IOC Report
Acrobat_Set-Up.exe

loading gif

Files

File Path
Type
Category
Malicious
Acrobat_Set-Up.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
C:\Users\user\AppData\Local\Adobe\OOBE\temp_lbs_wid
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\0a5c9686-bf2f-4836-9261-89a937cf8358.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\1790bab6-6ae5-409d-9978-81abfc52873e.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\52dfa16d-6029-467b-8f6c-c65c886558da.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\550ee668-e570-499a-9f73-4b7b39c825b0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\5b49605a-9938-47d0-b609-35a95eef27b3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_1
dBase III DBT, next free block index 3238316739, block length 1024
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\f_000001
ASCII text, with very long lines (56817), with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\f_000002
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\08ae7b95-56ac-4b3f-a79d-fea98a4e4d30.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\21666c3a-7303-47e9-8853-f4f515debf66.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\6a144b3f-e74d-4110-b767-4a1a260f052d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\70073e9e-00a1-4a73-9434-7db80f58d1bb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Network Persistent State~RF6f77a5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\SCT Auditing Pending Reports~RF6e5145.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Network\bc228063-030a-4b19-a07d-c70d2815d7bb.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF6eec5c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Preferences~RF6f616d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\efa089c5-3bf2-46b8-8658-4b772ccec296.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\f575e05b-e90b-4bd5-9177-3488b68eef1d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF6e4e76.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF6e4ee4.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF6e7603.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF6f6063.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Local State~RF6fc930.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\a5dddf3d-9954-4d0a-82d2-9fa9d6243a5c.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\ae8c7a3d-d75c-485e-8ef7-70deb4b41bd3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\f11aab54-8ffe-43db-8adc-d1a8855264f7.tmp
JSON data
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\ab326b5a64fa2db7\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
data
dropped
C:\Users\user\AppData\Local\Temp\CreativeCloud\ACC\WAM.log
Unicode text, UTF-16, little-endian text, with very long lines (413), with CRLF, LF line terminators
modified
C:\Users\user\AppData\Local\Temp\NGL\NGLClient_CreativeCloudInstaller1.ngllogcontrolconfig
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\CCDInstaller.js
Unicode text, UTF-8 text, with very long lines (62606)
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\1d440dad-db9c-44ec-9199-95beb993311d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\2bd9f9d2-4af0-47e4-8a2f-9a9ebe0ae1d3.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\5de269c2-2983-4e27-8351-1c67360f1714.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\BrowserMetrics-spare.pma (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\BrowserMetrics-spare.pma.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\613c26fd-30b6-42d8-92e0-68e36ba0bfee.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\632a30c8-11af-4283-8431-1d7ad0447b80.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000001
HTML document, Unicode text, UTF-8 text, with very long lines (22623)
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000002
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000003
Unicode text, UTF-8 text, with very long lines (65301)
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000004
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000005
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1920x1021, components 3
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000006
Unicode text, UTF-8 text, with very long lines (2258)
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000007
Web Open Font Format (Version 2), CFF, length 29924, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000008
Web Open Font Format (Version 2), CFF, length 29980, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\f_000009
Web Open Font Format (Version 2), CFF, length 29752, version 1.0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\0d86d14abb8a9b82_0
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\eeffd0915a06aa03_0
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RF6f646b.TMP (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension State\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension State\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Extension State\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\44db66db-47cb-46c9-897b-62dfc52b3cd8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\9a2160c7-3786-4deb-ba78-369fc1b1941f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\9c839502-86f8-432a-abb7-744bc065e4bf.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\Network Persistent State~RF6f78ae.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\SCT Auditing Pending Reports~RF6e5164.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\Sdch Dictionaries (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\b77bb2fe-88fd-4e9c-b876-1d47b41e1ccc.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Network\f6865424-f669-4be1-ad05-654c5208a9ba.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Preferences~RF6eec6c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Preferences~RF6f4f2d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\PreferredApps
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Secure Preferences (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\a6aa2915-9348-4cc1-96fb-cf4c367d615b.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\bb9d5b0d-4ead-4991-b1aa-fd79a6765ef9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GrShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GrShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GrShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GrShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GrShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GraphiteDawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GraphiteDawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GraphiteDawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GraphiteDawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\GraphiteDawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Local State~RF6e4e86.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Local State~RF6e4ec5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Local State~RF6e75d5.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Local State~RF6f5fd7.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\ShaderCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\customSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\customSettings_F95BA787499AB4FA9EFFF472CE383A14
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\edgeSettings_2.0-48b11410dc937a1723bf4c5ad33ecdb286d8ec69544241bc373f753e64b396c1
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\synchronousLookupUris_638343870221005468
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\topTraffic
