IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_60f973d7-f2f9-4ea4-8e72-c7f40f019b7e.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_60f973d7-f2f9-4ea4-8e72-c7f40f019b7e.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5761 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://www.facebook.com/video" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.facebook.com/video --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://www.facebook.com/video --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0396842b-5f8c-4a85-b679-9364957dd6a4} 7696 "\\.\pipe\gecko-crash-server-pipe.7696" 21a4256f710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4244 -parentBuildID 20230927232528 -prefsHandle 4564 -prefMapHandle 4560 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {34c7d413-63c5-4d1d-89ed-8453ea87de46} 7696 "\\.\pipe\gecko-crash-server-pipe.7696" 21a54645310 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5384 -prefMapHandle 5360 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74dd1765-0c36-4f4d-8ed0-1fe6c7988c56} 7696 "\\.\pipe\gecko-crash-server-pipe.7696" 21a541baf10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://login.li
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture0
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureWebExtensionUncheckedLastErr
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
star-mini.c10r.facebook.com
157.240.253.35
example.org
93.184.215.14
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.184.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 20 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
157.240.253.35
star-mini.c10r.facebook.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
21A49316000
heap
page read and write
21A492CE000
heap
page read and write
21A5E852000
trusted library allocation
page read and write
21A51B62000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A540C7000
trusted library allocation
page read and write
21A53214000
trusted library allocation
page read and write
279908B03000
trusted library allocation
page read and write
AE0000
heap
page read and write
21A492EB000
heap
page read and write
21A4E3BC000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A535A5000
trusted library allocation
page read and write
21A51B4F000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49322000
heap
page read and write
21A53A82000
trusted library allocation
page read and write
21A5AC61000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5ABB6000
trusted library allocation
page read and write
21A53E96000
trusted library allocation
page read and write
21A5A4F5000
trusted library allocation
page read and write
21A52E9C000
trusted library allocation
page read and write
21A53393000
trusted library allocation
page read and write
21A5AB4C000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49314000
heap
page read and write
1B498209000
heap
page read and write
21A492F5000
heap
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49304000
heap
page read and write
21A49302000
heap
page read and write
21A5AC77000
trusted library allocation
page read and write
21A51F00000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
2AD21C14000
heap
page read and write
21A49325000
heap
page read and write
21A5367D000
trusted library allocation
page read and write
21A5E83D000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5A612000
trusted library allocation
page read and write
21A5A700000
trusted library allocation
page read and write
21A5ACA2000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
278A8AC0000
heap
page read and write
21A5DED0000
trusted library allocation
page read and write
2B996770000
heap
page read and write
21A5218E000
trusted library allocation
page read and write
21A5D9A4000
trusted library allocation
page read and write
2AD21700000
unclassified section
page readonly
21A54AEA000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5D9F8000
trusted library allocation
page read and write
21A559BF000
trusted library allocation
page read and write
21A5A631000
trusted library allocation
page read and write
21A5E4ED000
trusted library allocation
page read and write
21A53A2E000
trusted library allocation
page read and write
21A534D0000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A53A85000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5BE64000
trusted library allocation
page read and write
21A54E4E000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5DF29000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5E8B1000
trusted library allocation
page read and write
21A51B3F000
trusted library allocation
page read and write
21A5D81B000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492F5000
heap
page read and write
21A53363000
trusted library allocation
page read and write
21A53488000
trusted library allocation
page read and write
1B498344000
heap
page read and write
21A4931B000
heap
page read and write
1B4982F1000
heap
page read and write
21A5A5AE000
trusted library allocation
page read and write
21A54A45000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A49314000
heap
page read and write
21A5364A000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492F5000
heap
page read and write
21A492D5000
heap
page read and write
21A55856000
trusted library allocation
page read and write
21A538CC000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A492DA000
heap
page read and write
21A49302000
heap
page read and write
21A4930E000
heap
page read and write
2AD21B66000
trusted library allocation
page read and write
21A54EF3000
trusted library allocation
page read and write
21A5D9B8000
trusted library allocation
page read and write
1B49826C000
heap
page read and write
21A538E2000
trusted library allocation
page read and write
21A538FD000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5E81E000
trusted library allocation
page read and write
21A49310000
heap
page read and write
21A4F2E6000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A53FC7000
trusted library allocation
page read and write
2AD2195F000
unclassified section
page read and write
21A53DEF000
trusted library allocation
page read and write
21A537E8000
trusted library allocation
page read and write
21A5EACE000
trusted library allocation
page read and write
21A548DB000
trusted library allocation
page read and write
1B4982FC000
heap
page read and write
21A5E3F9000
trusted library allocation
page read and write
21A55831000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A5463C000
trusted library allocation
page read and write
21A53FB2000
trusted library allocation
page read and write
21A5339D000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A49305000
heap
page read and write
21A548E2000
trusted library allocation
page read and write
1B4982E9000
heap
page read and write
21A5D9C4000
trusted library allocation
page read and write
21A5D9F8000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A49302000
heap
page read and write
FBC88EE000
unkown
page readonly
21A492F5000
heap
page read and write
21A53A4A000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492DA000
heap
page read and write
21A492F1000
heap
page read and write
21A49334000
heap
page read and write
21A5ABBE000
trusted library allocation
page read and write
21A5C64D000
trusted library allocation
page read and write
21A5C641000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A5581C000
trusted library allocation
page read and write
21A5DED2000
trusted library allocation
page read and write
21A5A55B000
trusted library allocation
page read and write
21A5D9DB000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5ABDC000
trusted library allocation
page read and write
21A53E98000
trusted library allocation
page read and write
21A5BEC9000
trusted library allocation
page read and write
21A55AEC000
trusted library allocation
page read and write
21A5C648000
trusted library allocation
page read and write
21A54AC2000
trusted library allocation
page read and write
21A53BA4000
trusted library allocation
page read and write
21A53FEB000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A541DD000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A4F2FD000
trusted library allocation
page read and write
21A534CC000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A492EB000
heap
page read and write
21A54952000
trusted library allocation
page read and write
21A54A93000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4F44C000
trusted library allocation
page read and write
21A5A6C3000
trusted library allocation
page read and write
21A4F2FD000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
1B49827D000
heap
page read and write
21A492F1000
heap
page read and write
21A53A04000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5ED01000
heap
page read and write
FBC89EE000
unkown
page readonly
21A53562000
trusted library allocation
page read and write
21A5A2D2000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5A548000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5AB13000
trusted library allocation
page read and write
21A54043000
trusted library allocation
page read and write
21A5225D000
trusted library allocation
page read and write
21A53A8F000
trusted library allocation
page read and write
21A5A6F1000
trusted library allocation
page read and write
21A5E85E000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5A545000
trusted library allocation
page read and write
21A492CC000
heap
page read and write
21A49327000
heap
page read and write
21A53583000
trusted library allocation
page read and write
21A533BB000
trusted library allocation
page read and write
21A5ACC8000
trusted library allocation
page read and write
21A5A612000
trusted library allocation
page read and write
21A53FEB000
trusted library allocation
page read and write
21A5A6F7000
trusted library allocation
page read and write
21A5E425000
trusted library allocation
page read and write
21A52247000
trusted library allocation
page read and write
21A5DF3B000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5E8AD000
trusted library allocation
page read and write
21A492E3000
heap
page read and write
21A537F7000
trusted library allocation
page read and write
1B4982E3000
heap
page read and write
21A546B8000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5A2D2000
trusted library allocation
page read and write
A8E000
stack
page read and write
21A5A6C9000
trusted library allocation
page read and write
21A4F2FD000
trusted library allocation
page read and write
21A53F70000
trusted library allocation
page read and write
21A51DD1000
heap
page read and write
21A4932E000
heap
page read and write
21A4931B000
heap
page read and write
21A5DF8A000
trusted library allocation
page read and write
F40000
heap
page read and write
21A558B0000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A4932E000
heap
page read and write
21A5AC59000
trusted library allocation
page read and write
2AD219C3000
heap
page read and write
21A49322000
heap
page read and write
21A53905000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A55D51000
trusted library allocation
page read and write
21A52EC3000
trusted library allocation
page read and write
21A54996000
trusted library allocation
page read and write
21A53629000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A54E5B000
trusted library allocation
page read and write
21A54156000
trusted library allocation
page read and write
21A5226F000
trusted library allocation
page read and write
21A546AE000
trusted library allocation
page read and write
21A54A96000
trusted library allocation
page read and write
1B4982F1000
heap
page read and write
21A53FC7000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A52292000
trusted library allocation
page read and write
21A54A48000
trusted library allocation
page read and write
21A533EB000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5388A000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49302000
heap
page read and write
21A492E0000
heap
page read and write
21A522CA000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A534C8000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A5347F000
trusted library allocation
page read and write
21A53AF5000
trusted library allocation
page read and write
21A5E2F3000
trusted library allocation
page read and write
21A541E5000
trusted library allocation
page read and write
21A548F7000
trusted library allocation
page read and write
21A5E3F7000
trusted library allocation
page read and write
AE4000
heap
page read and write
2B996812000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
2B99665B000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5E42F000
trusted library allocation
page read and write
21A53A21000
trusted library allocation
page read and write
21A53F24000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A53684000
trusted library allocation
page read and write
21A53622000
trusted library allocation
page read and write
21A53735000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
2AD21BF2000
trusted library allocation
page read and write
21A5582A000
trusted library allocation
page read and write
21A5A4F0000
trusted library allocation
page read and write
21A51B5A000
trusted library allocation
page read and write
21A536DA000
trusted library allocation
page read and write
9BEBFFF000
stack
page read and write
21A492DA000
heap
page read and write
21A56306000
trusted library allocation
page read and write
1B497BB4000
unkown
page execute read
21A5E8A5000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
FBCA3FE000
stack
page read and write
21A5584E000
trusted library allocation
page read and write
21A5E493000
trusted library allocation
page read and write
1B497450000
heap
page read and write
D3BF8FE000
unkown
page readonly
C20000
heap
page read and write
21A492ED000
heap
page read and write
21A492E4000
heap
page read and write
21A5E413000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A53E36000
trusted library allocation
page read and write
21A4937A000
heap
page read and write
21A5E4F2000
trusted library allocation
page read and write
21A49305000
heap
page read and write
B02F9D8000
stack
page read and write
21A54EE2000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5417D000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A524BB000
trusted library allocation
page read and write
21A53A4E000
trusted library allocation
page read and write
21A54A56000
trusted library allocation
page read and write
21A5DF8A000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A55D35000
trusted library allocation
page read and write
21A5ACB4000
trusted library allocation
page read and write
21A53FB4000
trusted library allocation
page read and write
21A5A5F8000
trusted library allocation
page read and write
21A492E3000
heap
page read and write
AE4000
heap
page read and write
2B996774000
heap
page read and write
21A4932E000
heap
page read and write
21A548F5000
trusted library allocation
page read and write
21A5DF98000
trusted library allocation
page read and write
21A5A6F1000
trusted library allocation
page read and write
21A5343D000
trusted library allocation
page read and write
21A519BC000
trusted library allocation
page read and write
21A546F3000
trusted library allocation
page read and write
21A5D9DB000
trusted library allocation
page read and write
21A540F1000
trusted library allocation
page read and write
21A5E509000
trusted library allocation
page read and write
21A55959000
trusted library allocation
page read and write
21A5ED3E000
heap
page read and write
21A53281000
trusted library allocation
page read and write
21A53620000
trusted library allocation
page read and write
21A4F2AA000
trusted library allocation
page read and write
2B996623000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A5321F000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A492E0000
heap
page read and write
21A54ABA000
trusted library allocation
page read and write
21A538E4000
trusted library allocation
page read and write
21A5E51D000
trusted library allocation
page read and write
1B49827F000
heap
page read and write
2AD21960000
heap
page read and write
21A4931D000
heap
page read and write
21A49304000
heap
page read and write
21A54938000
trusted library allocation
page read and write
21A5EA38000
trusted library allocation
page read and write
21A5D9E7000
trusted library allocation
page read and write
21A54950000
trusted library allocation
page read and write
21A52279000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A49312000
heap
page read and write
21A49322000
heap
page read and write
21A5E2E7000
trusted library allocation
page read and write
21A5DF91000
trusted library allocation
page read and write
21A53A82000
trusted library allocation
page read and write
21A538D2000
trusted library allocation
page read and write
21A492C9000
heap
page read and write
21A53F6B000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A4932E000
heap
page read and write
21A549A9000
trusted library allocation
page read and write
21A54AC2000
trusted library allocation
page read and write
21A53612000
trusted library allocation
page read and write
21A5209A000
trusted library allocation
page read and write
21A4931E000
heap
page read and write
21A4E3F9000
trusted library allocation
page read and write
1B498264000
heap
page read and write
21A492F5000
heap
page read and write
21A5D973000
trusted library allocation
page read and write
21A5A569000
trusted library allocation
page read and write
21A5D8E9000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492F1000
heap
page read and write
21A4932C000
heap
page read and write
21A4930B000
heap
page read and write
21A534C8000
trusted library allocation
page read and write
21A546FA000
trusted library allocation
page read and write
21A537CC000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A532C1000
trusted library allocation
page read and write
21A54E4C000
trusted library allocation
page read and write
21A5463A000
trusted library allocation
page read and write
1B497BB0000
unkown
page execute read
21A541D9000
trusted library allocation
page read and write
21A52EAC000
trusted library allocation
page read and write
21A5E2D5000
trusted library allocation
page read and write
21A5AC65000
trusted library allocation
page read and write
D3BCFD8000
stack
page read and write
21A5A900000
trusted library allocation
page read and write
21A5499F000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492E3000
heap
page read and write
21A5E858000
trusted library allocation
page read and write
21A5A558000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A49305000
heap
page read and write
ACE000
stack
page read and write
21A49304000
heap
page read and write
21A49321000
heap
page read and write
21A534CC000
trusted library allocation
page read and write
21A5DF50000
trusted library allocation
page read and write
21A5ABEF000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5E507000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A492F1000
heap
page read and write
21A558FD000
trusted library allocation
page read and write
21A4F434000
trusted library allocation
page read and write
21A5D9FC000
trusted library allocation
page read and write
21A54D6A000
trusted library allocation
page read and write
21A541AE000
trusted library allocation
page read and write
21A54949000
trusted library allocation
page read and write
21A492E1000
heap
page read and write
268A1310000
heap
page read and write
21A492F1000
heap
page read and write
21A5D9AB000
trusted library allocation
page read and write
21A5EC3A000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5A69A000
trusted library allocation
page read and write
C90000
unkown
page readonly
21A53F32000
trusted library allocation
page read and write
1B4974B2000
unclassified section
page read and write
21A536CB000
trusted library allocation
page read and write
21A545A5000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A52268000
trusted library allocation
page read and write
21A53FE2000
trusted library allocation
page read and write
2AD217C0000
heap
page read and write
2B9962E0000
heap
page read and write
21A53337000
trusted library allocation
page read and write
21A537C1000
trusted library allocation
page read and write
21A52E99000
trusted library allocation
page read and write
21A5228B000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A51B6B000
trusted library allocation
page read and write
21A54AF0000
trusted library allocation
page read and write
21A53D5D000
trusted library allocation
page read and write
21A52281000
trusted library allocation
page read and write
21A54765000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A533B5000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A54A56000
trusted library allocation
page read and write
21A549DB000
trusted library allocation
page read and write
21A549CA000
trusted library allocation
page read and write
21A5ACC8000
trusted library allocation
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5AB86000
trusted library allocation
page read and write
21A51B8E000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A49327000
heap
page read and write
21A4931B000
heap
page read and write
21A53FFC000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
1B498300000
heap
page read and write
21A5ABB6000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A538DF000
trusted library allocation
page read and write
21A5E434000
trusted library allocation
page read and write
21A54189000
trusted library allocation
page read and write
D60000
unkown
page write copy
21A5C60C000
trusted library allocation
page read and write
21A54A35000
trusted library allocation
page read and write
21A5E8E6000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5A538000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A53D6A000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5D9DB000
trusted library allocation
page read and write
21A5C706000
trusted library allocation
page read and write
21A5413C000
trusted library allocation
page read and write
1B4972B7000
remote allocation
page execute read
21A492ED000
heap
page read and write
21A5AC85000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A49302000
heap
page read and write
21A49302000
heap
page read and write
C60000
heap
page read and write
21A4930B000
heap
page read and write
21A5BEA6000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A53FFC000
trusted library allocation
page read and write
21A4F4E4000
trusted library allocation
page read and write
21A5AC39000
trusted library allocation
