82B000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
4651000
heap
page read and write
2880000
direct allocation
page read and write
16C7D356000
heap
page read and write
16C7D34E000
heap
page read and write
16C7F498000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D388000
heap
page read and write
16C16FB9000
trusted library allocation
page read and write
77B000
unkown
page execute and write copy
3B4F000
stack
page read and write
16C086C7000
trusted library allocation
page read and write
400F000
stack
page read and write
115F000
heap
page read and write
16C7D345000
heap
page read and write
16C7D357000
heap
page read and write
D74000
heap
page read and write
16C137B0000
trusted library allocation
page read and write
16C13BD5000
trusted library allocation
page read and write
16C7F481000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
16C0CA25000
trusted library allocation
page read and write
CB4000
heap
page read and write
537C000
trusted library allocation
page read and write
C64000
heap
page read and write
5D50000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
4D01000
heap
page read and write
59FE000
trusted library allocation
page read and write
4651000
heap
page read and write
1000000
direct allocation
page read and write
16C7F6C8000
trusted library allocation
page read and write
16C7FEEA000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D31E000
heap
page read and write
58B9000
trusted library allocation
page read and write
16C0B3DE000
trusted library allocation
page read and write
1185000
heap
page read and write
16C0C7E6000
trusted library allocation
page read and write
2F5F000
stack
page read and write
58BB000
trusted library allocation
page read and write
5453000
trusted library allocation
page read and write
784000
heap
page read and write
16C7D345000
heap
page read and write
16C0C4EE000
trusted library allocation
page read and write
3B0F000
stack
page read and write
16C13C00000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D357000
heap
page read and write
58B9000
trusted library allocation
page read and write
4910000
direct allocation
page read and write
58B4000
trusted library allocation
page read and write
16C0B7EA000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
16C0B223000
trusted library allocation
page read and write
1179000
heap
page read and write
16C7D35C000
heap
page read and write
E04000
heap
page read and write
3DCE000
stack
page read and write
16C0CA5A000
trusted library allocation
page read and write
13F3000
heap
page read and write
4830000
direct allocation
page read and write
13AF000
stack
page read and write
421F000
stack
page read and write
16C7F56F000
trusted library allocation
page read and write
16C16B80000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
784000
heap
page read and write
16C138D4000
trusted library allocation
page read and write
E04000
heap
page read and write
16C0EDE3000
trusted library allocation
page read and write
16C10102000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
16C7D329000
heap
page read and write
538D000
trusted library allocation
page read and write
4C1F000
stack
page read and write
400F000
stack
page read and write
45A1000
heap
page read and write
16C084E4000
trusted library allocation
page read and write
4651000
heap
page read and write
4C91000
heap
page read and write
16C7D380000
heap
page read and write
1E4000
heap
page read and write
929000
unkown
page execute and read and write
16C7F6E4000
trusted library allocation
page read and write
16C0CA7B000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
1424000
heap
page read and write
5668000
trusted library allocation
page read and write
48F0000
direct allocation
page execute and read and write
16C0B267000
trusted library allocation
page read and write
16C7D330000
heap
page read and write
D74000
heap
page read and write
6E6000
heap
page read and write
5F7B000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0CB75000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
E04000
heap
page read and write
53FC000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
16C0B71A000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
16C7D357000
heap
page read and write
764000
heap
page read and write
1030000
direct allocation
page read and write
4E30000
direct allocation
page execute and read and write
16C0B7FC000
trusted library allocation
page read and write
42CE000
stack
page read and write
2A61D4F1E000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D35A000
heap
page read and write
16C0C782000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
16C0CA9A000
trusted library allocation
page read and write
16C7D35F000
heap
page read and write
13EC000
heap
page read and write
16C7D35C000
heap
page read and write
4C91000
heap
page read and write
111E000
unkown
page execute and read and write
16C7F481000
trusted library allocation
page read and write
4D01000
heap
page read and write
16C138F3000
trusted library allocation
page read and write
16C0EDA9000
trusted library allocation
page read and write
6F9000
heap
page read and write
4621000
heap
page read and write
16C7D31E000
heap
page read and write
16C139BE000
trusted library allocation
page read and write
16C0EFA1000
trusted library allocation
page read and write
16C137BC000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
16C0DD76000
trusted library allocation
page read and write
59B000
unkown
page execute and write copy
4971000
heap
page read and write
16C7D33D000
heap
page read and write
1094000
heap
page read and write
13B3000
heap
page read and write
16C0EFD2000
trusted library allocation
page read and write
16C0EDFB000
trusted library allocation
page read and write
16C1377D000
trusted library allocation
page read and write
16C137FA000
trusted library allocation
page read and write
4960000
heap
page read and write
16C7D31E000
heap
page read and write
16C0CAA1000
trusted library allocation
page read and write
679000
unkown
page write copy
16C0CB13000
trusted library allocation
page read and write
16C0EF7D000
trusted library allocation
page read and write
16C08E8D000
trusted library allocation
page read and write
16C138B5000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
4651000
heap
page read and write
16C7D380000
heap
page read and write
16C7D35B000
heap
page read and write
16C0C857000
trusted library allocation
page read and write
16C0C822000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0EA4B000
trusted library allocation
page read and write
16C13881000
trusted library allocation
page read and write
4D01000
heap
page read and write
6062000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
16C1377B000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
16C0AFFE000
trusted library allocation
page read and write
5D58000
trusted library allocation
page read and write
16C15BF0000
trusted library allocation
page read and write
57E0000
remote allocation
page read and write
7CBE000
heap
page read and write
5CAE000
trusted library allocation
page read and write
4C91000
heap
page read and write
59B8000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C0C7C7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
D5E000
stack
page read and write
16C7D345000
heap
page read and write
16C7D345000
heap
page read and write
16C7D360000
heap
page read and write
26807FA9000
heap
page read and write
16C134AC000
trusted library allocation
page read and write
31DE000
stack
page read and write
16C08A63000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D389000
heap
page read and write
4820000
remote allocation
page read and write
1189000
heap
page read and write
16C7D345000
heap
page read and write
594C000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D357000
heap
page read and write
16C7F452000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
C71000
heap
page read and write
16C08ECE000
trusted library allocation
page read and write
3F9F000
stack
page read and write
381F000
stack
page read and write
16C0CBF9000
trusted library allocation
page read and write
CB4000
heap
page read and write
53BB000
trusted library allocation
page read and write
4D01000
heap
page read and write
535D000
trusted library allocation
page read and write
58C4000
trusted library allocation
page read and write
4861000
heap
page read and write
4840000
direct allocation
page execute and read and write
4F05000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C7FEEA000
trusted library allocation
page read and write
1182000
heap
page read and write
16C0C861000
trusted library allocation
page read and write
D70000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
59C9000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D354000
heap
page read and write
16C08E6A000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
FCE000
heap
page read and write
16C0CB73000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
5490000
direct allocation
page execute and read and write
5CD3000
trusted library allocation
page read and write
16C0C702000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
2BE0000
direct allocation
page read and write
16C0D8EE000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
1158000
heap
page read and write
4871000
heap
page read and write
16C13798000
trusted library allocation
page read and write
16C0CB93000
trusted library allocation
page read and write
647B000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
374F000
stack
page read and write
5CD1000
trusted library allocation
page read and write
672000
unkown
page execute and read and write
16C7D345000
heap
page read and write
16C0CB77000
trusted library allocation
page read and write
16C138B3000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0C8F4000
trusted library allocation
page read and write
17ED000
heap
page read and write
D90000
direct allocation
page execute and read and write
16C0B29F000
trusted library allocation
page read and write
1094000
heap
page read and write
5C58000
trusted library allocation
page read and write