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\topTraffic_170540185939602997400506234197983529371
data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\RemoteData\topTraffic_638004170464094982
raw G3 (Group 3) FAX, byte-padded
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\local\uriCache
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\SmartScreen\local\uriCache_
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\d2240f88-2b8e-4217-91ac-426b3fc2b989.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\dffb055b-3ff5-4249-8503-2dc23b22c5b9.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\index.css
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\index.html
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\anon_events\bfef1bb4-848c-4a71-a4b9-7714cba64b84
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\anon_events\manifest
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\meta_events\431363b7-b821-462a-bbff-c05044a06917
data
dropped
C:\Users\user\AppData\Roaming\com.adobe.dunamis\f65a88c9-12b3-4201-a633-87cf11b91fa8\v1\0\meta_events\manifest
data
dropped
There are 237 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Acrobat_Set-Up.exe
"C:\Users\user\Desktop\Acrobat_Set-Up.exe"
malicious
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7100.2080.4400570537256243048
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=7100.2080.18407888704770657282
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7fff28fd8e88,0x7fff28fd8e98,0x7fff28fd8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=117.0.5938.132 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=117.0.2045.47 --initial-client-data=0x15c,0x160,0x164,0x138,0x170,0x7fff28fd8e88,0x7fff28fd8e98,0x7fff28fd8ea8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1732 --field-trial-handle=1736,i,11302001976447578962,6141052540685699755,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1748 --field-trial-handle=1752,i,2376687933976929174,8431868357786446797,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2108 --field-trial-handle=1752,i,2376687933976929174,8431868357786446797,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1972 --field-trial-handle=1736,i,11302001976447578962,6141052540685699755,262144 --enable-features=MojoIpcz /prefetch:3
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2536 --field-trial-handle=1752,i,2376687933976929174,8431868357786446797,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-GB --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2468 --field-trial-handle=1736,i,11302001976447578962,6141052540685699755,262144 --enable-features=MojoIpcz /prefetch:8
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1713867994182546 --launch-time-ticks=7229637667 --mojo-platform-channel-handle=3360 --field-trial-handle=1752,i,2376687933976929174,8431868357786446797,262144 --enable-features=MojoIpcz /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-nacl --first-renderer-process --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=en_CH" --time-ticks-at-unix-epoch=-1713867994185397 --launch-time-ticks=7229621524 --mojo-platform-channel-handle=3360 --field-trial-handle=1736,i,11302001976447578962,6141052540685699755,262144 --enable-features=MojoIpcz /prefetch:1
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Adobe\webview2\Acrobat_Set-Up.exe\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4544 --field-trial-handle=1736,i,11302001976447578962,6141052540685699755,262144 --enable-features=MojoIpcz /prefetch:2
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe
"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\117.0.2045.47\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\user\AppData\Local\Temp\{AF7CCBC1-F98B-4EB4-ABDE-15D21C5E4444}\EBWebView" --webview-exe-name=Acrobat_Set-Up.exe --webview-exe-version=2.12.0.23 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4800 --field-trial-handle=1752,i,2376687933976929174,8431868357786446797,262144 --enable-features=MojoIpcz /prefetch:2
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://doh.familyshield.opendns.com/dns-query
unknown
http://anglebug.com/4633
unknown
https://dns.sb/privacy/Char
unknown
https://anglebug.com/7382
unknown
https://permanently-removed.invalid/v1/events
unknown
https://unitedstates2.ss.wd.microsoft.us/.com/https://unitedstates2.ss.wd.microsoft.us/
unknown
https://brazil.s
unknown
http://anglebug.com/7724gger
unknown
https://malaysia.smar
unknown
https://community.adobe
unknown
https://gist.github.com/1129031
unknown
http://anglebug.com/7724)
unknown
https://permanently-removed.invalid/OAuthLogin?source=ChromiumBrowser&issueuberauth=1
unknown
https://www.microsoftnews.cn/
unknown
https://dns11.quad9.net/dns-query
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
https://permanently-removed.invalid/v1:GetHints
unknown
https://permanently-removed.invalid/encryption/unlock/desktop?kdi=CAIaDgoKY2hyb21lc3luYxABF
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=ko
unknown
http://anglebug.com/6929
unknown
https://www.behance.net/leonardoworxH
unknown
http://anglebug.com/5750)
unknown
https://p.ty
unknown
https://nextdns.io/privacy
unknown
https://anglebug.com/7246
unknown
https://ims-na1-stg1.adobelogin.com
unknown
https://int.msn.cn/
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://www.behance.net/palomarincon
unknown
https://dpm.demdex.net/id?d_visid_ver=5.4.0&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=9E1005A551ED61CA0
unknown
https://unitedstates1.ss.wd.microsoft.us/
unknown
https://fb.me/react-async-component-lifecycle-hooks
unknown
https://doh.opendns.com/dns-query
unknown
https://easyauth.edgebrowser.microsoft-staging-falcon.io/
unknown
https://nextdns.io/privacyr
unknown
https://issuetracker.google.com/161903006
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=nl
unknown
http://anglebug.com/7724ancedG
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=nb
unknown
https://permanently-removed.invalid/v1/issuetoken
unknown
https://easyauth.edgebrowser.microsoft-testing-falcon.io/
unknown
http://anglebug.com/4722
unknown
https://permanently-removed.invalid/reauth/v1beta/users/
unknown
http://permanently-removed.invalid/
unknown
https://dpm.demdex.net/id/rd?d_visid_ver=5.4.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_verify=1&d_orgid=9E1005A551ED61CA0A490D45%40AdobeOrg&d_nsid=0&ts=1713875254171
54.225.234.85
https://permanently-removed.invalid/embedded/setup/chrome/usermenu
unknown
http://anglebug.com/5881Y
unknown
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aam&gdpr=0&gdpr_consent=&domain=auth.services.ado
unknown
http://anglebug.com/7406.
unknown
https://sso.behance.net/ims
unknown
https://npms.io/search?q=ponyfill.
unknown
https://permanently-removed.invalid/RotateBoundCookies
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
https://designerapp-int.azurewebsites.net/
unknown
http://anglebug.com/3624
unknown
https://my.4399.com/yxmsdzls/
unknown
https://xsts.auth.xboxlive.com
unknown
http://anglebug.com/3862
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=pt
unknown
https://dns.google/dns-query
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://www.behance.net/tomanders
unknown
https://localhost.msn.com/
unknown
https://sts.windows.net/
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=pl
unknown
https://use.typekit.net/af/40207f/0000000000000000000176ff/27/l?subset_id=2&fvd=n3&v=3
23.221.212.212
https://outlook.com/
unknown
https://cdn.arkoselabs.com
unknown
https://mths.be/mit
unknown
http://typekit.com/eulas/0000000000000000000176ff
unknown
http://anglebug.com/3970
unknown
https://malaysia.smarscreen.
