IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_31431ecc-1a1d-49a2-823b-6acc110d75d9.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_31431ecc-1a1d-49a2-823b-6acc110d75d9.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8N40XT4FMLGQVNLGUYSU.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TPI3F41MDA88A4TN5N33.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdb6f847-cb9e-4fb5-afb6-641a629cd22d} 7804 "\\.\pipe\gecko-crash-server-pipe.7804" 16b04870510 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2920 -parentBuildID 20230927232528 -prefsHandle 3560 -prefMapHandle 3100 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19bf62ce-243b-4030-87bf-9d8b0acb858c} 7804 "\\.\pipe\gecko-crash-server-pipe.7804" 16b16cb5410 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5308 -prefMapHandle 1556 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3cdc9275-8888-45cf-a7dd-d000686ae1a0} 7804 "\\.\pipe\gecko-crash-server-pipe.7804" 16b15a97310 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsing
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.185.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.185.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
BDE000
stack
page read and write
16B1487E000
trusted library allocation
page read and write
16B0B64F000
heap
page read and write
16B17AC5000
trusted library allocation
page read and write
25346390000
trusted library section
page readonly
121A6078000
trusted library allocation
page read and write
16B16498000
trusted library allocation
page read and write
584000
heap
page read and write
16B0B642000
heap
page read and write
16B1E477000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B641000
heap
page read and write
16B0B657000
heap
page read and write
16B14E88000
trusted library allocation
page read and write
16B1C771000
trusted library allocation
page read and write
16B20971000
trusted library allocation
page read and write
16B15DE7000
trusted library allocation
page read and write
16B1466F000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B657000
heap
page read and write
16B15EF8000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B146AB000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B0B62F000
heap
page read and write
16B155CF000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B16743000
trusted library allocation
page read and write
16B156FB000
trusted library allocation
page read and write
16B10682000
trusted library allocation
page read and write
16B1C6A1000
trusted library allocation
page read and write
16B159D9000
trusted library allocation
page read and write
16B0B5F1000
heap
page read and write
16B16426000
trusted library allocation
page read and write
BA4BD7E000
unkown
page readonly
16B1C50D000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B18061000
trusted library allocation
page read and write
16B15EF6000
trusted library allocation
page read and write
16B1F798000
trusted library allocation
page read and write
1C30012E000
trusted library allocation
page read and write
16B17AF7000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B0B642000
heap
page read and write
16B0B5FB000
heap
page read and write
16B20ABB000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
2534714D000
heap
page read and write
16B0B638000
heap
page read and write
16B1563A000
trusted library allocation
page read and write
16B1C73D000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16DF9000
trusted library allocation
page read and write
16B1ECD2000
trusted library allocation
page read and write
16B20932000
trusted library allocation
page read and write
16B17BF6000
trusted library allocation
page read and write
1C3001B7000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B642000
heap
page read and write
16B1ECD6000
trusted library allocation
page read and write
16B146B8000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B657000
heap
page read and write
2399F307000
trusted library allocation
page read and write
16B156D5000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B14839000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
1C37FD60000
remote allocation
page read and write
16B14682000
trusted library allocation
page read and write
16B17AF3000
trusted library allocation
page read and write
16B0B600000
heap
page read and write
16B14668000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B0B62F000
heap
page read and write
16B155EC000
trusted library allocation
page read and write
1C30015B000
trusted library allocation
page read and write
25347258000
heap
page read and write
16B1E4FD000
trusted library allocation
page read and write
2534722C000
heap
page read and write
16B15DC3000
trusted library allocation
page read and write
16B17BEF000
trusted library allocation
page read and write
16B0B5C5000
heap
page read and write
16B0B651000
heap
page read and write
16B1C9F4000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B11704000
trusted library allocation
page read and write
16B16737000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
16B1EF6D000
trusted library allocation
page read and write
16B14890000
trusted library allocation
page read and write
1C37FF10000
heap
page readonly
16B17EFC000
trusted library allocation
page read and write
16B1C8B3000
trusted library allocation
page read and write
16B1C996000
trusted library allocation
page read and write
16B16466000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1FAF3000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
2CE9077000
stack
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B0B62F000
heap
page read and write
CEF000
heap
page read and write
16B1E58C000
trusted library allocation
page read and write
16B154D9000
trusted library allocation
page read and write
16B1F74D000
trusted library allocation
page read and write
16B17A68000
trusted library allocation
page read and write
16B106B1000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B0B5D1000
heap
page read and write
16B15949000
trusted library allocation
page read and write
1C300300000
heap
page read and write
16B17A28000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B14657000
trusted library allocation
page read and write
16B15655000
trusted library allocation
page read and write
16B15DC3000
trusted library allocation
page read and write
16B17A28000
trusted library allocation
page read and write
16B0B660000
heap
page read and write
16B20A76000
trusted library allocation
page read and write
16B1F7A0000
trusted library allocation
page read and write
16B0B653000
heap
page read and write
16B11E6A000
heap
page read and write
16B20B41000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B10523000
trusted library allocation
page read and write
16B15DAF000
trusted library allocation
page read and write
16B159FE000
trusted library allocation
page read and write
16B1FACD000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B11792000
trusted library allocation
page read and write
16B141D5000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
1C300313000
heap
page read and write
16B0B5D8000
heap
page read and write
16B148D9000
trusted library allocation
page read and write
16B1F7EC000
trusted library allocation
page read and write
16B18100000
trusted library allocation
page read and write
16B1F70A000
trusted library allocation
page read and write
16B1467A000
trusted library allocation
page read and write
16B15596000
trusted library allocation
page read and write
16B20AC9000
trusted library allocation
page read and write
25346523000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5EE000
heap
page read and write
16B0B651000
heap
page read and write
16B14EC8000
trusted library allocation
page read and write
16B0B5FF000
heap
page read and write
16B17ECB000
trusted library allocation
page read and write
16B15DAF000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B0B5DC000
heap
page read and write
16B15CF3000
trusted library allocation
page read and write
16B109B3000
trusted library allocation
page read and write
16B1562D000
trusted library allocation
page read and write
16B14E42000
trusted library allocation
page read and write
16B20B1B000
trusted library allocation
page read and write
16B1FA75000
trusted library allocation
page read and write
16B1479A000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B0B64D000
heap
page read and write
121A5B10000
unclassified section
page readonly
2CE8FFE000
unkown
page readonly
16B0B614000
heap
page read and write
16B0B63F000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5D8000
heap
page read and write
16B0B654000
heap
page read and write
16B0B5EE000
heap
page read and write
16B0B5FA000
heap
page read and write
16B16FEA000
trusted library allocation
page read and write
16B207E2000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B14E31000
trusted library allocation
page read and write
2399F0B2000
heap
page read and write
2534716C000
heap
page read and write
16B14834000
trusted library allocation
page read and write
16B1ECE2000
trusted library allocation
page read and write
16B207D8000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B14E80000
trusted library allocation
page read and write
16B16F9A000
trusted library allocation
page read and write
2CEA13E000
stack
page read and write
25347221000
heap
page read and write
16B150B9000
trusted library allocation
page read and write
16B17A38000
trusted library allocation
page read and write
16B1FA7D000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B20D6D000
trusted library allocation
page read and write
16B16DD8000
trusted library allocation
page read and write
2399F070000
heap
page read and write
16B14571000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1CADF000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B1C73D000
trusted library allocation
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B657000
heap
page read and write
16B0B647000
heap
page read and write
16B159B5000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B1CA2E000
trusted library allocation
page read and write
16B15C49000
trusted library allocation
page read and write
16B15586000
trusted library allocation
page read and write
121A5B70000
remote allocation
page read and write
16B1C998000
trusted library allocation
page read and write
16B1CAA7000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B15CD1000
trusted library allocation
page read and write
16B1E51F000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
584000
heap
page read and write
16B20F89000
heap
page read and write
16B0B644000
heap
page read and write
16B1E4DF000
trusted library allocation
page read and write
16B0B5F6000
heap
page read and write
16B0B5D8000
heap
page read and write
16B0B63F000
heap
page read and write
16B1FAAB000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5FE000
heap
page read and write
1C300232000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B1F782000
trusted library allocation
page read and write
16B15471000
trusted library allocation
page read and write
16B0B638000
heap
page read and write
16B0B643000
heap
page read and write
16B0B649000
heap
page read and write
16B14E5D000
trusted library allocation
page read and write
16B1C92E000
trusted library allocation
page read and write
253471F0000
heap
page read and write
16B17EBC000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5CD000
heap
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B20F01000
heap
page read and write
16B145A5000
trusted library allocation
page read and write
25347160000
heap
page read and write
16B1C461000
trusted library allocation
page read and write
16B15C1F000
trusted library allocation
page read and write
16B1EC92000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B15DA7000
trusted library allocation
page read and write
16B16743000
trusted library allocation
page read and write
16B11C87000
trusted library allocation
page read and write
16B15CC5000
trusted library allocation
page read and write
16B10618000
trusted library allocation
page read and write
16B11EA9000
heap
page read and write
16B0B606000
heap
page read and write
16B17BF1000
trusted library allocation
page read and write
16B17EDF000
trusted library allocation
page read and write
16B1646F000
trusted library allocation
page read and write
16B1C9FC000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B15C15000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B16BC7000
trusted library allocation
page read and write
16B148C6000
trusted library allocation
page read and write
16B147DC000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1FAF3000
trusted library allocation
page read and write
16B16B5F000
trusted library allocation
page read and write
253461C0000
heap
page read and write
1C300147000
trusted library allocation
page read and write
16B1FA6A000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B0B655000
heap
page read and write
16B157F2000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B1FA75000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B20F71000
heap
page read and write
16B17E7F000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B17EC3000
trusted library allocation
page read and write
16B1FAD1000
trusted library allocation
page read and write
BA4E7FE000
stack
page read and write
16B0B5DD000
heap
page read and write
16B0B655000
heap
page read and write
16B162EB000
trusted library allocation
page read and write
1C37FF56000
heap
page read and write
16B14120000
trusted library allocation
page read and write
253471FD000
heap
page read and write
16B0B5F4000
heap
page read and write
16B17A7F000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1E471000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1C931000
trusted library allocation
page read and write
16B1456E000
trusted library allocation
page read and write
16B16EF7000
trusted library allocation
page read and write
16B14856000
trusted library allocation
page read and write
16B15CA7000
trusted library allocation
page read and write
16B14E3C000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B60F000
heap
page read and write
16B0B5EE000
heap
page read and write
16B1CAFD000
trusted library allocation
page read and write
253471E6000
heap
page read and write
2CE90FE000
unkown
page readonly
16B200AF000
trusted library allocation
page read and write
16B105FB000
trusted library allocation
page read and write
121A605D000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B0B64D000
heap
page read and write
16B0B647000
heap
page read and write
16B159B0000
trusted library allocation
page read and write
16B207F4000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B115E1000
trusted library allocation
page read and write
16B146D3000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B0B5EB000
heap
page read and write
16B14826000
trusted library allocation
page read and write
16B1599C000
trusted library allocation
page read and write
16B148DE000
trusted library allocation
page read and write
16B15983000
trusted library allocation
page read and write
16B0B5E7000
heap
page read and write
25346586000
trusted library allocation
page read and write
1A57DDC0000
heap
page read and write
16B1C6A1000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
1C37FF70000
heap
page read and write
16B16787000
trusted library allocation
page read and write
16B20B73000
trusted library allocation
page read and write
16B11EAD000
heap
page read and write
16B0B647000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B657000
heap
page read and write
16B1C89F000
trusted library allocation
page read and write
16B1FA66000
trusted library allocation
page read and write
16B1C68C000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B5FB000
heap
page read and write
16B16442000
trusted library allocation
page read and write
239A0BDD000
heap
page read and write
16B1C5FD000
trusted library allocation
page read and write
CDF000
heap
page read and write
16B17B2D000
trusted library allocation
page read and write
16B159EF000
trusted library allocation
page read and write
16B1C936000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B5DB000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B638000
heap
page read and write
16B15EC6000
trusted library allocation
page read and write
16B170DF000
trusted library allocation
page read and write
16B1C9F2000
trusted library allocation
page read and write
16B15CB8000
trusted library allocation
page read and write
16B147DC000
trusted library allocation
page read and write
16B209ED000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B14163000
trusted library allocation
page read and write
16B11EA9000
heap
page read and write
16B0B60F000
heap
page read and write
16B14EB0000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
BA4DFFE000
unkown
page readonly
16B1F74D000
trusted library allocation
page read and write
16B159CF000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B1FDCF000
trusted library allocation
page read and write
16B1C8C2000
trusted library allocation
page read and write
16B1FD9D000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B0B614000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B1FA80000
trusted library allocation
page read and write
16B20DF1000
trusted library allocation
page read and write
16B155CF000
trusted library allocation
page read and write
16B1E5D0000
trusted library allocation
page read and write
16B1FA98000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B60C000
heap
page read and write
16B1456C000
trusted library allocation
page read and write
16B1E4E7000
trusted library allocation
page read and write
16B14874000
trusted library allocation
page read and write
16B0B654000
heap
page read and write
16B1FF67000
trusted library allocation
page read and write
16B1FA5D000
trusted library allocation
page read and write
16B115CE000
trusted library allocation
page read and write
16B1C6FE000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5DF000
heap
page read and write
16B1ECDE000
trusted library allocation
page read and write
16B20F01000
heap
page read and write
16B159FA000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B60F000
heap
page read and write
25347164000
heap
page read and write
16B167C5000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B16F60000
trusted library allocation
page read and write
16B1FD60000
trusted library allocation
page read and write
16B1509B000
trusted library allocation
page read and write
16B10906000
trusted library allocation
page read and write
16B1FF61000
trusted library allocation
page read and write
16B159B2000
trusted library allocation
page read and write
16B11EAD000
heap
page read and write
16B1FFC7000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
2534650C000
trusted library allocation
page read and write
16B1CA5C000
trusted library allocation
page read and write
16B1CA5E000
trusted library allocation
page read and write
16B14546000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B5FA000
heap
page read and write
3501000
heap
page read and write
121A608F000
trusted library allocation
page read and write
16B156CF000
trusted library allocation
page read and write
253471B2000
heap
page read and write
16B1C695000
trusted library allocation
page read and write
16B1FD6A000
trusted library allocation
page read and write
2534722B000
heap
page read and write
CD7000
heap
page read and write
16B0B657000
heap
page read and write
16B1F033000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B614000
heap
page read and write
2534717F000
heap
page read and write
16B1FA7D000
trusted library allocation
page read and write
25347100000
heap
page read and write
16B15586000
trusted library allocation
page read and write
16B156E0000
trusted library allocation
page read and write
25346644000
unkown
page execute read
16B117C4000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B614000
heap
page read and write
16B155B2000
trusted library allocation
page read and write
16B17E57000
trusted library allocation
page read and write
16B159CF000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C89F000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B159B2000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B5FA000
heap
page read and write
25346676000
heap
page read and write
16B0B647000
heap
page read and write
16B1FAC9000
trusted library allocation
page read and write
16B1459E000
trusted library allocation
page read and write
16B17B3C000
trusted library allocation
page read and write
16B1C8BA000
trusted library allocation
page read and write
16B20779000
trusted library allocation
page read and write
121A5E86000
heap
page read and write
16B16FEA000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B15678000
trusted library allocation
page read and write
253471FD000
heap
page read and write
16B0B5F9000
heap
page read and write
16B15DDD000
trusted library allocation
page read and write
16B159B2000
trusted library allocation
page read and write
16B1E452000
trusted library allocation
page read and write
16B0B607000
heap
page read and write
16B1C974000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
2534716C000
heap
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B200C8000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B14132000
trusted library allocation
page read and write
16B150E7000
trusted library allocation
page read and write
16B1C7BE000
trusted library allocation
page read and write
16B20F47000
heap
page read and write
121A6003000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B642000
heap
page read and write
16B0B609000
heap
page read and write
16B1C8B5000
trusted library allocation
page read and write
16B1C6F0000
trusted library allocation
page read and write
88AFFE000
unkown
page readonly
16B1C9D3000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B1CA81000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1EB64000
trusted library allocation
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B5FE000
heap
page read and write
16B20A51000
trusted library allocation
page read and write
16B14E6A000
trusted library allocation
page read and write
16B14E81000
trusted library allocation
page read and write
1C300181000
trusted library allocation
page read and write
16B1EF07000
trusted library allocation
page read and write
25347109000
heap
page read and write
16B17E6B000
trusted library allocation
page read and write
16B16476000
trusted library allocation
page read and write
1C300197000
trusted library allocation
page read and write
16B1E48F000
trusted library allocation
page read and write
16B1FA52000
trusted library allocation
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1E474000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B20F01000
heap
page read and write
16B1E46F000
trusted library allocation
page read and write
16B14680000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B1C7DD000