page read and write
21A4F5DC000
trusted library allocation
page read and write
21A5229B000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A4F5DD000
trusted library allocation
page read and write
21A522BB000
trusted library allocation
page read and write
21A533B8000
trusted library allocation
page read and write
21A54A45000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A54CFA000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A49334000
heap
page read and write
21A49304000
heap
page read and write
21A49302000
heap
page read and write
21A4DCDF000
trusted library allocation
page read and write
21A5E2F3000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A5BE97000
trusted library allocation
page read and write
21A54A56000
trusted library allocation
page read and write
1B49828A000
heap
page read and write
21A492DA000
heap
page read and write
21A522AC000
trusted library allocation
page read and write
21A4930C000
heap
page read and write
21A5D9B8000
trusted library allocation
page read and write
21A519DB000
trusted library allocation
page read and write
21A52013000
trusted library allocation
page read and write
21A522FC000
trusted library allocation
page read and write
21A5A48C000
trusted library allocation
page read and write
21A49302000
heap
page read and write
FBCC3FE000
stack
page read and write
21A524BB000
trusted library allocation
page read and write
21A5ABB9000
trusted library allocation
page read and write
21A558ED000
trusted library allocation
page read and write
2AD21780000
unclassified section
page readonly
21A51D88000
heap
page read and write
21A492CE000
heap
page read and write
21A53ACA000
trusted library allocation
page read and write
21A5AC6A000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5AC12000
trusted library allocation
page read and write
21A55ADD000
trusted library allocation
page read and write
21A532C1000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A49334000
heap
page read and write
21A5E85C000
trusted library allocation
page read and write
21A53572000
trusted library allocation
page read and write
21A53F3F000
trusted library allocation
page read and write
C91000
unkown
page execute read
21A5D8A2000
trusted library allocation
page read and write
2AD21760000
remote allocation
page read and write
21A4E3A0000
trusted library allocation
page read and write
21A5D9EC000
trusted library allocation
page read and write
21A4930F000
heap
page read and write
21A492F0000
heap
page read and write
21A549E5000
trusted library allocation
page read and write
21A53D30000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A54A7A000
trusted library allocation
page read and write
21A53D32000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A4930E000
heap
page read and write
21A4932E000
heap
page read and write
21A492EB000
heap
page read and write
21A5326C000
trusted library allocation
page read and write
21A54EB2000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492F1000
heap
page read and write
21A533AA000
trusted library allocation
page read and write
1B498260000
heap
page read and write
21A4931B000
heap
page read and write
F70000
heap
page read and write
21A541D9000
trusted library allocation
page read and write
1B49827D000
heap
page read and write
21A4F283000
trusted library allocation
page read and write
21A5D9E4000
trusted library allocation
page read and write
2AD21940000
heap
page readonly
21A549F0000
trusted library allocation
page read and write
21A5ACC6000
trusted library allocation
page read and write
21A51D96000
heap
page read and write
21A53489000
trusted library allocation
page read and write
21A5E8E6000
trusted library allocation
page read and write
21A55DFD000
trusted library allocation
page read and write
21A54B63000
trusted library allocation
page read and write
21A5DF58000
trusted library allocation
page read and write
21A51B5A000
trusted library allocation
page read and write
21A5A5F6000
trusted library allocation
page read and write
2AD217A0000
heap
page read and write
21A5EA6D000
trusted library allocation
page read and write
F7E000
heap
page read and write
21A492F1000
heap
page read and write
21A54E20000
trusted library allocation
page read and write
1B4982E0000
heap
page read and write
21A492D5000
heap
page read and write
2B996270000
unclassified section
page readonly
21A549BA000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A52EBC000
trusted library allocation
page read and write
21A5E8A3000
trusted library allocation
page read and write
21A54A12000
trusted library allocation
page read and write
21A5367B000
trusted library allocation
page read and write
21A5DED0000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A53DD2000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5A632000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49316000
heap
page read and write
21A548E4000
trusted library allocation
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A53AFC000
trusted library allocation
page read and write
21A4E36A000
trusted library allocation
page read and write
21A5D9F2000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A55AE8000
trusted library allocation
page read and write
21A558C4000
trusted library allocation
page read and write
21A55AEA000
trusted library allocation
page read and write
1B4982E3000
heap
page read and write
21A54AE7000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A492EB000
heap
page read and write
21A51B84000
trusted library allocation
page read and write
21A52EF8000
trusted library allocation
page read and write
21A53F9A000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A52E3C000
trusted library allocation
page read and write
1B497460000
heap
page read and write
21A49316000
heap
page read and write
21A5ABE9000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5ED01000
heap
page read and write
2B996681000
trusted library allocation
page read and write
1B498269000
heap
page read and write
21A51DB5000
heap
page read and write
21A5499F000
trusted library allocation
page read and write
21A55AEA000
trusted library allocation
page read and write
21A5390A000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A492ED000
heap
page read and write
21A5492B000
trusted library allocation
page read and write
21A55CE4000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5219E000
trusted library allocation
page read and write
F66000
heap
page read and write
21A49302000
heap
page read and write
21A49319000
heap
page read and write
21A5A332000
trusted library allocation
page read and write
21A4DC90000
trusted library allocation
page read and write
21A4E400000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A54DF1000
trusted library allocation
page read and write
21A5ABE9000
trusted library allocation
page read and write
21A5ABE3000
trusted library allocation
page read and write
21A537F3000
trusted library allocation
page read and write
21A49302000
heap
page read and write
278A8B10000
heap
page read and write
21A53AFC000
trusted library allocation
page read and write
21A5D872000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A53678000
trusted library allocation
page read and write
21A5359C000
trusted library allocation
page read and write
1B49832A000
heap
page read and write
21A54AFB000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A54A4D000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
2B996803000
trusted library allocation
page read and write
21A49304000
heap
page read and write
268A2EF0000
heap
page read and write
21A5D887000
trusted library allocation
page read and write
21A5ABBE000
trusted library allocation
page read and write
21A5D970000
trusted library allocation
page read and write
D52000
unkown
page readonly
21A5ACF6000
trusted library allocation
page read and write
21A49338000
heap
page read and write
21A492E0000
heap
page read and write
21A492DA000
heap
page read and write
21A53359000
trusted library allocation
page read and write
21A5A2D6000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A4DC81000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5D980000
trusted library allocation
page read and write
21A53B8B000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A54A79000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A53F80000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A534D0000
trusted library allocation
page read and write
21A49316000
heap
page read and write
1B49769E000
trusted library allocation
page read and write
21A53A68000
trusted library allocation
page read and write
21A549B5000
trusted library allocation
page read and write
2AD21C16000
heap
page read and write
21A5ABE9000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A533EB000
trusted library allocation
page read and write
21A538C8000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5223B000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A53FE2000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A53A8A000
trusted library allocation
page read and write
21A5A6D6000
trusted library allocation
page read and write
21A55AA5000
trusted library allocation
page read and write
21A53FD3000
trusted library allocation
page read and write
21A49325000
heap
page read and write
F6A000
heap
page read and write
21A49327000
heap
page read and write
21A492EB000
heap
page read and write
21A5AB09000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
2AD21B49000
trusted library allocation
page read and write
21A5D99C000
trusted library allocation
page read and write
21A548C1000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A49302000
heap
page read and write
21A53626000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5E240000
trusted library allocation
page read and write
21A54BD4000
trusted library allocation
page read and write
21A4E2F6000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492CA000
heap
page read and write
21A5A5F8000
trusted library allocation
page read and write
21A5A56D000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A4931B000
heap
page read and write
21A49302000
heap
page read and write
21A5ABF6000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492D5000
heap
page read and write
21A52FF2000
trusted library allocation
page read and write
21A53569000
trusted library allocation
page read and write
21A5D9EC000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A492E9000
heap
page read and write
2B996664000
trusted library allocation
page read and write
21A5A2CA000
trusted library allocation
page read and write
2AD21B78000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A55897000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5415D000
trusted library allocation
page read and write
21A535F8000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A5DF8A000
trusted library allocation
page read and write
21A54E32000
trusted library allocation
page read and write
21A5217C000
trusted library allocation
page read and write
21A49311000
heap
page read and write
21A5D977000
trusted library allocation
page read and write
21A53A96000
trusted library allocation
page read and write
21A53A85000
trusted library allocation
page read and write
21A5E4B3000
trusted library allocation
page read and write
21A4F498000
trusted library allocation
page read and write
21A5C6A3000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5BE6D000
trusted library allocation
page read and write
21A5367B000
trusted library allocation
page read and write
21A52EF8000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5AB42000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4E38D000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49322000
heap
page read and write
21A492E4000
heap
page read and write
21A5EC8C000
trusted library allocation
page read and write
21A51D7C000
heap
page read and write
21A5D9C5000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5ACBC000
trusted library allocation
page read and write
21A5A5AE000
trusted library allocation
page read and write
21A5E46D000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A49319000
heap
page read and write
21A54A9D000
trusted library allocation
page read and write
21A53907000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A49302000
heap
page read and write
21A549BA000
trusted library allocation
page read and write
21A5328B000
trusted library allocation
page read and write
21A55D38000
trusted library allocation
page read and write
21A53EE3000
trusted library allocation
page read and write
21A4930C000
heap
page read and write
21A54022000
trusted library allocation
page read and write
21A53880000
trusted library allocation
page read and write
21A5D965000
trusted library allocation
page read and write
21A53FF2000
trusted library allocation
page read and write
21A5E858000
trusted library allocation
page read and write
21A52151000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5E51E000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5D9F2000
trusted library allocation
page read and write
21A52143000
trusted library allocation
page read and write
2B996679000
trusted library allocation
page read and write
21A5209A000
trusted library allocation
page read and write
21A5BEB5000
trusted library allocation
page read and write
21A5C607000
trusted library allocation
page read and write
21A5ACB6000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A4F5B2000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5A5BA000
trusted library allocation
page read and write
21A5E89B000
trusted library allocation
page read and write
2B996290000
heap
page read and write
21A492EA000
heap
page read and write
21A5ABE3000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5A52E000
trusted library allocation
page read and write
21A53E7C000
trusted library allocation
page read and write
21A549E5000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492F1000
heap
page read and write
21A5ABA8000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5A2DA000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A5E52D000
trusted library allocation
page read and write
AD0000
heap
page read and write
21A5D872000
trusted library allocation
page read and write
21A536B5000
trusted library allocation
page read and write
268A136F000
heap
page read and write
21A51D88000
heap
page read and write
21A56693000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A538A3000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A52E9D000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A492DB000
heap
page read and write
21A5457B000
trusted library allocation
page read and write
21A53A8D000
trusted library allocation
page read and write
21A492DC000
heap
page read and write
21A53A4B000
trusted library allocation
page read and write
1B497B60000
trusted library section
page readonly
21A492ED000
heap
page read and write
21A49302000
heap
page read and write
21A5A5C7000
trusted library allocation
page read and write
21A5A5FA000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A53A8F000
trusted library allocation
page read and write
21A5A33C000
trusted library allocation
page read and write
21A54999000
trusted library allocation
page read and write
21A53BFC000
trusted library allocation
page read and write
21A5AC85000
trusted library allocation
page read and write
21A54AEC000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A533AC000
trusted library allocation
page read and write
21A55AFB000
trusted library allocation
page read and write
21A54AF0000
trusted library allocation
page read and write
21A5AB4C000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A4930B000
heap
page read and write
21A52E8D000
trusted library allocation
page read and write
21A52E5D000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4931D000
heap
page read and write
21A49316000
heap
page read and write
21A492F5000
heap
page read and write
268A1340000
heap
page read and write
9DB000
stack
page read and write
2B9961E0000
unclassified section
page readonly
21A49321000
heap
page read and write
21A492ED000
heap
page read and write
21A49327000
heap
page read and write
21A5D9E8000
trusted library allocation
page read and write
21A5632C000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A5D99C000
trusted library allocation
page read and write
2AD21A00000
trusted library allocation
page read and write
1B498100000
trusted library allocation
page read and write
21A5D202000
trusted library allocation
page read and write
21A53FF9000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A5AC6A000
trusted library allocation
page read and write
21A5A6CD000
trusted library allocation
page read and write
268A150A000
trusted library allocation
page read and write
21A51DC7000
heap
page read and write
21A5D9F2000
trusted library allocation
page read and write
21A546B6000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A492D5000
heap
page read and write
2AD21B72000
trusted library allocation
page read and write
21A53216000
trusted library allocation
page read and write
21A49338000
heap
page read and write
21A492DA000
heap
page read and write
21A53A40000
trusted library allocation
page read and write
21A53A71000
trusted library allocation
page read and write
21A5D9E0000
trusted library allocation
page read and write
21A5346C000
trusted library allocation
page read and write
21A5D9E2000
trusted library allocation
page read and write
21A53A7C000
trusted library allocation
page read and write
AE4000
heap
page read and write
1B498200000
heap
page read and write
21A5D2A8000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A522C4000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A5A6C5000
trusted library allocation
page read and write
21A53383000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5413A000
trusted library allocation
page read and write
21A54996000
trusted library allocation
page read and write
21A492E6000
heap
page read and write
21A53A8D000
trusted library allocation
page read and write
21A5A2CA000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A55A9C000
trusted library allocation
page read and write
21A5A643000
trusted library allocation
page read and write
21A5E2E7000
trusted library allocation
page read and write
21A534A3000
trusted library allocation
page read and write
21A5AC59000
trusted library allocation
page read and write
21A54AAF000
trusted library allocation
page read and write
21A53BDC000
trusted library allocation
page read and write
21A53E65000
trusted library allocation
page read and write
21A5A686000
trusted library allocation
page read and write
21A53D34000
trusted library allocation
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A541A2000
trusted library allocation
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A49322000
heap
page read and write
AE4000
heap
page read and write
21A5EC31000
trusted library allocation
page read and write
21A5ABED000
trusted library allocation
page read and write
21A55CEF000
trusted library allocation
page read and write
21A55D8D000
trusted library allocation
page read and write
2B996600000
trusted library allocation
page read and write
21A548F5000
trusted library allocation
page read and write
21A5364E000
trusted library allocation
page read and write
21A522BE000
trusted library allocation
page read and write
21A52269000
trusted library allocation
page read and write
21A5D9E2000
trusted library allocation
page read and write
21A5EDE1000
heap
page read and write
21A53DC9000
trusted library allocation
page read and write
21A534FB000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A549A1000
trusted library allocation
page read and write
21A5AB49000
trusted library allocation
page read and write
21A53D73000
trusted library allocation
page read and write
1B49826C000
heap
page read and write
21A49302000
heap
page read and write
21A492ED000
heap
page read and write
21A53692000
trusted library allocation
page read and write
21A5A4CD000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A4F43B000
trusted library allocation
page read and write
21A538AD000
trusted library allocation
page read and write
21A54964000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A534A2000
trusted library allocation
page read and write
21A4F588000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A537E5000
trusted library allocation
page read and write
1B4982B9000
heap
page read and write
21A49330000
heap
page read and write
21A5BE1C000
trusted library allocation
page read and write
21A53F80000
trusted library allocation
page read and write
21A5DFB4000
trusted library allocation
page read and write
21A53319000
trusted library allocation
page read and write
D3C08FE000
unkown
page readonly
21A5ACB8000
trusted library allocation
page read and write
21A547CE000
trusted library allocation
page read and write
21A549A9000
trusted library allocation
page read and write
21A5AB5F000
trusted library allocation
page read and write
FBC892D000
stack
page read and write
21A53D38000
trusted library allocation
page read and write
21A5D9EE000
trusted library allocation
page read and write
21A522BE000
trusted library allocation
page read and write
21A53AC6000
trusted library allocation
page read and write
21A54BAD000
trusted library allocation
page read and write
21A534FA000
trusted library allocation
page read and write
21A53A71000
trusted library allocation
page read and write
21A5E21B000
trusted library allocation
page read and write
21A5D9E2000
trusted library allocation
page read and write
21A4F62B000
trusted library allocation
page read and write
21A53F8E000
trusted library allocation
page read and write
21A54CE7000
trusted library allocation
page read and write
21A5DF68000
trusted library allocation
page read and write
21A5365B000
trusted library allocation
page read and write
21A5A2DA000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
1B497675000
trusted library allocation
page read and write
21A5ABF6000
trusted library allocation
page read and write
21A55ACC000
trusted library allocation
page read and write
21A5AC5D000
trusted library allocation
page read and write
21A53A3B000
trusted library allocation
page read and write
21A536E4000
trusted library allocation
page read and write
2AD21B76000
trusted library allocation
page read and write
21A5E8AB000
trusted library allocation
page read and write
21A536D8000
trusted library allocation
page read and write
268A12F0000
heap
page read and write
21A5D9C4000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A492EB000
heap
page read and write
D3BF87E000
unkown
page readonly
21A5AC77000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5A489000