unknown
https://login.chinacloudapi.cn/
unknown
https://ims-prod06.adobelogin.com/ims/authorize/v3NF
unknown
https://odvr.nic.cz/doh
unknown
http://anglebug.com/5901
unknown
https://support.mozilla.org/cs-CZ/kb/where-find-and-manage-downloaded-files-firefox
unknown
http://anglebug.com/3965
unknown
https://anglebug.com/7161
unknown
https://use.typekit.net/af/eaf09c/000000000000000000017703/27/
unknown
https://www.quad9.net/home/privacy/
unknown
https://anglebug.com/7162
unknown
https://support.google.com/chrome/answer/95759?visit_id=637090496096814473-703968052&rd=1&hl=ru
unknown
https://doh.cleanbrowsing.org/doh/adult-filter
unknown
http://anglebug.com/5906
unknown
https://doh-01.spectrum.com/dns-query
unknown
http://anglebug.com/2517
unknown
https://permanently-removed.invalid/MergeSession
unknown
http://anglebug.com/4937
unknown
https://support.google.com/chrome/answer/95759?visit_id=63709049609681447
unknown
https://issuetracker.google.com/166809097
unknown
https://login.windows.local/
unknown
https://permanently-removed.invalid/embedded/setup/kidsignup/chromeos
unknown
https://www.sogou.com/web?ie=
unknown
https://support.mozilla.org/nb-NO/kb/where-find-and-manage-downloaded-files-firefox
unknown
http://anglebug.com/3832
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
d1n897799gitxr.cloudfront.net
108.139.15.110
resources-prod.licensingstack.com
18.244.194.168

IPs

IP
Domain
Country
Malicious
20.25.227.174
unknown
United States
13.107.21.239
unknown
United States
172.64.155.179
unknown
United States
162.159.140.165
unknown
United States
18.244.194.168
resources-prod.licensingstack.com
United States
20.88.206.205
unknown
United States
162.159.61.3
chrome.cloudflare-dns.com
United States
52.202.135.73
unknown
United States
63.140.39.82
unknown
United States
23.221.212.210
unknown
United States
204.79.197.239
unknown
United States
54.225.234.85
unknown
United States
108.139.15.110
d1n897799gitxr.cloudfront.net
United States
23.221.212.212
unknown
United States
172.64.41.3
unknown
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
Acrobat_Set-Up.exe
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\686DF0A4A89F7CB6BFB4D33C6A48E2EE5FB6C4FB
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\85E2C5B0D9CFF505363FA62A5E8B8C1D76A60B46
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\4C7C2E87F0BC79A039D39B05F899A1CC521FDE99
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\AdobeCertStore\Certificates\A5C8D928986EC17FCC7D5F2353885D1709B73A29
Blob
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
dr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView
UsageStatsInSample
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
usagestats
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
urlstats
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}
lastrun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDDFEBB86
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{C89E2069-AF13-46DB-9E39-216131494B87}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
dgiklkfkllikcanfonkcabmbdfmgleag
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeWebView\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E58022B3000
trusted library allocation
page read and write
46D80140E000
trusted library allocation
page read and write
92000184000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
46D8009D8000
trusted library allocation
page read and write
2E580408E000
trusted library allocation
page read and write
1454000
heap
page read and write
26C800220000
trusted library allocation
page read and write
2E5801685000
trusted library allocation
page read and write
2E58036A2000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E580400C000
trusted library allocation
page read and write
1AE00942000
trusted library allocation
page read and write
2E58009E4000
trusted library allocation
page read and write
3D14002B8000
trusted library allocation
page read and write
46D8013F7000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D80031E000
trusted library allocation
page read and write
240400234000
direct allocation
page read and write
1453000
heap
page read and write
1FC6482B000
heap
page read and write
2E5801B00000
trusted library allocation
page read and write
1AE00102000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
29EBE276000
heap
page read and write
1AE007C2000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E580378C000
trusted library allocation
page read and write
17EC412E000
heap
page read and write
2E5801AD8000
trusted library allocation
page read and write
5D6000254000
trusted library allocation
page read and write
46D801926000
trusted library allocation
page read and write
1B8F7BB0000
trusted library allocation
page read and write
21408A00000
unkown
page readonly
664000220000
trusted library allocation
page read and write
92000EA6000
trusted library allocation
page read and write
3E1402612000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E58022E0000
trusted library allocation
page read and write
143F000
heap
page read and write
17EC9C02000
heap
page read and write
214010B4000
heap
page read and write
1AE00D43000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
2E580160D000
trusted library allocation
page read and write
2E5802061000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
16066C25000
heap
page read and write
46D80191E000
trusted library allocation
page read and write
2E5801A14000
trusted library allocation
page read and write
21401127000
heap
page read and write
46D800694000
trusted library allocation
page read and write
160E9EC4000
trusted library allocation
page read and write
20500980000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
41B39FE000
stack
page read and write
21401140000
heap
page read and write
2E5804086000
trusted library allocation
page read and write
1AE00D0A000
trusted library allocation
page read and write
2E5803FCC000
trusted library allocation
page read and write
161400258000
trusted library allocation
page read and write
61880030C000
direct allocation
page read and write
46D801924000
trusted library allocation
page read and write
53C800294000
trusted library allocation
page read and write
21401013000
heap
page read and write
46D801918000
trusted library allocation
page read and write
2E58040C7000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
2E580079C000
trusted library allocation
page read and write
2E5801C60000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
FDBD1FE000
unkown
page readonly
2E5803CFC000
trusted library allocation
page read and write
46D801964000
trusted library allocation
page read and write
2E58037EC000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
3E14028B4000
trusted library allocation
page read and write
46D800A40000
trusted library allocation
page read and write
2E9C00230000
direct allocation
page read and write
6188002D0000
direct allocation
page read and write
323000060000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
25CAD497000
heap
page read and write
29EBB413000
heap
page read and write
43F1DED000
stack
page read and write
2A317750000
heap
page readonly
41B49FB000
stack
page read and write
221400128000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
46D801918000
trusted library allocation
page read and write
2E5800A94000
trusted library allocation
page read and write
160EADBC000
unclassified section
page read and write
2E58009C1000
trusted library allocation
page read and write
17EC6BC0000
unkown
page read and write
16066C10000
heap
page read and write
46D801248000
trusted library allocation
page read and write
27C000234000
direct allocation
page read and write
5D6000141000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
2E5801B18000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
2E58040A8000
trusted library allocation
page read and write
46D800359000
trusted library allocation
page read and write
2E580381C000
trusted library allocation
page read and write
92001323000
trusted library allocation
page read and write
16066C25000
heap
page read and write
46D801922000
trusted library allocation
page read and write
3E1402269000
trusted library allocation
page read and write
1468000
heap
page read and write
7094000
heap
page read and write
46D8012DC000
trusted library allocation
page read and write
20500242000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
1469000
heap
page read and write
16066C57000
heap
page read and write
1487000
heap
page read and write
140E7D30000
heap
page read and write
46D801300000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
3D28000
heap
page read and write
74703FE000
unkown
page readonly
7050000
heap
page read and write
41A81FE000
unkown
page readonly
21400EF0000
heap
page read and write
16066C0A000
heap
page read and write
2E5804092000
trusted library allocation
page read and write
25CAA64B000
heap
page read and write
92001474000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
F2000264000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5803722000
trusted library allocation
page read and write
540000
unkown
page readonly
2E5800BA9000
trusted library allocation
page read and write
2E58006AB000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
25CAA579000
unclassified section
page read and write