trusted library allocation
page read and write
16B17A7F000
trusted library allocation
page read and write
16B20DCE000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1F791000
trusted library allocation
page read and write
16B115DA000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B1FD98000
trusted library allocation
page read and write
16B1C6F0000
trusted library allocation
page read and write
16B16F60000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B63F000
heap
page read and write
16B1FA75000
trusted library allocation
page read and write
16B1C6E6000
trusted library allocation
page read and write
16B155B2000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B1483B000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B20973000
trusted library allocation
page read and write
16B16F6C000
trusted library allocation
page read and write
253465C2000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
16B180DE000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16FDE000
trusted library allocation
page read and write
2399F0AA000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B606000
heap
page read and write
16B1CAD7000
trusted library allocation
page read and write
16B16B96000
trusted library allocation
page read and write
16B0B60C000
heap
page read and write
16B0B638000
heap
page read and write
16B0B64D000
heap
page read and write
16B0B5E3000
heap
page read and write
16B0B5FD000
heap
page read and write
16B0B5FD000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B5E5000
heap
page read and write
16B1C939000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
888DCE000
unkown
page readonly
16B0B60F000
heap
page read and write
16B1C8B3000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1156A000
trusted library allocation
page read and write
16B167C7000
trusted library allocation
page read and write
16B1FAD1000
trusted library allocation
page read and write
16B146D2000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B5E5000
heap
page read and write
16B1FD9D000
trusted library allocation
page read and write
16B2070D000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1FFE0000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B1FA80000
trusted library allocation
page read and write
16B14E35000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B1676E000
trusted library allocation
page read and write
16B1EC97000
trusted library allocation
page read and write
16B1EE86000
trusted library allocation
page read and write
16B1C9D3000
trusted library allocation
page read and write
16B14D24000
trusted library allocation
page read and write
16B15473000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B0B61E000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5F9000
heap
page read and write
16B14E79000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B660000
heap
page read and write
16B167F4000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
9C91BFD000
stack
page read and write
16B1EF41000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B1CAF3000
trusted library allocation
page read and write
16B159B0000
trusted library allocation
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B164FC000
trusted library allocation
page read and write
16B1FA59000
trusted library allocation
page read and write
16B0B5F9000
heap
page read and write
16B0B614000
heap
page read and write
16B1C6A5000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B1C8A2000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
2CEA0FE000
unkown
page readonly
16B0B5FE000
heap
page read and write
16B0B5E0000
heap
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B1C577000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B647000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B1F300000
trusted library allocation
page read and write
16B11EC6000
heap
page read and write
16B1567D000
trusted library allocation
page read and write
16B15579000
trusted library allocation
page read and write
6F1000
unkown
page execute read
16B11E6E000
heap
page read and write
16B164A0000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
16B11EB1000
heap
page read and write
16B0B5EF000
heap
page read and write
16B1F7A0000
trusted library allocation
page read and write
16B16F2C000
trusted library allocation
page read and write
16B16F75000
trusted library allocation
page read and write
2534715F000
heap
page read and write
16B0B64F000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B5FA000
heap
page read and write
16B1C746000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B156D1000
trusted library allocation
page read and write
25346382000
unclassified section
page read and write
16B155CF000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1E588000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1483E000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B14E46000
trusted library allocation
page read and write
16B1FA9A000
trusted library allocation
page read and write
121A5B00000
unclassified section
page readonly
16B0B641000
heap
page read and write
16B16745000
trusted library allocation
page read and write
16B16BCF000
trusted library allocation
page read and write
16B16745000
trusted library allocation
page read and write
16B141DB000
trusted library allocation
page read and write
16B20A5F000
trusted library allocation
page read and write
16B1C6F0000
trusted library allocation
page read and write
16B1FF69000
trusted library allocation
page read and write
16B15690000
trusted library allocation
page read and write
16B15428000
trusted library allocation
page read and write
16B1C8A6000
trusted library allocation
page read and write
16B209E5000
trusted library allocation
page read and write
16B15CCE000
trusted library allocation
page read and write
16B207B1000
trusted library allocation
page read and write
16B159EA000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
121A60C4000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
2534723B000
heap
page read and write
16B0B62F000
heap
page read and write
1A57DE09000
heap
page read and write
16B11EA2000
heap
page read and write
16B1172D000
trusted library allocation
page read and write
16B1E46F000
trusted library allocation
page read and write
16B162F9000
trusted library allocation
page read and write
16B2097D000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1FA9A000
trusted library allocation
page read and write
16B159B0000
trusted library allocation
page read and write
16B14E4A000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1567D000
trusted library allocation
page read and write
16B1676E000
trusted library allocation
page read and write
16B1C9F0000
trusted library allocation
page read and write
16B1C621000
trusted library allocation
page read and write
16B1556D000
trusted library allocation
page read and write
16B0B60C000
heap
page read and write
16B15581000
trusted library allocation
page read and write
16B200C8000
trusted library allocation
page read and write
16B1564A000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
584000
heap
page read and write
16B0B657000
heap
page read and write
16B1FAA7000
trusted library allocation
page read and write
16B2097D000
trusted library allocation
page read and write
16B167C5000
trusted library allocation
page read and write
16B17B2F000
trusted library allocation
page read and write
888D0E000
stack
page read and write
16B0B5FE000
heap
page read and write
16B1C8E6000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1C547000
trusted library allocation
page read and write
16B1E47B000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5DD000
heap
page read and write
16B207B4000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B1CAEE000
trusted library allocation
page read and write
121A5D70000
heap
page read and write
16B15CD1000
trusted library allocation
page read and write
253465C5000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B5C2000
heap
page read and write
16B16F2C000
trusted library allocation
page read and write
16B15C92000
trusted library allocation
page read and write
16B117A8000
trusted library allocation
page read and write
253471F0000
heap
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B15ED0000
trusted library allocation
page read and write
16B1643B000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B0FFBF000
trusted library allocation
page read and write
2399F0B1000
heap
page read and write
16B15DFD000
trusted library allocation
page read and write
16B159C3000
trusted library allocation
page read and write
16B1182D000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B1C57B000
trusted library allocation
page read and write
16B1CA9F000
trusted library allocation
page read and write
16B16751000
trusted library allocation
page read and write
16B1FA79000
trusted library allocation
page read and write
16B20940000
trusted library allocation
page read and write
16B0B61E000
heap
page read and write
16B0B5E3000
heap
page read and write
16B0B647000
heap
page read and write
16B1EBF4000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1154B000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
25347034000
trusted library allocation
page read and write
16B159BC000
trusted library allocation
page read and write
16B17A82000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B15455000
trusted library allocation
page read and write
16B15C48000
trusted library allocation
page read and write
16B159B2000
trusted library allocation
page read and write
16B15ABF000
trusted library allocation
page read and write
16B0B61B000
heap
page read and write
CEF000
heap
page read and write
16B20714000
trusted library allocation
page read and write
16B1E495000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B651000
heap
page read and write
16B0B668000
heap
page read and write
16B1158C000
trusted library allocation
page read and write
16B1E474000
trusted library allocation
page read and write
16B1FD44000
trusted library allocation
page read and write
16B159D1000
trusted library allocation
page read and write
16B1C891000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
2399F09D000
heap
page read and write
16B15CAD000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B16785000
trusted library allocation
page read and write
16B1C8F6000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1178D000
trusted library allocation
page read and write
16B0B5D4000
heap
page read and write
16B0B5DB000
heap
page read and write
16B14661000
trusted library allocation
page read and write
16B11E79000
heap
page read and write
16B0B60F000
heap
page read and write
16B14678000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B0B5E4000
heap
page read and write
16B20F01000
heap
page read and write
16B15586000
trusted library allocation
page read and write
16B20AC4000
trusted library allocation
page read and write
16B20B5A000
trusted library allocation
page read and write
16B1E4A0000
trusted library allocation
page read and write
16B16745000
trusted library allocation
page read and write
16B11712000
trusted library allocation
page read and write
16B2070B000
trusted library allocation
page read and write
16B1E474000
trusted library allocation
page read and write
16B11733000
trusted library allocation
page read and write
BA4BD3C000
stack
page read and write
16B15411000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
CE3000
heap
page read and write
16B20A18000
trusted library allocation
page read and write
584000
heap
page read and write
16B1FA54000
trusted library allocation
page read and write
16B1558D000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B607000
heap
page read and write
2534717D000
heap
page read and write
16B0B638000
heap
page read and write
16B14EC4000
trusted library allocation
page read and write
16B16490000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B1E5D0000
trusted library allocation
page read and write
16B15CA4000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B0B5FA000
heap
page read and write
16B155C0000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B146A4000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B10998000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B5EE000
heap
page read and write
16B0B651000
heap
page read and write
16B0B657000
heap
page read and write
584000
heap
page read and write
16B16F7D000
trusted library allocation
page read and write
16B1FF3E000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B5F3000
heap
page read and write
25347003000
trusted library allocation
page read and write
16B15DDD000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B1E5E2000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B159C3000
trusted library allocation
page read and write
25347244000
heap
page read and write
16B1676C000
trusted library allocation
page read and write
16B159EE000
trusted library allocation
page read and write
16B1FAAD000
trusted library allocation
page read and write
16B17A11000
trusted library allocation
page read and write
16B16DB4000
trusted library allocation
page read and write
16B15441000
trusted library allocation
page read and write
16B0B608000
heap
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B11C8D000
trusted library allocation
page read and write
16B0B61B000
heap
page read and write
16B159C0000
trusted library allocation
page read and write
16B15DC1000
trusted library allocation
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B209E9000
trusted library allocation
page read and write
16B106E8000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B0B60C000
heap
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B20714000
trusted library allocation
page read and write
16B1CAB2000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B17B4F000
trusted library allocation
page read and write
16B20B33000
trusted library allocation
page read and write
18AE000
stack
page read and write
16B159B3000
trusted library allocation
page read and write
16B1CA9D000
trusted library allocation
page read and write
16B17A79000
trusted library allocation
page read and write
16B0B64B000
heap
page read and write
16B159B6000
trusted library allocation
page read and write
16B1C89F000
trusted library allocation
page read and write
1C300219000
trusted library allocation
page read and write
16B150B6000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B64A000
heap
page read and write
16B15ED3000
trusted library allocation
page read and write
16B146C4000
trusted library allocation
page read and write
16B0B63B000
heap
page read and write
16B0B640000
heap
page read and write
1C37FCF0000
unclassified section
page readonly
16B0B5F4000
heap
page read and write
16B0B5F3000
heap
page read and write
16B117B3000
trusted library allocation
page read and write
16B0B5F1000
heap
page read and write
16B15DB2000
trusted library allocation
page read and write
16B0B60D000
heap
page read and write
16B0B60D000
heap
page read and write
16B1CAC0000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1CA5A000
trusted library allocation
page read and write
16B105FE000
trusted library allocation
page read and write
16B17A32000
trusted library allocation
page read and write
1C300200000
trusted library allocation
page read and write
16B16739000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16F7D000
trusted library allocation
page read and write
16B10666000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B1C8A6000
trusted library allocation
page read and write
16B14163000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B5F4000
heap
page read and write
16B20F01000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B5FF000
heap
page read and write
16B148DE000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
7C4000
unkown
page readonly
16B0B5EE000
heap
page read and write
16B159A8000
trusted library allocation
page read and write
16B14839000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B0FFC0000
trusted library allocation
page read and write
16B14139000
trusted library allocation
page read and write
16B1CAB7000
trusted library allocation
page read and write
16B17A6E000
trusted library allocation
page read and write
16B17E75000
trusted library allocation
page read and write
16B0B5F8000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B167F4000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B5E5000
heap
page read and write
2534655C000
trusted library allocation
page read and write
16B1C542000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1FA5F000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B614000
heap
page read and write
16B1C4EB000
trusted library allocation
page read and write
16B18038000
trusted library allocation
page read and write
25347160000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B64F000
heap
page read and write
16B1459E000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B14668000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5E3000
heap
page read and write
16B0B655000
heap
page read and write
16B0B60C000
heap
page read and write
16B15CC7000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B14872000
trusted library allocation
page read and write
16B0B5F6000
heap
page read and write
16B0B609000
heap
page read and write
16B0B657000
heap
page read and write
16B15691000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5FA000
heap
page read and write
16B2092F000
trusted library allocation
page read and write
16B1C8B5000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1C9D7000
trusted library allocation
page read and write
16B10917000
trusted library allocation
page read and write
16B0B64A000
heap
page read and write
16B16700000
trusted library allocation
page read and write
16B14E8B000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B155A7000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
121A6066000
trusted library allocation
page read and write
25347258000
heap
page read and write
16B14E22000
trusted library allocation
page read and write
16B16438000
trusted library allocation
page read and write
16B15476000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B15E00000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B1CA9B000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
16B15599000
trusted library allocation
page read and write
16B0B64A000
heap
page read and write
16B1C6D8000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B0B5D8000
heap
page read and write
1C37FD73000
remote allocation
page execute read
16B1CAB2000
trusted library allocation
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B5DD000
heap
page read and write
16B146D2000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B17A2D000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
584000
heap
page read and write
16B1674B000
trusted library allocation
page read and write
584000
heap
page read and write
16B0B5F3000
heap
page read and write
1C30023E000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B643000
heap
page read and write
16B0B641000
heap
page read and write
16B146F1000
trusted library allocation
page read and write
16B17B77000
trusted library allocation
page read and write
16B1C932000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1C8DF000
trusted library allocation
page read and write
16B1CAE6000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
1C37FF20000
heap
page read and write
253465C7000
trusted library allocation
page read and write
16B0B5F7000
heap
page read and write
16B0B5FF000
heap
page read and write
16B0B606000
heap
page read and write
16B1C9B0000
trusted library allocation
page read and write
2534715C000
heap
page read and write
16B17E9F000
trusted library allocation
page read and write
1A57E120000
heap
page read and write
16B14E8F000
trusted library allocation
page read and write
16B15ADA000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B115DC000
trusted library allocation
page read and write
16B0B5E4000
heap
page read and write
16B16D9C000
trusted library allocation
page read and write
16B0B5F1000
heap
page read and write
16B0B5F5000
heap
page read and write
16B0B5F4000
heap
page read and write
16B17A8E000
trusted library allocation
page read and write
16B1FD3E000
trusted library allocation
page read and write
16B20F71000
heap
page read and write
16B0B608000
heap
page read and write
16B0B5E3000
heap
page read and write
16B1FABC000
trusted library allocation
page read and write
16B146B6000
trusted library allocation
page read and write
16B1C7DF000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B11EAD000
heap
page read and write
16B1566D000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B15673000
trusted library allocation
page read and write
16B20763000
trusted library allocation
page read and write
16B1FA51000
trusted library allocation
page read and write
16B159A3000
trusted library allocation
page read and write
16B1FAAB000
trusted library allocation
page read and write
16B14678000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B1E45B000
trusted library allocation
page read and write
16B15DFA000
trusted library allocation
page read and write
16B0B5E4000
heap
page read and write
16B1459E000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B60D000
heap
page read and write
16B1483E000
trusted library allocation
page read and write
253471E8000
heap
page read and write
16B0B5F4000
heap
page read and write
16B16F35000
trusted library allocation
page read and write
16B1EB64000
trusted library allocation
page read and write
16B1C73A000
trusted library allocation
page read and write
16B157B0000
trusted library allocation
page read and write
16B0B5E2000
heap
page read and write
121A6207000
trusted library allocation
page read and write
2CEA1BE000
stack
page read and write
16B0B5D8000
heap
page read and write
16B156DE000
trusted library allocation
page read and write
253471E1000
heap
page read and write
16B0B5FA000
heap
page read and write
16B200AF000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B0B637000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B1C9A3000
trusted library allocation
page read and write
16B1157A000
trusted library allocation
page read and write
16B14E3C000
trusted library allocation
page read and write
16B16783000
trusted library allocation
page read and write
16B15977000
trusted library allocation
page read and write
16B0B600000
heap
page read and write
16B1FA52000
trusted library allocation
page read and write
253461A0000
unclassified section
page readonly
16B1C4A2000
trusted library allocation
page read and write
16B1F7EA000
trusted library allocation
page read and write
16B15690000
trusted library allocation
page read and write
16B1C805000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B11EB1000
heap
page read and write
16B0B614000
heap
page read and write
16B0B5F4000
heap
page read and write
25347169000
heap
page read and write
16B0B608000
heap
page read and write