4861000
heap
page read and write
16C135F9000
trusted library allocation
page read and write
CB4000
heap
page read and write
5919000
trusted library allocation
page read and write
4861000
heap
page read and write
16C7D336000
heap
page read and write
16C0C87C000
trusted library allocation
page read and write
1161000
heap
page read and write
16C7D360000
heap
page read and write
4C91000
heap
page read and write
D74000
heap
page read and write
1159000
heap
page read and write
16C08E8A000
trusted library allocation
page read and write
1D49D000
stack
page read and write
16C137E1000
trusted library allocation
page read and write
3B0F000
stack
page read and write
7D4000
heap
page read and write
5F75000
trusted library allocation
page read and write
16C137CD000
trusted library allocation
page read and write
26807FA0000
heap
page read and write
16C7D360000
heap
page read and write
820000
direct allocation
page read and write
53AA000
trusted library allocation
page read and write
16C0B389000
trusted library allocation
page read and write
4C0000
unkown
page execute and write copy
16C0AFBB000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
16C0B35B000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
594A000
trusted library allocation
page read and write
16C0DDD0000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C135EA000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
468E000
stack
page read and write
16C7F5B5000
trusted library allocation
page read and write
16C0CAC3000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
690000
direct allocation
page read and write
4B68000
trusted library allocation
page read and write
16C7D33E000
heap
page read and write
16C0CB2B000
trusted library allocation
page read and write
16C0D8AC000
trusted library allocation
page read and write
26808028000
heap
page read and write
4910000
direct allocation
page read and write
16C7D351000
heap
page read and write
2730000
direct allocation
page read and write
1EE8AC21000
trusted library allocation
page execute read
16C13735000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
16C7F540000
trusted library allocation
page read and write
1409000
heap
page read and write
16C7D354000
heap
page read and write
16C0DDC2000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
1168000
heap
page read and write
16C15BD1000
trusted library allocation
page read and write
16C7FB1E000
trusted library allocation
page read and write
4A90000
remote allocation
page read and write
16C0B381000
trusted library allocation
page read and write
4910000
direct allocation
page execute and read and write
16C7D388000
heap
page read and write
4CF0000
direct allocation
page read and write
16C7D32B000
heap
page read and write
12C0000
heap
page read and write
537C000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7F47F000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
16C0B267000
trusted library allocation
page read and write
1EE8ACD1000
trusted library allocation
page execute read
16C14F4D000
trusted library allocation
page read and write
16C1397C000
trusted library allocation
page read and write
4871000
heap
page read and write
53AB000
trusted library allocation
page read and write
D2E000
heap
page read and write
4E41000
direct allocation
page read and write
16C0C7DE000
trusted library allocation
page read and write
16C0B35D000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C0DFFA000
trusted library allocation
page read and write
459F000
stack
page read and write
16C0DEE2000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0CA34000
trusted library allocation
page read and write
16C0DDCB000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
117F000
heap
page read and write
5350000
trusted library allocation
page read and write
16C7FED8000
trusted library allocation
page read and write
324F000
stack
page read and write
4A20000
direct allocation
page read and write
1424000
heap
page read and write
16C14FE4000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
16C0B28D000
trusted library allocation
page read and write
BF0000
heap
page read and write
614A000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
D74000
heap
page read and write
4971000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
FA2000
unkown
page execute and read and write
16C13B0C000
trusted library allocation
page read and write
16C0EFE9000
trusted library allocation
page read and write
16C13930000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
16C0AF62000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5610000
direct allocation
page execute and read and write
16C0CA4E000
trusted library allocation
page read and write
C50000
heap
page read and write
16C7F488000
trusted library allocation
page read and write
57E0000
remote allocation
page read and write
C71000
heap
page read and write
5369000
trusted library allocation
page read and write
CA0000
heap
page read and write
2B40000
direct allocation
page read and write
10C4000
heap
page read and write
5C71000
trusted library allocation
page read and write
16C0C767000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
16C139F4000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
16C1366C000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
16C7D38D000
heap
page read and write
4F60000
direct allocation
page execute and read and write
16C7D35A000
heap
page read and write
16C7D315000
heap
page read and write
16C16A01000
heap
page read and write
1D28D000
stack
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
1094000
heap
page read and write
16C0C5E5000
trusted library allocation
page read and write
4FF1000
heap
page read and write
16C7D332000
heap
page read and write
53A7000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
D74000
heap
page read and write
1424000
heap
page read and write
4E50000
direct allocation
page execute and read and write
16C0D943000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
4271000
heap
page read and write
4FE0000
direct allocation
page read and write
16C7D332000
heap
page read and write
DE2000
unkown
page execute and read and write
5354000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C085BB000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C7D354000
heap
page read and write
5385000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
5F74000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0CDBA000
trusted library allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
16C0B220000
trusted library allocation
page read and write
5CDD000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
16C0C484000
trusted library allocation
page read and write
16C0CAFA000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0CA9A000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
16C7F485000
trusted library allocation
page read and write
16C135D5000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
115D000
heap
page read and write
16C7D360000
heap
page read and write
537D000
trusted library allocation
page read and write
464F000
stack
page read and write
53A2000
trusted library allocation
page read and write
16C13596000
trusted library allocation
page read and write
820000
direct allocation
page read and write
1188000
heap
page read and write
2730000
direct allocation
page read and write
4871000
heap
page read and write
16C0C0E8000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0C756000
trusted library allocation
page read and write
16C7D336000
heap
page read and write
630000
heap
page read and write
4861000
heap
page read and write
16C0BCEC000
trusted library allocation
page read and write
16C0DFC3000
trusted library allocation
page read and write
16C7FEAE000
trusted library allocation
page read and write
16C086C1000
trusted library allocation
page read and write
16C0DDE1000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
16C0DDC2000
trusted library allocation
page read and write
16C0CE32000
trusted library allocation
page read and write
16C0ED98000
trusted library allocation
page read and write
16C7D32B000
heap
page read and write
4B90000
direct allocation
page execute and read and write
5363000
trusted library allocation
page read and write
B7A000
heap
page read and write
1C20000
heap
page read and write
16C7F568000
trusted library allocation
page read and write
71F0FFE000
stack
page read and write
16C0C0D7000
trusted library allocation
page read and write
5320000
direct allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
4861000
heap
page read and write
16C0DDF4000
trusted library allocation
page read and write
1D2AC000
stack
page read and write
5600000
direct allocation
page execute and read and write
16C0C474000
trusted library allocation
page read and write
16C1649D000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0BCFE000
trusted library allocation
page read and write
16C1391C000
trusted library allocation
page read and write
16C7D351000
heap
page read and write
E04000
heap
page read and write
16C7D350000
heap
page read and write
5CC2000
trusted library allocation
page read and write
16C137D1000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
43CF000
stack
page read and write
16C0C749000
trusted library allocation
page read and write
16C0CA4E000
trusted library allocation
page read and write
26807FCA000
heap
page read and write
16C7FAFB000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
1CB6F000
stack
page read and write
BD8000
heap
page read and write
4C20000
direct allocation
page execute and read and write
16C7D324000
heap
page read and write
16C0CA5A000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0ED2C000
trusted library allocation
page read and write
4DE0000
remote allocation
page read and write
16C0CA34000
trusted library allocation
page read and write
284B2300000
trusted library allocation
page read and write
16C7F481000
trusted library allocation
page read and write
4651000
heap
page read and write
331F000
stack
page read and write
16C1682F000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
680000
heap