46D80186E000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
2E58009B4000
trusted library allocation
page read and write
42E000278000
trusted library allocation
page read and write
74800348000
trusted library allocation
page read and write
21401127000
heap
page read and write
46D801920000
trusted library allocation
page read and write
1AE006AC000
trusted library allocation
page read and write
6FF0002B8000
trusted library allocation
page read and write
20500502000
trusted library allocation
page read and write
16066C10000
heap
page read and write
4BCA0000
trusted library allocation
page read and write
2E5801A88000
trusted library allocation
page read and write
552800280000
trusted library allocation
page read and write
141F000
heap
page read and write
7476BFB000
stack
page read and write
AD31FFE000
stack
page read and write
16066C2B000
heap
page read and write
5D60002AD000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
E132BFD000
stack
page read and write
17EC4141000
heap
page read and write
E10DBFE000
stack
page read and write
25CAA813000
heap
page read and write
46D80186C000
trusted library allocation
page read and write
323000070000
trusted library allocation
page read and write
2E58015D4000
trusted library allocation
page read and write
2E5800E5C000
trusted library allocation
page read and write
EEC000
unkown
page execute and read and write
2E5801A4C000
trusted library allocation
page read and write
2E5803BE4000
trusted library allocation
page read and write
17EC941B000
heap
page read and write
2404002AC000
direct allocation
page read and write
1B882602000
heap
page read and write
46D801924000
trusted library allocation
page read and write
3E1402374000
trusted library allocation
page read and write
1B00000C000
trusted library allocation
page read and write
20500894000
trusted library allocation
page read and write
25CAA613000
heap
page read and write
30980020C000
trusted library allocation
page read and write
16066C11000
heap
page read and write
2070003B0000
trusted library allocation
page read and write
E640040C000
trusted library allocation
page read and write
2E5801AF8000
trusted library allocation
page read and write
53C800201000
trusted library allocation
page read and write
C2C0028C000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
1471000
heap
page read and write
2E5800A50000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E580375C000
trusted library allocation
page read and write
6F00000D8000
trusted library allocation
page read and write
321000404000
direct allocation
page read and write
592C00174000
trusted library allocation
page read and write
2404002B0000
direct allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
5D60000E9000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
92000EEF000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
E12A3FE000
unkown
page readonly
2E58037B4000
trusted library allocation
page read and write
748000E0000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
25CAD49F000
heap
page read and write
321000220000
direct allocation
page read and write
9200134C000
trusted library allocation
page read and write
2E58016B9000
trusted library allocation
page read and write
1466000
heap
page read and write
2E9C00290000
direct allocation
page read and write
46D801918000
trusted library allocation
page read and write
1AE00E51000
trusted library allocation
page read and write
E11FBFD000
stack
page read and write
46D80190A000
trusted library allocation
page read and write
2E580080C000
trusted library allocation
page read and write
FDBC9FE000
stack
page read and write
2E58036C4000
trusted library allocation
page read and write
5D60002C8000
trusted library allocation
page read and write
E11D3FE000
unkown
page readonly
2E5800F74000
trusted library allocation
page read and write
7480044C000
trusted library allocation
page read and write
5D4C002CC000
direct allocation
page read and write
740E7FE000
unkown
page readonly
46D801950000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
29EBB2A0000
heap
page read and write
1452000
heap
page read and write
1AE007D0000
trusted library allocation
page read and write
2E580373C000
trusted library allocation
page read and write
12F6000
stack
page read and write
46D801876000
trusted library allocation
page read and write
2E58037C4000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
25CAD290000
unclassified section
page read and write
46D801922000
trusted library allocation
page read and write
160EAB10000
unclassified section
page read and write
43F2DFE000
stack
page read and write
3E1402F70000
trusted library allocation
page read and write
21BC00274000
trusted library allocation
page read and write
1471000
heap
page read and write
46D8018F8000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
920006F4000
trusted library allocation
page read and write
2E5803EDC000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
2E5800662000
trusted library allocation
page read and write
19B03E32000
heap
page read and write
21BC00278000
trusted library allocation
page read and write
1FC64800000
heap
page read and write
3D14002B8000
trusted library allocation
page read and write
2E5804028000
trusted library allocation
page read and write
21401145000
heap
page read and write
46D801978000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
1444000
heap
page read and write
1E4000288000
trusted library allocation
page read and write
2E5804057000
trusted library allocation
page read and write
3E1400A01000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
74800401000
trusted library allocation
page read and write
AD32FFE000
stack
page read and write
3F70000
heap
page read and write
46D8019B4000
trusted library allocation
page read and write
27458302000
heap
page read and write
E12F3FE000
unkown
page readonly
26C8002A0000
trusted library allocation
page read and write
2E58037B4000
trusted library allocation
page read and write
1FC6485D000
heap
page read and write
46D800238000
trusted library allocation
page read and write
46D801992000
trusted library allocation
page read and write
47A000307000
direct allocation
page read and write
17EC4157000
heap
page read and write
46D800B44000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
2E58040C7000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2E5800B10000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
F200010C000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
46D80197C000
trusted library allocation
page read and write
46D8014F0000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
F2000138000
trusted library allocation
page read and write
92001434000
trusted library allocation
page read and write
3B0002E4000
direct allocation
page read and write
3DE6000
heap
page read and write
74800336000
trusted library allocation
page read and write
920001C1000
trusted library allocation
page read and write
E1303FE000
unkown
page readonly
2E58036EC000
trusted library allocation
page read and write
2E58020C1000
trusted library allocation
page read and write
3DB4000
heap
page read and write
16066C0A000
heap
page read and write
3D60000
heap
page read and write
46D801316000
trusted library allocation
page read and write
17EC9494000
heap
page read and write
46D801950000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
E5000220000
direct allocation
page read and write
27C85A00000
heap
page read and write
2E5800B48000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D800B4C000
trusted library allocation
page read and write
3E1402EA0000
trusted library allocation
page read and write
46D80189A000
trusted library allocation
page read and write
592C00268000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
2E580040C000
trusted library allocation
page read and write
664000274000
trusted library allocation
page read and write
2E5803FCC000
trusted library allocation
page read and write
2E5801A44000
trusted library allocation
page read and write
1AE00183000
trusted library allocation
page read and write
1482000
heap
page read and write
46D801930000
trusted library allocation
page read and write
2E5803F8C000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
46D801914000
trusted library allocation
page read and write
46D801884000
trusted library allocation
page read and write
2E5800874000
trusted library allocation
page read and write
2E5800EEC000
trusted library allocation
page read and write
46D800884000
trusted library allocation
page read and write
C2C00264000
trusted library allocation
page read and write
3E1402EA4000
trusted library allocation
page read and write
160E9EC2000
trusted library allocation
page read and write
4BD94000
trusted library allocation
page read and write
99C33FE000
stack
page read and write
E12BBFD000
stack
page read and write
46D8018DC000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5801B20000
trusted library allocation
page read and write
2E5801A78000
trusted library allocation
page read and write
2E5803766000
trusted library allocation
page read and write
2E5803F7A000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D8003D0000
trusted library allocation
page read and write
664000244000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
3D14002C4000
trusted library allocation
page read and write
2E5801A80000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