trusted library allocation
page read and write
21A5AC92000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A4E3F9000
trusted library allocation
page read and write
21A54050000
trusted library allocation
page read and write
21A5BE73000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A49322000
heap
page read and write
21A5ACBC000
trusted library allocation
page read and write
21A53DDB000
trusted library allocation
page read and write
1B49765C000
trusted library allocation
page read and write
21A5A2DE000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A53A8D000
trusted library allocation
page read and write
21A520D2000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A492E9000
heap
page read and write
21A5D9E2000
trusted library allocation
page read and write
21A53A96000
trusted library allocation
page read and write
21A54BC5000
trusted library allocation
page read and write
F7E000
heap
page read and write
21A49316000
heap
page read and write
21A522D0000
trusted library allocation
page read and write
21A4F5A2000
trusted library allocation
page read and write
21A53678000
trusted library allocation
page read and write
21A5AB8D000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A53E65000
trusted library allocation
page read and write
1B497612000
trusted library allocation
page read and write
21A55AE8000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
2B99680C000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A5D9BE000
trusted library allocation
page read and write
B0311FE000
unkown
page readonly
21A49304000
heap
page read and write
1B498344000
heap
page read and write
21A49322000
heap
page read and write
21A54CFA000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A545D1000
trusted library allocation
page read and write
21A55D1A000
trusted library allocation
page read and write
21A52495000
trusted library allocation
page read and write
21A54013000
trusted library allocation
page read and write
21A5206A000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A55D4C000
trusted library allocation
page read and write
21A549F0000
trusted library allocation
page read and write
21A53F6B000
trusted library allocation
page read and write
21A49338000
heap
page read and write
21A492EA000
heap
page read and write
21A492F5000
heap
page read and write
21A49321000
heap
page read and write
21A5A61E000
trusted library allocation
page read and write
21A5A618000
trusted library allocation
page read and write
21A545F7000
trusted library allocation
page read and write
21A53221000
trusted library allocation
page read and write
21A4F4EA000
trusted library allocation
page read and write
268A1507000
trusted library allocation
page read and write
21A5349E000
trusted library allocation
page read and write
21A4F635000
trusted library allocation
page read and write
21A56381000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
2B9966A0000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
1B498358000
heap
page read and write
21A53FFC000
trusted library allocation
page read and write
21A55DB8000
trusted library allocation
page read and write
21A53885000
trusted library allocation
page read and write
21A51BCF000
trusted library allocation
page read and write
1B4976C4000
trusted library allocation
page read and write
21A5A53D000
trusted library allocation
page read and write
21A5A5BA000
trusted library allocation
page read and write
21A52279000
trusted library allocation
page read and write
21A5D9CD000
trusted library allocation
page read and write
21A541E5000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49302000
heap
page read and write
2B9961F0000
unclassified section
page readonly
21A5E4FE000
trusted library allocation
page read and write
21A5338A000
trusted library allocation
page read and write
21A5C757000
trusted library allocation
page read and write
21A5D859000
trusted library allocation
page read and write
21A4F455000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5226F000
trusted library allocation
page read and write
21A53F15000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A49316000
heap
page read and write
21A5AB39000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A49327000
heap
page read and write
21A492E4000
heap
page read and write
21A53BA8000
trusted library allocation
page read and write
21A5587C000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5215A000
trusted library allocation
page read and write
21A5AB42000
trusted library allocation
page read and write
21A54A96000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A52E99000
trusted library allocation
page read and write
21A5A2F2000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A53A72000
trusted library allocation
page read and write
21A53422000
trusted library allocation
page read and write
21A4E223000
trusted library allocation
page read and write
2AD21B5F000
trusted library allocation
page read and write
21A53A7C000
trusted library allocation
page read and write
21A53FF9000
trusted library allocation
page read and write
21A5A69A000
trusted library allocation
page read and write
21A5321A000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A492DA000
heap
page read and write
21A4931A000
heap
page read and write
21A492DA000
heap
page read and write
21A492F5000
heap
page read and write
21A49319000
heap
page read and write
21A49304000
heap
page read and write
21A49305000
heap
page read and write
21A5D893000
trusted library allocation
page read and write
21A53229000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5366D000
trusted library allocation
page read and write
21A549FC000
trusted library allocation
page read and write
21A4E313000
trusted library allocation
page read and write
21A558FD000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5D9AF000
trusted library allocation
page read and write
21A5A686000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A54EEA000
trusted library allocation
page read and write
21A540F1000
trusted library allocation
page read and write
21A5A2F2000
trusted library allocation
page read and write
21A5D865000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5D961000
trusted library allocation
page read and write
21A53ACA000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A492F1000
heap
page read and write
21A52084000
trusted library allocation
page read and write
21A53AC9000
trusted library allocation
page read and write
21A55AF5000
trusted library allocation
page read and write
21A522BB000
trusted library allocation
page read and write
21A53706000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A492E0000
heap
page read and write
21A492EB000
heap
page read and write
21A54EE8000
trusted library allocation
page read and write
1B4982E8000
heap
page read and write
1B49832A000
heap
page read and write
21A4930C000
heap
page read and write
21A49302000
heap
page read and write
2AD21980000
unclassified section
page readonly
1B4982B2000
heap
page read and write
21A5BED9000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5C6A7000
trusted library allocation
page read and write
21A5217E000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
FBCCBFE000
unkown
page readonly
21A4930F000
heap
page read and write
21A53319000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5E8C0000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A5AC49000
trusted library allocation
page read and write
21A5E8FD000
trusted library allocation
page read and write
21A5D970000
trusted library allocation
page read and write
21A548E2000
trusted library allocation
page read and write
21A53207000
trusted library allocation
page read and write
1B4982FC000
heap
page read and write
21A5209C000
trusted library allocation
page read and write
21A54CEF000
trusted library allocation
page read and write
1B497310000
heap
page read and write
21A54AF0000
trusted library allocation
page read and write
21A51982000
trusted library allocation
page read and write
21A548E4000
trusted library allocation
page read and write
21A5324D000
trusted library allocation
page read and write
21A558DC000
trusted library allocation
page read and write
21A5ACB8000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5D9EC000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49305000
heap
page read and write
2AD21B13000
trusted library allocation
page read and write
D3BC5EE000
unkown
page readonly
21A537CC000
trusted library allocation
page read and write
D3BC56B000
stack
page read and write
21A5E85A000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A53F9A000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
1B497C0A000
heap
page read and write
21A49334000
heap
page read and write
21A4930B000
heap
page read and write
21A492C7000
heap
page read and write
21A52E71000
trusted library allocation
page read and write
21A5EC28000
trusted library allocation
page read and write
21A5D9F2000
trusted library allocation
page read and write
21A520CA000
trusted library allocation
page read and write
21A54A9E000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
2AD21E00000
trusted library allocation
page read and write
21A49321000
heap
page read and write
1B4982E0000
heap
page read and write
21A49335000
heap
page read and write
21A5A2E8000
trusted library allocation
page read and write
2AD21B30000
trusted library allocation
page read and write
21A53F32000
trusted library allocation
page read and write
21A5E51B000
trusted library allocation
page read and write
21A5DF43000
trusted library allocation
page read and write
B03123E000
stack
page read and write
21A5AB26000
trusted library allocation
page read and write
21A49327000
heap
page read and write
1B4974C0000
trusted library allocation
page read and write
9EF000
stack
page read and write
21A5E46C000
trusted library allocation
page read and write
21A5AB8B000
trusted library allocation
page read and write
21A53A8F000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A492DA000
heap
page read and write
21A5E845000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
2B99660D000
trusted library allocation
page read and write
21A5AB8D000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A51933000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A538C4000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A52177000
trusted library allocation
page read and write
21A53FAA000
trusted library allocation
page read and write
21A5C607000
trusted library allocation
page read and write
21A51D88000
heap
page read and write
2AD21F00000
trusted library allocation
page read and write
1B497616000
trusted library allocation
page read and write
21A5E85C000
trusted library allocation
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A492D5000
heap
page read and write
21A5412C000
trusted library allocation
page read and write
21A4F5B2000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492D9000
heap
page read and write
21A492DA000
heap
page read and write
D3BF8BE000
stack
page read and write
2B996440000
heap
page readonly
21A53EFA000
trusted library allocation
page read and write
21A5A6F1000
trusted library allocation
page read and write
21A5ACA2000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492F5000
heap
page read and write
21A522FC000
trusted library allocation
page read and write
21A51D78000
heap
page read and write
21A54949000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A49334000
heap
page read and write
2AD21B63000
trusted library allocation
page read and write
21A534CE000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5D952000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
EA0000
heap
page read and write
21A492E4000
heap
page read and write
21A5D9CB000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5348D000
trusted library allocation
page read and write
21A541A4000
trusted library allocation
page read and write
21A5A69D000
trusted library allocation
page read and write
21A54A22000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A53335000
trusted library allocation
page read and write
21A4F4E8000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A49302000
heap
page read and write
21A53F5A000
trusted library allocation
page read and write
21A5E4C7000
trusted library allocation
page read and write
21A5AB46000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A53891000
trusted library allocation
page read and write
21A558C9000
trusted library allocation
page read and write
21A5385D000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
990AFFE000
stack
page read and write
21A4E39B000
trusted library allocation
page read and write
21A52071000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A4930B000
heap
page read and write
21A5D8B0000
trusted library allocation
page read and write
21A5D952000
trusted library allocation
page read and write
21A55DBA000
trusted library allocation
page read and write
21A5ABED000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5E50B000
trusted library allocation
page read and write
21A4F40D000
trusted library allocation
page read and write
F5F000
heap
page read and write
21A5C605000
trusted library allocation
page read and write
21A53F96000
trusted library allocation
page read and write
21A53FC2000
trusted library allocation
page read and write
21A53FE2000
trusted library allocation
page read and write
21A54E79000
trusted library allocation
page read and write
21A4F43B000
trusted library allocation
page read and write
21A5A2CA000
trusted library allocation
page read and write
21A5EA9E000
trusted library allocation
page read and write
21A522A3000
trusted library allocation
page read and write
21A53731000
trusted library allocation
page read and write
21A54A0E000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5A53D000
trusted library allocation
page read and write
F6B000
heap
page read and write
21A536F5000
trusted library allocation
page read and write
21A54CF4000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A49335000
heap
page read and write
21A53F8E000
trusted library allocation
page read and write
21A536F3000
trusted library allocation
page read and write
21A53FDF000
trusted library allocation
page read and write
21A53EE5000
trusted library allocation
page read and write
21A522C4000
trusted library allocation
page read and write
21A5A4FA000
trusted library allocation
page read and write
21A5ACC2000
trusted library allocation
page read and write
1B49765F000
trusted library allocation
page read and write
21A5C72C000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A54BA3000
trusted library allocation
page read and write
21A53A74000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A521CE000
trusted library allocation
page read and write
21A549DB000
trusted library allocation
page read and write
21A524FC000
trusted library allocation
page read and write
1B4976BA000
trusted library allocation
page read and write
21A5AC5B000
trusted library allocation
page read and write
21A53FEB000
trusted library allocation
page read and write
21A5A48C000
trusted library allocation
page read and write
21A492C4000
heap
page read and write
21A5320A000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5E2FE000
trusted library allocation
page read and write
21A5D81C000
trusted library allocation
page read and write
21A51972000
trusted library allocation
page read and write
1B49731A000
heap
page read and write
21A549DB000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A547D9000
trusted library allocation
page read and write
2B996603000
trusted library allocation
page read and write
21A55DF9000
trusted library allocation
page read and write
1B49762F000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A4931F000
heap
page read and write
21A49322000
heap
page read and write
21A4932E000
heap
page read and write
21A492ED000
heap
page read and write
21A522D0000
trusted library allocation
page read and write
1B49825F000
heap
page read and write
21A54A6E000
trusted library allocation
page read and write
21A5A52A000
trusted library allocation
page read and write
21A54DCE000
trusted library allocation
page read and write
21A5ACBA000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A546C0000
trusted library allocation
page read and write
21A54CF4000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A538EC000
trusted library allocation
page read and write
21A4F2A7000
trusted library allocation
page read and write
21A522C4000
trusted library allocation
page read and write
D3C10FE000
stack
page read and write
21A49322000
heap
page read and write
1B497648000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5DED2000
trusted library allocation
page read and write
21A5D000000
trusted library allocation
page read and write
21A4F4FA000
trusted library allocation
page read and write
21A52E27000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A54AC5000
trusted library allocation
page read and write
21A5A60E000
trusted library allocation
page read and write
21A522A3000
trusted library allocation
page read and write
21A54CE3000
trusted library allocation
page read and write
21A55D4A000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492E9000
heap
page read and write
21A54159000
trusted library allocation
page read and write
21A538A8000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A49327000
heap
page read and write
21A533FC000
trusted library allocation
page read and write
21A5D9BD000
trusted library allocation
page read and write
21A5E88F000
trusted library allocation
page read and write
21A55AC5000
trusted library allocation
page read and write
21A5BE68000
trusted library allocation
page read and write
21A5E520000
trusted library allocation
page read and write
21A54E3A000
trusted library allocation
page read and write
21A53FDF000
trusted library allocation
page read and write
21A55D4A000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5A62F000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A5D9CB000
trusted library allocation
page read and write
21A5E4DD000
trusted library allocation
page read and write
21A52E5D000
trusted library allocation
page read and write
1B49833B000
heap
page read and write
21A492E9000
heap
page read and write
21A49304000
heap
page read and write
21A55D58000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A549FC000
trusted library allocation
page read and write
21A54A96000
trusted library allocation
page read and write
21A53686000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A5E25F000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A53862000
trusted library allocation
page read and write
21A5E856000
trusted library allocation
page read and write
21A5AC2F000
trusted library allocation
page read and write
21A5E36C000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
2B996819000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A5228E000
trusted library allocation
page read and write
21A536E1000
trusted library allocation
page read and write
21A5E507000
trusted library allocation
page read and write
D64000
unkown
page readonly
21A53FC2000
trusted library allocation
page read and write
21A5AB8D000
trusted library allocation
page read and write
21A5E425000
trusted library allocation
page read and write
21A548DB000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A537FC000
trusted library allocation
page read and write
2B996662000
trusted library allocation
page read and write
21A534CE000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A55D51000
trusted library allocation
page read and write
21A51982000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A49322000
heap
page read and write
2AD21B03000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A54131000
trusted library allocation
page read and write
21A53F80000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A549FC000
trusted library allocation
page read and write
21A5ED35000
heap
page read and write
21A4931D000
heap
page read and write
21A5D9E0000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
268A2DAA000
heap
page read and write
21A49321000
heap
page read and write
21A5E471000
trusted library allocation
page read and write
21A5A5B6000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A4930C000
heap
page read and write
21A4931B000
heap
page read and write
21A55954000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A4F5EB000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
D5C000
unkown
page write copy
21A54917000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A492CE000
heap
page read and write
21A5ED7C000
heap
page read and write
21A53E30000
trusted library allocation
page read and write
21A5BED2000
trusted library allocation
page read and write
21A4E39B000
trusted library allocation
page read and write
21A53898000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5DFBB000
trusted library allocation
page read and write
21A51960000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5A5F6000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5C66D000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A51DE1000
heap
page read and write
21A5A6C9000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5E3EC000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5D980000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5A642000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A49302000
heap
page read and write
21A492EA000
heap
page read and write
21A54AEE000
trusted library allocation
page read and write
21A492E2000
heap
page read and write
21A53624000
trusted library allocation
page read and write
21A5DEC6000
trusted library allocation
page read and write
21A53AC6000
trusted library allocation
page read and write
21A5E885000
trusted library allocation
page read and write
21A53A8D000
trusted library allocation
page read and write
1B4976C7000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
B03127E000
unkown
page readonly
21A5E517000
trusted library allocation
page read and write
21A51D88000
heap
page read and write
21A53D79000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A5A538000
trusted library allocation
page read and write
21A5BEA4000
trusted library allocation
page read and write
21A533A6000
trusted library allocation
page read and write
21A5D887000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A54042000
trusted library allocation
page read and write
21A5E8B4000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A4932E000
heap
page read and write
C90000
unkown
page readonly
21A541A4000
trusted library allocation
page read and write
21A537F7000
trusted library allocation