page read and write
4C91000
heap
page read and write
4871000
heap
page read and write
1192000
unkown
page execute and write copy
16C7D350000
heap
page read and write
592B000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C7D380000
heap
page read and write
5442000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
16C0B3EC000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
16C0C85A000
trusted library allocation
page read and write
268080AC000
heap
page read and write
16C0B367000
trusted library allocation
page read and write
59B000
unkown
page execute and write copy
116B000
heap
page read and write
16C136F9000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C13798000
trusted library allocation
page read and write
41DF000
stack
page read and write
16C7F485000
trusted library allocation
page read and write
16C0EDAB000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
16C0DD9D000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
16C08499000
trusted library allocation
page read and write
4971000
heap
page read and write
268080B7000
heap
page read and write
16C0B3A7000
trusted library allocation
page read and write
16C7D35D000
heap
page read and write
16C0DD96000
trusted library allocation
page read and write
4C91000
heap
page read and write
4F70000
direct allocation
page execute and read and write
4C90000
heap
page read and write
10D0000
heap
page read and write
450F000
stack
page read and write
16C139E0000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C14F07000
trusted library allocation
page read and write
16C7FBAF000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
5CB4000
trusted library allocation
page read and write
D74000
heap
page read and write
540D000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D331000
heap
page read and write
16C0EDAB000
trusted library allocation
page read and write
16C139E9000
trusted library allocation
page read and write
33CF000
stack
page read and write
16C7D343000
heap
page read and write
537D000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C1671C000
trusted library allocation
page read and write
16C14E7F000
trusted library allocation
page read and write
4301000
heap
page read and write
359E000
stack
page read and write
16C0C6C2000
trusted library allocation
page read and write
1E4000
heap
page read and write
58B4000
trusted library allocation
page read and write
E04000
heap
page read and write
535C000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C164E7000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
4830000
direct allocation
page read and write
16C7D35A000
heap
page read and write
6416000
trusted library allocation
page read and write
16C13785000
trusted library allocation
page read and write
16C0B29D000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
5D52000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
16C7D35C000
heap
page read and write
16C0CF9B000
trusted library allocation
page read and write
309E000
stack
page read and write
5EFA000
trusted library allocation
page read and write
2E1F000
stack
page read and write
16C7D331000
heap
page read and write
5384000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
485F000
stack
page read and write
7D4000
heap
page read and write
16C133DF000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D382000
heap
page read and write
5C94000
trusted library allocation
page read and write
16C13721000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7F572000
trusted library allocation
page read and write
16C13743000
trusted library allocation
page read and write
1168000
heap
page read and write
5CA5000
trusted library allocation
page read and write
16C08CE5000
heap
page read and write
42F0000
direct allocation
page read and write
58D2000
trusted library allocation
page read and write
4F40000
direct allocation
page execute and read and write
16C0C6A6000
trusted library allocation
page read and write
F70000
heap
page read and write
16C7D332000
heap
page read and write
16C7D32F000
heap
page read and write
16C7D35C000
heap
page read and write
784000
heap
page read and write
53A7000
trusted library allocation
page read and write
16C0CB63000
trusted library allocation
page read and write
16C0CAC4000
trusted library allocation
page read and write
385E000
stack
page read and write
4F2B000
trusted library allocation
page read and write
1409000
heap
page read and write
16C0C425000
trusted library allocation
page read and write
92A000
unkown
page execute and write copy
411E000
stack
page read and write
16C13741000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D332000
heap
page read and write
5310000
direct allocation
page execute and read and write
16C0CE06000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
16C0CAEF000
trusted library allocation
page read and write
16C0CAA1000
trusted library allocation
page read and write
1186000
heap
page read and write
16C7D388000
heap
page read and write
4C10000
direct allocation
page execute and read and write
58BB000
trusted library allocation
page read and write
16C15BD1000
trusted library allocation
page read and write
26808098000
heap
page read and write
1409000
heap
page read and write
1094000
heap
page read and write
584000
unkown
page execute and write copy
16C16A47000
heap
page read and write
16C13917000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
11CE000
stack
page read and write
5679000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
592C000
trusted library allocation
page read and write
26808084000
heap
page read and write
58C4000
trusted library allocation
page read and write
450F000
stack
page read and write
1D410000
heap
page read and write
16C0C772000
trusted library allocation
page read and write
16C0C7C7000
trusted library allocation
page read and write
16C0DFB4000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
16C1368B000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
784000
heap
page read and write
16C0B3A1000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C7F5E9000
trusted library allocation
page read and write
16C0CA75000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
16C137DA000
trusted library allocation
page read and write
16C0DF7B000
trusted library allocation
page read and write
16C08A86000
trusted library allocation
page read and write
16C0DD9D000
trusted library allocation
page read and write
328E000
stack
page read and write
7D4000
heap
page read and write
16C0BB12000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
1094000
heap
page read and write
16C13917000
trusted library allocation
page read and write
16C7D325000
heap
page read and write
4861000
heap
page read and write
1B0000
unkown
page readonly
58B9000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
16C0B227000
trusted library allocation
page read and write
4651000
heap
page read and write
5F75000
trusted library allocation
page read and write
16C7D327000
heap
page read and write
16C7D35A000
heap
page read and write
16C7D33A000
heap
page read and write
EC0000
unkown
page read and write
16C7D345000
heap
page read and write
16C7D332000
heap
page read and write
140C000
heap
page read and write
16C0CB53000
trusted library allocation
page read and write
16C134A2000
trusted library allocation
page read and write
5F77000
trusted library allocation
page read and write
784000
heap
page read and write
43A1000
heap
page read and write
16C0DEB7000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
16C0C48E000
trusted library allocation
page read and write
606C000
trusted library allocation
page read and write
2C30000
direct allocation
page read and write
16BE000
stack
page read and write
16C138D4000
trusted library allocation
page read and write
ACB000
unkown
page execute and write copy
58B9000
trusted library allocation
page read and write
16C14FA3000
trusted library allocation
page read and write
16C0EA74000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
16C7FB9D000
trusted library allocation
page read and write
16C7D31F000
heap
page read and write
CB4000
heap
page read and write
16C0DDF7000
trusted library allocation
page read and write
3290000
heap
page read and write
16C1373B000
trusted library allocation
page read and write
16C0C431000
trusted library allocation
page read and write
4651000
heap
page read and write
481F000
stack
page read and write
7CB0000
heap
page read and write
16C0C6BF000
trusted library allocation
page read and write
16C0DDE1000
trusted library allocation
page read and write
16C7D367000
heap
page read and write
16C08EA5000
trusted library allocation
page read and write
309F000
stack
page read and write
16C13BCF000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
1CE0000
heap
page read and write
16C7D382000
heap
page read and write
16C0D8A0000
trusted library allocation
page read and write
2730000
direct allocation
page read and write
7D4000
heap
page read and write
5380000
trusted library allocation
page read and write
EC1000
unkown
page execute and write copy
3F9E000
stack
page read and write
4FE0000
direct allocation
page read and write
16C0B751000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
592C000
trusted library allocation
page read and write
16C0E94D000
trusted library allocation
page read and write
43A1000
heap
page read and write
609D000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C7F4F4000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C0CB77000
trusted library allocation
page read and write
16C7FBF9000
trusted library allocation
page read and write
D74000
heap
page read and write
449E000
stack
page read and write
16C7D31E000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C16F67000
trusted library allocation
page read and write
672000
unkown
page execute and read and write
1C8E31B4000
heap
page read and write
5E4F000
trusted library allocation
page read and write
784000
heap
page read and write
2C30000
direct allocation
page read and write
16C1359A000
trusted library allocation
page read and write
16C0D964000
trusted library allocation