2F800054000
trusted library allocation
page read and write
2E5800B78000
trusted library allocation
page read and write
309800408000
trusted library allocation
page read and write
43F3DFD000
stack
page read and write
46D8018A4000
trusted library allocation
page read and write
46D8003A0000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
5D4C00201000
direct allocation
page read and write
AD2C7FE000
unkown
page readonly
46D8018AC000
trusted library allocation
page read and write
46D800211000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
27C0002D0000
direct allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
7480033B000
trusted library allocation
page read and write
160EA93D000
unclassified section
page read and write
74800510000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
2E5801A4C000
trusted library allocation
page read and write
46D8013A6000
trusted library allocation
page read and write
F2000201000
trusted library allocation
page read and write
5F9000328000
trusted library allocation
page read and write
2578002D4000
trusted library allocation
page read and write
240400264000
direct allocation
page read and write
17EC9C00000
heap
page read and write
21406453000
heap
page read and write
744E000
stack
page read and write
46D800B0A000
trusted library allocation
page read and write
46D800BC8000
trusted library allocation
page read and write
3E1402F70000
trusted library allocation
page read and write
2E5801AA0000
trusted library allocation
page read and write
674D000
stack
page read and write
920005D8000
trusted library allocation
page read and write
357D000
stack
page read and write
2E5804088000
trusted library allocation
page read and write
26C800270000
trusted library allocation
page read and write
46D801302000
trusted library allocation
page read and write
309800278000
trusted library allocation
page read and write
21408322000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
1B8F7A90000
heap
page read and write
20500184000
trusted library allocation
page read and write
3E140260C000
trusted library allocation
page read and write
2E5803834000
trusted library allocation
page read and write
4BC29000
trusted library allocation
page read and write
124800298000
trusted library allocation
page read and write
2E5800788000
trusted library allocation
page read and write
2E5800F44000
trusted library allocation
page read and write
2E58016CC000
trusted library allocation
page read and write
2E58003D9000
trusted library allocation
page read and write
1AE00E56000
trusted library allocation
page read and write
2E5803EC8000
trusted library allocation
page read and write
4EE400298000
direct allocation
page read and write
207000244000
trusted library allocation
page read and write
17EC9CA2000
heap
page read and write
21402F02000
heap
page read and write
3D10000
heap
page read and write
1455000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
21401154000
heap
page read and write
2E5801676000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
592C00098000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
7A2C00238000
trusted library allocation
page read and write
2E5804394000
trusted library allocation
page read and write
240400284000
direct allocation
page read and write
2E5802305000
trusted library allocation
page read and write
309800310000
trusted library allocation
page read and write
27C85A2B000
heap
page read and write
46D80188C000
trusted library allocation
page read and write
20500883000
trusted library allocation
page read and write
19B0691F000
trusted library allocation
page read and write
74800114000
trusted library allocation
page read and write
46D8012EC000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
17EC9241000
unkown
page readonly
46D8018DC000
trusted library allocation
page read and write
2050053A000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
142C000
heap
page read and write
2E5800BB4000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
27458199000
unclassified section
page read and write
74800150000
trusted library allocation
page read and write
592C000FC000
trusted library allocation
page read and write
7A2C0024C000
trusted library allocation
page read and write
21401142000
heap
page read and write
2E5800FC8000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58007A4000
trusted library allocation
page read and write
2E5803718000
trusted library allocation
page read and write
3DB3000
heap
page read and write
21BC00248000
trusted library allocation
page read and write
1AE01340000
trusted library allocation
page read and write
2E5801B40000
trusted library allocation
page read and write
92000C68000
trusted library allocation
page read and write
92000E7B000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
20500903000
trusted library allocation
page read and write
7400FFC000
stack
page read and write
53C800300000
trusted library allocation
page read and write
2E580089C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
20500554000
trusted library allocation
page read and write
2E5800FC8000
trusted library allocation
page read and write
2E5804244000
trusted library allocation
page read and write
16066C25000
heap
page read and write
41B0000
heap
page read and write
19B03E72000
heap
page read and write
5D6000178000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
2E5802341000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E580089A000
trusted library allocation
page read and write
C15ABFE000
stack
page read and write
46D800B0C000
trusted library allocation
page read and write
140E7F02000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
F2000139000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5800C88000
trusted library allocation
page read and write
7030000
heap
page read and write
5D600026C000
trusted library allocation
page read and write
592C001F0000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
1B8F7C98000
heap
page read and write
2578002E4000
trusted library allocation
page read and write
2E5804084000
trusted library allocation
page read and write
46D800BA0000
trusted library allocation
page read and write
E1183FE000
unkown
page readonly
2E5803704000
trusted library allocation
page read and write
41B19FE000
stack
page read and write
46D80192E000
trusted library allocation
page read and write
2E580399C000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
1B8F7C59000
heap
page read and write
2E5803714000
trusted library allocation
page read and write
1AE01204000
trusted library allocation
page read and write
1487000
heap
page read and write
5D600029F000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D800B16000
trusted library allocation
page read and write
2E5801AD0000
trusted library allocation
page read and write
1AE003DF000
trusted library allocation
page read and write
20500202000
trusted library allocation
page read and write
E10B3FE000
unkown
page readonly
46D801258000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
309800288000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D800B16000
trusted library allocation
page read and write
9DC00284000
trusted library allocation
page read and write
46D80061C000
trusted library allocation
page read and write
46D80191E000
trusted library allocation
page read and write
72D7000
heap
page read and write
14C0002C4000
trusted library allocation
page read and write
1AE00E5A000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
B911BFE000
stack
page read and write
1AE00D84000
trusted library allocation
page read and write
5D4C00274000
direct allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
5E60000
heap
page read and write
310400264000
direct allocation
page read and write
3E1402DE4000
trusted library allocation
page read and write
1E76A7F0000
heap
page read and write
E6400270000
trusted library allocation
page read and write
1AE007E3000
trusted library allocation
page read and write
1AE00DB2000
trusted library allocation
page read and write
E1203FE000
unkown
page readonly
20500538000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
1B8F7CC5000
heap
page read and write
1FCE854D000
unclassified section
page read and write
46D801970000
trusted library allocation
page read and write
C15E3FE000
unkown
page readonly
221400120000
trusted library allocation
page read and write
46D8002B4000
trusted library allocation
page read and write
2F800070000
trusted library allocation
page read and write
7035000
heap
page read and write
46D801948000
trusted library allocation
page read and write
1614002D4000
trusted library allocation
page read and write
41AA1FE000
unkown
page readonly
2E58015DC000
trusted library allocation
page read and write
2F8000F8000
trusted library allocation
page read and write
E50002A4000
direct allocation
page read and write
1435000
heap
page read and write
2E5803710000
trusted library allocation
page read and write
2E58039DC000
trusted library allocation
page read and write
2E58008AF000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
17EC9502000
heap
page read and write
46D801930000
trusted library allocation
page read and write
46D801982000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
1AE008E8000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
3BDB000
stack
page read and write
2E5800AF0000