16B1FA2A000
trusted library allocation
page read and write
16B15DFA000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B1C6A3000
trusted library allocation
page read and write
16B15599000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B5E3000
heap
page read and write
16B207E2000
trusted library allocation
page read and write
16B1676C000
trusted library allocation
page read and write
239A0BC0000
heap
page read and write
16B159D9000
trusted library allocation
page read and write
2534659F000
trusted library allocation
page read and write
16B1C984000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B614000
heap
page read and write
16B1FD2F000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B15566000
trusted library allocation
page read and write
16B17BD1000
trusted library allocation
page read and write
16B1FD6A000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1EB4B000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C8F8000
trusted library allocation
page read and write
239A0D70000
heap
page read and write
16B11EC6000
heap
page read and write
16B0B60F000
heap
page read and write
2534656A000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B1C9E6000
trusted library allocation
page read and write
16B17B59000
trusted library allocation
page read and write
16B1FA6A000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B16B5B000
trusted library allocation
page read and write
16B1E550000
trusted library allocation
page read and write
16B1F7EA000
trusted library allocation
page read and write
16B1FA83000
trusted library allocation
page read and write
16B1FA5D000
trusted library allocation
page read and write
16B1EFA7000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B15DE2000
trusted library allocation
page read and write
16B155A7000
trusted library allocation
page read and write
16B1C743000
trusted library allocation
page read and write
16B20A95000
trusted library allocation
page read and write
16B0B5E8000
heap
page read and write
16B17AA9000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B651000
heap
page read and write
16B17EBA000
trusted library allocation
page read and write
16B1459E000
trusted library allocation
page read and write
16B1FAE8000
trusted library allocation
page read and write
16B2097B000
trusted library allocation
page read and write
16B1FF48000
trusted library allocation
page read and write
3500000
heap
page read and write
16B1FA80000
trusted library allocation
page read and write
16B14890000
trusted library allocation
page read and write
16B0B5F6000
heap
page read and write
16B0B606000
heap
page read and write
16B0B647000
heap
page read and write
16B1C8C7000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B15DF7000
trusted library allocation
page read and write
16B1CAE8000
trusted library allocation
page read and write
16B1FA7E000
trusted library allocation
page read and write
16B14E8B000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B0B5D8000
heap
page read and write
25347169000
heap
page read and write
16B1FAF3000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B16749000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B15CA8000
trusted library allocation
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
121A5D62000
unclassified section
page read and write
16B15013000
trusted library allocation
page read and write
25346514000
trusted library allocation
page read and write
16B155FD000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B17B5C000
trusted library allocation
page read and write
16B17B5E000
trusted library allocation
page read and write
16B15DC1000
trusted library allocation
page read and write
16B1E588000
trusted library allocation
page read and write
16B17EBF000
trusted library allocation
page read and write
16B1559B000
trusted library allocation
page read and write
16B155BB000
trusted library allocation
page read and write
16B1C4FB000
trusted library allocation
page read and write
16B1C8C3000
trusted library allocation
page read and write
16B0B668000
heap
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1C89A000
trusted library allocation
page read and write
16B1FAAD000
trusted library allocation
page read and write
16B16BAC000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B20973000
trusted library allocation
page read and write
16B1E47E000
trusted library allocation
page read and write
16B15EFC000
trusted library allocation
page read and write
16B16749000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C8C2000
trusted library allocation
page read and write
16B1FAF3000
trusted library allocation
page read and write
16B1C4E2000
trusted library allocation
page read and write
16B16CA1000
trusted library allocation
page read and write
16B1E58C000
trusted library allocation
page read and write
16B1485B000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B1E47B000
trusted library allocation
page read and write
16B0B60D000
heap
page read and write
239A0BCA000
heap
page read and write
16B0B5DB000
heap
page read and write
16B11794000
trusted library allocation
page read and write
16B1C9D5000
trusted library allocation
page read and write
16B1469C000
trusted library allocation
page read and write
16B1459E000
trusted library allocation
page read and write
16B155F3000
trusted library allocation
page read and write
16B1C56B000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
16B17ACB000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1C7D3000
trusted library allocation
page read and write
16B209A1000
trusted library allocation
page read and write
16B1FA68000
trusted library allocation
page read and write
16B16733000
trusted library allocation
page read and write
16B0B645000
heap
page read and write
16B0B5FA000
heap
page read and write
16B115C8000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B5FB000
heap
page read and write
253462B0000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B5E5000
heap
page read and write
16B1673F000
trusted library allocation
page read and write
16B1CAD5000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B641000
heap
page read and write
16B0B640000
heap
page read and write
16B1FA66000
trusted library allocation
page read and write
16B15ECD000
trusted library allocation
page read and write
25346581000
trusted library allocation
page read and write
16B1C74C000
trusted library allocation
page read and write
16B1CABC000
trusted library allocation
page read and write
16B1453C000
trusted library allocation
page read and write
16B1C6FA000
trusted library allocation
page read and write
16B1152D000
trusted library allocation
page read and write
16B1CAA9000
trusted library allocation
page read and write
16B0B638000
heap
page read and write
16B17A45000
trusted library allocation
page read and write
16B11580000
trusted library allocation
page read and write
16B170E7000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B14E80000
trusted library allocation
page read and write
16B20A8E000
trusted library allocation
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B117C4000
trusted library allocation
page read and write
16B1F71D000
trusted library allocation
page read and write
16B1FA2E000
trusted library allocation
page read and write
16B159FA000
trusted library allocation
page read and write
16B1EF48000
trusted library allocation
page read and write
16B16751000
trusted library allocation
page read and write
16B1C927000
trusted library allocation
page read and write
16B1568B000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B15CA7000
trusted library allocation
page read and write
16B1CA99000
trusted library allocation
page read and write
16B16B91000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B159CF000
trusted library allocation
page read and write
16B15CAF000
trusted library allocation
page read and write
253471E9000
heap
page read and write
16B20F5C000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B0B64B000
heap
page read and write
16B0B657000
heap
page read and write
16B17B5E000
trusted library allocation
page read and write
16B1EBDA000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B1FA5D000
trusted library allocation
page read and write
25347163000
heap
page read and write
121A6082000
trusted library allocation
page read and write
16B1599B000
trusted library allocation
page read and write
16B11EA9000
heap
page read and write
16B0B5FD000
heap
page read and write
16B20A63000
trusted library allocation
page read and write
16B1E495000
trusted library allocation
page read and write
16B15094000
trusted library allocation
page read and write
16B11777000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B15805000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B0FF9E000
trusted library allocation
page read and write
16B1CA30000
trusted library allocation
page read and write
16B1EFA3000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1FB00000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B11726000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B11E6A000
heap
page read and write
16B1458B000
trusted library allocation
page read and write
16B16B73000
trusted library allocation
page read and write
16B1FA5D000
trusted library allocation
page read and write
253471F0000
heap
page read and write
16B14874000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B162FC000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B150FC000
trusted library allocation
page read and write
1C30019D000
trusted library allocation
page read and write
16B10626000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1552E000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B14688000
trusted library allocation
page read and write
16B16B9C000
trusted library allocation
page read and write
121A6076000
trusted library allocation
page read and write
2399F080000
heap
page read and write
16B1C77D000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B20F01000
heap
page read and write
16B11EB1000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1C756000
trusted library allocation
page read and write
16B15CB8000
trusted library allocation
page read and write
16B1483B000
trusted library allocation
page read and write
16B117FD000
trusted library allocation
page read and write
16B1643B000
trusted library allocation
page read and write
16B1C64C000
trusted library allocation
page read and write
16B207A0000
trusted library allocation
page read and write
16B1C9D3000
trusted library allocation
page read and write
25346565000
trusted library allocation
page read and write
16B1F7E8000
trusted library allocation
page read and write
2534619E000
remote allocation
page execute read
16B15CC5000
trusted library allocation
page read and write
16B1FA66000
trusted library allocation
page read and write
16B16DC8000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C9F2000
trusted library allocation
page read and write
16B11CF4000
trusted library allocation
page read and write
25347244000
heap
page read and write
16B1ECC9000
trusted library allocation
page read and write
BCF000
stack
page read and write
16B209EB000
trusted library allocation
page read and write
16B1C4DD000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1FAC6000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B1C93B000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B159FA000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1170F000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B1CAA9000
trusted library allocation
page read and write
16B1ECDE000
trusted library allocation
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
1C300110000
trusted library allocation
page read and write
121A6300000
trusted library allocation
page read and write
253471E8000
heap
page read and write
16B1E48F000
trusted library allocation
page read and write
16B1C898000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B0B5F3000
heap
page read and write
9C923FE000
stack
page read and write
16B11777000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
16B0B5F4000
heap
page read and write
16B156DC000
trusted library allocation
page read and write
16B16416000
trusted library allocation
page read and write
584000
heap
page read and write
CE3000
heap
page read and write
16B15DB5000
trusted library allocation
page read and write
121A5EB0000
heap
page read and write
16B207CB000
trusted library allocation
page read and write
16B0B600000
heap
page read and write
16B15DA7000
trusted library allocation
page read and write
16B11EA9000
heap
page read and write
253471AA000
heap
page read and write
16B11E56000
heap
page read and write
16B14678000
trusted library allocation
page read and write
1C3001CB000
trusted library allocation
page read and write
16B11E79000
heap
page read and write
510000
heap
page read and write
16B1CAF0000
trusted library allocation
page read and write
16B1C6F8000
trusted library allocation
page read and write
1A57DE00000
heap
page read and write
16B14E70000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
253471E3000
heap
page read and write
16B1C8F8000
trusted library allocation
page read and write
16B164AA000
trusted library allocation
page read and write
16B0B5E9000
heap
page read and write
16B159D9000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B64C000
heap
page read and write
16B1C77D000
trusted library allocation
page read and write
16B15DE2000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1597A000
trusted library allocation
page read and write
16B0B601000
heap
page read and write
16B0B5FD000
heap
page read and write
16B2096F000
trusted library allocation
page read and write
16B155AC000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1FFEC000
trusted library allocation
page read and write
16B16470000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1EFC5000
trusted library allocation
page read and write
16B2092A000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B1F798000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B14E55000
trusted library allocation
page read and write
16B155EC000
trusted library allocation
page read and write
16B1C7E6000
trusted library allocation
page read and write
16B1FFD1000
trusted library allocation
page read and write
16B14655000
trusted library allocation
page read and write
16B155C3000
trusted library allocation
page read and write
16B1FACD000
trusted library allocation
page read and write
16B10942000
trusted library allocation
page read and write
16B1061E000
trusted library allocation
page read and write
888D4E000
unkown
page readonly
16B0B651000
heap
page read and write
16B11EB1000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0FFDF000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B1E45F000
trusted library allocation
page read and write
16B148D9000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B655000
heap
page read and write
16B0B5F9000
heap
page read and write
16B17AC0000
trusted library allocation
page read and write
16B1C9E6000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B1CA58000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B1FA9B000
trusted library allocation
page read and write
16B1C746000
trusted library allocation
page read and write
16B16737000
trusted library allocation
page read and write
16B20935000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B5EE000
heap
page read and write
16B0B5E3000
heap
page read and write
16B11E57000
heap
page read and write
16B15CAB000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
16B1672D000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B11EA9000
heap
page read and write
16B0B5FF000
heap
page read and write
16B0B5F5000
heap
page read and write
16B1C6D6000
trusted library allocation
page read and write
16B150AA000
trusted library allocation
page read and write
16B1E4B9000
trusted library allocation
page read and write
253471E6000
heap
page read and write
16B1554B000
trusted library allocation
page read and write
16B0B60D000
heap
page read and write
253471E3000
heap
page read and write
16B0B678000
heap
page read and write
16B1FABC000
trusted library allocation
page read and write
16B146F7000
trusted library allocation
page read and write
16B1C6A7000
trusted library allocation
page read and write
16B11E54000
heap
page read and write
1A57E007000
trusted library allocation
page read and write
16B10571000
trusted library allocation
page read and write
16B0FFEF000
trusted library allocation
page read and write
16B1C7ED000
trusted library allocation
page read and write
16B17E79000
trusted library allocation
page read and write
16B1E45F000
trusted library allocation
page read and write
16B1CA41000
trusted library allocation
page read and write
2534716C000
heap
page read and write
16B1C898000
trusted library allocation
page read and write
16B15571000
trusted library allocation
page read and write
2534650A000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B15EFC000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1CAF3000
trusted library allocation
page read and write
16B1410C000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
16B1C9B0000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B0B5FE000
heap
page read and write
16B11741000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B63F000
heap
page read and write
16B1C6D1000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B0B64B000
heap
page read and write
16B0B62F000
heap
page read and write
16B16758000
trusted library allocation
page read and write
16B1EF4D000
trusted library allocation
page read and write
16B16472000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1C592000
trusted library allocation
page read and write
16B15C0F000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
2CE98FE000
stack
page read and write
16B1E4E3000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B157CF000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B655000
heap
page read and write
16B0B657000
heap
page read and write
16B141DB000
trusted library allocation
page read and write
16B15CAF000
trusted library allocation
page read and write
16B20716000
trusted library allocation
page read and write
16B1E562000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
16B1C532000
trusted library allocation
page read and write
16B1152D000
trusted library allocation
page read and write
121A6000000
trusted library allocation
page read and write
16B17BC7000
trusted library allocation
page read and write
16B154B2000
trusted library allocation
page read and write
16B1FAC6000
trusted library allocation
page read and write
16B15DD4000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B17E83000
trusted library allocation
page read and write
16B1C554000
trusted library allocation
page read and write
16B11782000
trusted library allocation
page read and write
16B17E9F000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B641000
heap
page read and write
16B0B653000
heap
page read and write
584000
heap
page read and write
16B1E45B000
trusted library allocation
page read and write
16B106FC000
trusted library allocation
page read and write
16B15599000
trusted library allocation
page read and write
16B1E46F000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1C6D2000
trusted library allocation
page read and write
16B1644C000
trusted library allocation
page read and write
16B16F75000
trusted library allocation
page read and write
16B1E47E000
trusted library allocation
page read and write
16B1559B000
trusted library allocation
page read and write
16B1C8D1000
trusted library allocation
page read and write
7B2000
unkown
page readonly
9C913FA000
stack
page read and write
16B159C3000
trusted library allocation
page read and write
16B1C8F2000
trusted library allocation
page read and write
16B15CA4000
trusted library allocation
page read and write
25346360000
heap
page readonly
16B1CAF9000
trusted library allocation
page read and write
16B16CF6000
trusted library allocation
page read and write
16B15CBB000
trusted library allocation
page read and write
16B15C5A000
trusted library allocation
page read and write
16B209EB000
trusted library allocation
page read and write
16B2075A000
trusted library allocation
page read and write
16B20F4D000
heap
page read and write
16B1508C000
trusted library allocation
page read and write
16B1CAA4000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B115B2000
trusted library allocation
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B1EF05000
trusted library allocation
page read and write
16B1FA59000
trusted library allocation
page read and write
253465BB000
trusted library allocation
page read and write
16B1C6D6000
trusted library allocation
page read and write
16B15CC2000
trusted library allocation
page read and write
16B11734000
trusted library allocation
page read and write
16B15790000
trusted library allocation
page read and write
16B20B73000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B1E58C000
trusted library allocation
page read and write
16B1CA4E000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B647000
heap
page read and write
16B1C9FC000
trusted library allocation
page read and write
16B14852000
trusted library allocation
page read and write
16B0B64B000
heap
page read and write
16B0B678000
heap
page read and write
16B20FE1000
heap
page read and write
16B159EA000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B159EA000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B0B5FF000
heap
page read and write
16B0FFB3000
trusted library allocation
page read and write
16B1C8C0000
trusted library allocation
page read and write
16B0B605000
heap
page read and write
16B17E6B000
trusted library allocation
page read and write
16B0B5E4000
heap
page read and write
16B1C8C2000
trusted library allocation
page read and write
16B1CAE4000
trusted library allocation
page read and write
16B1FA62000
trusted library allocation
page read and write
16B16B6E000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B0B605000
heap
page read and write
16B17E2B000
trusted library allocation
page read and write
16B20F36000
heap
page read and write
16B1E454000
trusted library allocation
page read and write
253471E0000
heap
page read and write
16B17ED8000
trusted library allocation
page read and write
16B101FA000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B5E5000
heap
page read and write
16B17A79000
trusted library allocation
page read and write
16B159A8000
trusted library allocation
page read and write
16B17EBF000
trusted library allocation
page read and write
16B14682000
trusted library allocation
page read and write
16B1FA35000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B0B657000
heap
page read and write
16B15586000
trusted library allocation
page read and write
839B7FE000
stack
page read and write
16B0B651000
heap
page read and write
16B15584000
trusted library allocation
page read and write
25347258000
heap
page read and write