page read and write
16C7D339000
heap
page read and write
16C7D326000
heap
page read and write
16C7D33C000
heap
page read and write
592C000
trusted library allocation
page read and write
16C0DD3B000
trusted library allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C134E3000
trusted library allocation
page read and write
D74000
heap
page read and write
16C13776000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
4C91000
heap
page read and write
16C7D31E000
heap
page read and write
65C2000
trusted library allocation
page read and write
16C7FECB000
trusted library allocation
page read and write
5CB7000
trusted library allocation
page read and write
16C0ED91000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
58B5000
trusted library allocation
page read and write
2680802B000
heap
page read and write
784000
heap
page read and write
16C13937000
trusted library allocation
page read and write
16C133AD000
trusted library allocation
page read and write
16C7D36E000
heap
page read and write
16C164C6000
trusted library allocation
page read and write
16C08A88000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0BB1A000
trusted library allocation
page read and write
16C0C7BC000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
16C0B27F000
trusted library allocation
page read and write
13BD000
unkown
page execute and read and write
16C7F559000
trusted library allocation
page read and write
4871000
heap
page read and write
543C000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
71F17FE000
stack
page read and write
4651000
heap
page read and write
4E20000
direct allocation
page execute and read and write
537C000
trusted library allocation
page read and write
1192000
unkown
page execute and write copy
16C1649F000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
4C91000
heap
page read and write
4651000
heap
page read and write
140C000
heap
page read and write
16C13790000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
16C0CA47000
trusted library allocation
page read and write
16C086A6000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
16C086F6000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7FBB2000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
16C164E1000
trusted library allocation
page read and write
1386000
heap
page read and write
2D1F000
stack
page read and write
D74000
heap
page read and write
16C0ED8F000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
16C7D345000
heap
page read and write
430E000
stack
page read and write
16C7D33C000
heap
page read and write
16C7D354000
heap
page read and write
56E000
unkown
page execute and read and write
16C137F1000
trusted library allocation
page read and write
16C0BB22000
trusted library allocation
page read and write
16C137F1000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C7D352000
heap
page read and write
16C0B220000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
16C0CB7E000
trusted library allocation
page read and write
16C0ED89000
trusted library allocation
page read and write
4C91000
heap
page read and write
D74000
heap
page read and write
4871000
heap
page read and write
5C78000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
16C0CA6C000
trusted library allocation
page read and write
5F7B000
trusted library allocation
page read and write
F30000
heap
page read and write
16C7F556000
trusted library allocation
page read and write
EC0000
unkown
page read and write
16C7D324000
heap
page read and write
16C7D324000
heap
page read and write
4A06000
trusted library allocation
page read and write
16C7D331000
heap
page read and write
55D0000
direct allocation
page execute and read and write
16C0CB81000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
C6D000
heap
page read and write
4D01000
heap
page read and write
5CC1000
trusted library allocation
page read and write
DC0000
heap
page read and write
F71000
unkown
page execute and read and write
16C0C409000
trusted library allocation
page read and write
2E5F000
stack
page read and write
16C7D350000
heap
page read and write
16C0B397000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
4271000
heap
page read and write
16C0BCF1000
trusted library allocation
page read and write
115D000
heap
page read and write
53A4000
trusted library allocation
page read and write
2F0B000
heap
page read and write
16C0BBFA000
trusted library allocation
page read and write
16C0C47E000
trusted library allocation
page read and write
117F000
heap
page read and write
16C0C746000
trusted library allocation
page read and write
16C139E9000
trusted library allocation
page read and write
16C0DE89000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
16C7D35A000
heap
page read and write
16C0E9F6000
trusted library allocation
page read and write
16C0B389000
trusted library allocation
page read and write
16C0DDF7000
trusted library allocation
page read and write
16C7D330000
heap
page read and write
615C000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
4CF0000
direct allocation
page read and write
16C0B755000
trusted library allocation
page read and write
16C0B7EA000
trusted library allocation
page read and write
46DF000
stack
page read and write
535C000
trusted library allocation
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C13BEC000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
444E000
stack
page read and write
16C7D360000
heap
page read and write
16C7D345000
heap
page read and write
16C138D1000
trusted library allocation
page read and write
13CB000
unkown
page execute and read and write
534B000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
1133000
heap
page read and write
4E10000
direct allocation
page read and write
58B5000
trusted library allocation
page read and write
1094000
heap
page read and write
4961000
heap
page read and write
16C7D354000
heap
page read and write
16C0DB00000
trusted library allocation
page read and write
16C13743000
trusted library allocation
page read and write
16C0CCFC000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
58B4000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
3C4F000
stack
page read and write
16C13969000
trusted library allocation
page read and write
10C0000
heap
page read and write
4850000
direct allocation
page execute and read and write
16C0CBF2000
trusted library allocation
page read and write
5E07000
trusted library allocation
page read and write
1094000
heap
page read and write
16C15B8E000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D324000
heap
page read and write
16C7D345000
heap
page read and write
471F000
stack
page read and write
16C0CB24000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0DFB2000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0C48A000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
75B000
unkown
page execute and write copy
764000
heap
page read and write
16C7D339000
heap
page read and write
D74000
heap
page read and write
53A2000
trusted library allocation
page read and write
16C0AF9C000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
F96000
heap
page read and write
16C086A8000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C7D389000
heap
page read and write
16C7D35D000
heap
page read and write
4390000
direct allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
54D6000
trusted library allocation
page read and write
764000
heap
page read and write
16C0DD53000
trusted library allocation
page read and write
300000
unkown
page execute and write copy
4FE0000
direct allocation
page read and write
5CBF000
trusted library allocation
page read and write
16C0DD95000
trusted library allocation
page read and write
381E000
stack
page read and write
16C0CB77000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
1094000
heap
page read and write
16C0B7D8000
trusted library allocation
page read and write
7D4000
heap
page read and write
D74000
heap
page read and write
140C000
heap
page read and write
5310000
direct allocation
page execute and read and write
16C1350F000
trusted library allocation
page read and write
10C4000
heap
page read and write
16C0CB79000
trusted library allocation
page read and write
16C0ED8B000
trusted library allocation
page read and write
15C0000
direct allocation
page read and write
16C7D339000
heap
page read and write
4871000
heap
page read and write
820000
direct allocation
page read and write
5689000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
4871000
heap
page read and write
10D5000
heap
page read and write
16C137B0000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
7D4000
heap
page read and write
5CB4000
trusted library allocation
page read and write
349F000
stack
page read and write
1188000
heap
page read and write
C71000
heap
page read and write
5C7D000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
16C7D33C000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
16C0CB79000
trusted library allocation
page read and write
16C0CDFA000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
16C13732000
trusted library allocation
page read and write
16C0C7BC000
trusted library allocation
page read and write
16C0C4ED000
trusted library allocation
page read and write
C80000
heap
page read and write
16C13BEC000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
68CE000
stack
page read and write
58BD000
trusted library allocation
page read and write
327E000
stack
page read and write
16C7D35C000
heap
page read and write
16C0CA7B000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
16C0B265000
trusted library allocation
page read and write
4301000
heap
page read and write
16C0C0F4000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C7D332000
heap
page read and write
16C0B3DD000
trusted library allocation
page read and write
1040000
heap
page read and write
5F7B000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
471E000
stack
page read and write
16C7D334000
heap
page read and write
16C7D324000
heap
page read and write
16C7F4BF000
trusted library allocation
page read and write
381E000
stack
page read and write
16C0CA0F000