page read and write
2AD217E0000
heap
page read and write
21A5A6C9000
trusted library allocation
page read and write
2B99665D000
trusted library allocation
page read and write
1B497420000
heap
page read and write
21A53383000
trusted library allocation
page read and write
21A563AE000
trusted library allocation
page read and write
21A5E46C000
trusted library allocation
page read and write
21A5321A000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5D9C8000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A5E852000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5AB49000
trusted library allocation
page read and write
21A533C3000
trusted library allocation
page read and write
21A53E91000
trusted library allocation
page read and write
FBCBBFE000
unkown
page readonly
B02EF6E000
unkown
page readonly
21A49310000
heap
page read and write
21A55899000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5ACBA000
trusted library allocation
page read and write
21A55CF4000
trusted library allocation
page read and write
21A5AC50000
trusted library allocation
page read and write
1B497677000
trusted library allocation
page read and write
21A53384000
trusted library allocation
page read and write
21A51D88000
heap
page read and write
21A49316000
heap
page read and write
21A5E4B8000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A4931D000
heap
page read and write
21A49334000
heap
page read and write
21A51D97000
heap
page read and write
21A52EFA000
trusted library allocation
page read and write
21A5ACB6000
trusted library allocation
page read and write
21A5C6C5000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A524ED000
trusted library allocation
page read and write
21A549BE000
trusted library allocation
page read and write
21A5ED71000
heap
page read and write
21A4930B000
heap
page read and write
21A5AC50000
trusted library allocation
page read and write
1B3E000
stack
page read and write
21A538F7000
trusted library allocation
page read and write
2B996250000
remote allocation
page read and write
21A53FAA000
trusted library allocation
page read and write
21A5D966000
trusted library allocation
page read and write
2AD21F0C000
trusted library allocation
page read and write
21A5AB86000
trusted library allocation
page read and write
1B498260000
heap
page read and write
1B498359000
heap
page read and write
21A5361A000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A549F0000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A49335000
heap
page read and write
21A49316000
heap
page read and write
21A4930B000
heap
page read and write
1B4982A8000
heap
page read and write
21A4932E000
heap
page read and write
2B9962A3000
heap
page read and write
21A5C64D000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A54E69000
trusted library allocation
page read and write
21A55D4C000
trusted library allocation
page read and write
21A4E3BC000
trusted library allocation
page read and write
21A55D51000
trusted library allocation
page read and write
21A55DBA000
trusted library allocation
page read and write
21A522B8000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A4931B000
heap
page read and write
21A52EC6000
trusted library allocation
page read and write
21A54CFC000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
1B497BC3000
unkown
page execute read
21A4F56E000
trusted library allocation
page read and write
21A5E4F1000
trusted library allocation
page read and write
1B498358000
heap
page read and write
21A49322000
heap
page read and write
21A5D95D000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
2B996672000
trusted library allocation
page read and write
21A54071000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492D5000
heap
page read and write
21A5499F000
trusted library allocation
page read and write
AE4000
heap
page read and write
2AD21800000
heap
page read and write
21A492D5000
heap
page read and write
2B996647000
trusted library allocation
page read and write
2B996452000
unclassified section
page read and write
21A5A6D6000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5A2DA000
trusted library allocation
page read and write
21A5E520000
trusted library allocation
page read and write
21A533EB000
trusted library allocation
page read and write
21A5A48C000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5BE35000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A54EBD000
trusted library allocation
page read and write
21A53FF9000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A5321F000
trusted library allocation
page read and write
21A4F2D3000
trusted library allocation
page read and write
21A51931000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4932C000
heap
page read and write
21A4930B000
heap
page read and write
21A49334000
heap
page read and write
21A533A9000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A5D9BD000
trusted library allocation
page read and write
21A5C66D000
trusted library allocation
page read and write
21A53FC7000
trusted library allocation
page read and write
21A55DEE000
trusted library allocation
page read and write
21A53708000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492ED000
heap
page read and write
1B4974E0000
heap
page read and write
21A4931B000
heap
page read and write
21A4931B000
heap
page read and write
21A5A2D6000
trusted library allocation
page read and write
21A54CE7000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A55D51000
trusted library allocation
page read and write
21A54BFC000
trusted library allocation
page read and write
21A54964000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5363A000
trusted library allocation
page read and write
21A5A2AD000
trusted library allocation
page read and write
21A4E269000
trusted library allocation
page read and write
21A4F4E4000
trusted library allocation
page read and write
21A54BBC000
trusted library allocation
page read and write
21A546E6000
trusted library allocation
page read and write
21A5ABBB000
trusted library allocation
page read and write
21A549F6000
trusted library allocation
page read and write
21A5ABB9000
trusted library allocation
page read and write
21A5ED46000
heap
page read and write
21A5A6CD000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A5E3CF000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4F458000
trusted library allocation
page read and write
21A55D5B000
trusted library allocation
page read and write
21A5A5BA000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5C643000
trusted library allocation
page read and write
21A519EE000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A54AB5000
trusted library allocation
page read and write
21A54128000
trusted library allocation
page read and write
21A5ABF6000
trusted library allocation
page read and write
1B498269000
heap
page read and write
21A4931B000
heap
page read and write
21A492F1000
heap
page read and write
21A492F1000
heap
page read and write
21A5BE66000
trusted library allocation
page read and write
21A5585E000
trusted library allocation
page read and write
21A5D874000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
268A2DAF000
heap
page read and write
21A492EB000
heap
page read and write
21A49302000
heap
page read and write
21A54EDB000
trusted library allocation
page read and write
1B497456000
heap
page read and write
21A5E4EA000
trusted library allocation
page read and write
1B4974B0000
unclassified section
page read and write
21A49327000
heap
page read and write
21A53F8E000
trusted library allocation
page read and write
21A53A80000
trusted library allocation
page read and write
21A5E87C000
trusted library allocation
page read and write
21A52EC1000
trusted library allocation
page read and write
21A532C3000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A54A79000
trusted library allocation
page read and write
21A53EA1000
trusted library allocation
page read and write
21A4930C000
heap
page read and write
21A53FB4000
trusted library allocation
page read and write
21A4930F000
heap
page read and write
21A5A2DA000
trusted library allocation
page read and write
21A5E42F000
trusted library allocation
page read and write
21A52E9D000
trusted library allocation
page read and write
21A549A9000
trusted library allocation
page read and write
21A4F4E8000
trusted library allocation
page read and write
21A540C7000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A49316000
heap
page read and write
21A492EE000
heap
page read and write
21A492E0000
heap
page read and write
21A53F96000
trusted library allocation
page read and write
21A53A8F000
trusted library allocation
page read and write
21A53F96000
trusted library allocation
page read and write
21A5A6E9000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A5C5A2000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4930B000
heap
page read and write
21A54E89000
trusted library allocation
page read and write
21A536D4000
trusted library allocation
page read and write
21A492E4000
heap
page read and write
21A4931B000
heap
page read and write
21A492E0000
heap
page read and write
21A549BA000
trusted library allocation
page read and write
21A5D9E7000
trusted library allocation
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A548F7000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5D96A000
trusted library allocation
page read and write
3711000
heap
page read and write
2AD21B17000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5D9DB000
trusted library allocation
page read and write
21A54AD7000
trusted library allocation
page read and write
21A4F2F2000
trusted library allocation
page read and write
2B996500000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A51DE3000
heap
page read and write
21A492E9000
heap
page read and write
21A51B89000
trusted library allocation
page read and write
21A53F8E000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A4F436000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A54A45000
trusted library allocation
page read and write
1B498344000
heap
page read and write
21A5417A000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A5E520000
trusted library allocation
page read and write
21A5ED35000
heap
page read and write
21A49316000
heap
page read and write
21A5D400000
trusted library allocation
page read and write
21A5388F000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A492F5000
heap
page read and write
AE4000
heap
page read and write
21A534CC000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A5A563000
trusted library allocation
page read and write
21A53FCC000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A4930B000
heap
page read and write
2B99632A000
heap
page read and write
21A5D949000
trusted library allocation
page read and write
21A53678000
trusted library allocation
page read and write
21A533BF000
trusted library allocation
page read and write
21A49334000
heap
page read and write
1B498322000
heap
page read and write
21A492F5000
heap
page read and write
21A535EF000
trusted library allocation
page read and write
21A5AB98000
trusted library allocation
page read and write
21A5D970000
trusted library allocation
page read and write
21A5A563000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A56327000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A54A4D000
trusted library allocation
page read and write
21A5E4CD000
trusted library allocation
page read and write
21A54AA5000
trusted library allocation
page read and write
21A5E514000
trusted library allocation
page read and write
21A53BD0000
trusted library allocation
page read and write
1B4982F1000
heap
page read and write
21A5475B000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5E8BC000
trusted library allocation
page read and write
21A54CEF000
trusted library allocation
page read and write
21A5A6C9000
trusted library allocation
page read and write
21A49306000
heap
page read and write
21A5334D000
trusted library allocation
page read and write
21A49366000
heap
page read and write
21A49302000
heap
page read and write
21A49321000
heap
page read and write
21A5217C000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49327000
heap
page read and write
1B4974BF000
unclassified section
page read and write
278A8D07000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A53A30000
trusted library allocation
page read and write
21A5A2CE000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A54A9D000
trusted library allocation
page read and write
21A54A6E000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A53F92000
trusted library allocation
page read and write
2AD21BB1000
trusted library allocation
page read and write
1B498367000
heap
page read and write
21A492F1000
heap
page read and write
21A492DC000
heap
page read and write
21A54673000
trusted library allocation
page read and write
2AD2180A000
heap
page read and write
21A492E2000
heap
page read and write
21A5ABDC000
trusted library allocation
page read and write
21A547C0000
trusted library allocation
page read and write
21A52E4E000
trusted library allocation
page read and write
21A5A5C7000
trusted library allocation
page read and write
21A51B27000
trusted library allocation
page read and write
21A492E3000
heap
page read and write
21A53A25000
trusted library allocation
page read and write
21A5ABDC000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A519B0000
trusted library allocation
page read and write
21A536F8000
trusted library allocation
page read and write
21A5E3FE000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A49327000
heap
page read and write
2B996800000
trusted library allocation
page read and write
21A54557000
trusted library allocation
page read and write
21A54133000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A4932C000
heap
page read and write
21A492D5000
heap
page read and write
21A5A2C4000
trusted library allocation
page read and write
21A5A483000
trusted library allocation
page read and write
21A54697000
trusted library allocation
page read and write
1B4976F3000
trusted library allocation
page read and write
21A537EF000
trusted library allocation
page read and write
21A53434000
trusted library allocation
page read and write
21A5DF50000
trusted library allocation
page read and write
21A5D9E7000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5D9E0000
trusted library allocation
page read and write
21A55866000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A5EC0D000
trusted library allocation
page read and write
21A54E23000
trusted library allocation
page read and write
21A5339B000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A54D62000
trusted library allocation
page read and write
21A54965000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492E0000
heap
page read and write
AE4000
heap
page read and write
21A5A625000
trusted library allocation
page read and write
21A53A74000
trusted library allocation
page read and write
21A53477000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A5AB9F000
trusted library allocation
page read and write
21A5D9C8000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
2AD21B24000
trusted library allocation
page read and write
21A52E16000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A492F0000
heap
page read and write
21A49305000
heap
page read and write
21A54636000
trusted library allocation
page read and write
21A53B99000
trusted library allocation
page read and write
21A5E3A2000
trusted library allocation
page read and write
B0309FE000
stack
page read and write
21A5327C000
trusted library allocation
page read and write
21A534F3000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A53579000
trusted library allocation
page read and write
21A53A36000
trusted library allocation
page read and write
21A5E8AF000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A548F7000
trusted library allocation
page read and write
21A534FA000
trusted library allocation
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A524CD000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A49316000
heap
page read and write
21A519B1000
trusted library allocation
page read and write
21A54047000
trusted library allocation
page read and write
21A53DA9000
trusted library allocation
page read and write
2B996450000
unclassified section
page read and write
21A53864000
trusted library allocation
page read and write
21A5ABEF000
trusted library allocation
page read and write
D52000
unkown
page readonly
21A5AC92000
trusted library allocation
page read and write
21A5A69D000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A492F1000
heap
page read and write
21A51D7D000
heap
page read and write
268A1362000
heap
page read and write
21A49334000
heap
page read and write
21A49316000
heap
page read and write
21A54E46000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A5D9EE000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5DFE4000
trusted library allocation
page read and write
1B49832A000
heap
page read and write
21A549B5000
trusted library allocation
page read and write
21A5BE0F000
trusted library allocation
page read and write
21A52279000
trusted library allocation
page read and write
21A5ABF6000
trusted library allocation
page read and write
2B9962C0000
heap
page read and write
21A4930B000
heap
page read and write
21A537ED000
trusted library allocation
page read and write
21A5A549000
trusted library allocation
page read and write
21A524FB000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A51D70000
heap
page read and write
21A548E4000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A5A4D4000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A49305000
heap
page read and write
1B497454000
heap
page read and write
21A54AB4000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5ED01000
heap
page read and write
21A5A5FA000
trusted library allocation
page read and write
21A49312000
heap
page read and write
21A49314000
heap
page read and write
21A5367D000
trusted library allocation
page read and write
21A51D8E000
heap
page read and write
1B497603000
trusted library allocation
page read and write
21A537D2000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5DF4D000
trusted library allocation
page read and write
21A53FEA000
trusted library allocation
page read and write
21A54AF3000
trusted library allocation
page read and write
21A5479F000
trusted library allocation
page read and write
21A520C4000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A52084000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A53610000
trusted library allocation
page read and write
21A5AC5D000
trusted library allocation
page read and write
21A5208A000
trusted library allocation
page read and write
21A54950000
trusted library allocation
page read and write
21A558CD000
trusted library allocation
page read and write
21A53643000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A558E9000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A53AFC000
trusted library allocation
page read and write
21A521A5000
trusted library allocation
page read and write
21A5A2B1000
trusted library allocation
page read and write
21A549E5000
trusted library allocation
page read and write
F72000
heap
page read and write
21A4930B000
heap
page read and write
21A53A16000
trusted library allocation
page read and write
21A5D9C8000
trusted library allocation
page read and write
21A5E41A000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4932C000
heap
page read and write
21A492E9000
heap
page read and write
21A492F2000
heap
page read and write
21A492E1000
heap
page read and write
21A49334000
heap
page read and write
21A53A77000
trusted library allocation
page read and write
2AD21B00000
trusted library allocation
page read and write
21A5AB8B000
trusted library allocation
page read and write
21A52EFA000
trusted library allocation
page read and write
268A1500000
trusted library allocation
page read and write
21A53D6A000
trusted library allocation
page read and write
21A55DB3000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49316000
heap
page read and write
21A5A63D000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5C6E4000
trusted library allocation
page read and write
21A5205B000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A53FAA000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5219E000
trusted library allocation
page read and write
21A5E8D2000
trusted library allocation
page read and write
21A5AB9F000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A52E7A000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A49336000
heap
page read and write
2AD21777000
remote allocation
page execute read
21A492E9000
heap
page read and write
21A541DD000
trusted library allocation
page read and write
21A5DF29000
trusted library allocation
page read and write
21A536EF000
trusted library allocation
page read and write
21A5A5C0000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A4F638000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A54999000
trusted library allocation
page read and write
21A53447000
trusted library allocation
page read and write
21A5C6AC000
trusted library allocation
page read and write
21A5A2EC000
trusted library allocation
page read and write
21A5ABDC000
trusted library allocation
page read and write
21A5AC77000
trusted library allocation
page read and write
21A4E3BC000
trusted library allocation
page read and write
21A5C72E000
trusted library allocation
page read and write
21A53478000
trusted library allocation
page read and write
21A541BE000
trusted library allocation
page read and write
21A5E3E7000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
9FE000
stack
page read and write
21A549F6000
trusted library allocation
page read and write
21A4931F000
heap
page read and write
21A5ABE3000
trusted library allocation
page read and write
21A5A300000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A54AB4000
trusted library allocation
page read and write
21A534D0000
trusted library allocation
page read and write
21A53F5A000
trusted library allocation
page read and write
21A5A6AD000
trusted library allocation
page read and write
21A53EF1000
trusted library allocation
page read and write
21A5A69A000
trusted library allocation
page read and write
21A53A68000
trusted library allocation
page read and write
21A54AA5000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A53320000
trusted library allocation
page read and write
21A53A7E000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5D978000
trusted library allocation
page read and write
21A5ED4C000
heap
page read and write
21A5A647000
trusted library allocation
page read and write
21A5E4B8000
trusted library allocation