16B117AA000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B17067000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B0B5D1000
heap
page read and write
16B1CA5C000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B164A0000
trusted library allocation
page read and write
16B15DC1000
trusted library allocation
page read and write
16B159C3000
trusted library allocation
page read and write
16B1CA5A000
trusted library allocation
page read and write
16B1F7A2000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B648000
heap
page read and write
16B0B60F000
heap
page read and write
16B0B5F4000
heap
page read and write
16B16F5C000
trusted library allocation
page read and write
7BC000
unkown
page write copy
16B1F723000
trusted library allocation
page read and write
16B1EF43000
trusted library allocation
page read and write
16B17B75000
trusted library allocation
page read and write
16B159D9000
trusted library allocation
page read and write
16B17BFA000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B15DB5000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B167F9000
trusted library allocation
page read and write
16B0B64E000
heap
page read and write
16B159E7000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B642000
heap
page read and write
16B0B641000
heap
page read and write
16B0B5F4000
heap
page read and write
16B20A4B000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
25346C90000
heap
page read and write
16B0B5FA000
heap
page read and write
16B141FE000
trusted library allocation
page read and write
16B1C8C2000
trusted library allocation
page read and write
16B1C8B5000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1459E000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B11EAD000
heap
page read and write
839BFFF000
stack
page read and write
16B11CCF000
trusted library allocation
page read and write
16B141AB000
trusted library allocation
page read and write
16B0B5F8000
heap
page read and write
16B17A5E000
trusted library allocation
page read and write
25347267000
heap
page read and write
16B0B604000
heap
page read and write
25347160000
heap
page read and write
16B0B5F3000
heap
page read and write
16B148DE000
trusted library allocation
page read and write
16B1C693000
trusted library allocation
page read and write
16B1FAC6000
trusted library allocation
page read and write
16B15AF6000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B640000
heap
page read and write
16B141A6000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B106F0000
trusted library allocation
page read and write
2534652F000
trusted library allocation
page read and write
16B141F7000
trusted library allocation
page read and write
16B1806E000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1547B000
trusted library allocation
page read and write
16B148EE000
trusted library allocation
page read and write
16B15C9D000
trusted library allocation
page read and write
16B14E28000
trusted library allocation
page read and write
16B115CB000
trusted library allocation
page read and write
16B11EB1000
heap
page read and write
16B159AB000
trusted library allocation
page read and write
16B1E471000
trusted library allocation
page read and write
16B180A7000
trusted library allocation
page read and write
16B170EB000
trusted library allocation
page read and write
16B1E5AF000
trusted library allocation
page read and write
16B1E5B1000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B640000
heap
page read and write
16B150E3000
trusted library allocation
page read and write
16B148F3000
trusted library allocation
page read and write
16B14180000
trusted library allocation
page read and write
16B17EC4000
trusted library allocation
page read and write
16B1C889000
trusted library allocation
page read and write
16B159C9000
trusted library allocation
page read and write
16B146C4000
trusted library allocation
page read and write
16B1FA3E000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B209DF000
trusted library allocation
page read and write
16B15CD7000
trusted library allocation
page read and write
16B14550000
trusted library allocation
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B1EEC8000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B109FC000
trusted library allocation
page read and write
16B1CA9F000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C64C000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1C7EE000
trusted library allocation
page read and write
16B12979000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B5DF000
heap
page read and write
16B15DF7000
trusted library allocation
page read and write
1C300160000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1C7E9000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B159E7000
trusted library allocation
page read and write
16B0FFCD000
trusted library allocation
page read and write
121A5E84000
heap
page read and write
16B155CF000
trusted library allocation
page read and write
16B1C8F8000
trusted library allocation
page read and write
16B1C74C000
trusted library allocation
page read and write
1C30010D000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B1458B000
trusted library allocation
page read and write
16B1E495000
trusted library allocation
page read and write
16B167C7000
trusted library allocation
page read and write
16B17BF1000
trusted library allocation
page read and write
16B15C52000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B5DD000
heap
page read and write
16B146E1000
trusted library allocation
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B146FA000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B1FA18000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B641000
heap
page read and write
16B0B5FE000
heap
page read and write
16B17EED000
trusted library allocation
page read and write
16B16DE1000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1C91C000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1E49F000
trusted library allocation
page read and write
16B15C21000
trusted library allocation
page read and write
16B1C9E6000
trusted library allocation
page read and write
16B11780000
trusted library allocation
page read and write
16B20F26000
heap
page read and write
16B15C9D000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B614000
heap
page read and write
16B0B647000
heap
page read and write
16B0B5F4000
heap
page read and write
16B14582000
trusted library allocation
page read and write
16B207FD000
trusted library allocation
page read and write
16B155C3000
trusted library allocation
page read and write
16B1E588000
trusted library allocation
page read and write
16B15997000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B640000
heap
page read and write
16B167F4000
trusted library allocation
page read and write
16B11EE9000
heap
page read and write
16B17E59000
trusted library allocation
page read and write
16B1C62E000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B167FC000
trusted library allocation
page read and write
16B15C72000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B156DA000
trusted library allocation
page read and write
16B15619000
trusted library allocation
page read and write
16B0B604000
heap
page read and write
16B0B614000
heap
page read and write
1A57DCB0000
heap
page read and write
16B0B5CD000
heap
page read and write
16B0B63F000
heap
page read and write
16B1E4E3000
trusted library allocation
page read and write
16B0B5D7000
heap
page read and write
16B0B647000
heap
page read and write
16B159EA000
trusted library allocation
page read and write
1C30017E000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B15636000
trusted library allocation
page read and write
16B1C7DD000
trusted library allocation
page read and write
16B2077E000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B5D6000
heap
page read and write
16B15C94000
trusted library allocation
page read and write
2534718A000
heap
page read and write
16B0B64B000
heap
page read and write
16B0B614000
heap
page read and write
16B11789000
trusted library allocation
page read and write
121A6049000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1176D000
trusted library allocation
page read and write
16B15AF4000
trusted library allocation
page read and write
16B1FA6E000
trusted library allocation
page read and write
16B170A9000
trusted library allocation
page read and write
25347229000
heap
page read and write
16B16DD0000
trusted library allocation
page read and write
16B20930000
trusted library allocation
page read and write
16B1674B000
trusted library allocation
page read and write
16B1FA87000
trusted library allocation
page read and write
16B11EB1000
heap
page read and write
16B1C483000
trusted library allocation
page read and write
16B1E524000
trusted library allocation
page read and write
16B14133000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
6C0000
heap
page read and write
16B0B614000
heap
page read and write
16B0B63F000
heap
page read and write
16B0B60D000
heap
page read and write
16B15CCB000
trusted library allocation
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
14AD000
stack
page read and write
16B0B63E000
heap
page read and write
16B11E54000
heap
page read and write
16B0B5F3000
heap
page read and write
16B0B652000
heap
page read and write
16B14163000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B1E5FE000
trusted library allocation
page read and write
16B14172000
trusted library allocation
page read and write
16B146BE000
trusted library allocation
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B1C68C000
trusted library allocation
page read and write
16B1183A000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B15574000
trusted library allocation
page read and write
16B20180000
trusted library allocation
page read and write
16B0B60D000
heap
page read and write
16B1FA64000
trusted library allocation
page read and write
16B155C3000
trusted library allocation
page read and write
16B141FE000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B10934000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B148C8000
trusted library allocation
page read and write
16B1C7A6000
trusted library allocation
page read and write
121A5CEA000
heap
page read and write
16B1672B000
trusted library allocation
page read and write
25347269000
heap
page read and write
16B15CA7000
trusted library allocation
page read and write
16B1E4C6000
trusted library allocation
page read and write
16B1CA5E000
trusted library allocation
page read and write
16B16769000
trusted library allocation
page read and write
16B16FD2000
trusted library allocation
page read and write
16B117AA000
trusted library allocation
page read and write
16B15CF3000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1C89F000
trusted library allocation
page read and write
16B1C8C3000
trusted library allocation
page read and write
16B170FE000
trusted library allocation
page read and write
16B1FFDA000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B0B5E5000
heap
page read and write
16B1E4A4000
trusted library allocation
page read and write
121A6024000
trusted library allocation
page read and write
16B1C7E9000
trusted library allocation
page read and write
16B17A82000
trusted library allocation
page read and write
16B1C8B5000
trusted library allocation
page read and write
16B14E76000
trusted library allocation
page read and write
253471E8000
heap
page read and write
16B0B5FA000
heap
page read and write
16B15571000
trusted library allocation
page read and write
16B1FAF1000
trusted library allocation
page read and write
16B17E83000
trusted library allocation
page read and write
16B1ECD2000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B115AA000
trusted library allocation
page read and write
16B0B5FF000
heap
page read and write
16B155AC000
trusted library allocation
page read and write
1C37FFE0000
heap
page read and write
16B159F6000
trusted library allocation
page read and write
16B15596000
trusted library allocation
page read and write
16B155A7000
trusted library allocation
page read and write
16B1C8B8000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B660000
heap
page read and write
16B1CAC9000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B1599B000
trusted library allocation
page read and write
16B141B8000
trusted library allocation
page read and write
16B17E60000
trusted library allocation
page read and write
16B0B64A000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1C8C0000
trusted library allocation
page read and write
16B155BB000
trusted library allocation
page read and write
16B15CAF000
trusted library allocation
page read and write
16B1CAF5000
trusted library allocation
page read and write
16B14E42000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1E488000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1C984000
trusted library allocation
page read and write
16B16F50000
trusted library allocation
page read and write
16B1F7D3000
trusted library allocation
page read and write
16B11763000
trusted library allocation
page read and write
7C0000
unkown
page write copy
16B0B60F000
heap
page read and write
16B2096F000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B64D000
heap
page read and write
16B0B647000
heap
page read and write
16B209E3000
trusted library allocation
page read and write
16B15763000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B609000
heap
page read and write
16B0B614000
heap
page read and write
16B11C87000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1CA97000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B170A5000
trusted library allocation
page read and write
16B156DE000
trusted library allocation
page read and write
16B1E477000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B1478E000
trusted library allocation
page read and write
16B15CA7000
trusted library allocation
page read and write
16B2070B000
trusted library allocation
page read and write
16B1C6F4000
trusted library allocation
page read and write
16B0B5EF000
heap
page read and write
16B1C843000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B1C4DD000
trusted library allocation
page read and write
16B1C516000
trusted library allocation
page read and write
16B14796000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1F057000
trusted library allocation
page read and write
16B115BB000
trusted library allocation
page read and write
16B1CA58000
trusted library allocation
page read and write
16B15616000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1E454000
trusted library allocation
page read and write
16B1F7EE000
trusted library allocation
page read and write
2399F190000
heap
page read and write
16B1C6B0000
trusted library allocation
page read and write
25347160000
heap
page read and write
16B0B614000
heap
page read and write
BA4D7FE000
stack
page read and write
16B15963000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1FA4E000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B14788000
trusted library allocation
page read and write
16B1C9D5000
trusted library allocation
page read and write
16B1C9F4000
trusted library allocation
page read and write
16B157FC000
trusted library allocation
page read and write
16B1467E000
trusted library allocation
page read and write
16B15579000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B20D2F000
trusted library allocation
page read and write
16B1E47E000
trusted library allocation
page read and write
6F1000
unkown
page execute read
16B145A5000
trusted library allocation
page read and write
16B156DE000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B159D1000
trusted library allocation
page read and write
1C30017B000
trusted library allocation
page read and write
16B1C99A000
trusted library allocation
page read and write
121A5D6F000
unclassified section
page read and write
16B1173E000
trusted library allocation
page read and write
16B1FA7D000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B17ED8000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B14E57000
trusted library allocation
page read and write
16B14588000
trusted library allocation
page read and write
25346AE0000
heap
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B11EAD000
heap
page read and write
16B15CCB000
trusted library allocation
page read and write
16B17EBA000
trusted library allocation
page read and write
9C943FF000
stack
page read and write
16B1FF4C000
trusted library allocation
page read and write
16B155F2000
trusted library allocation
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B117C4000
trusted library allocation
page read and write
16B1C8BA000
trusted library allocation
page read and write
16B1FDCF000
trusted library allocation
page read and write
7BC000
unkown
page read and write
16B0B60F000
heap
page read and write
16B159EA000
trusted library allocation
page read and write
16B1CA8A000
trusted library allocation
page read and write
16B16460000
trusted library allocation
page read and write
16B1159E000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B0B657000
heap
page read and write
16B0B5FD000
heap
page read and write
16B15DFD000
trusted library allocation
page read and write
16B209E3000
trusted library allocation
page read and write
16B0B638000
heap
page read and write
16B0B5D8000
heap
page read and write
16B17A93000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B200C8000
trusted library allocation
page read and write
16B1C9D5000
trusted library allocation
page read and write
16B0FF81000
trusted library allocation
page read and write
16B14163000
trusted library allocation
page read and write
16B105F6000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
121A6100000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1C6F8000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
16B0B5F4000
heap
page read and write
16B117FD000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5F9000
heap
page read and write
16B0B63F000
heap
page read and write
16B0B61B000
heap
page read and write
16B1FA5D000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B0B5FE000
heap
page read and write
16B0B5FA000
heap
page read and write
16B1FAD1000
trusted library allocation
page read and write
16B1410F000
trusted library allocation
page read and write
16B16F92000
trusted library allocation
page read and write
2534717D000
heap
page read and write
16B0B640000
heap
page read and write
16B1801E000
trusted library allocation
page read and write
16B148D9000
trusted library allocation
page read and write
584000
heap
page read and write
253465E9000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
2CE87FE000
stack
page read and write
16B1C7D5000
trusted library allocation
page read and write
16B1CA8C000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
16B0B637000
heap
page read and write
16B14856000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
25346630000
trusted library allocation
page read and write
16B200AC000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B14E39000
trusted library allocation
page read and write
16B1E4A0000
trusted library allocation
page read and write
2534659D000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B16FE8000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
16B1CA9B000
trusted library allocation
page read and write
16B20F45000
heap
page read and write
16B11EC6000
heap
page read and write
16B1F006000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B5E5000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B614000
heap
page read and write
16B0B63F000
heap
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B604000
heap
page read and write
9C93BFE000
stack
page read and write
16B1C4E6000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
253462D0000
heap
page read and write
16B1F001000
trusted library allocation
page read and write
16B11774000
trusted library allocation
page read and write
16B156DC000
trusted library allocation
page read and write
16B14663000
trusted library allocation
page read and write
25346380000
unclassified section
page read and write
16B0B5EE000
heap
page read and write
16B16DA1000
trusted library allocation
page read and write
16B1E5D9000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B1CAD9000
trusted library allocation
page read and write
16B0B61B000
heap
page read and write
9C933FF000
stack
page read and write
25346629000
unkown
page execute read
16B11EA9000
heap
page read and write
16B1CA85000
trusted library allocation
page read and write
25347258000
heap
page read and write
16B1CADF000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
7B2000
unkown
page readonly
16B1E4CE000
trusted library allocation
page read and write
16B1459E000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B11E6E000
heap
page read and write
16B20006000
trusted library allocation
page read and write
16B11EAD000
heap
page read and write
16B15C4E000
trusted library allocation
page read and write
16B1C8C2000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B15C42000
trusted library allocation
page read and write
16B147D7000
trusted library allocation
page read and write
16B20977000
trusted library allocation
page read and write
16B14E39000
trusted library allocation
page read and write
16B159C3000
trusted library allocation
page read and write
16B1F7BD000
trusted library allocation
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B5E0000
heap
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B63F000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B637000
heap
page read and write
16B1C8C5000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B17B57000
trusted library allocation
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B109B5000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1598B000
trusted library allocation
page read and write
16B1EBCB000
trusted library allocation
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B15CC2000
trusted library allocation
page read and write
16B16FFE000
trusted library allocation
page read and write
16B1C53A000
trusted library allocation
page read and write
16B1FA3E000
trusted library allocation
page read and write
16B209DF000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B1FA93000
trusted library allocation
page read and write
88B87E000
stack
page read and write
16B0B614000
heap
page read and write
16B0B651000
heap
page read and write
16B0B64E000
heap
page read and write
16B15C22000
trusted library allocation
page read and write
16B1648A000
trusted library allocation
page read and write
16B1E4C7000
trusted library allocation
page read and write
16B167F2000
trusted library allocation
page read and write
16B159E3000
trusted library allocation
page read and write
16B16B63000
trusted library allocation
page read and write
16B0B5E4000
heap
page read and write
16B20F01000
heap
page read and write
1C30021C000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
3905B3024000
trusted library allocation