trusted library allocation
page read and write
16C0C47E000
trusted library allocation
page read and write
E04000
heap
page read and write
594C000
trusted library allocation
page read and write
16C0DD62000
trusted library allocation
page read and write
16C7D32B000
heap
page read and write
16C139B0000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
16C14FAC000
trusted library allocation
page read and write
6D6000
heap
page read and write
38CF000
stack
page read and write
1189000
heap
page read and write
16C08ACF000
trusted library allocation
page read and write
16C0AF9E000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
16C13887000
trusted library allocation
page read and write
16C1502E000
trusted library allocation
page read and write
16C086A1000
trusted library allocation
page read and write
180C000
heap
page read and write
16C7D324000
heap
page read and write
408E000
stack
page read and write
16C7D331000
heap
page read and write
26808031000
heap
page read and write
6E1000
heap
page read and write
3D8F000
stack
page read and write
4651000
heap
page read and write
5CAA000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
16C7D33C000
heap
page read and write
16C7D354000
heap
page read and write
16C13438000
trusted library allocation
page read and write
16C0CB7E000
trusted library allocation
page read and write
1765000
heap
page read and write
115F000
heap
page read and write
4DB0000
direct allocation
page read and write
16C0B227000
trusted library allocation
page read and write
AFE000
stack
page read and write
53D3000
trusted library allocation
page read and write
E9B000
unkown
page execute and write copy
16C7D31E000
heap
page read and write
1CF1E000
stack
page read and write
16C0ED8D000
trusted library allocation
page read and write
435F000
stack
page read and write
16C164D9000
trusted library allocation
page read and write
4861000
heap
page read and write
2A5E000
stack
page read and write
16C7D382000
heap
page read and write
6087000
trusted library allocation
page read and write
16C7D343000
heap
page read and write
16C7D382000
heap
page read and write
3F5F000
stack
page read and write
16C16F48000
trusted library allocation
page read and write
1030000
direct allocation
page read and write
16C7D356000
heap
page read and write
CB4000
heap
page read and write
4E81000
heap
page read and write
16C7D360000
heap
page read and write
17FA000
heap
page read and write
16C0B7FC000
trusted library allocation
page read and write
16C0EA96000
trusted library allocation
page read and write
1094000
heap
page read and write
16C0CA2C000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
16C0C750000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
7D4000
heap
page read and write
1094000
heap
page read and write
5385000
trusted library allocation
page read and write
16C1649F000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D350000
heap
page read and write
13DA000
heap
page read and write
2D8E000
stack
page read and write
53BB000
trusted library allocation
page read and write
16C08E6A000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
4F10000
direct allocation
page execute and read and write
592C000
trusted library allocation
page read and write
71F2FFE000
stack
page read and write
43A1000
heap
page read and write
5944000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
16C08ECE000
trusted library allocation
page read and write
16C0B7DA000
trusted library allocation
page read and write
1094000
heap
page read and write
DBE000
stack
page read and write
16C7F6E0000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
5000000
heap
page read and write
16C7D360000
heap
page read and write
16C0DAFC000
trusted library allocation
page read and write
16C16498000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C0CCE8000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
364F000
stack
page read and write
16C7D382000
heap
page read and write
53BB000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
5E69000
trusted library allocation
page read and write
16C13776000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
6EA000
heap
page read and write
6966000
heap
page read and write
5CA4000
trusted library allocation
page read and write
16C08476000
trusted library allocation
page read and write
4871000
heap
page read and write
4A70000
trusted library allocation
page read and write
16C0C79A000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0C4F1000
trusted library allocation
page read and write
16C0EF9D000
trusted library allocation
page read and write
16C13438000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
16C08ABD000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
784000
heap
page read and write
16C0D9AF000
trusted library allocation
page read and write
662000
unkown
page execute and write copy
16C0DD3F000
trusted library allocation
page read and write
CB4000
heap
page read and write
539D000
trusted library allocation
page read and write
4C91000
heap
page read and write
6202000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
26808098000
heap
page read and write
16C1643C000
trusted library allocation
page read and write
1D68E000
stack
page read and write
D74000
heap
page read and write
FB1000
unkown
page execute and write copy
16C0EFFD000
trusted library allocation
page read and write
10C4000
heap
page read and write
2F07000
heap
page read and write
1C8E1850000
heap
page read and write
16C0CEC0000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
1398000
heap
page read and write
16C137C4000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
4C91000
heap
page read and write
16C0DE89000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C135FD000
trusted library allocation
page read and write
FE1000
heap
page read and write
16C086C7000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C0B7C5000
trusted library allocation
page read and write
139F000
stack
page read and write
16C7D33C000
heap
page read and write
16C0B27B000
trusted library allocation
page read and write
16C08478000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
391F000
stack
page read and write
16C0B77D000
trusted library allocation
page read and write
16C16F48000
trusted library allocation
page read and write
16C08454000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
16C0CA6C000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
116B000
heap
page read and write
461000
unkown
page execute and write copy
16C7D35C000
heap
page read and write
D74000
heap
page read and write
16C086DC000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C0BCF0000
trusted library allocation
page read and write
2ECE000
stack
page read and write
536D000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
440E000
stack
page read and write
D74000
heap
page read and write
16C7F58A000
trusted library allocation
page read and write
16C137F1000
trusted library allocation
page read and write
16C0AFA5000
trusted library allocation
page read and write
16C14F0C000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
16C0BB0C000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D31E000
heap
page read and write
10D7000
heap
page read and write
592C000
trusted library allocation
page read and write
42F0000
direct allocation
page read and write
16C13536000
trusted library allocation
page read and write
1D1AD000
stack
page read and write
16C164DB000
trusted library allocation
page read and write
395E000
stack
page read and write
16C13400000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
1D06F000
stack
page read and write
16C0B3B2000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
16C0CBFD000
trusted library allocation
page read and write
16C139AD000
trusted library allocation
page read and write
1CA2F000
stack
page read and write
D74000
heap
page read and write
16C137B5000
trusted library allocation
page read and write
E04000
heap
page read and write
53D4000
trusted library allocation
page read and write
E82000
heap
page read and write
609D000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
10DF000
heap
page read and write
16C0848F000
trusted library allocation
page read and write
16C0CAA4000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
16C084F8000
trusted library allocation
page read and write
2C00000
direct allocation
page read and write
B90000
heap
page read and write
16C13785000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
16C0DDF4000
trusted library allocation
page read and write
414F000
stack
page read and write
C90000
direct allocation
page read and write
16C0B755000
trusted library allocation
page read and write
16C08A41000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D324000
heap
page read and write
16C136B8000
trusted library allocation
page read and write
3F9D000
stack
page read and write
59DC000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
5C88000
trusted library allocation
page read and write
16C0CDB3000
trusted library allocation
page read and write
16C0DD22000
trusted library allocation
page read and write
16C0CA72000
trusted library allocation
page read and write
16C164D9000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C14F48000
trusted library allocation
page read and write
482000
unkown
page execute and write copy
16C13727000
trusted library allocation
page read and write
1180000
heap
page read and write
16C7D345000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C0DD78000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C0C46A000
trusted library allocation
page read and write
16C13581000
trusted library allocation
page read and write
16C0B3DD000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
4871000
heap
page read and write
10F4000
heap
page read and write
16C0AF9A000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
4D01000
heap
page read and write
D75000
heap
page read and write
538F000
trusted library allocation
page read and write
16C0C4A6000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
59B1000
trusted library allocation
page read and write