trusted library allocation
page read and write
3E1402684000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
74207FE000
unkown
page readonly
160EAE7C000
unclassified section
page read and write
2E5801ED8000
trusted library allocation
page read and write
3B000220000
direct allocation
page read and write
29EBB350000
heap
page read and write
46D80192A000
trusted library allocation
page read and write
17EC4154000
heap
page read and write
20500520000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
1B882500000
heap
page read and write
2E5804380000
trusted library allocation
page read and write
19B03F02000
heap
page read and write
7418FFB000
stack
page read and write
2E58036CC000
trusted library allocation
page read and write
17EC9477000
heap
page read and write
7008000
heap
page read and write
46D8018B1000
trusted library allocation
page read and write
F20003C3000
trusted library allocation
page read and write
2050054E000
trusted library allocation
page read and write
46D800370000
trusted library allocation
page read and write
2E58036A8000
trusted library allocation
page read and write
2E5804084000
trusted library allocation
page read and write
2418F65F000
heap
page read and write
46D801928000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
664000254000
trusted library allocation
page read and write
2E58040C0000
trusted library allocation
page read and write
2E5800C7C000
trusted library allocation
page read and write
2140114D000
heap
page read and write
221400038000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
29EBE2A1000
heap
page read and write
46D800340000
trusted library allocation
page read and write
2E5803EE6000
trusted library allocation
page read and write
2E5800C20000
trusted library allocation
page read and write
2E5800F44000
trusted library allocation
page read and write
42E0002E8000
trusted library allocation
page read and write
46D800EFD000
trusted library allocation
page read and write
46D8008B2000
trusted library allocation
page read and write
32300011C000
trusted library allocation
page read and write
2A317902000
heap
page read and write
92000DD4000
trusted library allocation
page read and write
920005A0000
trusted library allocation
page read and write
21406620000
unkown
page readonly
2E5803724000
trusted library allocation
page read and write
2F800044000
trusted library allocation
page read and write
54D91FE000
stack
page read and write
27C859E0000
heap
page read and write
46D801968000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
46D8012EC000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
36BE000
stack
page read and write
5D60002B2000
trusted library allocation
page read and write
AD2D7FE000
unkown
page readonly
2E5801615000
trusted library allocation
page read and write
1482000
heap
page read and write
46D8016AC000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
1471000
heap
page read and write
6FF000274000
trusted library allocation
page read and write
46D801884000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
19B0692F000
trusted library allocation
page read and write
746C3FE000
unkown
page readonly
14C0002B0000
trusted library allocation
page read and write
17EC94F3000
heap
page read and write
2E5803704000
trusted library allocation
page read and write
2E5800B08000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
2F8000A8000
trusted library allocation
page read and write
EFA000
unkown
page write copy
2E5800AC0000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
5D600008C000
trusted library allocation
page read and write
748000C1000
trusted library allocation
page read and write
92000060000
trusted library allocation
page read and write
3E1402D68000
trusted library allocation
page read and write
74800113000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E5800ADA000
trusted library allocation
page read and write
46D80077D000
trusted library allocation
page read and write
F04000
unkown
page read and write
74800280000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E5801B30000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
21406421000
heap
page read and write
46D801932000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
27B87FE000
unkown
page readonly
29EBE2A9000
heap
page read and write
205008E0000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
3E0D000
heap
page read and write
46D801336000
trusted library allocation
page read and write
2E580407F000
trusted library allocation
page read and write
3B0002C4000
direct allocation
page read and write
3E140268A000
trusted library allocation
page read and write
5D6000248000
trusted library allocation
page read and write
17EC4141000
heap
page read and write
1AE015C2000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
3E1402458000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D8018B1000
trusted library allocation
page read and write
61880031B000
direct allocation
page read and write
16066C55000
heap
page read and write
46D801894000
trusted library allocation
page read and write
46D800751000
trusted library allocation
page read and write
2578002B4000
trusted library allocation
page read and write
C2B97FD000
stack
page read and write
46D8008AB000
trusted library allocation
page read and write
21408B50000
unkown
page readonly
46D80061C000
trusted library allocation
page read and write
1E4000238000
trusted library allocation
page read and write
17EC4142000
heap
page read and write
2E5803714000
trusted library allocation
page read and write
2E5802020000
trusted library allocation
page read and write
17EC9412000
heap
page read and write
2E9C002CC000
direct allocation
page read and write
704B000
heap
page read and write
5D60002DC000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
205008AC000
trusted library allocation
page read and write
3E14023D0000
trusted library allocation
page read and write
142C000
heap
page read and write
46D8012D4000
trusted library allocation
page read and write
2E58040BC000
trusted library allocation
page read and write
12480023C000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
1AE015E3000
trusted library allocation
page read and write
7421FFD000
stack
page read and write
16066C0A000
heap
page read and write
592C000B2000
trusted library allocation
page read and write
2E5800654000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
F2000101000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D800B90000
trusted library allocation
page read and write
16066C24000
heap
page read and write
747FBFD000
stack
page read and write
46D80192E000
trusted library allocation
page read and write
C2AB7FE000
stack
page read and write
7415FFD000
stack
page read and write
92000C34000
trusted library allocation
page read and write
747EBFC000
stack
page read and write
2E580028C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D801434000
trusted library allocation
page read and write
2E58020DF000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
5D60002B1000
trusted library allocation
page read and write
321000230000
direct allocation
page read and write
46D801928000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
7480011E000
trusted library allocation
page read and write
2E5800A0C000
trusted library allocation
page read and write
2E58037F4000
trusted library allocation
page read and write
2E580369A000
trusted library allocation
page read and write
2E5803F8C000
trusted library allocation
page read and write
2140114C000
heap
page read and write
4BC2C000
trusted library allocation
page read and write
1AE00B02000
trusted library allocation
page read and write
1AE00DA8000
trusted library allocation
page read and write
3B000234000
direct allocation
page read and write
1443000
heap
page read and write
2E58020BD000
trusted library allocation
page read and write
7DF4DCCC1000
trusted library allocation
page execute read
2E58022D1000
trusted library allocation
page read and write
3DCC000
heap
page read and write
2E58003D4000
trusted library allocation
page read and write
6FF0002A8000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
160A9CA0000
trusted library allocation
page read and write
1AE00D4A000
trusted library allocation
page read and write
21401129000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
5D6000248000
trusted library allocation
page read and write
F20000B4000
trusted library allocation
page read and write
2E5804084000
trusted library allocation
page read and write
2E5801F23000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
F200017C000
trusted library allocation
page read and write
2E9C0029C000
direct allocation
page read and write
2E5803724000
trusted library allocation
page read and write
323000104000
trusted library allocation
page read and write
16066AF0000
heap
page readonly
2E580378C000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
92000E74000
trusted library allocation
page read and write
143E000
heap
page read and write
1AE00D9F000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
700F000
heap
page read and write
309800274000
trusted library allocation
page read and write
92000CE8000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
2418F705000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
2E5800E2D000
trusted library allocation
page read and write
1E765E3F000
heap
page read and write