page read and write
16B15CCE000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
BA4BCBB000
stack
page read and write
16B0B657000
heap
page read and write
16B17A5E000
trusted library allocation
page read and write
16B1FA93000
trusted library allocation
page read and write
16B14763000
trusted library allocation
page read and write
16B0B632000
heap
page read and write
16B0B614000
heap
page read and write
16B17A32000
trusted library allocation
page read and write
16B1FAF0000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B148FC000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B159A8000
trusted library allocation
page read and write
16B1C4D0000
trusted library allocation
page read and write
16B0B5E6000
heap
page read and write
16B145CE000
trusted library allocation
page read and write
16B209E5000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B0B5F3000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B606000
heap
page read and write
16B159CF000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B20977000
trusted library allocation
page read and write
16B17E36000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B1E474000
trusted library allocation
page read and write
16B2077E000
trusted library allocation
page read and write
16B115BB000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5D8000
heap
page read and write
16B0B5FE000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1CAA1000
trusted library allocation
page read and write
25347169000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1FAF5000
trusted library allocation
page read and write
6A0000
heap
page read and write
16B164AA000
trusted library allocation
page read and write
121A5EB3000
heap
page read and write
16B0B603000
heap
page read and write
16B20AC7000
trusted library allocation
page read and write
16B1CAE8000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
16B167C7000
trusted library allocation
page read and write
16B15CCE000
trusted library allocation
page read and write
16B15924000
trusted library allocation
page read and write
16B1482F000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B1CA88000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1CAB7000
trusted library allocation
page read and write
16B0B64B000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B608000
heap
page read and write
16B0B5DD000
heap
page read and write
16B117B3000
trusted library allocation
page read and write
16B1EBD3000
trusted library allocation
page read and write
16B11CF4000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B64F000
heap
page read and write
16B17A2D000
trusted library allocation
page read and write
16B20F36000
heap
page read and write
16B155FA000
trusted library allocation
page read and write
16B1C69F000
trusted library allocation
page read and write
16B159B5000
trusted library allocation
page read and write
16B117AA000
trusted library allocation
page read and write
1C37FEA0000
heap
page read and write
16B0B655000
heap
page read and write
16B1CA85000
trusted library allocation
page read and write
16B1506D000
trusted library allocation
page read and write
16B141D5000
trusted library allocation
page read and write
16B1176F000
trusted library allocation
page read and write
16B1061E000
trusted library allocation
page read and write
16B1E488000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B5D8000
heap
page read and write
16B0B644000
heap
page read and write
16B16D9C000
trusted library allocation
page read and write
16B1F02C000
trusted library allocation
page read and write
16B16FB4000
trusted library allocation
page read and write
16B1E4C6000
trusted library allocation
page read and write
16B15E23000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1FAD5000
trusted library allocation
page read and write
16B20971000
trusted library allocation
page read and write
3501000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1458E000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1EC9B000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B11EC6000
heap
page read and write
16B0B607000
heap
page read and write
16B1C640000
trusted library allocation
page read and write
16B159E7000
trusted library allocation
page read and write
16B146A4000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B1469C000
trusted library allocation
page read and write
16B18063000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B5FE000
heap
page read and write
16B1C8B8000
trusted library allocation
page read and write
16B1E56E000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B15586000
trusted library allocation
page read and write
16B20AC9000
trusted library allocation
page read and write
16B16D92000
trusted library allocation
page read and write
16B15584000
trusted library allocation
page read and write
16B159B0000
trusted library allocation
page read and write
16B17ECB000
trusted library allocation
page read and write
16B0B5F8000
heap
page read and write
2534655F000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B16737000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B1C6E6000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B1FA5A000
trusted library allocation
page read and write
16B0B5E2000
heap
page read and write
16B11792000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B15EEF000
trusted library allocation
page read and write
1C37FD80000
unclassified section
page readonly
16B0B60F000
heap
page read and write
16B1C9A3000
trusted library allocation
page read and write
16B1FA6A000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B1FA5A000
trusted library allocation
page read and write
16B1E47E000
trusted library allocation
page read and write
16B20D84000
trusted library allocation
page read and write
16B1C6D6000
trusted library allocation
page read and write
25347267000
heap
page read and write
16B17B4F000
trusted library allocation
page read and write
16B11EB6000
heap
page read and write
16B1C6FA000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B63F000
heap
page read and write
BA4BDFE000
unkown
page readonly
16B0FFA8000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B609000
heap
page read and write
16B1F7D3000
trusted library allocation
page read and write
25347229000
heap
page read and write
16B1509D000
trusted library allocation
page read and write
16B1F73E000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B159F6000
trusted library allocation
page read and write
25346400000
trusted library allocation
page read and write
2399F300000
trusted library allocation
page read and write
16B16F92000
trusted library allocation
page read and write
16B155C3000
trusted library allocation
page read and write
253471A1000
heap
page read and write
16B1564A000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B0B614000
heap
page read and write
16B159D9000
trusted library allocation
page read and write
25347200000
heap
page read and write
16B16472000
trusted library allocation
page read and write
121A6068000
trusted library allocation
page read and write
16B20AAE000
trusted library allocation
page read and write
16B1C4F5000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B14E33000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B608000
heap
page read and write
2534722B000
heap
page read and write
16B1FA75000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16CC1000
trusted library allocation
page read and write
16B1E45F000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B1C6F0000
trusted library allocation
page read and write
25346503000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B117C4000
trusted library allocation
page read and write
16B14890000
trusted library allocation
page read and write
16B1561A000
trusted library allocation
page read and write
9C913FF000
stack
page read and write
16B11C63000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5FB000
heap
page read and write
16B17E62000
trusted library allocation
page read and write
16B15DE2000
trusted library allocation
page read and write
16B16B05000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B0B5FE000
heap
page read and write
121A6013000
trusted library allocation
page read and write
16B207B5000
trusted library allocation
page read and write
1C300167000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
253471F2000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1CAF9000
trusted library allocation
page read and write
CD0000
heap
page read and write
16B1C72E000
trusted library allocation
page read and write
121A6203000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B14805000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B657000
heap
page read and write
16B1C4D9000
trusted library allocation
page read and write
25347259000
heap
page read and write
16B1C7DF000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
16B1C939000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B146B8000
trusted library allocation
page read and write
16B117FC000
trusted library allocation
page read and write
16B1C68C000
trusted library allocation
page read and write
2399F087000
heap
page read and write
16B15EF6000
trusted library allocation
page read and write
16B15CEA000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1456C000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B603000
heap
page read and write
16B1F782000
trusted library allocation
page read and write
16B1FAEB000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
253471F0000
heap
page read and write
16B15C1F000
trusted library allocation
page read and write
25347267000
heap
page read and write
16B155EC000
trusted library allocation
page read and write
16B18102000
trusted library allocation
page read and write
16B1CA88000
trusted library allocation
page read and write
16B1171B000
trusted library allocation
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B17EE4000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B14546000
trusted library allocation
page read and write
16B15CD7000
trusted library allocation
page read and write
16B15C94000
trusted library allocation
page read and write
1A57DE0F000
heap
page read and write
16B16F50000
trusted library allocation
page read and write
16B1CA83000
trusted library allocation
page read and write
16B0B64B000
heap
page read and write
16B15C1F000
trusted library allocation
page read and write
16B1052F000
trusted library allocation
page read and write
16B17B77000
trusted library allocation
page read and write
16B0FFC3000
trusted library allocation
page read and write
16B1C977000
trusted library allocation
page read and write
16B11779000
trusted library allocation
page read and write
2CE6D8C000
stack
page read and write
16B146E9000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
1C300112000
trusted library allocation
page read and write
16B1FA71000
trusted library allocation
page read and write
1D6A34C1000
trusted library allocation
page execute read
16B148F5000
trusted library allocation
page read and write
16B159C8000
trusted library allocation
page read and write
16B1C925000
trusted library allocation
page read and write
16B17BEF000
trusted library allocation
page read and write
16B0B64F000
heap
page read and write
16B1458B000
trusted library allocation
page read and write
16B1C6C4000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B15DDD000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B16DA1000
trusted library allocation
page read and write
121A6200000
trusted library allocation
page read and write
16B1C7FB000
trusted library allocation
page read and write
16B1C9FC000
trusted library allocation
page read and write
16B11EB1000
heap
page read and write
16B1568B000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
1C37FEB0000
heap
page read and write
16B16760000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
25347267000
heap
page read and write
16B17BE7000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B15ED3000
trusted library allocation
page read and write
16B1FA5F000
trusted library allocation
page read and write
16B1457C000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B15DE7000
trusted library allocation
page read and write
16B1459E000
trusted library allocation
page read and write
16B16CF6000
trusted library allocation
page read and write
16B1C69F000
trusted library allocation
page read and write
121A5D50000
heap
page readonly
16B1CA8A000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B11EA2000
heap
page read and write
16B15CEA000
trusted library allocation
page read and write
2CE907B000
stack
page read and write
16B15CD7000
trusted library allocation
page read and write
16B106F0000
trusted library allocation
page read and write
16B167C5000
trusted library allocation
page read and write
16B1E4E8000
trusted library allocation
page read and write
16B0B616000
heap
page read and write
16B16C98000
trusted library allocation
page read and write
16B17BC5000
trusted library allocation
page read and write
2399F1C0000
heap
page read and write
16B1176F000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1C62B000
trusted library allocation
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B1FA20000
trusted library allocation
page read and write
16B0B64D000
heap
page read and write
16B164F3000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B0B5DD000
heap
page read and write
16B16FD2000
trusted library allocation
page read and write
16B0FFEF000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B16758000
trusted library allocation
page read and write
16B20935000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B167C5000
trusted library allocation
page read and write
16B1FA71000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1EBDA000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B15DD4000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1C9D3000
trusted library allocation
page read and write
16B115D1000
trusted library allocation
page read and write
16B154D0000
trusted library allocation
page read and write
16B0B605000
heap
page read and write
16B11E6A000
heap
page read and write
16B0B5FA000
heap
page read and write
16B1C7E9000
trusted library allocation
page read and write
16B15599000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B641000
heap
page read and write
16B20A57000
trusted library allocation
page read and write
16B141B7000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1C7E1000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B0B609000
heap
page read and write
16B0B5E5000
heap
page read and write
16B0B603000
heap
page read and write
121A5F00000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1C74C000
trusted library allocation
page read and write
16B159A8000
trusted library allocation
page read and write
16B17A8E000
trusted library allocation
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B1479E000
trusted library allocation
page read and write
16B15497000
trusted library allocation
page read and write
16B167C7000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1FA07000
trusted library allocation
page read and write
BA4BCFE000
unkown
page readonly
16B14E40000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B649000
heap
page read and write
16B1066A000
trusted library allocation
page read and write
16B16F68000
trusted library allocation
page read and write
16B1C6FB000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B5E3000
heap
page read and write
16B20AC7000
trusted library allocation
page read and write
1D6A3431000
trusted library allocation
page execute read
16B1808F000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1C8BA000
trusted library allocation
page read and write
16B1804C000
trusted library allocation
page read and write
16B15576000
trusted library allocation
page read and write
16B1E491000
trusted library allocation
page read and write
16B16F57000
trusted library allocation
page read and write
16B159A8000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B15564000
trusted library allocation
page read and write
16B0B645000
heap
page read and write
16B0B64A000
heap
page read and write
16B150F9000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B159B0000
trusted library allocation
page read and write
253463D0000
heap
page read and write
16B14E51000
trusted library allocation
page read and write
16B1C9F2000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
CB0000
heap
page read and write
16B15E43000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B1C88C000
trusted library allocation
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
78C000
unkown
page readonly
16B1FA6A000
trusted library allocation
page read and write
16B1C8EF000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B14EF9000
trusted library allocation
page read and write
16B15EF8000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B10963000
trusted library allocation
page read and write
16B1CD00000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5CC000
heap
page read and write
16B0B5D7000
heap
page read and write
16B0B651000
heap
page read and write
121A60B1000
trusted library allocation
page read and write
16B17B5C000
trusted library allocation
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B15C42000
trusted library allocation
page read and write
121A5B90000
unclassified section
page readonly
16B0B5DD000
heap
page read and write
16B165CC000
trusted library allocation
page read and write
16B1C9FC000
trusted library allocation
page read and write
BA4C7D8000
stack
page read and write
16B20F99000
heap
page read and write
16B14688000
trusted library allocation
page read and write
16B14EC8000
trusted library allocation
page read and write
16B170A5000
trusted library allocation
page read and write
16B14E89000
trusted library allocation
page read and write
16B1FAAD000
trusted library allocation
page read and write
16B1C6FC000
trusted library allocation
page read and write
16B0B60A000
heap
page read and write
16B0B62F000
heap
page read and write
1C300203000
trusted library allocation
page read and write
16B15DF7000
trusted library allocation
page read and write
16B146DB000
trusted library allocation
page read and write
16B164A0000
trusted library allocation
page read and write
16B15997000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B60C000
heap
page read and write
16B1FA20000
trusted library allocation
page read and write
16B0B60C000
heap
page read and write
16B15596000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
2534722B000
heap
page read and write
16B1599C000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B17BFA000
trusted library allocation
page read and write
16B1C8AB000
trusted library allocation
page read and write
CE1000
heap
page read and write
16B1FF61000
trusted library allocation
page read and write
16B1C9B6000
trusted library allocation
page read and write
16B1559D000
trusted library allocation
page read and write
16B15C32000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B5E3000
heap
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B14180000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1FA2A000
trusted library allocation
page read and write
1C37FF60000
unclassified section
page read and write
16B0B5FE000
heap
page read and write
16B16773000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B14831000
trusted library allocation
page read and write
16B15C9C000
trusted library allocation
page read and write
16B0B653000
heap
page read and write
16B15ACF000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B5EE000
heap
page read and write
16B15CA5000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B15CFC000
trusted library allocation
page read and write
16B16729000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B17A40000
trusted library allocation
page read and write
16B148EE000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1FA5F000
trusted library allocation
page read and write
16B146BF000
trusted library allocation
page read and write
16B1454F000
trusted library allocation
page read and write
16B17EE4000
trusted library allocation
page read and write
16B20D9E000
trusted library allocation
page read and write
16B147A0000
trusted library allocation
page read and write
16B1CAF7000
trusted library allocation
page read and write
16B148CF000
trusted library allocation
page read and write
25347000000
trusted library allocation
page read and write
16B17ADA000
trusted library allocation
page read and write
16B1E45C000
trusted library allocation
page read and write
16B1C73D000
trusted library allocation
page read and write
16B15CAD000
trusted library allocation
page read and write
1C37FF6F000
unclassified section
page read and write
16B1672D000
trusted library allocation
page read and write
16B1F02E000
trusted library allocation
page read and write
16B1C9CA000
trusted library allocation
page read and write
16B16493000
trusted library allocation
page read and write
16B1C492000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
580000
heap
page read and write
16B17E5D000
trusted library allocation
page read and write
16B1EEA2000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1F791000
trusted library allocation
page read and write
16B1E42B000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
253465F3000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B641000
heap
page read and write
16B1C8A2000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5DF000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B159D1000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B652000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B16BF4000
trusted library allocation
page read and write
2CE77D8000
stack
page read and write
16B20B41000
trusted library allocation
page read and write
16B1C9F0000
trusted library allocation
page read and write
16B1C9EE000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1545B000
trusted library allocation
page read and write
16B148EE000
trusted library allocation
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B159BA000
trusted library allocation
page read and write
16B1CABE000
trusted library allocation
page read and write
16B1CAD9000
trusted library allocation
page read and write
1C37FFE6000
heap
page read and write
16B15DA3000
trusted library allocation
page read and write
16B14E88000
trusted library allocation
page read and write
16B17BF6000
trusted library allocation
page read and write
16B1FAFA000
trusted library allocation
page read and write
2CEA17E000
unkown
page readonly
16B1E4A8000
trusted library allocation
page read and write
16B15DFD000
trusted library allocation
page read and write
121A5CC0000
heap
page read and write
16B15CF9000
trusted library allocation
page read and write
16B11789000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B17B75000
trusted library allocation
page read and write
16B1567D000
trusted library allocation
page read and write