page read and write
21A5AC52000
trusted library allocation
page read and write
21A53893000
trusted library allocation
page read and write
21A5ABE9000
trusted library allocation
page read and write
21A492EE000
heap
page read and write
21A537C5000
trusted library allocation
page read and write
D3BE7FE000
unkown
page readonly
21A49316000
heap
page read and write
1B497BBC000
unkown
page execute read
21A4E3F9000
trusted library allocation
page read and write
21A53FF9000
trusted library allocation
page read and write
21A53733000
trusted library allocation
page read and write
21A54A6E000
trusted library allocation
page read and write
21A558C9000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A49302000
heap
page read and write
21A492DA000
heap
page read and write
21A5ABBB000
trusted library allocation
page read and write
21A535CC000
trusted library allocation
page read and write
21A53AE4000
trusted library allocation
page read and write
21A49325000
heap
page read and write
21A5AB2E000
trusted library allocation
page read and write
21A549F6000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A541A2000
trusted library allocation
page read and write
21A5A5F8000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A53BBF000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4930B000
heap
page read and write
21A4F561000
trusted library allocation
page read and write
21A522BB000
trusted library allocation
page read and write
21A5E4B6000
trusted library allocation
page read and write
21A49325000
heap
page read and write
21A56667000
trusted library allocation
page read and write
21A53652000
trusted library allocation
page read and write
21A5D9A4000
trusted library allocation
page read and write
21A54BAD000
trusted library allocation
page read and write
21A53716000
trusted library allocation
page read and write
21A5E36C000
trusted library allocation
page read and write
21A53FC2000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A545EC000
trusted library allocation
page read and write
21A49334000
heap
page read and write
1B498130000
trusted library allocation
page read and write
21A54AB2000
trusted library allocation
page read and write
21A524EF000
trusted library allocation
page read and write
21A54AA5000
trusted library allocation
page read and write
21A5E4CD000
trusted library allocation
page read and write
21A533EB000
trusted library allocation
page read and write
F71000
heap
page read and write
21A533EB000
trusted library allocation
page read and write
21A5A6DB000
trusted library allocation
page read and write
21A5ACC6000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A492F1000
heap
page read and write
13C7D0524000
trusted library allocation
page read and write
1B4982F2000
heap
page read and write
21A51BF4000
trusted library allocation
page read and write
21A5E88C000
trusted library allocation
page read and write
21A49309000
heap
page read and write
21A53D4F000
trusted library allocation
page read and write
21A52EBC000
trusted library allocation
page read and write
21A537F9000
trusted library allocation
page read and write
21A55888000
trusted library allocation
page read and write
21A5A69A000
trusted library allocation
page read and write
21A5DE9D000
trusted library allocation
page read and write
21A545FE000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A5E438000
trusted library allocation
page read and write
21A53E6D000
trusted library allocation
page read and write
21A5E85E000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A54E1F000
trusted library allocation
page read and write
21A52471000
trusted library allocation
page read and write
21A5E406000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A4930B000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A49338000
heap
page read and write
21A5A63C000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5ACC6000
trusted library allocation
page read and write
21A563C3000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49327000
heap
page read and write
21A548FD000
trusted library allocation
page read and write
21A53A82000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5A2D6000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A49302000
heap
page read and write
21A492E1000
heap
page read and write
21A492E2000
heap
page read and write
21A55DFB000
trusted library allocation
page read and write
21A55CE6000
trusted library allocation
page read and write
21A549B5000
trusted library allocation
page read and write
21A537D4000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A4DCEF000
trusted library allocation
page read and write
21A5366D000
trusted library allocation
page read and write
21A54EBB000
trusted library allocation
page read and write
21A51961000
trusted library allocation
page read and write
1B498269000
heap
page read and write
21A533EB000
trusted library allocation
page read and write
21A55A9E000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A492FA000
heap
page read and write
21A492F1000
heap
page read and write
21A51D88000
heap
page read and write
21A55DCC000
trusted library allocation
page read and write
21A5E808000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49334000
heap
page read and write
21A49316000
heap
page read and write
21A49302000
heap
page read and write
21A51960000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A4E2FE000
trusted library allocation
page read and write
21A5E42F000
trusted library allocation
page read and write
21A540A2000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5ABED000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
F84000
heap
page read and write
21A53268000
trusted library allocation
page read and write
21A538DD000
trusted library allocation
page read and write
21A549BE000
trusted library allocation
page read and write
21A53EEB000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A54CFA000
trusted library allocation
page read and write
21A4DCCC000
trusted library allocation
page read and write
268A13C5000
heap
page read and write
21A54608000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A534FC000
trusted library allocation
page read and write
1B498321000
heap
page read and write
21A540A2000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492D5000
heap
page read and write
21A53F9A000
trusted library allocation
page read and write
21A5DA80000
trusted library allocation
page read and write
1B498367000
heap
page read and write
21A53FCB000
trusted library allocation
page read and write
21A5E8F3000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
2AD21C10000
heap
page read and write
21A492E0000
heap
page read and write
21A54AC5000
trusted library allocation
page read and write
21A4933D000
heap
page read and write
21A5342B000
trusted library allocation
page read and write
21A4F479000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492F1000
heap
page read and write
21A55D9E000
trusted library allocation
page read and write
21A535F8000
trusted library allocation
page read and write
21A521A5000
trusted library allocation
page read and write
21A5389D000
trusted library allocation
page read and write
2AD21E03000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A49322000
heap
page read and write
21A5322C000
trusted library allocation
page read and write
21A533EB000
trusted library allocation
page read and write
2B9966C8000
trusted library allocation
page read and write
21A538D9000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A524ED000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5366D000
trusted library allocation
page read and write
21A5E4D3000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A54EAA000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5332C000
trusted library allocation
page read and write
21A5D9AF000
trusted library allocation
page read and write
21A54071000
trusted library allocation
page read and write
21A5D978000
trusted library allocation
page read and write
21A51DDD000
heap
page read and write
21A5DF70000
trusted library allocation
page read and write
21A5C643000
trusted library allocation
page read and write
21A49327000
heap
page read and write
2AD21B0C000
trusted library allocation
page read and write
21A5AC09000
trusted library allocation
page read and write
21A55CF6000
trusted library allocation
page read and write
21A52170000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A52258000
trusted library allocation
page read and write
268A134A000
heap
page read and write
2B99662E000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A53FFC000
trusted library allocation
page read and write
21A53A54000
trusted library allocation
page read and write
B02EFAC000
stack
page read and write
21A53FD2000
trusted library allocation
page read and write
21A5AC5D000
trusted library allocation
page read and write
21A5AB6F000
trusted library allocation
page read and write
21A5E4C0000
trusted library allocation
page read and write
21A5EC28000
trusted library allocation
page read and write
B02EF2B000
stack
page read and write
21A53FDF000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A540C7000
trusted library allocation
page read and write
21A52485000
trusted library allocation
page read and write
21A4DCC3000
trusted library allocation
page read and write
21A5359A000
trusted library allocation
page read and write
21A5E50C000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5A2CE000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A49327000
heap
page read and write
21A492EE000
heap
page read and write
21A49302000
heap
page read and write
21A49322000
heap
page read and write
21A54C63000
trusted library allocation
page read and write
21A49320000
heap
page read and write
21A49321000
heap
page read and write
21A4E22F000
trusted library allocation
page read and write
21A5A6FB000
trusted library allocation
page read and write
21A5A6BD000
trusted library allocation
page read and write
21A5A5C0000
trusted library allocation
page read and write
21A5DF3B000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
2B996331000
heap
page read and write
1B497661000
trusted library allocation
page read and write
21A5AC59000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A4F455000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A5AC92000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492ED000
heap
page read and write
21A5A2EC000
trusted library allocation
page read and write
1B4982E0000
heap
page read and write
21A492E0000
heap
page read and write
21A53A7E000
trusted library allocation
page read and write
1B498103000
trusted library allocation
page read and write
21A54AF9000
trusted library allocation
page read and write
21A53AFC000
trusted library allocation
page read and write
21A5BE29000
trusted library allocation
page read and write
21A534C3000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A49302000
heap
page read and write
21A49305000
heap
page read and write
21A558B0000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
2B996C40000
heap
page read and write
FBCABFE000
unkown
page readonly
21A549A9000
trusted library allocation
page read and write
21A53E52000
trusted library allocation
page read and write
21A54996000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A492EB000
heap
page read and write
21A4F4E4000
trusted library allocation
page read and write
21A5A316000
trusted library allocation
page read and write
21A5AC20000
trusted library allocation
page read and write
21A53FDF000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A53A7C000
trusted library allocation
page read and write
21A53472000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
1B49828A000
heap
page read and write
21A53A5E000
trusted library allocation
page read and write
1B4976E9000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A549F0000
trusted library allocation
page read and write
1B49833B000
heap
page read and write
21A51B9D000
trusted library allocation
page read and write
21A5D9C8000
trusted library allocation
page read and write
D3BC4EE000
unkown
page readonly
21A52187000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A49321000
heap
page read and write
21A5A5C0000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A492CE000
heap
page read and write
21A5363F000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5408C000
trusted library allocation
page read and write
21A54960000
trusted library allocation
page read and write
21A5A6C5000
trusted library allocation
page read and write
21A558ED000
trusted library allocation
page read and write
21A53485000
trusted library allocation
page read and write
2B9966B6000
trusted library allocation
page read and write
21A5ABB6000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
1B497681000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A5C72E000
trusted library allocation
page read and write
21A5E4EE000
trusted library allocation
page read and write
21A4F5F6000
trusted library allocation
page read and write
21A5D9BD000
trusted library allocation
page read and write
21A547A9000
trusted library allocation
page read and write
21A5DE74000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A5ABBB000
trusted library allocation
page read and write
21A53FC8000
trusted library allocation
page read and write
278A8EE0000
heap
page read and write
21A53404000
trusted library allocation
page read and write
21A54A9D000
trusted library allocation
page read and write
1B49825F000
heap
page read and write
21A54569000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A533EB000
trusted library allocation
page read and write
21A5D9E0000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492E0000
heap
page read and write
21A492E9000
heap
page read and write
21A54AEA000
trusted library allocation
page read and write
21A53AF5000
trusted library allocation
page read and write
21A53FC2000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A49335000
heap
page read and write
21A492F1000
heap
page read and write
21A53FF9000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A492E0000
heap
page read and write
21A549BE000
trusted library allocation
page read and write
21A55CF6000
trusted library allocation
page read and write
21A5324F000
trusted library allocation
page read and write
1B4982E9000
heap
page read and write
21A5A571000
trusted library allocation
page read and write
21A5DEC6000
trusted library allocation
page read and write
21A49322000
heap
page read and write
1B4982FC000
heap
page read and write
21A49321000
heap
page read and write
21A5385B000
trusted library allocation
page read and write
21A5412C000
trusted library allocation
page read and write
21A49310000
heap
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A49316000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5213C000
trusted library allocation
page read and write
21A52E39000
trusted library allocation
page read and write
21A54A5A000
trusted library allocation
page read and write
990B7FE000
stack
page read and write
21A5E41A000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
2B9966E8000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A522A3000
trusted library allocation
page read and write
21A54ADF000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A492F5000
heap
page read and write
21A4932E000
heap
page read and write
21A5C6E4000
trusted library allocation
page read and write
21A549FC000
trusted library allocation
page read and write
21A492DF000
heap
page read and write
21A49319000
heap
page read and write
21A51DE3000
heap
page read and write
21A49327000
heap
page read and write
21A540F1000
trusted library allocation
page read and write
21A54CF4000
trusted library allocation
page read and write
21A5A6C3000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A56345000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5D9AF000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A52EB0000
trusted library allocation
page read and write
21A5D9BD000
trusted library allocation
page read and write
21A5E529000
trusted library allocation
page read and write
21A524EF000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5D9E0000
trusted library allocation
page read and write
21A53FAA000
trusted library allocation
page read and write
21A5AC65000
trusted library allocation
page read and write
21A5ABB9000
trusted library allocation
page read and write
1B498358000
heap
page read and write
21A4930F000
heap
page read and write
21A5AB49000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5A2D2000
trusted library allocation
page read and write
21A5EC3A000
trusted library allocation
page read and write
21A5ACC8000
trusted library allocation
page read and write
21A54A96000
trusted library allocation
page read and write
21A53A7A000
trusted library allocation
page read and write
21A549DB000
trusted library allocation
page read and write
21A54A00000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A54CEF000
trusted library allocation
page read and write
21A52298000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A53319000
trusted library allocation
page read and write
21A54EDD000
trusted library allocation
page read and write
21A532F2000
trusted library allocation
page read and write
1B498367000
heap
page read and write
21A5A6AD000
trusted library allocation
page read and write
21A5A6A5000
trusted library allocation
page read and write
2AB8F831000
trusted library allocation
page execute read
21A53EEB000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A4932E000
heap
page read and write
21A4DC98000
trusted library allocation
page read and write
21A53A48000
trusted library allocation
page read and write
21A4E3B4000
trusted library allocation
page read and write
21A538A6000
trusted library allocation
page read and write
21A5E466000
trusted library allocation
page read and write
21A5A2E8000
trusted library allocation
page read and write
268A135D000
heap
page read and write
21A54782000
trusted library allocation
page read and write
1B49825F000
heap
page read and write
21A537D2000
trusted library allocation
page read and write
21A5E83D000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A548D1000
trusted library allocation
page read and write
21A4E375000
trusted library allocation
page read and write
21A54E3A000
trusted library allocation
page read and write
1B49825F000
heap
page read and write
21A558F5000
trusted library allocation
page read and write
21A5AB86000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A52182000
trusted library allocation
page read and write
21A537E5000
trusted library allocation
page read and write
21A5A69D000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A4F2DC000
trusted library allocation
page read and write
21A546DA000
trusted library allocation
page read and write
21A49384000
heap
page read and write
21A54A46000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5C701000
trusted library allocation
page read and write
21A5A2DE000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A522CD000
trusted library allocation
page read and write
21A5E43B000
trusted library allocation
page read and write
21A5408A000
trusted library allocation
page read and write
21A5AC53000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4931B000
heap
page read and write
21A5D9B8000
trusted library allocation
page read and write
21A4F43A000
trusted library allocation
page read and write
21A51D7A000
heap
page read and write
21A5470C000
trusted library allocation
page read and write
D3C18FE000
unkown
page readonly
21A532B0000
trusted library allocation
page read and write
21A54E32000
trusted library allocation
page read and write
21A5ACC4000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A53F0E000
trusted library allocation
page read and write
21A5A69A000
trusted library allocation
page read and write
21A5C686000
trusted library allocation
page read and write
282272180000
trusted library allocation
page read and write
21A53A48000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5E3FE000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A492CE000
heap
page read and write
F7E000
heap
page read and write
21A5356E000
trusted library allocation
page read and write
21A5A2CE000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A53AC6000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A49302000
heap
page read and write
21A534CC000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A492DA000
heap
page read and write
21A492EA000
heap
page read and write
21A5DFE4000
trusted library allocation
page read and write
21A563B3000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A52078000
trusted library allocation
page read and write
21A5D99C000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A5A4FC000
trusted library allocation
page read and write
21A5EA84000
trusted library allocation
page read and write
21A5ABDC000
trusted library allocation
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A5495A000
trusted library allocation
page read and write
21A53675000
trusted library allocation
page read and write
21A5ECAC000
trusted library allocation
page read and write
2AD21BB5000
trusted library allocation
page read and write
21A5A60E000
trusted library allocation
page read and write
21A52EF8000
trusted library allocation
page read and write
21A5E3E3000
trusted library allocation
page read and write
21A54A93000
trusted library allocation
page read and write
21A4930F000
heap
page read and write
21A54128000
trusted library allocation
page read and write
21A5363F000
trusted library allocation
page read and write
21A5E38F000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4931B000
heap
page read and write
21A5343E000
trusted library allocation
page read and write
21A5E4AB000
trusted library allocation
page read and write
21A53A2E000
trusted library allocation
page read and write
21A541F8000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A49322000
heap
page read and write
21A49302000
heap
page read and write
21A53FF9000
trusted library allocation
page read and write
21A541AE000
trusted library allocation
page read and write
21A53BB5000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A492ED000
heap
page read and write
21A5ABDF000
trusted library allocation
page read and write
1B497600000
trusted library allocation
page read and write
21A520D2000
trusted library allocation
page read and write
21A5ACB6000
trusted library allocation
page read and write
21A5E2D1000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49302000
heap
page read and write
21A5370C000
trusted library allocation
page read and write
21A53A7C000