16C137AD000
trusted library allocation
page read and write
10F4000
heap
page read and write
5CB4000
trusted library allocation
page read and write
5694000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
485F000
stack
page read and write
1094000
heap
page read and write
1030000
direct allocation
page read and write
16C7D332000
heap
page read and write
5350000
trusted library allocation
page read and write
16C0C484000
trusted library allocation
page read and write
D74000
heap
page read and write
16C0E925000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C0D9A2000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
FC1000
heap
page read and write
58B9000
trusted library allocation
page read and write
4651000
heap
page read and write
16C13BF8000
trusted library allocation
page read and write
374F000
stack
page read and write
16C7D356000
heap
page read and write
10C4000
heap
page read and write
16C0C79A000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
16C13515000
trusted library allocation
page read and write
27C000
unkown
page read and write
16C7D360000
heap
page read and write
16C13BE6000
trusted library allocation
page read and write
16C0EA54000
trusted library allocation
page read and write
13AF000
heap
page read and write
16C7D33A000
heap
page read and write
26808098000
heap
page read and write
16C0B3BD000
trusted library allocation
page read and write
16C7F481000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7F54A000
trusted library allocation
page read and write
4961000
heap
page read and write
515E000
stack
page read and write
525F000
stack
page read and write
381F000
stack
page read and write
16C0C4D7000
trusted library allocation
page read and write
16C0DB0E000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D382000
heap
page read and write
4651000
heap
page read and write
16C7D356000
heap
page read and write
16C7D345000
heap
page read and write
15C0000
direct allocation
page read and write
5377000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
16C134D6000
trusted library allocation
page read and write
537A000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0CA6C000
trusted library allocation
page read and write
17C3000
heap
page read and write
6E3000
heap
page read and write
16C13943000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D324000
heap
page read and write
58BB000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
17F5000
heap
page read and write
5526000
trusted library allocation
page read and write
16C7F490000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
5394000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
16C0C484000
trusted library allocation
page read and write
16C135DF000
trusted library allocation
page read and write
33CE000
stack
page read and write
5D5B000
trusted library allocation
page read and write
16C0AF4E000
trusted library allocation
page read and write
16C135F9000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D324000
heap
page read and write
16C15BD9000
trusted library allocation
page read and write
16C0CB60000
trusted library allocation
page read and write
16C1502C000
trusted library allocation
page read and write
16C0D9C8000
trusted library allocation
page read and write
16C134BF000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
1E4000
heap
page read and write
4D60000
trusted library allocation
page read and write
16C0B3DD000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
E04000
heap
page read and write
53B7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
58B5000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C08728000
trusted library allocation
page read and write
FA9000
heap
page read and write
CA0000
direct allocation
page read and write
594C000
trusted library allocation
page read and write
16C13921000
trusted library allocation
page read and write
16C0D991000
trusted library allocation
page read and write
388F000
stack
page read and write
1781000
heap
page read and write
16C0B227000
trusted library allocation
page read and write
4301000
heap
page read and write
16C137BC000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
4871000
heap
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C13BE1000
trusted library allocation
page read and write
16C0DF9D000
trusted library allocation
page read and write
16C14EE5000
trusted library allocation
page read and write
4871000
heap
page read and write
EBE000
stack
page read and write
4651000
heap
page read and write
26808023000
heap
page read and write
16C7D350000
heap
page read and write
13EE000
stack
page read and write
16C1382C000
trusted library allocation
page read and write
16C7D340000
heap
page read and write
5371000
trusted library allocation
page read and write
4C91000
heap
page read and write
16C7D334000
heap
page read and write
4D51000
direct allocation
page read and write
16C7D381000
heap
page read and write
16C0B7CE000
trusted library allocation
page read and write
58EC000
trusted library allocation
page read and write
16C0CA0E000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
16C0D1EE000
trusted library allocation
page read and write
26807FCD000
heap
page read and write
16C164C1000
trusted library allocation
page read and write
4271000
heap
page read and write
16C0AFA5000
trusted library allocation
page read and write
16C0B790000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
13FF000
heap
page read and write
53BA000
trusted library allocation
page read and write
16C0CA60000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
7D4000
heap
page read and write
1401000
heap
page read and write
5DFD000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
16C7D332000
heap
page read and write
16C7F485000
trusted library allocation
page read and write
16C0EAA2000
trusted library allocation
page read and write
70E000
heap
page read and write
16C0C7E4000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
6EA000
heap
page read and write
16C0DFD7000
trusted library allocation
page read and write
16C0C4E2000
trusted library allocation
page read and write
2680807B000
heap
page read and write
16C7D337000
heap
page read and write
539B000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
16C0CA66000
trusted library allocation
page read and write
16C7D35C000
heap
page read and write
4651000
heap
page read and write
4651000
heap
page read and write
53A9000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C7D32D000
heap
page read and write
5355000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C0DD5D000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
4C91000
heap
page read and write
53BE000
trusted library allocation
page read and write
16C7FEC9000
trusted library allocation
page read and write
272000
unkown
page readonly
D74000
heap
page read and write
16C0BBFE000
trusted library allocation
page read and write
1000000
direct allocation
page read and write
16C15A5A000
trusted library allocation
page read and write
16C08A8C000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
4971000
heap
page read and write
16C7D357000
heap
page read and write
5359000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
1CD5F000
stack
page read and write
DB0000
heap
page read and write
1172000
heap
page read and write
16C7D360000
heap
page read and write
16C085D9000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
3C1E000
stack
page read and write
268080AC000
heap
page read and write
284B207B000
heap
page read and write
5911000
trusted library allocation
page read and write
16C0AF33000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7F6DA000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
16C0CB26000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C7D31E000
heap
page read and write
4651000
heap
page read and write
16C7D357000
heap
page read and write
6965000
heap
page read and write
16C7D345000
heap
page read and write
16C135FD000
trusted library allocation
page read and write
4910000
direct allocation
page execute and read and write
42F0000
direct allocation
page read and write
5D76000
trusted library allocation
page read and write
26807FA9000
heap
page read and write
16C139F8000
trusted library allocation
page read and write
1168000
heap
page read and write
16C7D380000
heap
page read and write
16C13476000
trusted library allocation
page read and write
26808098000
heap
page read and write
16C7D345000
heap
page read and write
60C7000
trusted library allocation
page read and write
13D1000
heap
page read and write
16C7D388000
heap
page read and write
5CAE000
trusted library allocation
page read and write
6459000
trusted library allocation
page read and write
10F4000
heap
page read and write
53AB000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
17AB000
heap
page read and write
3CCE000
stack
page read and write
16C0DDFD000
trusted library allocation
page read and write
16C0B297000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
26808028000
heap
page read and write
16C13850000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C7D360000
heap
page read and write
6156000
trusted library allocation
page read and write
16C16F67000
trusted library allocation
page read and write
5672000
trusted library allocation
page read and write
16C08498000
trusted library allocation
page read and write
16C7F44D000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
537D000
trusted library allocation
page read and write
D74000
heap
page read and write
16C7D38D000
heap
page read and write
58BB000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
D50000
heap
page read and write
16C7D38D000
heap
page read and write
D74000
heap
page read and write
4910000
direct allocation
page read and write
16C0DDEE000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
4861000
heap
page read and write
58DC000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
16C7D31D000
heap
page read and write
784000
heap
page read and write
13CC000
unkown
page execute and write copy
16C7D34E000
heap
page read and write
16C0C724000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