16B1C8A8000
trusted library allocation
page read and write
16B1E49F000
trusted library allocation
page read and write
16B15678000
trusted library allocation
page read and write
16B16DD8000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B60D000
heap
page read and write
16B0B614000
heap
page read and write
1C30016E000
trusted library allocation
page read and write
25346510000
trusted library allocation
page read and write
16B1CAB4000
trusted library allocation
page read and write
16B14E84000
trusted library allocation
page read and write
16B1176D000
trusted library allocation
page read and write
16B141FE000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B14E8F000
trusted library allocation
page read and write
16B1FAD1000
trusted library allocation
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B5E5000
heap
page read and write
16B0B5FE000
heap
page read and write
16B0B60A000
heap
page read and write
16B1C8AB000
trusted library allocation
page read and write
16B159B0000
trusted library allocation
page read and write
16B159DB000
trusted library allocation
page read and write
16B159D1000
trusted library allocation
page read and write
25346620000
unkown
page execute read
16B155CF000
trusted library allocation
page read and write
16B17EBC000
trusted library allocation
page read and write
16B1C996000
trusted library allocation
page read and write
16B115A9000
trusted library allocation
page read and write
16B16472000
trusted library allocation
page read and write
16B146AB000
trusted library allocation
page read and write
16B16764000
trusted library allocation
page read and write
16B209ED000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B167C7000
trusted library allocation
page read and write
25347160000
heap
page read and write
BBB000
stack
page read and write
16B0B647000
heap
page read and write
16B17EDF000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1FA3E000
trusted library allocation
page read and write
16B11EA2000
heap
page read and write
16B141DB000
trusted library allocation
page read and write
16B20FB8000
heap
page read and write
16B1FA77000
trusted library allocation
page read and write
1C300114000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B209E7000
trusted library allocation
page read and write
16B15ED3000
trusted library allocation
page read and write
16B1CA9D000
trusted library allocation
page read and write
2399F0A2000
heap
page read and write
16B0B63F000
heap
page read and write
16B1479E000
trusted library allocation
page read and write
16B15EFE000
trusted library allocation
page read and write
16B1FA4E000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1C7E1000
trusted library allocation
page read and write
16B1F7F7000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1599F000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1FD2B000
trusted library allocation
page read and write
16B1C9E4000
trusted library allocation
page read and write
16B15CCE000
trusted library allocation
page read and write
C44000
heap
page read and write
25347221000
heap
page read and write
16B1599E000
trusted library allocation
page read and write
16B16DB4000
trusted library allocation
page read and write
16B2097B000
trusted library allocation
page read and write
16B1E48F000
trusted library allocation
page read and write
16B20F45000
heap
page read and write
16B1C9EE000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1C695000
trusted library allocation
page read and write
16B15CD7000
trusted library allocation
page read and write
16B0B650000
heap
page read and write
16B0B5FA000
heap
page read and write
16B17BBB000
trusted library allocation
page read and write
16B0B637000
heap
page read and write
16B15CC5000
trusted library allocation
page read and write
16B0B5F1000
heap
page read and write
121A6030000
trusted library allocation
page read and write
16B1E48F000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1C7D5000
trusted library allocation
page read and write
16B200AC000
trusted library allocation
page read and write
16B106C0000
trusted library allocation
page read and write
16B1CA36000
trusted library allocation
page read and write
16B148C6000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B17E7C000
trusted library allocation
page read and write
16B101F8000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B20F6B000
heap
page read and write
16B15673000
trusted library allocation
page read and write
16B1EBCB000
trusted library allocation
page read and write
16B1F7EC000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1481C000
trusted library allocation
page read and write
16B1154B000
trusted library allocation
page read and write
2534723B000
heap
page read and write
16B159B3000
trusted library allocation
page read and write
16B146B2000
trusted library allocation
page read and write
16B0B5E0000
heap
page read and write
16B0B5E5000
heap
page read and write
25346548000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B15C29000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1CA97000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B14680000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B62F000
heap
page read and write
16B159B2000
trusted library allocation
page read and write
16B159D1000
trusted library allocation
page read and write
16B148FB000
trusted library allocation
page read and write
2CEA9FE000
stack
page read and write
16B1E41B000
trusted library allocation
page read and write
16B1FAB8000
trusted library allocation
page read and write
16B170C7000
trusted library allocation
page read and write
16B16CA1000
trusted library allocation
page read and write
16B14872000
trusted library allocation
page read and write
16B1C6AD000
trusted library allocation
page read and write
16B115B4000
trusted library allocation
page read and write
16B16447000
trusted library allocation
page read and write
16B14E55000
trusted library allocation
page read and write
16B0B5C6000
heap
page read and write
16B20913000
trusted library allocation
page read and write
121A5D60000
unclassified section
page read and write
16B1FA75000
trusted library allocation
page read and write
16B1069C000
trusted library allocation
page read and write
16B0B64A000
heap
page read and write
16B11E6A000
heap
page read and write
16B1EBF4000
trusted library allocation
page read and write
239A0BD8000
heap
page read and write
16B14647000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1FAEB000
trusted library allocation
page read and write
16B15C9C000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B16F5C000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
16B16773000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B16CC1000
trusted library allocation
page read and write
16B1FA80000
trusted library allocation
page read and write
16B1C6FB000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0FF98000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B0B5FE000
heap
page read and write
16B1577C000
trusted library allocation
page read and write
16B1176F000
trusted library allocation
page read and write
16B0B64F000
heap
page read and write
16B0B5E5000
heap
page read and write
16B0B647000
heap
page read and write
16B1F502000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5FF000
heap
page read and write
16B11ECB000
heap
page read and write
16B0B607000
heap
page read and write
16B15673000
trusted library allocation
page read and write
16B1FA9F000
trusted library allocation
page read and write
CE3000
heap
page read and write
16B0B650000
heap
page read and write
16B0B62F000
heap
page read and write
25347160000
heap
page read and write
16B0B655000
heap
page read and write
16B0B642000
heap
page read and write
16B1CA8C000
trusted library allocation
page read and write
16B14692000
trusted library allocation
page read and write
16B1E45F000
trusted library allocation
page read and write
16B1558F000
trusted library allocation
page read and write
16B170A1000
trusted library allocation
page read and write
16B0B5F1000
heap
page read and write
16B16739000
trusted library allocation
page read and write
16B15C1E000
trusted library allocation
page read and write
16B0B605000
heap
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B11EC6000
heap
page read and write
16B1C6C4000
trusted library allocation
page read and write
16B1E44B000
trusted library allocation
page read and write
16B0B5E9000
heap
page read and write
16B0B614000
heap
page read and write
16B0B62F000
heap
page read and write
16B14581000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B0B642000
heap
page read and write
16B15CC5000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1FDEA000
trusted library allocation
page read and write
16B14E35000
trusted library allocation
page read and write
16B1E4C6000
trusted library allocation
page read and write
16B1CAC0000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B642000
heap
page read and write
16B1EBB1000
trusted library allocation
page read and write
16B17E22000
trusted library allocation
page read and write
88A7FE000
stack
page read and write
16B18065000
trusted library allocation
page read and write
16B1FAC4000
trusted library allocation
page read and write
16B146DB000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1C9B0000
trusted library allocation
page read and write
3905B301E000
trusted library allocation
page read and write
16B14698000
trusted library allocation
page read and write
16B156E1000
trusted library allocation
page read and write
16B17EC1000
trusted library allocation
page read and write
16B16F70000
trusted library allocation
page read and write
16B17A40000
trusted library allocation
page read and write
16B20A3A000
trusted library allocation
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B159D1000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B1ECD2000
trusted library allocation
page read and write
16B1C8D2000
trusted library allocation
page read and write
16B1FA68000
trusted library allocation
page read and write
16B0B632000
heap
page read and write
16B0B5E3000
heap
page read and write
16B0B609000
heap
page read and write
121A607A000
trusted library allocation
page read and write
CDC000
heap
page read and write
16B11E56000
heap
page read and write
16B0B5EA000
heap
page read and write
16B200AC000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
25346500000
trusted library allocation
page read and write
16B11E6E000
heap
page read and write
16B0B5FE000
heap
page read and write
16B155EC000
trusted library allocation
page read and write
16B17A45000
trusted library allocation
page read and write
16B14890000
trusted library allocation
page read and write
16B15619000
trusted library allocation
page read and write
16B159FA000
trusted library allocation
page read and write
50D000
stack
page read and write
16B0B62F000
heap
page read and write
16B0B649000
heap
page read and write
16B1EFE4000
trusted library allocation
page read and write
16B1F7F1000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B1C49E000
trusted library allocation
page read and write
16B14587000
trusted library allocation
page read and write
16B1FA93000
trusted library allocation
page read and write
16B15C42000
trusted library allocation
page read and write
16B14577000
trusted library allocation
page read and write
253463E0000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B0B647000
heap
page read and write
16B0FFF7000
trusted library allocation
page read and write
16B15CA4000
trusted library allocation
page read and write
16B0B5F9000
heap
page read and write
16B11EC6000
heap
page read and write
16B145A5000
trusted library allocation
page read and write
16B15CC5000
trusted library allocation
page read and write
16B15993000
trusted library allocation
page read and write
253462FA000
heap
page read and write
16B11EA9000
heap
page read and write
16B1CAD5000
trusted library allocation
page read and write
16B115D3000
trusted library allocation
page read and write
121A5CA0000
heap
page read and write
16B0B654000
heap
page read and write
16B159A8000
trusted library allocation
page read and write
16B1C89A000
trusted library allocation
page read and write
16B20F01000
heap
page read and write
16B155EC000
trusted library allocation
page read and write
16B1FDFE000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B651000
heap
page read and write
16B146B8000
trusted library allocation
page read and write
16B11C91000
trusted library allocation
page read and write
16B159C6000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B0B64B000
heap
page read and write
16B146B2000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1C6D6000
trusted library allocation
page read and write
16B1FDFE000
trusted library allocation
page read and write
16B0B5F9000
heap
page read and write
16B0B5FE000
heap
page read and write
16B14300000
trusted library allocation
page read and write
16B1FAFE000
trusted library allocation
page read and write
16B15EC6000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B647000
heap
page read and write
16B1478E000
trusted library allocation
page read and write
16B1C965000
trusted library allocation
page read and write
16B14678000
trusted library allocation
page read and write
16B1648D000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B17E7F000
trusted library allocation
page read and write
CE0000
heap
page read and write
16B14844000
trusted library allocation
page read and write
16B1CAF7000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B0B608000
heap
page read and write
16B0B606000
heap
page read and write
16B0B5DD000
heap
page read and write
16B16FB4000
trusted library allocation
page read and write
16B20A3E000
trusted library allocation
page read and write
16B16785000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B1FA98000
trusted library allocation
page read and write
16B15CAB000
trusted library allocation
page read and write
253471E9000
heap
page read and write
16B16783000
trusted library allocation
page read and write
16B1FA12000
trusted library allocation
page read and write
16B1FA80000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1E44D000
trusted library allocation
page read and write
16B1E5F5000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B0B600000
heap
page read and write
121A5BB0000
heap
page read and write
16B14856000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
1C300315000
heap
page read and write
16B0B637000
heap
page read and write
16B11E6E000
heap
page read and write
2534715C000
heap
page read and write
16B1C889000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B0B64B000
heap
page read and write
1A57E000000
trusted library allocation
page read and write
16B1FF69000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B17B23000
trusted library allocation
page read and write
16B1559D000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B1C695000
trusted library allocation
page read and write
16B15C9C000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B1C4EB000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B159F6000
trusted library allocation
page read and write
16B207AF000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B644000
heap
page read and write
16B11EB1000
heap
page read and write
16B15630000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
1C3001EB000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B20A47000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
16B115CE000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B15DE7000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B1C9DA000
trusted library allocation
page read and write
16B1C4C1000
trusted library allocation
page read and write
16B17E75000
trusted library allocation
page read and write
25346512000
trusted library allocation
page read and write
16B14796000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B0B5EE000
heap
page read and write
16B200AF000
trusted library allocation
page read and write
16B16DF9000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B15678000
trusted library allocation
page read and write
16B20FE1000
heap
page read and write
16B1FA5F000
trusted library allocation
page read and write
16B15DC3000
trusted library allocation
page read and write
16B1F7DA000
trusted library allocation
page read and write
16B159CF000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B0B5F9000
heap
page read and write
45A000
stack
page read and write
25347169000
heap
page read and write
16B0B5FE000
heap
page read and write
88C07E000
unkown
page readonly
16B159C3000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B11545000
trusted library allocation
page read and write
16B1C99D000
trusted library allocation
page read and write
253471B9000
heap
page read and write
16B1091F000
trusted library allocation
page read and write
16B1FABD000
trusted library allocation
page read and write
16B1FA50000
trusted library allocation
page read and write
16B1FA7E000
trusted library allocation
page read and write
16B14E84000
trusted library allocation
page read and write
16B1466F000
trusted library allocation
page read and write
16B155C0000
trusted library allocation
page read and write
16B1FA66000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B15DD4000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1CABC000
trusted library allocation
page read and write
16B1597B000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B63F000
heap
page read and write
16B0B646000
heap
page read and write
16B0B684000
heap
page read and write
16B159B3000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5D1000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B647000
heap
page read and write
16B1C4FB000
trusted library allocation
page read and write
16B17A93000
trusted library allocation
page read and write
25347267000
heap
page read and write
16B0B650000
heap
page read and write
16B1E495000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B0B5F4000
heap
page read and write
16B117A8000
trusted library allocation
page read and write
16B0B654000
heap
page read and write
16B14E2A000
trusted library allocation
page read and write
CD3000
heap
page read and write
16B0B5FA000
heap
page read and write
253462F0000
heap
page read and write
16B0B60F000
heap
page read and write
16B0B657000
heap
page read and write
16B0B62F000
heap
page read and write
16B1C9EE000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1CAB4000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B16F6C000
trusted library allocation
page read and write
16B1C6CA000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1C93B000
trusted library allocation
page read and write
16B0B5F9000
heap
page read and write
16B0B614000
heap
page read and write
16B0B5D8000
heap
page read and write
16B117FC000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1176F000
trusted library allocation
page read and write
16B16F68000
trusted library allocation
page read and write
16B1C8BB000
trusted library allocation
page read and write
16B1C735000
trusted library allocation
page read and write
16B148D9000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B1C4A8000
trusted library allocation
page read and write
16B1465A000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B15EDD000
trusted library allocation
page read and write
16B1FA3E000
trusted library allocation
page read and write
16B1506B000
trusted library allocation
page read and write
16B1676C000
trusted library allocation
page read and write
16B207D8000
trusted library allocation
page read and write
16B14796000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B167F2000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
888D8D000
stack
page read and write
16B0B603000
heap
page read and write
16B0B63F000
heap
page read and write
121A60DB000
trusted library allocation
page read and write
16B16498000
trusted library allocation
page read and write
16B106FB000
trusted library allocation
page read and write
121A5CE0000
heap
page read and write
16B1067E000
trusted library allocation
page read and write
16B16FFE000
trusted library allocation
page read and write
16B10700000
trusted library allocation
page read and write
16B1CAA7000
trusted library allocation
page read and write
8897D8000
stack
page read and write
16B0B652000
heap
page read and write
16B1ECE2000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B146A4000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B1E47E000
trusted library allocation
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B15619000
trusted library allocation
page read and write
2399F415000
heap
page read and write
16B159B5000
trusted library allocation
page read and write
16B1ECE2000
trusted library allocation
page read and write
16B1CA99000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1FA71000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B1EFAC000
trusted library allocation
page read and write
16B11EC6000
heap
page read and write
16B1E47E000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B0B60D000
heap
page read and write
16B1C6B0000
trusted library allocation
page read and write
16B1C4E2000
trusted library allocation
page read and write
25347244000
heap
page read and write
16B16DE1000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B155F0000
trusted library allocation
page read and write
16B0B5E0000
heap
page read and write
16B0B5DF000
heap
page read and write
16B0B5F6000
heap
page read and write
16B180FC000
trusted library allocation
page read and write
16B165F2000
trusted library allocation
page read and write
16B1E545000
trusted library allocation
page read and write
16B11ECC000
heap
page read and write
16B0B641000
heap
page read and write
C40000
heap
page read and write
16B0B650000
heap
page read and write
16B1E49F000
trusted library allocation
page read and write
16B1C9D3000
trusted library allocation
page read and write
16B1C96F000
trusted library allocation
page read and write
16B1E46F000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B1562B000
trusted library allocation
page read and write
16B16D92000
trusted library allocation
page read and write
16B15C92000
trusted library allocation
page read and write
1C300123000
trusted library allocation
page read and write
16B1C477000
trusted library allocation
page read and write
16B16495000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
16B146C4000
trusted library allocation
page read and write
16B147A2000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B11E6A000
heap
page read and write
584000
heap
page read and write
88B07E000
unkown
page readonly
16B0B5FE000
heap
page read and write
16B0B608000
heap
page read and write
16B15CD1000
trusted library allocation
page read and write
16B0B5F2000
heap
page read and write
16B1C73A000
trusted library allocation
page read and write
16B0B5FC000
heap
page read and write
16B11C8A000
trusted library allocation
page read and write
16B0B654000
heap