trusted library allocation
page read and write
D2C000
unkown
page readonly
21A49334000
heap
page read and write
21A549A1000
trusted library allocation
page read and write
21A54AF4000
trusted library allocation
page read and write
21A51D88000
heap
page read and write
1B497BA0000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5403F000
trusted library allocation
page read and write
21A53F89000
trusted library allocation
page read and write
1B497610000
trusted library allocation
page read and write
21A53A7A000
trusted library allocation
page read and write
21A5A2CA000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A49314000
heap
page read and write
21A49302000
heap
page read and write
21A5A5F6000
trusted library allocation
page read and write
21A54AA8000
trusted library allocation
page read and write
21A5D99A000
trusted library allocation
page read and write
21A53638000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A49302000
heap
page read and write
21A49305000
heap
page read and write
21A536F8000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A54E40000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5D952000
trusted library allocation
page read and write
21A5BE6B000
trusted library allocation
page read and write
21A53399000
trusted library allocation
page read and write
2B99666E000
trusted library allocation
page read and write
2B996696000
trusted library allocation
page read and write
21A51D88000
heap
page read and write
21A492F1000
heap
page read and write
21A49319000
heap
page read and write
21A537F9000
trusted library allocation
page read and write
21A536C4000
trusted library allocation
page read and write
21A55AEF000
trusted library allocation
page read and write
21A5A69D000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A5AC2F000
trusted library allocation
page read and write
21A53EE2000
trusted library allocation
page read and write
21A5AC5B000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5A6C5000
trusted library allocation
page read and write
21A53FB2000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5DFA6000
trusted library allocation
page read and write
21A52071000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5E80C000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A51D7A000
heap
page read and write
21A49321000
heap
page read and write
21A49319000
heap
page read and write
21A4931B000
heap
page read and write
21A5ABBE000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A492F5000
heap
page read and write
21A54AC5000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A5455D000
trusted library allocation
page read and write
21A54CEF000
trusted library allocation
page read and write
21A4DCBF000
trusted library allocation
page read and write
21A5E854000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
278A89E0000
heap
page read and write
21A521CE000
trusted library allocation
page read and write
21A4931A000
heap
page read and write
21A54A76000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A53466000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A4DC9E000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A49319000
heap
page read and write
21A49302000
heap
page read and write
21A49327000
heap
page read and write
21A54922000
trusted library allocation
page read and write
21A54759000
trusted library allocation
page read and write
21A492E2000
heap
page read and write
21A49302000
heap
page read and write
21A53351000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A5E425000
trusted library allocation
page read and write
21A5E471000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5EA4E000
trusted library allocation
page read and write
21A49327000
heap
page read and write
1B4976BC000
trusted library allocation
page read and write
21A52078000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A492EB000
heap
page read and write
E00000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A52EBC000
trusted library allocation
page read and write
21A54AAC000
trusted library allocation
page read and write
21A5349D000
trusted library allocation
page read and write
21A5A5A2000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A53692000
trusted library allocation
page read and write
21A5AC1E000
trusted library allocation
page read and write
21A53586000
trusted library allocation
page read and write
21A547B2000
trusted library allocation
page read and write
21A4F574000
trusted library allocation
page read and write
21A53D5E000
trusted library allocation
page read and write
21A4933D000
heap
page read and write
21A49314000
heap
page read and write
21A4E31E000
trusted library allocation
page read and write
268A1200000
heap
page read and write
21A538E6000
trusted library allocation
page read and write
21A548F5000
trusted library allocation
page read and write
21A4E271000
trusted library allocation
page read and write
21A55D47000
trusted library allocation
page read and write
21A54AEA000
trusted library allocation
page read and write
21A4E271000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A5218B000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5C706000
trusted library allocation
page read and write
21A5E852000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
1B497BE0000
heap
page read and write
21A53ACA000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
3710000
heap
page read and write
21A524F5000
trusted library allocation
page read and write
21A5207E000
trusted library allocation
page read and write
21A5ED66000
heap
page read and write
21A522BB000
trusted library allocation
page read and write
21A51D7C000
heap
page read and write
21A52274000
trusted library allocation
page read and write
1B49825F000
heap
page read and write
21A492D5000
heap
page read and write
21A49327000
heap
page read and write
FBCB3FE000
stack
page read and write
21A5D99A000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A54958000
trusted library allocation
page read and write
21A5E4DD000
trusted library allocation
page read and write
21A53365000
trusted library allocation
page read and write
21A5AC42000
trusted library allocation
page read and write
21A49320000
heap
page read and write
21A49304000
heap
page read and write
21A4930C000
heap
page read and write
21A54A52000
trusted library allocation
page read and write
21A5EDE1000
heap
page read and write
1B497240000
unclassified section
page readonly
21A537C1000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A54A5E000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A492E1000
heap
page read and write
21A5A686000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A5E47C000
trusted library allocation
page read and write
21A538B6000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A49316000
heap
page read and write
21A53EB4000
trusted library allocation
page read and write
21A4F46A000
trusted library allocation
page read and write
21A538B8000
trusted library allocation
page read and write
21A53AE4000
trusted library allocation
page read and write
21A52E8C000
trusted library allocation
page read and write
21A54A5A000
trusted library allocation
page read and write
21A5363F000
trusted library allocation
page read and write
21A5D94D000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A4F479000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4F55A000
trusted library allocation
page read and write
21A5ACA2000
trusted library allocation
page read and write
F63000
heap
page read and write
21A55AE8000
trusted library allocation
page read and write
21A54A42000
trusted library allocation
page read and write
21A4930F000
heap
page read and write
21A492E0000
heap
page read and write
21A5229C000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A492F5000
heap
page read and write
21A5217C000
trusted library allocation
page read and write
21A5C60C000
trusted library allocation
page read and write
21A5ACC2000
trusted library allocation
page read and write
2B996480000
unclassified section
page readonly
21A4F463000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492ED000
heap
page read and write
21A5A618000
trusted library allocation
page read and write
21A4F2D3000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A4930B000
heap
page read and write
21A55DFD000
trusted library allocation
page read and write
21A55D7C000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A492CE000
heap
page read and write
21A53E78000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A492F1000
heap
page read and write
21A5214F000
trusted library allocation
page read and write
21A5C5A3000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A53AC2000
trusted library allocation
page read and write
21A51960000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5ACBA000
trusted library allocation
page read and write
21A54AF6000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49316000
heap
page read and write
21A5D600000
trusted library allocation
page read and write
1B4972C0000
unclassified section
page readonly
21A5A631000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A522D9000
trusted library allocation
page read and write
21A5D9AF000
trusted library allocation
page read and write
21A49334000
heap
page read and write
1B498260000
heap
page read and write
21A519BA000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5E856000
trusted library allocation
page read and write
21A5DE88000
trusted library allocation
page read and write
2AD21B70000
trusted library allocation
page read and write
21A5E3E3000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A492E3000
heap
page read and write
21A55D7C000
trusted library allocation
page read and write
21A5217E000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492CE000
heap
page read and write
21A4E3B1000
trusted library allocation
page read and write
21A5229C000
trusted library allocation
page read and write
21A53FC2000
trusted library allocation
page read and write
21A533FE000
trusted library allocation
page read and write
21A5A5B6000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A51B3C000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A537BC000
trusted library allocation
page read and write
21A5E4CD000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A49316000
heap
page read and write
21A55AE8000
trusted library allocation
page read and write
21A549BE000
trusted library allocation
page read and write
21A524FC000
trusted library allocation
page read and write
21A54958000
trusted library allocation
page read and write
21A5339D000
trusted library allocation
page read and write
21A5ED01000
heap
page read and write
21A49321000
heap
page read and write
21A546F9000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
278A8D0A000
trusted library allocation
page read and write
21A5A45F000
trusted library allocation
page read and write
21A549E5000
trusted library allocation
page read and write
21A53FD5000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A492F0000
heap
page read and write
21A492CE000
heap
page read and write
21A55DB3000
trusted library allocation
page read and write
C91000
unkown
page execute read
21A5BEEB000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5C587000
trusted library allocation
page read and write
21A56364000
trusted library allocation
page read and write
21A53FFC000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A492F1000
heap
page read and write
2AD21BC4000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A541FC000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49334000
heap
page read and write
21A49305000
heap
page read and write
21A49385000
heap
page read and write
21A5E482000
trusted library allocation
page read and write
21A5E85E000
trusted library allocation
page read and write
21A54148000
trusted library allocation
page read and write
21A492E1000
heap
page read and write
21A4F4E8000
trusted library allocation
page read and write
21A53FDF000
trusted library allocation
page read and write
B0332FE000
unkown
page readonly
21A49327000
heap
page read and write
21A492F0000
heap
page read and write
21A54952000
trusted library allocation
page read and write
21A5661C000
trusted library allocation
page read and write
21A5A5BB000
trusted library allocation
page read and write
21A5D96D000
trusted library allocation
page read and write
21A5347F000
trusted library allocation
page read and write
21A5A4B0000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A4930C000
heap
page read and write
21A5218B000
trusted library allocation
page read and write
1B498269000
heap
page read and write
21A5C6AC000
trusted library allocation
page read and write
AE4000
heap
page read and write
21A534FA000
trusted library allocation
page read and write
21A5ABBE000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A49322000
heap
page read and write
21A49322000
heap
page read and write
21A5ED0A000
heap
page read and write
21A49314000
heap
page read and write
1B497250000
unclassified section
page readonly
21A5D9DB000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A541D6000
trusted library allocation
page read and write
21A5A56D000
trusted library allocation
page read and write
21A53A3B000
trusted library allocation
page read and write
21A4DCC1000
trusted library allocation
page read and write
21A53384000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A49305000
heap
page read and write
21A5A409000
trusted library allocation
page read and write
21A5D990000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A492F5000
heap
page read and write
21A492DA000
heap
page read and write
278A8D00000
trusted library allocation
page read and write
21A522BE000
trusted library allocation
page read and write
21A5A6AD000
trusted library allocation
page read and write
21A5BE71000
trusted library allocation
page read and write
21A547DD000
trusted library allocation
page read and write
FBC89AE000
stack
page read and write
21A49302000
heap
page read and write
1B4972E0000
heap
page read and write
21A549CA000
trusted library allocation
page read and write
21A5ABDE000
trusted library allocation
page read and write
21A54BBC000
trusted library allocation
page read and write
21A53BEC000
trusted library allocation
page read and write
21A5A2E8000
trusted library allocation
page read and write
21A5DFAB000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A4F264000
trusted library allocation
page read and write
21A55DD6000
trusted library allocation
page read and write
21A55847000
trusted library allocation
page read and write
21A521A5000
trusted library allocation
page read and write
21A5A69D000
trusted library allocation
page read and write
21A54BB6000
trusted library allocation
page read and write
21A5AB42000
trusted library allocation
page read and write
21A492DF000
heap
page read and write
21A5DE86000
trusted library allocation
page read and write
21A53FB4000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5AB3D000
trusted library allocation
page read and write
21A5ABEF000
trusted library allocation
page read and write
F7E000
heap
page read and write
21A54621000
trusted library allocation
page read and write
21A5D9E7000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
2B9962A0000
heap
page read and write
21A492E1000
heap
page read and write
21A4E37F000
trusted library allocation
page read and write
21A53DB3000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A53902000
trusted library allocation
page read and write
21A52282000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A53FDF000
trusted library allocation
page read and write
21A54E62000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A5A6C3000
trusted library allocation
page read and write
21A5E85A000
trusted library allocation
page read and write
21A5A2CE000
trusted library allocation
page read and write
21A52E70000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A49302000
heap
page read and write
21A4932E000
heap
page read and write
21A5C6A3000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5A540000
trusted library allocation
page read and write
C64000
heap
page read and write
21A54996000
trusted library allocation
page read and write
21A53650000
trusted library allocation
page read and write
21A55D56000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
F7E000
heap
page read and write
21A492D5000
heap
page read and write
21A4930B000
heap
page read and write
21A56363000
trusted library allocation
page read and write
21A532CC000
trusted library allocation
page read and write
2AD21E07000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A52EB9000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
9BF000
stack
page read and write
21A5A5C0000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A549A1000
trusted library allocation
page read and write
21A5A6C3000
trusted library allocation
page read and write
21A5ABF6000
trusted library allocation
page read and write
21A5E4EA000
trusted library allocation
page read and write
21A54A25000
trusted library allocation
page read and write
21A492E4000
heap
page read and write
21A5E2FE000
trusted library allocation
page read and write
21A5E80C000
trusted library allocation
page read and write
21A5AB3F000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A4E2FB000
trusted library allocation
page read and write
21A5D9A4000
trusted library allocation
page read and write
21A53A8D000
trusted library allocation
page read and write
21A524F4000
trusted library allocation
page read and write
21A5216C000
trusted library allocation
page read and write
1B49824D000
heap
page read and write
21A4930E000
heap
page read and write
21A5A483000
trusted library allocation
page read and write
21A53FDF000
trusted library allocation
page read and write
21A5D9A4000
trusted library allocation
page read and write
21A4F44F000
trusted library allocation
page read and write
21A521A5000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
D64000
unkown
page readonly
21A53278000
trusted library allocation
page read and write
21A49338000
heap
page read and write
21A534D0000
trusted library allocation
page read and write
21A5DFDA000
trusted library allocation
page read and write
21A53A6F000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A55D27000
trusted library allocation
page read and write
21A5D979000
trusted library allocation
page read and write
2B996821000
trusted library allocation
page read and write
21A51BB4000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A49302000
heap
page read and write
21A54A23000
trusted library allocation
page read and write
21A5229B000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A492DA000
heap
page read and write
21A5D9B8000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A4930E000
heap
page read and write
21A4E3A0000
trusted library allocation
page read and write
21A51D92000
heap
page read and write
21A492D5000
heap
page read and write
21A4F622000
trusted library allocation
page read and write
21A5D86E000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5E49C000
trusted library allocation
page read and write
21A53443000
trusted library allocation
page read and write
21A5E808000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A53FB2000
trusted library allocation
page read and write
21A53D47000
trusted library allocation
page read and write
21A5E845000
trusted library allocation
page read and write
21A53EEF000
trusted library allocation
page read and write
21A55956000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5A6CD000
trusted library allocation
page read and write
1B4982F1000
heap
page read and write
21A5A69A000
trusted library allocation
page read and write
21A53FFC000
trusted library allocation
page read and write
21A5ACB4000
trusted library allocation
page read and write
21A538D6000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5330E000
trusted library allocation
page read and write
278A8C00000
trusted library allocation
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A533ED000
trusted library allocation
page read and write
21A54A48000
trusted library allocation
page read and write
21A522FC000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A52170000
trusted library allocation
page read and write
21A4930A000
heap
page read and write
21A492E0000
heap
page read and write
21A534D3000
trusted library allocation
page read and write
A40000
heap
page read and write
21A5206A000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5D8CD000
trusted library allocation
page read and write
21A5367F000
trusted library allocation
page read and write
21A5ACC4000
trusted library allocation
page read and write
21A5E4F2000
trusted library allocation
page read and write
21A5ACBC000
trusted library allocation
page read and write
D3BF83E000
stack
page read and write
21A53A4B000
trusted library allocation
page read and write
21A5DFE4000
trusted library allocation
page read and write
21A5D9CB000
trusted library allocation
page read and write
21A537BC000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5A2F4000
trusted library allocation
page read and write
2AD21B6C000
trusted library allocation
page read and write
1B497BBA000
unkown
page execute read
21A53295000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5D9D5000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5D9E2000
trusted library allocation
page read and write
21A53A68000
trusted library allocation
page read and write
21A53F52000
trusted library allocation
page read and write
21A5D9EC000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49319000
heap
page read and write
21A5E85A000
trusted library allocation
page read and write
F71000
heap
page read and write
21A53468000
trusted library allocation
page read and write
21A5E8BC000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A492DD000
heap
page read and write
21A5A6C5000
trusted library allocation
page read and write
21A5475B000
trusted library allocation
page read and write
2B996261000
remote allocation
page execute read
21A52263000
trusted library allocation
page read and write
21A5AC50000
trusted library allocation
page read and write
21A53FD3000
trusted library allocation
page read and write
21A53488000
trusted library allocation
page read and write
21A5E8F3000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A51D7D000
heap
page read and write
21A5A534000
trusted library allocation
page read and write
21A51D92000
heap
page read and write
21A54047000
trusted library allocation
page read and write
21A54A0A000
trusted library allocation
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A51D92000
heap