1AE0094B000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
240400201000
direct allocation
page read and write
46D801928000
trusted library allocation
page read and write
74237FE000
unkown
page readonly
16066C10000
heap
page read and write
2E5802261000
trusted library allocation
page read and write
321000244000
direct allocation
page read and write
3E1402444000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
3E1402438000
trusted library allocation
page read and write
46D80089C000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
1AE014C9000
trusted library allocation
page read and write
2E580375D000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
46D80191A000
trusted library allocation
page read and write
E6400274000
trusted library allocation
page read and write
2E5800B4C000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
C2B47FE000
stack
page read and write
46D800BA8000
trusted library allocation
page read and write
160EAE6E000
unclassified section
page read and write
5D600029F000
trusted library allocation
page read and write
160E9EB8000
trusted library allocation
page read and write
2E580033A000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
688E000
stack
page read and write
5D6000268000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
3DFD000
heap
page read and write
2E58037BC000
trusted library allocation
page read and write
46D800B10000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E58008A4000
trusted library allocation
page read and write
3E1402EA4000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
7474BFB000
stack
page read and write
1AE00DBF000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
17EC925D000
unkown
page readonly
5D60002B2000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
3E1402244000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
3D1400230000
trusted library allocation
page read and write
4EE400280000
direct allocation
page read and write
46D801926000
trusted library allocation
page read and write
1AE00D1C000
trusted library allocation
page read and write
F20003A8000
trusted library allocation
page read and write
E116BFB000
stack
page read and write
16066C0A000
heap
page read and write
2E5803F87000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E580378A000
trusted library allocation
page read and write
E12D3FE000
unkown
page readonly
310400234000
direct allocation
page read and write
3E140228C000
trusted library allocation
page read and write
25CAD4B9000
heap
page read and write
F200029C000
trusted library allocation
page read and write
3E14024A4000
trusted library allocation
page read and write
3E140221D000
trusted library allocation
page read and write
21402F02000
heap
page read and write
46D801898000
trusted library allocation
page read and write
1442000
heap
page read and write
46D801338000
trusted library allocation
page read and write
C2B3FFE000
unkown
page readonly
2E5800AD8000
trusted library allocation
page read and write
42E000264000
trusted library allocation
page read and write
161400248000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D800BAC000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
920000A8000
trusted library allocation
page read and write
146A000
heap
page read and write
1B8F7C58000
heap
page read and write
205009C2000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
74800104000
trusted library allocation
page read and write
1AE00E42000
trusted library allocation
page read and write
16066C00000
heap
page read and write
2E5800E30000
trusted library allocation
page read and write
1466000
heap
page read and write
2E5800ADD000
trusted library allocation
page read and write
2AC800264000
direct allocation
page read and write
920014E5000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E5800B58000
trusted library allocation
page read and write
46D8012A2000
trusted library allocation
page read and write
2E58015C0000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
92000E74000
trusted library allocation
page read and write
2E5800A40000
trusted library allocation
page read and write
1425000
heap
page read and write
146E000
heap
page read and write
5D6000284000
trusted library allocation
page read and write
2E5800A18000
trusted library allocation
page read and write
F2000384000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
2E5803EC8000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
3988002AC000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
1B88258F000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
3D1400288000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
3E140253E000
trusted library allocation
page read and write
46D80191A000
trusted library allocation
page read and write
920001D0000
trusted library allocation
page read and write
46D801874000
trusted library allocation
page read and write
46D801892000
trusted library allocation
page read and write
7470BFD000
stack
page read and write
5D600029C000
trusted library allocation
page read and write
46D800BC8000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
E12EBFE000
stack
page read and write
2E5800B10000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
146E000
heap
page read and write
46D8012EC000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
257800344000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
17EC414E000
heap
page read and write
46D800BA8000
trusted library allocation
page read and write
6F0000024000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
AD307FE000
unkown
page readonly
4BCA4000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
C2C00220000
trusted library allocation
page read and write
2E5802041000
trusted library allocation
page read and write
2E5804364000
trusted library allocation
page read and write
5D6000116000
trusted library allocation
page read and write
1AE00D1B000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
E64002E8000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D8012BC000
trusted library allocation
page read and write
1AE00D21000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
1E40002D4000
trusted library allocation
page read and write
3D70000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
146E000
heap
page read and write
9DC00310000
trusted library allocation
page read and write
5D60002B8000
trusted library allocation
page read and write
2E58008A9000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
2E580389C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
1F8800248000
trusted library allocation
page read and write
3D8C000
heap
page read and write
207000210000
trusted library allocation
page read and write
2E58038DC000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
25CAA5B0000
trusted library allocation
page read and write
2E580381C000
trusted library allocation
page read and write
1FC64712000
unclassified section
page read and write
4080000
heap
page read and write
7A2C002B0000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
46D801774000
trusted library allocation
page read and write
25CAD370000
trusted library allocation
page read and write
16066C26000
heap
page read and write
46D801930000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
1AE00E4D000
trusted library allocation
page read and write
17EC940C000
heap
page read and write
1404002A4000
trusted library allocation
page read and write
46D80020F000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
1AE014E2000
trusted library allocation
page read and write
74800550000
trusted library allocation
page read and write
2E580235B000
trusted library allocation
page read and write
4BCA4000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
1464000
heap
page read and write
26C80020C000
trusted library allocation
page read and write
1AE00CC2000
trusted library allocation
page read and write
46D8006AC000
trusted library allocation
page read and write
3E14022A4000
trusted library allocation
page read and write
2E580370A000
trusted library allocation
page read and write
920001F0000
trusted library allocation
page read and write
FDBF9FC000
stack
page read and write
6F00000DD000
trusted library allocation
page read and write
46D801870000
trusted library allocation
page read and write
2E580166C000
trusted library allocation
page read and write
2E5800A9A000
trusted library allocation
page read and write
46D800EFE000
trusted library allocation
page read and write
46D801260000
trusted library allocation
page read and write
205002C2000
trusted library allocation
page read and write
17EC5F00000
heap
page read and write
46D801930000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
92000F7F000
trusted library allocation
page read and write
B916BFE000
stack
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
2E5803812000
trusted library allocation
page read and write
1AE00A42000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
1464000
heap
page read and write
46D800A5A000
trusted library allocation
page read and write
592C000FC000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
3E1402F90000
trusted library allocation
page read and write
46D8016BC000
trusted library allocation
page read and write
3E1402714000
trusted library allocation
page read and write
1AE00900000
trusted library allocation
page read and write
2E5801A24000
trusted library allocation