page read and write
16B207AD000
trusted library allocation
page read and write
25346130000
unclassified section
page readonly
16B17BE7000
trusted library allocation
page read and write
16B0B5EF000
heap
page read and write
16B1CAA4000
trusted library allocation
page read and write
16B1C9B0000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B62F000
heap
page read and write
16B115CE000
trusted library allocation
page read and write
16B1CA32000
trusted library allocation
page read and write
253471A8000
heap
page read and write
16B20F01000
heap
page read and write
CE5000
heap
page read and write
16B0B614000
heap
page read and write
16B14882000
trusted library allocation
page read and write
25347244000
heap
page read and write
16B159EA000
trusted library allocation
page read and write
16B14186000
trusted library allocation
page read and write
16B17B17000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B11E79000
heap
page read and write
16B17A0A000
trusted library allocation
page read and write
16B150F0000
trusted library allocation
page read and write
16B1E477000
trusted library allocation
page read and write
16B1C9F4000
trusted library allocation
page read and write
16B19201000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
839AFFC000
stack
page read and write
16B141B5000
trusted library allocation
page read and write
16B1154B000
trusted library allocation
page read and write
16B11792000
trusted library allocation
page read and write
16B11822000
trusted library allocation
page read and write
16B14656000
trusted library allocation
page read and write
25346670000
heap
page read and write
16B11C5E000
trusted library allocation
page read and write
16B11796000
trusted library allocation
page read and write
16B1E4F9000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B15DFA000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1FAB8000
trusted library allocation
page read and write
16B1CAF5000
trusted library allocation
page read and write
16B17A11000
trusted library allocation
page read and write
9C92BFE000
stack
page read and write
16B1C8C0000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B657000
heap
page read and write
584000
heap
page read and write
16B17EC3000
trusted library allocation
page read and write
16B1E4C7000
trusted library allocation
page read and write
16B148FB000
trusted library allocation
page read and write
16B15CA7000
trusted library allocation
page read and write
16B1FA1E000
trusted library allocation
page read and write
16B1C8C0000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B1CAE6000
trusted library allocation
page read and write
16B1E5BF000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B15CD1000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1E4BD000
trusted library allocation
page read and write
16B15CC2000
trusted library allocation
page read and write
16B14879000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B5FA000
heap
page read and write
16B20A44000
trusted library allocation
page read and write
16B16421000
trusted library allocation
page read and write
16B0B61E000
heap
page read and write
16B0B60F000
heap
page read and write
16B0B606000
heap
page read and write
16B1EB4B000
trusted library allocation
page read and write
16B1F7E8000
trusted library allocation
page read and write
16B109CC000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
253471E0000
heap
page read and write
1C300172000
trusted library allocation
page read and write
16B146C6000
trusted library allocation
page read and write
16B16743000
trusted library allocation
page read and write
16B1C6CE000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B15562000
trusted library allocation
page read and write
16B1C580000
trusted library allocation
page read and write
16B155AA000
trusted library allocation
page read and write
16B15C3C000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
16B2001D000
trusted library allocation
page read and write
16B1CA81000
trusted library allocation
page read and write
16B1FA20000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16F70000
trusted library allocation
page read and write
16B20979000
trusted library allocation
page read and write
16B1CAA1000
trusted library allocation
page read and write
16B14EF5000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B647000
heap
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B155CF000
trusted library allocation
page read and write
16B1CAC9000
trusted library allocation
page read and write
16B1FD19000
trusted library allocation
page read and write
16B0B63B000
heap
page read and write
16B11784000
trusted library allocation
page read and write
16B1C4EF000
trusted library allocation
page read and write
16B20940000
trusted library allocation
page read and write
16B159A3000
trusted library allocation
page read and write
16B1EC90000
trusted library allocation
page read and write
16B155EC000
trusted library allocation
page read and write
16B0FF90000
trusted library allocation
page read and write
16B20975000
trusted library allocation
page read and write
16B1FAFA000
trusted library allocation
page read and write
16B15CFC000
trusted library allocation
page read and write
16B155C0000
trusted library allocation
page read and write
16B15570000
trusted library allocation
page read and write
16B15031000
trusted library allocation
page read and write
16B16C98000
trusted library allocation
page read and write
CD7000
heap
page read and write
16B15CA7000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5FE000
heap
page read and write
16B159D1000
trusted library allocation
page read and write
16B1FA79000
trusted library allocation
page read and write
16B1C8B1000
trusted library allocation
page read and write
16B148C8000
trusted library allocation
page read and write
16B16F57000
trusted library allocation
page read and write
1A57DDA0000
heap
page read and write
25347258000
heap
page read and write
16B17B2F000
trusted library allocation
page read and write
16B1FAC9000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B0B60F000
heap
page read and write
16B11E6E000
heap
page read and write
16B0B60F000
heap
page read and write
16B16800000
trusted library allocation
page read and write
121A630C000
trusted library allocation
page read and write
1A57E00A000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B630000
heap
page read and write
16B1FAD5000
trusted library allocation
page read and write
16B1E477000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B15CB1000
trusted library allocation
page read and write
16B1C6C9000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B17BBF000
trusted library allocation
page read and write
16B209E7000
trusted library allocation
page read and write
16B11EC6000
heap
page read and write
2CEB1FE000
unkown
page readonly
16B106F9000
trusted library allocation
page read and write
16B1463B000
trusted library allocation
page read and write
16B11ED8000
heap
page read and write
16B0B641000
heap
page read and write
25347258000
heap
page read and write
16B16489000
trusted library allocation
page read and write
16B17A6E000
trusted library allocation
page read and write
16B16EF9000
trusted library allocation
page read and write
16B1C46B000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B1E471000
trusted library allocation
page read and write
16B14831000
trusted library allocation
page read and write
16B15CB8000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B1FACA000
trusted library allocation
page read and write
16B11777000
trusted library allocation
page read and write
16B1FA50000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B1174B000
trusted library allocation
page read and write
16B11E56000
heap
page read and write
16B0B603000
heap
page read and write
16B0B64F000
heap
page read and write
16B209E1000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B15C92000
trusted library allocation
page read and write
16B1C4E6000
trusted library allocation
page read and write
16B11734000
trusted library allocation
page read and write
16B1FAB5000
trusted library allocation
page read and write
16B1C500000
trusted library allocation
page read and write
16B17A9D000
trusted library allocation
page read and write
88B03E000
stack
page read and write
16B1F7A2000
trusted library allocation
page read and write
16B0B637000
heap
page read and write
16B0B5D8000
heap
page read and write
16B15CC5000
trusted library allocation
page read and write
16B0B60A000
heap
page read and write
16B15CA7000
trusted library allocation
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B14150000
trusted library allocation
page read and write
16B15C52000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B11E6A000
heap
page read and write
16B17B15000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B0B5E5000
heap
page read and write
16B14EC4000
trusted library allocation
page read and write
16B17AD2000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B1C48E000
trusted library allocation
page read and write
16B1CAFD000
trusted library allocation
page read and write
16B1151B000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B1E4FD000
trusted library allocation
page read and write
16B11780000
trusted library allocation
page read and write
16B20F8D000
heap
page read and write
16B0B614000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B5DB000
heap
page read and write
16B15616000
trusted library allocation
page read and write
16B1C8AB000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B15CEA000
trusted library allocation
page read and write
16B17A68000
trusted library allocation
page read and write
CD8000
heap
page read and write
16B15618000
trusted library allocation
page read and write
16B16480000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
BAE000
stack
page read and write
16B11E6E000
heap
page read and write
16B1E5D9000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B0B641000
heap
page read and write
16B1E46F000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B16498000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B0B5E5000
heap
page read and write
16B16769000
trusted library allocation
page read and write
25347160000
heap
page read and write
16B1C71D000
trusted library allocation
page read and write
16B17EED000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B60F000
heap
page read and write
16B16747000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B11EAD000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1C64C000
trusted library allocation
page read and write
16B0B5E8000
heap
page read and write
16B1580A000
trusted library allocation
page read and write
16B1CAD7000
trusted library allocation
page read and write
16B14852000
trusted library allocation
page read and write
16B1ECDE000
trusted library allocation
page read and write
16B17A1F000
trusted library allocation
page read and write
16B1466D000
trusted library allocation
page read and write
1C37FF62000
unclassified section
page read and write
16B16DC8000
trusted library allocation
page read and write
253471E0000
heap
page read and write
16B10626000
trusted library allocation
page read and write
16B15ECD000
trusted library allocation
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B11EBA000
heap
page read and write
16B0B614000
heap
page read and write
16B0B640000
heap
page read and write
16B11E73000
heap
page read and write
16B11543000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B17B59000
trusted library allocation
page read and write
16B1C6F0000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B0B5F4000
heap
page read and write
16B0B5DD000
heap
page read and write
1C37FED0000
heap
page read and write
16B0B5DD000
heap
page read and write
16B1C9F4000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B11E54000
heap
page read and write
16B0B5EF000
heap
page read and write
16B1C76E000
trusted library allocation
page read and write
16B0B5FE000
heap
page read and write
16B0B5FA000
heap
page read and write
16B14852000
trusted library allocation
page read and write
16B156DC000
trusted library allocation
page read and write
16B1FDFE000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B15DB5000
trusted library allocation
page read and write
16B0B645000
heap
page read and write
25347267000
heap
page read and write
2534722D000
heap
page read and write
16B1C775000
trusted library allocation
page read and write
16B1C9F2000
trusted library allocation
page read and write
16B0B5F5000
heap
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B1FA66000
trusted library allocation
page read and write
16B157A9000
trusted library allocation
page read and write
16B17B13000
trusted library allocation
page read and write
BA4EFFE000
unkown
page readonly
16B14555000
trusted library allocation
page read and write
16B167F9000
trusted library allocation
page read and write
16B1C7EF000
trusted library allocation
page read and write
253471F0000
heap
page read and write
16B15CCE000
trusted library allocation
page read and write
16B141AB000
trusted library allocation
page read and write
16B14E76000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B156FE000
trusted library allocation
page read and write
1C300000000
trusted library allocation
page read and write
16B1FAEB000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1FFE1000
trusted library allocation
page read and write
16B16713000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
239A0BCB000
heap
page read and write
16B14839000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B162F9000
trusted library allocation
page read and write
16B14788000
trusted library allocation
page read and write
16B0B60C000
heap
page read and write
16B1298B000
trusted library allocation
page read and write
16B1171E000
trusted library allocation
page read and write
16B209E9000
trusted library allocation
page read and write
16B15571000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B159B2000
trusted library allocation
page read and write
16B115CB000
trusted library allocation
page read and write
16B15668000
trusted library allocation
page read and write
16B1E477000
trusted library allocation
page read and write
16B11EB4000
heap
page read and write
16B0B651000
heap
page read and write
16B20749000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
253471E8000
heap
page read and write
16B1E495000
trusted library allocation
page read and write
16B1E4A8000
trusted library allocation
page read and write
16B20F89000
heap
page read and write
16B1F800000
trusted library allocation
page read and write
16B1C4D0000
trusted library allocation
page read and write
253465AE000
trusted library allocation
page read and write
16B10947000
trusted library allocation
page read and write
16B1FA5A000
trusted library allocation
page read and write
16B117B3000
trusted library allocation
page read and write
16B15DB2000
trusted library allocation
page read and write
16B1469C000
trusted library allocation
page read and write
1C37FEA3000
heap
page read and write
16B17A38000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B115CB000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B16F35000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
16B159CB000
trusted library allocation
page read and write
16B1C891000
trusted library allocation
page read and write
16B10675000
trusted library allocation
page read and write
16B1E4C6000
trusted library allocation
page read and write
16B11EB1000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B60F000
heap
page read and write
16B1701D000
trusted library allocation
page read and write
16B167C5000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B614000
heap
page read and write
16B15581000
trusted library allocation
page read and write
16B207FD000
trusted library allocation
page read and write
16B1FAA3000
trusted library allocation
page read and write
16B0B644000
heap
page read and write
16B15DF5000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5FB000
heap
page read and write
16B11EC6000
heap
page read and write
16B154AC000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B16FDE000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1FD98000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B15C49000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
2534656F000
trusted library allocation
page read and write
16B0B5D1000
heap
page read and write
16B0B5D8000
heap
page read and write
16B159FE000
trusted library allocation
page read and write
16B15EC3000
trusted library allocation
page read and write
2399F200000
trusted library allocation
page read and write
16B1568B000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B170F5000
trusted library allocation
page read and write
16B155BB000
trusted library allocation
page read and write
16B1CAE2000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B1CAFB000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B157BD000
trusted library allocation
page read and write
16B17B3C000
trusted library allocation
page read and write
16B20975000
trusted library allocation
page read and write
16B1E4B3000
trusted library allocation
page read and write
16B159F6000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B1458B000
trusted library allocation
page read and write
16B1E49F000
trusted library allocation
page read and write
2CE6DCE000
unkown
page readonly
121A5D90000
unclassified section
page readonly
4C0000
heap
page read and write
16B11595000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B15CB1000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B609000
heap
page read and write
1A57DF00000
trusted library allocation
page read and write
16B14E40000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
16B1FA5F000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B0B64C000
heap
page read and write
16B20ACC000
trusted library allocation
page read and write
16B164AA000
trusted library allocation
page read and write
16B14EB0000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B603000
heap
page read and write
16B0B657000
heap
page read and write
16B115BD000
trusted library allocation
page read and write
16B11509000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
1C30015D000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B15DF5000
trusted library allocation
page read and write
1C3001AF000
trusted library allocation
page read and write
16B17BAC000
trusted library allocation
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B146DB000
trusted library allocation
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B14E89000
trusted library allocation
page read and write
16B15574000
trusted library allocation
page read and write
16B141B5000
trusted library allocation
page read and write
16B15807000
trusted library allocation
page read and write
6F0000
unkown
page readonly
16B0B5FE000
heap
page read and write
16B0B5DB000
heap
page read and write
16B1457C000
trusted library allocation
page read and write
16B0B5DE000
heap
page read and write
16B0B604000
heap
page read and write
16B146D4000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1FA98000
trusted library allocation
page read and write
16B15CA8000
trusted library allocation
page read and write
16B11789000
trusted library allocation
page read and write
2534723B000
heap
page read and write
16B1E4C6000
trusted library allocation
page read and write
253471F0000
heap
page read and write
16B0B5FA000
heap
page read and write
16B1C8F6000
trusted library allocation
page read and write
16B1FD8A000
trusted library allocation
page read and write
16B0B5DB000
heap
page read and write
16B20F01000
heap
page read and write
16B1C8E2000
trusted library allocation
page read and write
16B159C3000
trusted library allocation
page read and write
16B1E41B000
trusted library allocation
page read and write
16B1C9F0000
trusted library allocation
page read and write
16B10613000
trusted library allocation
page read and write
16B1FDEA000
trusted library allocation
page read and write
16B159FA000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B0B5E8000
heap
page read and write
16B0B5DB000
heap
page read and write
1C3001C8000
trusted library allocation
page read and write
16B1C546000
trusted library allocation
page read and write
16B15786000
trusted library allocation
page read and write
121A5E80000
heap
page read and write
16B15802000
trusted library allocation
page read and write
16B0B607000
heap
page read and write
16B150C8000
trusted library allocation
page read and write
16B16760000
trusted library allocation
page read and write
1C37FDA0000
heap
page read and write
16B14549000
trusted library allocation
page read and write
16B0B5FF000
heap
page read and write
121A6062000
trusted library allocation
page read and write
16B0B5DC000
heap
page read and write
16B209A1000
trusted library allocation
page read and write
25346577000
trusted library allocation
page read and write
16B1E495000
trusted library allocation
page read and write
16B1F7EE000
trusted library allocation
page read and write
1D6A34D1000
trusted library allocation
page execute read
16B0B5D8000
heap
page read and write
16B0B642000
heap
page read and write
16B1C7D3000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B155B5000
trusted library allocation
page read and write
16B20F6B000
heap
page read and write
16B0B660000
heap
page read and write
16B1FD8A000
trusted library allocation
page read and write
16B1F729000
trusted library allocation
page read and write
2534638F000
unclassified section
page read and write
3501000
heap
page read and write
16B16480000
trusted library allocation
page read and write
6F0000
unkown
page readonly
16B0B5FA000
heap
page read and write
16B20AC4000
trusted library allocation
page read and write
16B1E48F000
trusted library allocation
page read and write
16B1CAFB000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B1FA98000
trusted library allocation
page read and write
16B109EE000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B684000
heap
page read and write
16B1FF5F000
trusted library allocation
page read and write
16B17A1F000
trusted library allocation
page read and write
1C30020F000
trusted library allocation
page read and write
16B16764000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B5C5000
heap
page read and write
16B1597B000
trusted library allocation
page read and write
16B1C9B6000
trusted library allocation
page read and write
16B17BC2000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
16B1C920000
trusted library allocation
page read and write
121A605F000
trusted library allocation
page read and write
16B1CAEE000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B11EA9000
heap
page read and write
121A5B8D000
remote allocation
page execute read
16B1C936000
trusted library allocation
page read and write
16B0B5EB000
heap
page read and write