page read and write
21A5E49C000
trusted library allocation
page read and write
21A5E497000
trusted library allocation
page read and write
21A52E2E000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A4933D000
heap
page read and write
21A492F1000
heap
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A56650000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A55889000
trusted library allocation
page read and write
278A8B17000
heap
page read and write
21A492E0000
heap
page read and write
21A5DF63000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A534C1000
trusted library allocation
page read and write
21A51D8F000
heap
page read and write
21A52EB1000
trusted library allocation
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A5A572000
trusted library allocation
page read and write
21A533FA000
trusted library allocation
page read and write
21A5E4B8000
trusted library allocation
page read and write
21A51B1C000
trusted library allocation
page read and write
21A4931C000
heap
page read and write
21A53A80000
trusted library allocation
page read and write
21A5211F000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A492ED000
heap
page read and write
21A4F46C000
trusted library allocation
page read and write
21A5328E000
trusted library allocation
page read and write
21A51B3F000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A538B2000
trusted library allocation
page read and write
21A53F6E000
trusted library allocation
page read and write
21A53E69000
trusted library allocation
page read and write
21A524EA000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
B0322FE000
unkown
page readonly
21A5E2CC000
trusted library allocation
page read and write
21A5BE0B000
trusted library allocation
page read and write
21A49310000
heap
page read and write
21A53E39000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A55DFB000
trusted library allocation
page read and write
21A5C757000
trusted library allocation
page read and write
21A57002000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5E8BC000
trusted library allocation
page read and write
1B498036000
unkown
page execute read
21A492EA000
heap
page read and write
21A53E56000
trusted library allocation
page read and write
21A492E4000
heap
page read and write
21A492E9000
heap
page read and write
F7E000
heap
page read and write
21A492DA000
heap
page read and write
21A492E5000
heap
page read and write
2AD21BDB000
trusted library allocation
page read and write
21A5E4D1000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A492F1000
heap
page read and write
21A5E434000
trusted library allocation
page read and write
21A54EBF000
trusted library allocation
page read and write
21A54019000
trusted library allocation
page read and write
2AD21811000
heap
page read and write
21A5DFA6000
trusted library allocation
page read and write
1B498369000
heap
page read and write
21A5D9C4000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5347F000
trusted library allocation
page read and write
21A54A5A000
trusted library allocation
page read and write
21A54EB7000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A492C6000
heap
page read and write
1B4982E6000
heap
page read and write
21A559C6000
trusted library allocation
page read and write
21A4F4E8000
trusted library allocation
page read and write
21A4F588000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
F6F000
heap
page read and write
2AD21C28000
heap
page read and write
21A492EA000
heap
page read and write
21A5E854000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A4F2A7000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A54999000
trusted library allocation
page read and write
21A54BB6000
trusted library allocation
page read and write
21A55CFD000
trusted library allocation
page read and write
2B996839000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A5DFBB000
trusted library allocation
page read and write
21A53ED3000
trusted library allocation
page read and write
21A5D99C000
trusted library allocation
page read and write
21A49325000
heap
page read and write
21A5E279000
trusted library allocation
page read and write
21A534C8000
trusted library allocation
page read and write
21A5AB3F000
trusted library allocation
page read and write
21A54138000
trusted library allocation
page read and write
21A54043000
trusted library allocation
page read and write
1B498367000
heap
page read and write
21A492F5000
heap
page read and write
21A5E3AC000
trusted library allocation
page read and write
21A533BF000
trusted library allocation
page read and write
21A537FC000
trusted library allocation
page read and write
21A5E508000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A53F96000
trusted library allocation
page read and write
21A4E366000
trusted library allocation
page read and write
21A549F6000
trusted library allocation
page read and write
1B4982E8000
heap
page read and write
21A533C3000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A53D4C000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
21A4E326000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A5C6C5000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5A535000
trusted library allocation
page read and write
21A5322C000
trusted library allocation
page read and write
21A5E4BF000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5BED4000
trusted library allocation
page read and write
21A4F2EE000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A53A77000
trusted library allocation
page read and write
21A492DE000
heap
page read and write
21A4E326000
trusted library allocation
page read and write
21A53FEB000
trusted library allocation
page read and write
9CF000
stack
page read and write
21A5A2AB000
trusted library allocation
page read and write
21A54EFE000
trusted library allocation
page read and write
21A53A7A000
trusted library allocation
page read and write
21A53F8E000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5E438000
trusted library allocation
page read and write
21A537E2000
trusted library allocation
page read and write
21A5D977000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A53488000
trusted library allocation
page read and write
D3C00FE000
stack
page read and write
21A5ABFD000
trusted library allocation
page read and write
21A53A77000
trusted library allocation
page read and write
21A53A66000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A52261000
trusted library allocation
page read and write
1B498263000
heap
page read and write
21A492C1000
heap
page read and write
21A49321000
heap
page read and write
21A4F4EA000
trusted library allocation
page read and write
21A54775000
trusted library allocation
page read and write
21A5D95C000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A522BE000
trusted library allocation
page read and write
21A5226F000
trusted library allocation
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A54189000
trusted library allocation
page read and write
21A53A36000
trusted library allocation
page read and write
268A2DAE000
heap
page read and write
21A5338F000
trusted library allocation
page read and write
21A537B6000
trusted library allocation
page read and write
21A5E37D000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A53D3D000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A492E4000
heap
page read and write
21A5C641000
trusted library allocation
page read and write
21A5ACC2000
trusted library allocation
page read and write
2B996610000
trusted library allocation
page read and write
21A519EB000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A54CE7000
trusted library allocation
page read and write
1B497623000
trusted library allocation
page read and write
21A53D30000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A54BB0000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5EC31000
trusted library allocation
page read and write
21A5C605000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5A6A8000
trusted library allocation
page read and write
173D000
stack
page read and write
21A5A538000
trusted library allocation
page read and write
D2C000
unkown
page readonly
21A546A6000
trusted library allocation
page read and write
21A563AC000
trusted library allocation
page read and write
21A49322000
heap
page read and write
9BEB7FC000
stack
page read and write
21A55CFA000
trusted library allocation
page read and write
21A4930C000
heap
page read and write
21A54A93000
trusted library allocation
page read and write
21A4E276000
trusted library allocation
page read and write
21A558BB000
trusted library allocation
page read and write
21A55AEA000
trusted library allocation
page read and write
21A4930E000
heap
page read and write
21A492DA000
heap
page read and write
21A4F416000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A52475000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A56323000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A49322000
heap
page read and write
21A5DF98000
trusted library allocation
page read and write
1B49766F000
trusted library allocation
page read and write
21A492E5000
heap
page read and write
21A533A9000
trusted library allocation
page read and write
21A5E4B3000
trusted library allocation
page read and write
21A5D99A000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A492E0000
heap
page read and write
21A53AF9000
trusted library allocation
page read and write
21A5D9C4000
trusted library allocation
page read and write
21A53F52000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A52261000
trusted library allocation
page read and write
21A4933A000
heap
page read and write
1B4982AA000
heap
page read and write
21A49334000
heap
page read and write
21A5A6CD000
trusted library allocation
page read and write
21A5AC6A000
trusted library allocation
page read and write
21A5490C000
trusted library allocation
page read and write
21A4930A000
heap
page read and write
21A53A48000
trusted library allocation
page read and write
21A492E9000
heap
page read and write
21A492F0000
heap
page read and write
21A5245B000
trusted library allocation
page read and write
21A54E71000
trusted library allocation
page read and write
21A54643000
trusted library allocation
page read and write
21A49334000
heap
page read and write
1B4982E8000
heap
page read and write
21A49314000
heap
page read and write
21A541F8000
trusted library allocation
page read and write
2B99681C000
trusted library allocation
page read and write
21A53AF5000
trusted library allocation
page read and write
21A534A2000
trusted library allocation
page read and write
21A5A2DE000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A53726000
trusted library allocation
page read and write
21A538D0000
trusted library allocation
page read and write
D5C000
unkown
page read and write
21A49321000
heap
page read and write
21A5A6F1000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A49316000
heap
page read and write
21A492F5000
heap
page read and write
21A4F4E4000
trusted library allocation
page read and write
21A52090000
trusted library allocation
page read and write
21A54AEE000
trusted library allocation
page read and write
21A5A62B000
trusted library allocation
page read and write
21A5494E000
trusted library allocation
page read and write
21A5E83D000
trusted library allocation
page read and write
21A54164000
trusted library allocation
page read and write
21A53A40000
trusted library allocation
page read and write
1B4982E8000
heap
page read and write
21A5ACF6000
trusted library allocation
page read and write
21A537B6000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A53A1F000
trusted library allocation
page read and write
21A5E845000
trusted library allocation
page read and write
21A5D9CD000
trusted library allocation
page read and write
21A5A550000
trusted library allocation
page read and write
1B49826C000
heap
page read and write
21A53D52000
trusted library allocation
page read and write
21A5E480000
trusted library allocation
page read and write
21A5223D000
trusted library allocation
page read and write
2AD21B11000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5AB98000
trusted library allocation
page read and write
21A49321000
heap
page read and write
3711000
heap
page read and write
21A5388C000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5D9FC000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49316000
heap
page read and write
21A5D943000
trusted library allocation
page read and write
21A49321000
heap
page read and write
268A2DA0000
heap
page read and write
21A53440000
trusted library allocation
page read and write
21A52094000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A536E6000
trusted library allocation
page read and write
13C7D051E000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A49327000
heap
page read and write
21A538F9000
trusted library allocation
page read and write
21A5A571000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A52F5B000
trusted library allocation
page read and write
21A55DF9000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
F7E000
heap
page read and write
21A492F5000
heap
page read and write
21A5586A000
trusted library allocation
page read and write
21A53895000
trusted library allocation
page read and write
21A558CD000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A5249A000
trusted library allocation
page read and write
1B4982FC000
heap
page read and write
21A5BEF5000
trusted library allocation
page read and write
FBC93D8000
stack
page read and write
21A4F586000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5AB6F000
trusted library allocation
page read and write
21A5E444000
trusted library allocation
page read and write
21A5DF26000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5A549000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A54AA9000
trusted library allocation
page read and write
21A51B63000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A4933D000
heap
page read and write
21A54AF9000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A49302000
heap
page read and write
21A49334000
heap
page read and write
21A53632000
trusted library allocation
page read and write
21A53A27000
trusted library allocation
page read and write
21A558DC000
trusted library allocation
page read and write
268A1371000
heap
page read and write
21A5D980000
trusted library allocation
page read and write
21A5A6F1000
trusted library allocation
page read and write
F48000
heap
page read and write
21A5DED2000
trusted library allocation
page read and write
21A533C0000
trusted library allocation
page read and write
21A5E887000
trusted library allocation
page read and write
21A54A2D000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
3711000
heap
page read and write
21A53FFC000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492ED000
heap
page read and write
21A49321000
heap
page read and write
21A53FB2000
trusted library allocation
page read and write
F62000
heap
page read and write
21A5D941000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
2AD219C0000
heap
page read and write
21A492F5000
heap
page read and write
21A548C5000
trusted library allocation
page read and write
21A49335000
heap
page read and write
21A548DB000
trusted library allocation
page read and write
21A53AE4000
trusted library allocation
page read and write
21A51D92000
heap
page read and write
99097FB000
stack
page read and write
21A49319000
heap
page read and write
21A558E9000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A559CA000
trusted library allocation
page read and write
21A54013000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A53FEA000
trusted library allocation
page read and write
21A5A5F8000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A547B6000
trusted library allocation
page read and write
21A54CFA000
trusted library allocation
page read and write
21A533FC000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A54A1D000
trusted library allocation
page read and write
21A54CEF000
trusted library allocation
page read and write
21A5A4FC000
trusted library allocation
page read and write
1B4982F1000
heap
page read and write
21A54999000
trusted library allocation
page read and write
21A5D9B8000
trusted library allocation
page read and write
21A4F556000
trusted library allocation
page read and write
21A55D5B000
trusted library allocation
page read and write
21A55AEA000
trusted library allocation
page read and write
21A5ABE9000
trusted library allocation
page read and write
21A5A2AB000
trusted library allocation
page read and write
21A54A48000
trusted library allocation
page read and write
21A5A5FA000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A53F8E000
trusted library allocation
page read and write
21A492D9000
heap
page read and write
21A492F0000
heap
page read and write
21A53E9C000
trusted library allocation
page read and write
21A5A6D6000
trusted library allocation
page read and write
21A5D9CE000
trusted library allocation
page read and write
21A4F498000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A5414C000
trusted library allocation
page read and write
21A53FEB000
trusted library allocation
page read and write
21A5200F000
trusted library allocation
page read and write
21A54965000
trusted library allocation
page read and write
21A5ABF6000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A53DE1000
trusted library allocation
page read and write
21A5D9C4000
trusted library allocation
page read and write
21A53F62000
trusted library allocation
page read and write
21A5E48B000
trusted library allocation
page read and write
21A5C5C8000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A522B9000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5BE6F000
trusted library allocation
page read and write
21A5D9F2000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5207C000
trusted library allocation
page read and write
21A51918000
trusted library allocation
page read and write
21A5493C000
trusted library allocation
page read and write
21A52183000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A54583000
trusted library allocation
page read and write
21A5D9BF000
trusted library allocation
page read and write
21A519A6000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A492D5000
heap
page read and write
21A5218D000
trusted library allocation
page read and write
21A5495A000
trusted library allocation
page read and write
2AD21B8F000
trusted library allocation
page read and write
21A4F5A2000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A53E94000
trusted library allocation
page read and write
1B497500000
trusted library allocation
page read and write
21A533FD000
trusted library allocation
page read and write
21A5E8AF000
trusted library allocation
page read and write
21A4F5EB000
trusted library allocation
page read and write
21A549BA000
trusted library allocation
page read and write
21A535E9000
trusted library allocation
page read and write
21A5ABE3000
trusted library allocation
page read and write
21A533EB000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A537F3000
trusted library allocation
page read and write
F83000
heap
page read and write
21A4930B000
heap
page read and write
21A5D888000
trusted library allocation
page read and write
FBC88AE000
stack
page read and write
21A49321000
heap
page read and write
21A5DF50000
trusted library allocation
page read and write
1B4982A1000
heap
page read and write
21A492CE000
heap
page read and write
21A533CA000
trusted library allocation
page read and write
21A5499F000
trusted library allocation
page read and write
21A559EC000
trusted library allocation
page read and write
21A53664000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A4930B000
heap
page read and write
21A5AB3B000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A49304000
heap
page read and write
21A492D5000
heap
page read and write
21A5DF43000
trusted library allocation
page read and write
21A5A6F7000
trusted library allocation
page read and write
21A49313000
heap
page read and write
21A492EB000
heap
page read and write
21A49327000
heap
page read and write
21A5D89A000
trusted library allocation
page read and write
21A5E438000
trusted library allocation
page read and write
21A55AA3000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5C5E5000
trusted library allocation
page read and write
21A51D7C000
heap
page read and write
21A5DF29000
trusted library allocation
page read and write
21A5AC85000
trusted library allocation
page read and write
21A5490E000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5BEDD000
trusted library allocation
page read and write
21A55842000
trusted library allocation
page read and write
2AD21B82000
trusted library allocation
page read and write
21A563D7000
trusted library allocation
page read and write
21A492DF000
heap
page read and write
1B4982E6000
heap
page read and write
21A53681000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
2B996776000
heap
page read and write
21A492F1000
heap
page read and write
21A4E317000
trusted library allocation
page read and write
21A54CF4000
trusted library allocation
page read and write
21A5EAF1000
trusted library allocation
page read and write
21A54140000
trusted library allocation
page read and write
2AD21952000
unclassified section
page read and write
21A492F1000
heap
page read and write
21A5ACB4000
trusted library allocation
page read and write
21A519DB000
trusted library allocation
page read and write
21A548FA000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A53A87000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492E0000
heap
page read and write
21A492DA000
heap
page read and write
21A5AC61000
trusted library allocation
page read and write
21A5E413000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492F0000
heap
page read and write
2B996832000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5A552000
trusted library allocation
page read and write
21A53443000
trusted library allocation
page read and write
21A53F00000
trusted library allocation
page read and write
21A51D7C000
heap
page read and write
21A5D9BE000
trusted library allocation
page read and write
9909FFE000
stack
page read and write
21A492D5000
heap
page read and write
278A8AF0000
heap
page read and write
B031AFE000
stack
page read and write
21A54B83000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5D94D000
trusted library allocation
page read and write
21A492EE000
heap
page read and write
21A5A2D2000
trusted library allocation
page read and write
21A51B4F000
trusted library allocation
page read and write
21A524FC000
trusted library allocation
page read and write