4E60000
direct allocation
page execute and read and write
4ADF000
stack
page read and write
5556000
trusted library allocation
page read and write
64BC000
trusted library allocation
page read and write
16C0BBFA000
trusted library allocation
page read and write
16C7FA2F000
trusted library allocation
page read and write
D20000
unkown
page readonly
2C17000
heap
page read and write
1E4000
heap
page read and write
16C7D357000
heap
page read and write
1166000
heap
page read and write
CB4000
heap
page read and write
BC9000
heap
page read and write
1094000
heap
page read and write
26808020000
heap
page read and write
16C134B2000
trusted library allocation
page read and write
1374000
heap
page read and write
5396000
trusted library allocation
page read and write
4980000
heap
page read and write
16C7D332000
heap
page read and write
26808031000
heap
page read and write
16C0C770000
trusted library allocation
page read and write
16C0B3CD000
trusted library allocation
page read and write
16C0CA78000
trusted library allocation
page read and write
67E000
stack
page read and write
16C0C476000
trusted library allocation
page read and write
16C0CA5A000
trusted library allocation
page read and write
4860000
direct allocation
page execute and read and write
16C0CB22000
trusted library allocation
page read and write
C5B000
heap
page read and write
D74000
heap
page read and write
4871000
heap
page read and write
16C0CA5F000
trusted library allocation
page read and write
16C7FBB7000
trusted library allocation
page read and write
4651000
heap
page read and write
16C1378B000
trusted library allocation
page read and write
368E000
stack
page read and write
123E000
stack
page read and write
16C7F56D000
trusted library allocation
page read and write
516C000
trusted library allocation
page read and write
1D1AF000
stack
page read and write
4C91000
heap
page read and write
4871000
heap
page read and write
16C7D345000
heap
page read and write
16C15BCD000
trusted library allocation
page read and write
6E8000
heap
page read and write
1094000
heap
page read and write
16C7D35A000
heap
page read and write
602E000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
16C7D35C000
heap
page read and write
53FC000
trusted library allocation
page read and write
16C7F47C000
trusted library allocation
page read and write
4651000
heap
page read and write
16C0CA11000
trusted library allocation
page read and write
FB1000
unkown
page execute and write copy
10F4000
heap
page read and write
16C134C3000
trusted library allocation
page read and write
16C0B3DF000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
16C08AF4000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
CB4000
heap
page read and write
16C0CB7D000
trusted library allocation
page read and write
16C0ED2C000
trusted library allocation
page read and write
16C0AFDE000
trusted library allocation
page read and write
5E7A000
trusted library allocation
page read and write
16C0B3F7000
trusted library allocation
page read and write
16C13689000
trusted library allocation
page read and write
16C0CB0C000
trusted library allocation
page read and write
784000
heap
page read and write
16C7D304000
heap
page read and write
53E6000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
16C0C41C000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
16C7D35A000
heap
page read and write
16C7D31E000
heap
page read and write
16C134A0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
D74000
heap
page read and write
5CE5000
trusted library allocation
page read and write
16C13732000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5CC5000
trusted library allocation
page read and write
4820000
remote allocation
page read and write
16C1377D000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
16C13BC1000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
2BE0000
direct allocation
page read and write
16C7D33B000
heap
page read and write
16C0DE6A000
trusted library allocation
page read and write
3C8D000
stack
page read and write
4871000
heap
page read and write
16C0CB9B000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
16C139AB000
trusted library allocation
page read and write
16C135E7000
trusted library allocation
page read and write
16C7D31D000
heap
page read and write
16C7D324000
heap
page read and write
1000000
direct allocation
page read and write
6116000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
FB0000
unkown
page readonly
5E10000
trusted library allocation
page read and write
1424000
heap
page read and write
16C0D9E5000
trusted library allocation
page read and write
1094000
heap
page read and write
16C7D34E000
heap
page read and write
16C13790000
trusted library allocation
page read and write
16C7D38C000
heap
page read and write
16C0B731000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C13BC8000
trusted library allocation
page read and write
16C134BF000
trusted library allocation
page read and write
345E000
stack
page read and write
5432000
trusted library allocation
page read and write
16C7D327000
heap
page read and write
10F4000
heap
page read and write
705000
heap
page read and write
16C086BE000
trusted library allocation
page read and write
16C7F56D000
trusted library allocation
page read and write
16C7D347000
heap
page read and write
4871000
heap
page read and write
D74000
heap
page read and write
594000
unkown
page execute and write copy
16C137FA000
trusted library allocation
page read and write
4B6F000
trusted library allocation
page read and write
3F5F000
stack
page read and write
554E000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C0CAFA000
trusted library allocation
page read and write
16C0C494000
trusted library allocation
page read and write
16C0C7D6000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
1D18D000
stack
page read and write
16C14E84000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
16C08E9E000
trusted library allocation
page read and write
16C7D38D000
heap
page read and write
58E7000
trusted library allocation
page read and write
16C7D380000
heap
page read and write
42CF000
stack
page read and write
16C7D345000
heap
page read and write
16C08E9E000
trusted library allocation
page read and write
BDF000
heap
page read and write
6E4000
heap
page read and write
16C084E4000
trusted library allocation
page read and write
16C134E3000
trusted library allocation
page read and write
26808021000
heap
page read and write
16C0EA79000
trusted library allocation
page read and write
1164000
heap
page read and write
16C13976000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
C90000
direct allocation
page read and write
535C000
trusted library allocation
page read and write
D74000
heap
page read and write
804000
unkown
page execute and read and write
16C135CC000
trusted library allocation
page read and write
16C0AF96000
trusted library allocation
page read and write
58C7000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
16C0EDF3000
trusted library allocation
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
16C7D31E000
heap
page read and write
16C7FBA9000
trusted library allocation
page read and write
4861000
heap
page read and write
16C0D9B2000
trusted library allocation
page read and write
36DE000
stack
page read and write
1094000
heap
page read and write
16C1398C000
trusted library allocation
page read and write
16C7D35A000
heap
page read and write
300E000
stack
page read and write
16C0CBA7000
trusted library allocation
page read and write
16C7D388000
heap
page read and write
13B2000
heap
page read and write
16C1366C000
trusted library allocation
page read and write
520000
heap
page read and write
16C0B354000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
26807F41000
heap
page read and write
C90000
direct allocation
page read and write
16C0EA5A000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
16C7F586000
trusted library allocation
page read and write
26808028000
heap
page read and write
2730000
direct allocation
page read and write
611000
unkown
page execute and write copy
5375000
trusted library allocation
page read and write
4CF0000
direct allocation
page read and write
6E8000
heap
page read and write
16C08A4B000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
16C0B367000
trusted library allocation
page read and write
421F000
stack
page read and write
16C134C8000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
551C000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
2C30000
direct allocation
page read and write
4871000
heap
page read and write
D74000
heap
page read and write
16C0C7BF000
trusted library allocation
page read and write
B50000
direct allocation
page read and write
16C7D320000
heap
page read and write
1409000
heap
page read and write
314E000
stack
page read and write
16C0D866000
trusted library allocation
page read and write
16C0B7FA000
trusted library allocation
page read and write
16C7D332000
heap
page read and write
2EE0000
heap
page read and write
C6B5FFF000
stack
page read and write
16C7D389000
heap
page read and write
16C0BB20000
trusted library allocation
page read and write
16C0CAE4000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
16C7D382000
heap
page read and write
117B000
heap
page read and write
385E000
stack
page read and write
16C13BEC000
trusted library allocation
page read and write
16C7D32D000
heap
page read and write
16C08E64000
trusted library allocation
page read and write
16C0DADE000
trusted library allocation
page read and write
16C7D315000
heap
page read and write
16C7D35C000
heap
page read and write
318E000
stack
page read and write
5D05000
trusted library allocation
page read and write
16C7D34E000
heap
page read and write
4E9F000
stack
page read and write
537B000
trusted library allocation
page read and write
594000
unkown
page execute and write copy
16C138EF000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
5F71000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
4E4E000
stack
page read and write
1402000
heap
page read and write
16C0B3B9000