16B14543000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B1C590000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B11EA9000
heap
page read and write
25347101000
heap
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B0B5F9000
heap
page read and write
16B0B5E5000
heap
page read and write
16B207F4000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B655000
heap
page read and write
16B1C9CA000
trusted library allocation
page read and write
16B146B2000
trusted library allocation
page read and write
1C300103000
trusted library allocation
page read and write
16B1C99D000
trusted library allocation
page read and write
16B1CAE2000
trusted library allocation
page read and write
16B15671000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B159B0000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B159A3000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
121A600C000
trusted library allocation
page read and write
16B2092A000
trusted library allocation
page read and write
16B1564A000
trusted library allocation
page read and write
16B157FE000
trusted library allocation
page read and write
16B17A15000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B11EA9000
heap
page read and write
16B1E488000
trusted library allocation
page read and write
16B1C538000
trusted library allocation
page read and write
16B0B5FD000
heap
page read and write
16B1CAE4000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B1FA66000
trusted library allocation
page read and write
16B14783000
trusted library allocation
page read and write
16B1807B000
trusted library allocation
page read and write
16B0B5E4000
heap
page read and write
16B0B650000
heap
page read and write
16B15584000
trusted library allocation
page read and write
16B1C8D1000
trusted library allocation
page read and write
16B15CBB000
trusted library allocation
page read and write
16B117AD000
trusted library allocation
page read and write
16B0B653000
heap
page read and write
16B1459E000
trusted library allocation
page read and write
16B1C69C000
trusted library allocation
page read and write
16B0B60F000
heap
page read and write
16B155F2000
trusted library allocation
page read and write
16B0B655000
heap
page read and write
16B0B64A000
heap
page read and write
16B0B61B000
heap
page read and write
16B0B5E5000
heap
page read and write
16B0B647000
heap
page read and write
16B16EDB000
trusted library allocation
page read and write
16B1C7FB000
trusted library allocation
page read and write
16B159EA000
trusted library allocation
page read and write
16B14EFE000
trusted library allocation
page read and write
16B1C550000
trusted library allocation
page read and write
16B14E87000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B1152D000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B20B51000
trusted library allocation
page read and write
16B1C7FB000
trusted library allocation
page read and write
16B145A5000
trusted library allocation
page read and write
16B0B5F4000
heap
page read and write
16B1C8A6000
trusted library allocation
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B11509000
trusted library allocation
page read and write
16B1C9EE000
trusted library allocation
page read and write
16B1F5A8000
trusted library allocation
page read and write
1C37FF90000
unclassified section
page readonly
16B106B4000
trusted library allocation
page read and write
16B150D5000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B14582000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B0B5DB000
heap
page read and write
16B145CE000
trusted library allocation
page read and write
16B16B84000
trusted library allocation
page read and write
16B145CE000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
1C300100000
trusted library allocation
page read and write
16B1FAAB000
trusted library allocation
page read and write
121A60F8000
trusted library allocation
page read and write
16B17A0A000
trusted library allocation
page read and write
16B1647D000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B1F7F1000
trusted library allocation
page read and write
16B0B5D8000
heap
page read and write
16B0B657000
heap
page read and write
16B141FE000
trusted library allocation
page read and write
16B15EF1000
trusted library allocation
page read and write
16B1C6E9000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B62F000
heap
page read and write
CDA000
heap
page read and write
16B1C4F5000
trusted library allocation
page read and write
16B1C891000
trusted library allocation
page read and write
16B1C8F5000
trusted library allocation
page read and write
16B1C487000
trusted library allocation
page read and write
121A600E000
trusted library allocation
page read and write
16B11E6A000
heap
page read and write
16B159F6000
trusted library allocation
page read and write
2534700D000
trusted library allocation
page read and write
16B0B5EF000
heap
page read and write
BA4BDBE000
stack
page read and write
16B159D9000
trusted library allocation
page read and write
16B115C8000
trusted library allocation
page read and write
1C37FD00000
unclassified section
page readonly
16B0B5F8000
heap
page read and write
16B0B60F000
heap
page read and write
16B0B640000
heap
page read and write
16B0B62F000
heap
page read and write
16B17AFC000
trusted library allocation
page read and write
16B20979000
trusted library allocation
page read and write
16B16B99000
trusted library allocation
page read and write
16B0B640000
heap
page read and write
16B1C5FB000
trusted library allocation
page read and write
2399F0AB000
heap
page read and write
16B1ECCE000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B1E45F000
trusted library allocation
page read and write
1C300214000
trusted library allocation
page read and write
16B1EBB1000
trusted library allocation
page read and write
16B15CBB000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B154BF000
trusted library allocation
page read and write
16B1CA83000
trusted library allocation
page read and write
16B15079000
trusted library allocation
page read and write
16B1E5FE000
trusted library allocation
page read and write
16B156C3000
trusted library allocation
page read and write
25346B01000
heap
page read and write
16B14E52000
trusted library allocation
page read and write
16B0B608000
heap
page read and write
16B0B655000
heap
page read and write
16B1FAF3000
trusted library allocation
page read and write
16B0B60D000
heap
page read and write
16B15795000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B0B5D8000
heap
page read and write
16B1485B000
trusted library allocation
page read and write
16B1EBF4000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
253471FD000
heap
page read and write
16B0B5D1000
heap
page read and write
16B141D5000
trusted library allocation
page read and write
16B156E0000
trusted library allocation
page read and write
16B1CB00000
trusted library allocation
page read and write
16B15584000
trusted library allocation
page read and write
16B1E463000
trusted library allocation
page read and write
16B159C8000
trusted library allocation
page read and write
25346574000
trusted library allocation
page read and write
CB7000
heap
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B0B609000
heap
page read and write
16B1EEE5000
trusted library allocation
page read and write
16B1C741000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
839AFFF000
stack
page read and write
16B1463D000
trusted library allocation
page read and write
16B167C5000
trusted library allocation
page read and write
16B162F5000
trusted library allocation
page read and write
16B15C9D000
trusted library allocation
page read and write
16B1C8B1000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B5FA000
heap
page read and write
16B0B62F000
heap
page read and write
16B0B5FA000
heap
page read and write
16B209E1000
trusted library allocation
page read and write
16B14E33000
trusted library allocation
page read and write
584000
heap
page read and write
16B0B61B000
heap
page read and write
16B0B5E3000
heap
page read and write
16B0B5FA000
heap
page read and write
16B159AA000
trusted library allocation
page read and write
16B15574000
trusted library allocation
page read and write
16B1E4FB000
trusted library allocation
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B1FAC0000
trusted library allocation
page read and write
16B2091D000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B14783000
trusted library allocation
page read and write
16B14669000
trusted library allocation
page read and write
16B1E4A9000
trusted library allocation
page read and write
16B14E31000
trusted library allocation
page read and write
16B15C94000
trusted library allocation
page read and write
16B11734000
trusted library allocation
page read and write
16B1E4E3000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B17E50000
trusted library allocation
page read and write
2534657A000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B167C7000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B1FAAD000
trusted library allocation
page read and write
16B1E582000
trusted library allocation
page read and write
16B1FAB8000
trusted library allocation
page read and write
16B0B606000
heap
page read and write
55E000
stack
page read and write
16B159D9000
trusted library allocation
page read and write
16B16BA8000
trusted library allocation
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B1C6D6000
trusted library allocation
page read and write
CE2000
heap
page read and write
16B1F7BD000
trusted library allocation
page read and write
16B117B3000
trusted library allocation
page read and write
16B16493000
trusted library allocation
page read and write
25346120000
unclassified section
page readonly
16B1E4B9000
trusted library allocation
page read and write
16B1E4E3000
trusted library allocation
page read and write
16B1FAD1000
trusted library allocation
page read and write
16B11EC6000
heap
page read and write
7C4000
unkown
page readonly
16B1C4D9000
trusted library allocation
page read and write
16B0B5E5000
heap
page read and write
16B0B5DB000
heap
page read and write
16B11835000
trusted library allocation
page read and write
16B1FD5C000
trusted library allocation
page read and write
16B16440000
trusted library allocation
page read and write
16B1E48F000
trusted library allocation
page read and write
16B0B631000
heap
page read and write
16B0B60F000
heap
page read and write
16B1C898000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B117AA000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B62F000
heap
page read and write
16B17A15000
trusted library allocation
page read and write
16B15CCB000
trusted library allocation
page read and write
16B1ECE0000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1C775000
trusted library allocation
page read and write
16B1C8AB000
trusted library allocation
page read and write
16B1C6D2000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B17EC1000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5DB000
heap
page read and write
121A6011000
trusted library allocation
page read and write
16B0B5EE000
heap
page read and write
16B0B62F000
heap
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B1176D000
trusted library allocation
page read and write
16B1FF67000
trusted library allocation
page read and write
16B16769000
trusted library allocation
page read and write
16B1E454000
trusted library allocation
page read and write
16B11774000
trusted library allocation
page read and write
16B1E474000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B0B614000
heap
page read and write
16B1FAD7000
trusted library allocation
page read and write
16B1E45F000
trusted library allocation
page read and write
16B1C8BB000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1558D000
trusted library allocation
page read and write
16B16BE8000
trusted library allocation
page read and write
16B15CD1000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
2399F30A000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B64F000
heap
page read and write
16B0B5F3000
heap
page read and write
16B1E4A4000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B146C4000
trusted library allocation
page read and write
16B0B600000
heap
page read and write
16B164C3000
trusted library allocation
page read and write
16B0B5F6000
heap
page read and write
16B1E477000
trusted library allocation
page read and write
16B14E6D000
trusted library allocation
page read and write
16B1C89A000
trusted library allocation
page read and write
16B1E423000
trusted library allocation
page read and write
16B0B649000
heap
page read and write
16B15ED3000
trusted library allocation
page read and write
16B150AD000
trusted library allocation
page read and write
16B159B2000
trusted library allocation
page read and write
16B159CB000
trusted library allocation
page read and write
16B1C6D1000
trusted library allocation
page read and write
16B0B643000
heap
page read and write
16B1ECE5000
trusted library allocation
page read and write
16B15CC5000
trusted library allocation
page read and write
16B0B601000
heap
page read and write
16B10951000
trusted library allocation
page read and write
16B17B57000
trusted library allocation
page read and write
16B16EF0000
trusted library allocation
page read and write
16B1C6F0000
trusted library allocation
page read and write
16B1EF0C000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B11E73000
heap
page read and write
16B14CFD000
trusted library allocation
page read and write
16B1455A000
trusted library allocation
page read and write
25347229000
heap
page read and write
16B117AD000
trusted library allocation
page read and write
16B16FE8000
trusted library allocation
page read and write
16B164AD000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B5D8000
heap
page read and write
16B15579000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B1E4BB000
trusted library allocation
page read and write
16B109EC000
trusted library allocation
page read and write
16B10576000
trusted library allocation
page read and write
16B20932000
trusted library allocation
page read and write
16B1C741000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B101FD000
trusted library allocation
page read and write
16B207CB000
trusted library allocation
page read and write
16B1C8C0000
trusted library allocation
page read and write
16B0B632000
heap
page read and write
16B15485000
trusted library allocation
page read and write
16B1C8A6000
trusted library allocation
page read and write
16B11784000
trusted library allocation
page read and write
16B14582000
trusted library allocation
page read and write
16B0B62F000
heap
page read and write
16B0B632000
heap
page read and write
16B0B60F000
heap
page read and write
121A6070000
trusted library allocation
page read and write
16B11794000
trusted library allocation
page read and write
16B16DD0000
trusted library allocation
page read and write
16B1C4EF000
trusted library allocation
page read and write
16B0B668000
heap
page read and write
16B0B640000
heap
page read and write
16B1CAF0000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1E558000
trusted library allocation
page read and write
16B1E4AF000
trusted library allocation
page read and write
16B16466000
trusted library allocation
page read and write
16B17AE3000
trusted library allocation
page read and write
16B15C92000
trusted library allocation
page read and write
16B1E4E5000
trusted library allocation
page read and write
16B16F9A000
trusted library allocation
page read and write
16B1C9E6000
trusted library allocation
page read and write
16B146B9000
trusted library allocation
page read and write
16B148C6000
trusted library allocation
page read and write
16B11E79000
heap
page read and write
CEF000
heap
page read and write
16B11EA9000
heap
page read and write
16B1E474000
trusted library allocation
page read and write
16B1156A000
trusted library allocation
page read and write
16B1483E000
trusted library allocation
page read and write
16B1FA92000
trusted library allocation
page read and write
16B1E471000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B1C6F2000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B0B5FA000
heap
page read and write
16B157BA000
trusted library allocation
page read and write
16B15C9D000
trusted library allocation
page read and write
16B1C9F0000
trusted library allocation
page read and write
16B146F4000
trusted library allocation
page read and write
253471B9000
heap
page read and write
16B0B64F000
heap
page read and write
16B0B62F000
heap
page read and write
16B1CABE000
trusted library allocation
page read and write
16B1451F000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B156D7000
trusted library allocation
page read and write
16B15596000
trusted library allocation
page read and write
16B1C8FB000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B654000
heap
page read and write
16B1C4C1000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B614000
heap
page read and write
16B0B5FA000
heap
page read and write
16B1FABC000
trusted library allocation
page read and write
78C000
unkown
page readonly
B9F000
stack
page read and write
16B0B614000
heap
page read and write
2534715C000
heap
page read and write
16B159CF000
trusted library allocation
page read and write
16B17E69000
trusted library allocation
page read and write
16B1F7DA000
trusted library allocation
page read and write
16B1EF86000
trusted library allocation
page read and write
16B0B641000
heap
page read and write
16B141DC000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B642000
heap
page read and write
16B141A6000
trusted library allocation
page read and write
16B155B2000
trusted library allocation
page read and write
16B0B64C000
heap
page read and write
16B0B5D8000
heap
page read and write
16B0B61E000
heap
page read and write
16B0B606000
heap
page read and write
16B14E6F000
trusted library allocation
page read and write
16B0B651000
heap
page read and write
16B1562D000
trusted library allocation
page read and write
16B0B638000
heap
page read and write
16B0B652000
heap
page read and write
16B0B606000
heap
page read and write
1C37FF2A000
heap
page read and write
16B0B650000
heap
page read and write
1C37FFE4000
heap
page read and write
16B0B5F4000
heap
page read and write
16B1E5E2000
trusted library allocation
page read and write
16B1FA93000
trusted library allocation
page read and write
16B1C6CB000
trusted library allocation
page read and write
16B16BFA000
trusted library allocation
page read and write
16B1C6AD000
trusted library allocation
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B0B652000
heap
page read and write
16B0B614000
heap
page read and write
16B0B5D1000
heap
page read and write
25346610000
trusted library allocation
page read and write
16B14880000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B0B5DD000
heap
page read and write
16B0B5E4000
heap
page read and write
16B11E6A000
heap
page read and write
16B0B64C000
heap
page read and write
16B1E4C1000
trusted library allocation
page read and write
16B1457E000
trusted library allocation
page read and write
16B148FB000
trusted library allocation
page read and write
16B0B63F000
heap
page read and write
16B1E419000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B11E54000
heap
page read and write
16B1C9B0000
trusted library allocation
page read and write
16B20B5F000
trusted library allocation
page read and write
16B1598F000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B0B5FE000
heap
page read and write
16B0B5E0000
heap
page read and write
16B0B5FB000
heap
page read and write
16B1C8F6000
trusted library allocation
page read and write
25346674000
heap
page read and write
16B1FAE8000
trusted library allocation
page read and write
25346562000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B159BD000
trusted library allocation
page read and write
16B1E5BF000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B155C3000
trusted library allocation
page read and write
16B0B647000
heap
page read and write
16B0B60F000
heap
page read and write
16B1E4B9000
trusted library allocation
page read and write
16B0B5FA000
heap
page read and write
16B209AE000
trusted library allocation
page read and write
16B0B5FB000
heap
page read and write
16B0B614000
heap
page read and write
16B0B647000
heap
page read and write
16B0B655000
heap
page read and write
16B1E4CE000
trusted library allocation
page read and write
16B0B5DF000
heap
page read and write
16B15DF5000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
16B0B5FD000
heap
page read and write
16B10955000
trusted library allocation
page read and write
16B1096A000
trusted library allocation
page read and write
16B1C586000
trusted library allocation
page read and write
16B15CA5000
trusted library allocation
page read and write
158FD0403000
trusted library allocation
page read and write
16B117A8000
trusted library allocation
page read and write
16B0B5DD000
heap
page read and write
16B0B61B000
heap
page read and write
16B0B605000
heap
page read and write
16B0B5E4000
heap
page read and write
16B1CA4E000
trusted library allocation
page read and write
16B15C62000
trusted library allocation
page read and write
16B1ECD6000
trusted library allocation
page read and write
16B0B5E3000
heap
page read and write
16B17ACD000
trusted library allocation
page read and write
16B16496000
trusted library allocation
page read and write
16B11786000
trusted library allocation
page read and write
16B0B678000
heap
page read and write
16B0B64D000
heap
page read and write
16B1C6E6000
trusted library allocation
page read and write
16B20F01000
heap
page read and write
16B0B5F3000
heap
page read and write
16B0B5FF000
heap
page read and write
16B145CE000
trusted library allocation
page read and write
16B141FE000
trusted library allocation
page read and write
16B1E58F000
trusted library allocation
page read and write
16B146CD000
trusted library allocation
page read and write
16B1E4EA000
trusted library allocation
page read and write
16B146AB000
trusted library allocation
page read and write
16B1E46F000
trusted library allocation
page read and write
16B0B614000
heap
page read and write
16B207A0000
trusted library allocation
page read and write
16B1C6E6000
trusted library allocation
page read and write
16B0B657000
heap
page read and write
16B17E0B000
trusted library allocation
page read and write
16B0B5F3000
heap
page read and write
16B1C746000
trusted library allocation
page read and write
16B209AE000
trusted library allocation
page read and write
16B0B603000
heap
page read and write
2399F410000
heap
page read and write
2534718A000
heap
page read and write
16B0B603000
heap
page read and write
16B154E8000
trusted library allocation
page read and write
16B0B642000
heap
page read and write
16B0B5D1000
heap
page read and write
16B0B684000
heap
page read and write
2CEA1FE000
unkown
page readonly
16B150B0000
trusted library allocation
page read and write
There are 4191 hidden memdumps, click here to show them.