21A5E3AC000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A4F5F6000
trusted library allocation
page read and write
21A51DE3000
heap
page read and write
B02EFEE000
unkown
page readonly
21A49327000
heap
page read and write
21A521CE000
trusted library allocation
page read and write
21A5C701000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A537ED000
trusted library allocation
page read and write
21A5D9BD000
trusted library allocation
page read and write
21A5A2EC000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A5459E000
trusted library allocation
page read and write
2B996817000
trusted library allocation
page read and write
21A55D2C000
trusted library allocation
page read and write
21A492C5000
heap
page read and write
21A54BE4000
trusted library allocation
page read and write
21A5E854000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A5A6FB000
trusted library allocation
page read and write
21A5D9AF000
trusted library allocation
page read and write
21A5AC65000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A49316000
heap
page read and write
21A538CE000
trusted library allocation
page read and write
1B4982E1000
heap
page read and write
21A5A2E8000
trusted library allocation
page read and write
1B4982B9000
heap
page read and write
21A53FEB000
trusted library allocation
page read and write
21A53A77000
trusted library allocation
page read and write
21A492EC000
heap
page read and write
21A49319000
heap
page read and write
21A54AA8000
trusted library allocation
page read and write
21A4DCB3000
trusted library allocation
page read and write
21A5344A000
trusted library allocation
page read and write
21A5D952000
trusted library allocation
page read and write
2AD21BF6000
trusted library allocation
page read and write
21A53E9A000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5D956000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A49302000
heap
page read and write
21A53444000
trusted library allocation
page read and write
21A5A4F4000
trusted library allocation
page read and write
21A51D92000
heap
page read and write
21A4F288000
trusted library allocation
page read and write
21A522FC000
trusted library allocation
page read and write
21A5E4B1000
trusted library allocation
page read and write
21A54BBF000
trusted library allocation
page read and write
21A5E423000
trusted library allocation
page read and write
21A540F8000
trusted library allocation
page read and write
21A53A7A000
trusted library allocation
page read and write
D3BEFFE000
stack
page read and write
21A5DF4D000
trusted library allocation
page read and write
2AD21C20000
heap
page read and write
2B996460000
heap
page read and write
21A49311000
heap
page read and write
21A53A7E000
trusted library allocation
page read and write
21A5A2D6000
trusted library allocation
page read and write
21A549B5000
trusted library allocation
page read and write
21A55DEE000
trusted library allocation
page read and write
21A5D9CB000
trusted library allocation
page read and write
1B498344000
heap
page read and write
21A49321000
heap
page read and write
21A522C4000
trusted library allocation
page read and write
1B498201000
heap
page read and write
B032AFE000
stack
page read and write
21A5494E000
trusted library allocation
page read and write
21A5D95B000
trusted library allocation
page read and write
1B49833B000
heap
page read and write
21A49302000
heap
page read and write
21A492F5000
heap
page read and write
21A54C63000
trusted library allocation
page read and write
21A53A4E000
trusted library allocation
page read and write
21A5DEC6000
trusted library allocation
page read and write
21A5A5C7000
trusted library allocation
page read and write
21A5ACC4000
trusted library allocation
page read and write
21A5475F000
trusted library allocation
page read and write
21A54A76000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A5417D000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A492F5000
heap
page read and write
21A4931B000
heap
page read and write
1B497664000
trusted library allocation
page read and write
2B996320000
heap
page read and write
1B497490000
heap
page readonly
21A5DFF4000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5227E000
trusted library allocation
page read and write
21A4E37D000
trusted library allocation
page read and write
21A55D42000
trusted library allocation
page read and write
21A5E88C000
trusted library allocation
page read and write
2B99660B000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A51D7A000
heap
page read and write
21A4932E000
heap
page read and write
21A54D2A000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A53FF9000
trusted library allocation
page read and write
21A5E425000
trusted library allocation
page read and write
21A52172000
trusted library allocation
page read and write
21A5E89B000
trusted library allocation
page read and write
21A53ED7000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A49304000
heap
page read and write
21A4931B000
heap
page read and write
21A5C6A7000
trusted library allocation
page read and write
21A533C3000
trusted library allocation
page read and write
21A5D9C8000
trusted library allocation
page read and write
990A7FE000
stack
page read and write
21A558BB000
trusted library allocation
page read and write
21A55ACD000
trusted library allocation
page read and write
21A49311000
heap
page read and write
21A5339D000
trusted library allocation
page read and write
21A492CE000
heap
page read and write
21A5ACB8000
trusted library allocation
page read and write
21A54045000
trusted library allocation
page read and write
21A49334000
heap
page read and write
D3BDFFE000
stack
page read and write
2AD216F0000
unclassified section
page readonly
21A5A4D5000
trusted library allocation
page read and write
21A5E471000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A54AE8000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A51D88000
heap
page read and write
21A54960000
trusted library allocation
page read and write
21A5E3E7000
trusted library allocation
page read and write
21A49322000
heap
page read and write
990BFFF000
stack
page read and write
21A5E856000
trusted library allocation
page read and write
21A53F6E000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A49322000
heap
page read and write
21A5A558000
trusted library allocation
page read and write
21A5D954000
trusted library allocation
page read and write
21A56605000
trusted library allocation
page read and write
21A55823000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A548BC000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A532F8000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A5A625000
trusted library allocation
page read and write
21A5ED71000
heap
page read and write
21A4F2A7000
trusted library allocation
page read and write
2AD21B5D000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5A5FA000
trusted library allocation
page read and write
21A5E408000
trusted library allocation
page read and write
21A55886000
trusted library allocation
page read and write
21A49316000
heap
page read and write
99097FF000
stack
page read and write
21A49322000
heap
page read and write
21A521A5000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5A2DE000
trusted library allocation
page read and write
21A54C23000
trusted library allocation
page read and write
2B996612000
trusted library allocation
page read and write
21A521CE000
trusted library allocation
page read and write
21A492F0000
heap
page read and write
21A51DDE000
heap
page read and write
21A5E3A2000
trusted library allocation
page read and write
1B497BD0000
heap
page read and write
21A51DE3000
heap
page read and write
21A5BE21000
trusted library allocation
page read and write
2AB8F8D1000
trusted library allocation
page execute read
21A5A5A3000
trusted library allocation
page read and write
21A5367D000
trusted library allocation
page read and write
1B498358000
heap
page read and write
21A5C72C000
trusted library allocation
page read and write
2B99667B000
trusted library allocation
page read and write
21A5DFBB000
trusted library allocation
page read and write
21A5C733000
trusted library allocation
page read and write
21A5216C000
trusted library allocation
page read and write
21A53AF0000
trusted library allocation
page read and write
21A5AC5B000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
FBC896E000
unkown
page readonly
21A51BC2000
trusted library allocation
page read and write
21A53689000
trusted library allocation
page read and write
2B996666000
trusted library allocation
page read and write
21A5AB9F000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5C5C8000
trusted library allocation
page read and write
21A54EEF000
trusted library allocation
page read and write
21A5E87C000
trusted library allocation
page read and write
21A54AEE000
trusted library allocation
page read and write
D3BC568000
stack
page read and write
21A492F1000
heap
page read and write
1B497669000
trusted library allocation
page read and write
21A4F4FA000
trusted library allocation
page read and write
21A5208A000
trusted library allocation
page read and write
21A52155000
trusted library allocation
page read and write
21A53A80000
trusted library allocation
page read and write
21A492FC000
heap
page read and write
21A5346C000
trusted library allocation
page read and write
21A538E8000
trusted library allocation
page read and write
21A5A5F6000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A492E0000
heap
page read and write
9BEB7FF000
stack
page read and write
21A4F49C000
trusted library allocation
page read and write
21A5A4FA000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A49305000
heap
page read and write
21A549CA000
trusted library allocation
page read and write
21A5D8D6000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A52EC0000
trusted library allocation
page read and write
21A53A89000
trusted library allocation
page read and write
268A13C0000
heap
page read and write
21A5A6CD000
trusted library allocation
page read and write
21A520F3000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A49305000
heap
page read and write
21A492D5000
heap
page read and write
21A49302000
heap
page read and write
21A52183000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A492F0000
heap
page read and write
21A54022000
trusted library allocation
page read and write
21A49305000
heap
page read and write
21A5A696000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
2B996810000
trusted library allocation
page read and write
21A5A6C5000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A4932C000
heap
page read and write
21A5D9CB000
trusted library allocation
page read and write
21A53684000
trusted library allocation
page read and write
9BEC7FE000
stack
page read and write
21A49334000
heap
page read and write
21A492D5000
heap
page read and write
21A53ECD000
trusted library allocation
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A54A0F000
trusted library allocation
page read and write
21A4932C000
heap
page read and write
21A53FD0000
trusted library allocation
page read and write
21A52291000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A4931B000
heap
page read and write
21A49322000
heap
page read and write
21A5ABB6000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A4932E000
heap
page read and write
21A492E0000
heap
page read and write
21A49321000
heap
page read and write
21A5AC39000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
2AD21950000
unclassified section
page read and write
21A5D9DB000
trusted library allocation
page read and write
21A49334000
heap
page read and write
21A5668A000
trusted library allocation
page read and write
21A4E382000
trusted library allocation
page read and write
21A5ABE3000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A492F0000
heap
page read and write
21A49302000
heap
page read and write
21A49334000
heap
page read and write
21A51DE3000
heap
page read and write
21A4931B000
heap
page read and write
21A51DE3000
heap
page read and write
21A522D2000
trusted library allocation
page read and write
21A5E4FD000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A5E858000
trusted library allocation
page read and write
21A53F96000
trusted library allocation
page read and write
21A5A573000
trusted library allocation
page read and write
21A53A30000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A492F1000
heap
page read and write
21A548E2000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A54043000
trusted library allocation
page read and write
1B498358000
heap
page read and write
21A5A5B6000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A5C586000
trusted library allocation
page read and write
21A5A409000
trusted library allocation
page read and write
268A1400000
trusted library allocation
page read and write
2AD21C26000
heap
page read and write
21A4930B000
heap
page read and write
1B498358000
heap
page read and write
21A4930B000
heap
page read and write
21A535A0000
trusted library allocation
page read and write
21A549A1000
trusted library allocation
page read and write
21A537C7000
trusted library allocation
page read and write
2B99669D000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A536E8000
trusted library allocation
page read and write
21A492D5000
heap
page read and write
21A49302000
heap
page read and write
21A53A8F000
trusted library allocation
page read and write
21A5C648000
trusted library allocation
page read and write
21A5C5E5000
trusted library allocation
page read and write
21A5D9AD000
trusted library allocation
page read and write
21A53E62000
trusted library allocation
page read and write
21A54E23000
trusted library allocation
page read and write
21A5C733000
trusted library allocation
page read and write
21A5ABE3000
trusted library allocation
page read and write
1B49832D000
heap
page read and write
21A5AC1C000
trusted library allocation
page read and write
21A558C4000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5AC1C000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5ABE9000
trusted library allocation
page read and write
1B498020000
trusted library allocation
page read and write
21A522AC000
trusted library allocation
page read and write
21A49316000
heap
page read and write
21A4931B000
heap
page read and write
21A5E4AB000
trusted library allocation
page read and write
21A56386000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A5E8A7000
trusted library allocation
page read and write
21A5AB3F000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A54BA3000
trusted library allocation
page read and write
21A5D995000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A492DA000
heap
page read and write
D3BC4AD000
stack
page read and write
21A53A7C000
trusted library allocation
page read and write
21A4931D000
heap
page read and write
21A49320000
heap
page read and write
21A53F57000
trusted library allocation
page read and write
21A49304000
heap
page read and write
21A492DA000
heap
page read and write
1B498367000
heap
page read and write
21A49302000
heap
page read and write
21A549D7000
trusted library allocation
page read and write
21A5BEC5000
trusted library allocation
page read and write
21A522A3000
trusted library allocation
page read and write
21A537EF000
trusted library allocation
page read and write
21A534C8000
trusted library allocation
page read and write
21A541BE000
trusted library allocation
page read and write
21A5DFE4000
trusted library allocation
page read and write
21A5A45F000
trusted library allocation
page read and write
21A5AC61000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A4930B000
heap
page read and write
268A2DAD000
heap
page read and write
21A54A5A000
trusted library allocation
page read and write
21A5E42F000
trusted library allocation
page read and write
21A5ACF6000
trusted library allocation
page read and write
F68000
heap
page read and write
21A4932E000
heap
page read and write
21A5A2EC000
trusted library allocation
page read and write
21A541D6000
trusted library allocation
page read and write
21A4930B000
heap
page read and write
21A5BC00000
trusted library allocation
page read and write
21A537D4000
trusted library allocation
page read and write
21A5367B000
trusted library allocation
page read and write
21A51DCA000
heap
page read and write
21A49316000
heap
page read and write
1B498321000
heap
page read and write
21A5417A000
trusted library allocation
page read and write
21A54CF4000
trusted library allocation
page read and write
21A492DA000
heap
page read and write
21A5325E000
trusted library allocation
page read and write
21A5D9E7000
trusted library allocation
page read and write
21A53D73000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A492ED000
heap
page read and write
21A492F5000
heap
page read and write
21A49316000
heap
page read and write
21A5A625000
trusted library allocation
page read and write
21A55DB8000
trusted library allocation
page read and write
21A492EA000
heap
page read and write
21A53A54000
trusted library allocation
page read and write
21A519DC000
trusted library allocation
page read and write
21A4F49A000
trusted library allocation
page read and write
21A53F98000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A5E434000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A52063000
trusted library allocation
page read and write
21A5E88F000
trusted library allocation
page read and write
21A49319000
heap
page read and write
21A492ED000
heap
page read and write
21A492F1000
heap
page read and write
21A5A6A5000
trusted library allocation
page read and write
21A4932E000
heap
page read and write
21A51BC8000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
21A5DFC5000
trusted library allocation
page read and write
21A49314000
heap
page read and write
21A4F476000
trusted library allocation
page read and write
21A56637000
trusted library allocation
page read and write
21A5219E000
trusted library allocation
page read and write
21A54ABC000
trusted library allocation
page read and write
21A49322000
heap
page read and write
21A492F5000
heap
page read and write
21A49322000
heap
page read and write
21A537E8000
trusted library allocation
page read and write
2B9966CB000
trusted library allocation
page read and write
21A54A96000
trusted library allocation
page read and write
21A4F40D000
trusted library allocation
page read and write
21A5207C000
trusted library allocation
page read and write
21A54AF9000
trusted library allocation
page read and write
21A535A5000
trusted library allocation
page read and write
21A49321000
heap
page read and write
21A5ABBB000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A4F423000
trusted library allocation
page read and write
21A49327000
heap
page read and write
21A492DA000
heap
page read and write
21A492E0000
heap
page read and write
21A52FA5000
trusted library allocation
page read and write
21A54BB0000
trusted library allocation
page read and write
21A54DF1000
trusted library allocation
page read and write
21A53635000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A4F5DC000
trusted library allocation
page read and write
21A5D893000
trusted library allocation
page read and write
21A53A71000
trusted library allocation
page read and write
21A492ED000
heap
page read and write
21A51DE3000
heap
page read and write
21A535EF000
trusted library allocation
page read and write
21A5D945000
trusted library allocation
page read and write
21A53729000
trusted library allocation
page read and write
3DA000
stack
page read and write
21A5A2B7000
trusted library allocation
page read and write
21A5E3F7000
trusted library allocation
page read and write
21A5D86E000
trusted library allocation
page read and write
21A4F569000
trusted library allocation
page read and write
21A5E38F000
trusted library allocation
page read and write
21A5E85C000
trusted library allocation
page read and write
2B99645F000
unclassified section
page read and write
21A4DCEF000
trusted library allocation
page read and write
21A5240D000
trusted library allocation
page read and write
21A5E37D000
trusted library allocation
page read and write
21A492F1000
heap
page read and write
21A5AB12000
trusted library allocation
page read and write
21A49302000
heap
page read and write
21A492EB000
heap
page read and write
21A53686000
trusted library allocation
page read and write
21A53A6E000
trusted library allocation
page read and write
21A492E0000
heap
page read and write
21A53F7A000
trusted library allocation
page read and write
21A540F1000
trusted library allocation
page read and write
21A54121000
trusted library allocation
page read and write
21A522B4000
trusted library allocation
page read and write
21A55D8D000
trusted library allocation
page read and write
21A5A6E2000
trusted library allocation
page read and write
21A533C0000
trusted library allocation
page read and write
1B498367000
heap
page read and write
21A49302000
heap
page read and write
21A55815000
trusted library allocation
page read and write
21A54165000
trusted library allocation
page read and write
1B497686000
trusted library allocation
page read and write
21A536EB000
trusted library allocation
page read and write
21A524EF000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A5387E000
trusted library allocation
page read and write
21A5E87C000
trusted library allocation
page read and write
21A5C686000
trusted library allocation
page read and write
1B4982F1000
heap
page read and write
21A492F1000
heap
page read and write
21A492CE000
heap
page read and write
21A492E7000
heap
page read and write
21A51979000
trusted library allocation
page read and write
21A54E40000
trusted library allocation
page read and write
21A492F5000
heap
page read and write
21A55874000
trusted library allocation
page read and write
21A53AC6000
trusted library allocation
page read and write
21A540C7000
trusted library allocation
page read and write
21A5362B000
trusted library allocation
page read and write
21A5E813000
trusted library allocation
page read and write
21A549CA000
trusted library allocation
page read and write
F6F000
heap
page read and write
21A5D9F4000
trusted library allocation
page read and write
21A4931B000
heap
page read and write
2B99681F000
trusted library allocation
page read and write
21A5A5C7000
trusted library allocation
page read and write
21A5D952000
trusted library allocation
page read and write
21A53F6A000
trusted library allocation
page read and write
21A492EB000
heap
page read and write
21A566AC000
trusted library allocation
page read and write
21A53F92000
trusted library allocation
page read and write
There are 4000 hidden memdumps, click here to show them.