trusted library allocation
page read and write
16C0DFD7000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
16C7D38D000
heap
page read and write
16C0DBDF000
trusted library allocation
page read and write
16C0BCF0000
trusted library allocation
page read and write
C6D000
heap
page read and write
16C13732000
trusted library allocation
page read and write
16C133E2000
trusted library allocation
page read and write
16C0C7A9000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
65AC000
trusted library allocation
page read and write
16C138CE000
trusted library allocation
page read and write
16C164AE000
trusted library allocation
page read and write
1094000
heap
page read and write
59DF000
trusted library allocation
page read and write
D74000
heap
page read and write
16C1338B000
trusted library allocation
page read and write
2C57000
heap
page read and write
16C7D380000
heap
page read and write
16C7D388000
heap
page read and write
D74000
heap
page read and write
16C0D9A7000
trusted library allocation
page read and write
784000
heap
page read and write
16C0C7DE000
trusted library allocation
page read and write
4F30000
direct allocation
page execute and read and write
65A2000
trusted library allocation
page read and write
16C137D1000
trusted library allocation
page read and write
16C0C4ED000
trusted library allocation
page read and write
43A1000
heap
page read and write
6070000
trusted library allocation
page read and write
43A1000
heap
page read and write
4EEF000
stack
page read and write
1373000
heap
page read and write
764000
heap
page read and write
592B000
trusted library allocation
page read and write
16C7D355000
heap
page read and write
16C7D345000
heap
page read and write
47CE000
stack
page read and write
2C7E000
stack
page read and write
16C13BC5000
trusted library allocation
page read and write
16C7D356000
heap
page read and write
17DF000
heap
page read and write
16C7D345000
heap
page read and write
1404000
heap
page read and write
16C7D360000
heap
page read and write
16C7D360000
heap
page read and write
16C0CCF7000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
16C138DA000
trusted library allocation
page read and write
BE1000
heap
page read and write
16C7D332000
heap
page read and write
59B1000
trusted library allocation
page read and write
16C0AF79000
trusted library allocation
page read and write
4B03000
trusted library allocation
page read and write
16C0B3A1000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
26808098000
heap
page read and write
53FC000
trusted library allocation
page read and write
4BE0000
direct allocation
page execute and read and write
7D4000
heap
page read and write
C60000
heap
page read and write
4C91000
heap
page read and write
6064000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
4651000
heap
page read and write
16C16F24000
trusted library allocation
page read and write
16C7D357000
heap
page read and write
58CD000
trusted library allocation
page read and write
16C7D360000
heap
page read and write
9560000
heap
page read and write
BF6000
heap
page read and write
1E4000
heap
page read and write
FB0000
unkown
page readonly
16C7FBB4000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
16C08EA5000
trusted library allocation
page read and write
26808029000
heap
page read and write
5661000
trusted library allocation
page read and write
4301000
heap
page read and write
16C16F15000
trusted library allocation
page read and write
D74000
heap
page read and write
16C086FE000
trusted library allocation
page read and write
16C7D353000
heap
page read and write
3D71000
heap
page read and write
53BE000
trusted library allocation
page read and write
16C0CA0B000
trusted library allocation
page read and write
4F60000
direct allocation
page execute and read and write
53BB000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
16C08E71000
trusted library allocation
page read and write
16C0EA5A000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
16C7F4C9000
trusted library allocation
page read and write
16C13B33000
trusted library allocation
page read and write
16C0C7F6000
trusted library allocation
page read and write
329E000
heap
page read and write
16C14F07000
trusted library allocation
page read and write
16C139B9000
trusted library allocation
page read and write
4651000
heap
page read and write
16C7D35C000
heap
page read and write
5E6E000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
4621000
heap
page read and write
16C7D345000
heap
page read and write
16C0B3C4000
trusted library allocation
page read and write
6D90000
heap
page read and write
16C16412000
trusted library allocation
page read and write
4390000
direct allocation
page read and write
16C7D34E000
heap
page read and write
54A4000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
1094000
heap
page read and write
16C08E82000
trusted library allocation
page read and write
784000
heap
page read and write
4390000
direct allocation
page read and write
16C7D381000
heap
page read and write
16C7D339000
heap
page read and write
5F5F000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
5CB4000
trusted library allocation
page read and write
4871000
heap
page read and write
5613000
trusted library allocation
page read and write
16C7D345000
heap
page read and write
4910000
direct allocation
page execute and read and write
6044000
trusted library allocation
page read and write
16C0C7BF000
trusted library allocation
page read and write
16C0CA66000
trusted library allocation
page read and write
471E000
stack
page read and write
450000
unkown
page readonly
16C08E55000
trusted library allocation
page read and write
1185000
heap
page read and write
16C15A53000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
17F2000
heap
page read and write
16C0CAF7000
trusted library allocation
page read and write
16C0EAA2000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
16C7D350000
heap
page read and write
642000
unkown
page execute and write copy
4B1E000
stack
page read and write
5F7E000
trusted library allocation
page read and write
1C8E31B6000
heap
page read and write
138D000
heap
page read and write
16C0EA2E000
trusted library allocation
page read and write
26808061000
heap
page read and write
D74000
heap
page read and write
16C1502C000
trusted library allocation
page read and write
359F000
stack
page read and write
537B000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
806000
unkown
page execute and read and write
16C0EF9F000
trusted library allocation
page read and write
16C0AF9A000
trusted library allocation
page read and write
16C0C754000
trusted library allocation
page read and write
D74000
heap
page read and write
4FE0000
direct allocation
page read and write
16C0CAA7000
trusted library allocation
page read and write
6109000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
BFA000
heap
page read and write
16C135FD000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
4861000
heap
page read and write
5D5C000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
16C1349E000
trusted library allocation
page read and write
16C7D354000
heap
page read and write
4F70000
direct allocation
page execute and read and write
16C1398C000
trusted library allocation
page read and write
4C91000
heap
page read and write
5CB4000
trusted library allocation
page read and write
16C0B287000
trusted library allocation
page read and write
5620000
direct allocation
page execute and read and write
4E30000
direct allocation
page execute and read and write
16C1390C000
trusted library allocation
page read and write
8DE000
unkown
page execute and read and write
12AB000
unkown
page execute and read and write
16C084EF000
trusted library allocation
page read and write
16C0B38F000
trusted library allocation
page read and write
1294000
unkown
page execute and write copy
16C13798000
trusted library allocation
page read and write
435E000
stack
page read and write
5385000
trusted library allocation
page read and write
16C1377B000
trusted library allocation
page read and write
16C7F47C000
trusted library allocation
page read and write
2CFE000
stack
page read and write
16C7D35A000
heap
page read and write
16C7F4DF000
trusted library allocation
page read and write
3E1F000
stack
page read and write
58B5000
trusted library allocation
page read and write
1D40F000
stack
page read and write
58B4000
trusted library allocation
page read and write
16C08AC8000
trusted library allocation
page read and write
5687000
trusted library allocation
page read and write
16C0C7F3000
trusted library allocation
page read and write
16C137BC000
trusted library allocation
page read and write
16C7D32E000
heap
page read and write
534A000
trusted library allocation
page read and write
16C0ED87000
trusted library allocation
page read and write
16C7F5DA000
trusted library allocation
page read and write
16C08A4B000
trusted library allocation
page read and write
16C16A01000
heap
page read and write
D74000
heap
page read and write
1168000
heap
page read and write
16C7D354000
heap
page read and write
16C7D3B7000
heap
page read and write
1C8E31B2000
heap
page read and write
D74000
heap
page read and write
1094000
heap
page read and write
16C0D8D3000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
16C0EF79000
trusted library allocation
page read and write
16C14F48000
trusted library allocation
page read and write
16C134C3000
trusted library allocation
page read and write
16C7D324000
heap
page read and write
16C1363A000
trusted library allocation
page read and write
4C91000
heap
page read and write
D74000
heap
page read and write
16C0C741000
trusted library allocation
page read and write
16C14F43000
trusted library allocation
page read and write
16C14FA7000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
4D01000
heap
page read and write
16C16902000
trusted library allocation
page read and write
16C7FEC5000
trusted library allocation
page read and write
16C7D31E000
heap
page read and write
16C7D345000
heap
page read and write
There are 7904 hidden memdumps, click here to show them.