page read and write
46D801892000
trusted library allocation
page read and write
1483000
heap
page read and write
74800001000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
FDC11FE000
unkown
page readonly
3E14027D8000
trusted library allocation
page read and write
46D8018D1000
trusted library allocation
page read and write
16066C23000
heap
page read and write
25CAA6FF000
heap
page read and write
46D801928000
trusted library allocation
page read and write
1B00000C000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
48B5DFA000
stack
page read and write
2E580089A000
trusted library allocation
page read and write
21BC00201000
trusted library allocation
page read and write
25CAD4C4000
heap
page read and write
7A2C00280000
trusted library allocation
page read and write
4BC70000
trusted library allocation
page read and write
1AE00DBB000
trusted library allocation
page read and write
2E5803EE6000
trusted library allocation
page read and write
274581B0000
heap
page read and write
46D8008F0000
trusted library allocation
page read and write
32300010C000
trusted library allocation
page read and write
1B8F7C7A000
heap
page read and write
4BC60000
trusted library allocation
page read and write
17EC9412000
heap
page read and write
1AE01502000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D801384000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
748003A0000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
7041000
heap
page read and write
21401126000
heap
page read and write
2E5803EE4000
trusted library allocation
page read and write
207000270000
trusted library allocation
page read and write
2080000C000
trusted library allocation
page read and write
2E580370C000
trusted library allocation
page read and write
552800280000
trusted library allocation
page read and write
1466000
heap
page read and write
240400244000
direct allocation
page read and write
46D801928000
trusted library allocation
page read and write
4F1400254000
direct allocation
page read and write
7480011C000
trusted library allocation
page read and write
1AE00E8A000
trusted library allocation
page read and write
920014DC000
trusted library allocation
page read and write
4BD71000
trusted library allocation
page read and write
46D80130C000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E5801A50000
trusted library allocation
page read and write
21401146000
heap
page read and write
16066C2B000
heap
page read and write
99C63FE000
stack
page read and write
214010FA000
heap
page read and write
AD20FF6000
stack
page read and write
3D95000
heap
page read and write
21401133000
heap
page read and write
16069CA7000
trusted library allocation
page read and write
3D140020C000
trusted library allocation
page read and write
748003D8000
trusted library allocation
page read and write
2E5804097000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
1AE0159C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
16066C10000
heap
page read and write
AD23FFE000
stack
page read and write
B9173FE000
unkown
page readonly
2E5802314000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
1AE00602000
trusted library allocation
page read and write
205008A5000
trusted library allocation
page read and write
1AE01600000
trusted library allocation
page read and write
2E580405C000
trusted library allocation
page read and write
2E58020D8000
trusted library allocation
page read and write
160EAD3A000
unclassified section
page read and write
74800388000
trusted library allocation
page read and write
17EC4148000
heap
page read and write
54DA1FC000
stack
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E5800E38000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
3CDB000
stack
page read and write
1AE006C8000
trusted library allocation
page read and write
2A317670000
heap
page read and write
2E5800F70000
trusted library allocation
page read and write
E6400238000
trusted library allocation
page read and write
664000260000
trusted library allocation
page read and write
1DD67FE000
unkown
page readonly
46D801932000
trusted library allocation
page read and write
1AE001AA000
trusted library allocation
page read and write
21406453000
heap
page read and write
2140112F000
heap
page read and write
2E580377A000
trusted library allocation
page read and write
46D800BE4000
trusted library allocation
page read and write
9200030C000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
20500556000
trusted library allocation
page read and write
19B03D40000
heap
page readonly
2E5803854000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
1FC64809000
heap
page read and write
1AE00CBF000
trusted library allocation
page read and write
1AE00E5B000
trusted library allocation
page read and write
41AB9FB000
stack
page read and write
46D800F2C000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E5800BB4000
trusted library allocation
page read and write
1AE007D9000
trusted library allocation
page read and write
3E1400C01000
trusted library allocation
page read and write
4EE4002BC000
direct allocation
page read and write
46D801928000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
74167FE000
unkown
page readonly
2E58037AC000
trusted library allocation
page read and write
1B882384000
trusted library section
page readonly
2E580379C000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
C2BA7FE000
stack
page read and write
3DDD000
heap
page read and write
46D801928000
trusted library allocation
page read and write
3E02000
heap
page read and write
3E140254C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
205009CC000
trusted library allocation
page read and write
16066800000
heap
page read and write
2E5803CA4000
trusted library allocation
page read and write
21401000000
heap
page read and write
323000186000
trusted library allocation
page read and write
2050087F000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
741A7FE000
unkown
page readonly
2E5800CE4000
trusted library allocation
page read and write
AD2EFF9000
stack
page read and write
2E580228E000
trusted library allocation
page read and write
2E580375C000
trusted library allocation
page read and write
16066750000
heap
page read and write
E64002D8000
trusted library allocation
page read and write
F2000264000
trusted library allocation
page read and write
46D80189A000
trusted library allocation
page read and write
E6400408000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
27C0002B4000
direct allocation
page read and write
53C80026C000
trusted library allocation
page read and write
2E580380C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5800F70000
trusted library allocation
page read and write
E6400254000
trusted library allocation
page read and write
46D801404000
trusted library allocation
page read and write
3B000270000
direct allocation
page read and write
1AE00702000
trusted library allocation
page read and write
207000260000
trusted library allocation
page read and write
1DD2FFD000
stack
page read and write
2E5803715000
trusted library allocation
page read and write
1AE00D77000
trusted library allocation
page read and write
16066C09000
heap
page read and write
27C000230000
direct allocation
page read and write
46D80190E000
trusted library allocation
page read and write
F200039C000
trusted library allocation
page read and write
1464000
heap
page read and write
2E58007A2000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
92000C0F000
trusted library allocation
page read and write
1B8F7CC9000
heap
page read and write
20500559000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
47A00030C000
direct allocation
page read and write
AD2DFFE000
stack
page read and write
F2000298000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5803764000
trusted library allocation
page read and write
1AE014C2000
trusted library allocation
page read and write
1614002E4000
trusted library allocation
page read and write
53C80023C000
trusted library allocation
page read and write
3E14030BC000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E5800F5C000
trusted library allocation
page read and write
2E580368C000
trusted library allocation
page read and write
748005E0000
trusted library allocation
page read and write
6640002C0000
trusted library allocation
page read and write
1404002CC000
trusted library allocation
page read and write
43F6DFC000
stack
page read and write
1E40002C8000
trusted library allocation
page read and write
1404002A4000
trusted library allocation
page read and write
4BC34000
trusted library allocation
page read and write
2E5800F4C000
trusted library allocation
page read and write
9200023E000
trusted library allocation
page read and write
3E1400601000
trusted library allocation
page read and write
46D8013A6000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
46D801880000
trusted library allocation
page read and write
19B03E64000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
1AE01602000
trusted library allocation
page read and write
16066C09000
heap
page read and write
7A2C0040C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
29EBB439000
heap
page read and write
309800248000
trusted library allocation
page read and write
2E5800FD8000
trusted library allocation
page read and write
2140112E000
heap
page read and write
3E1400E01000
trusted library allocation
page read and write
54DD1FE000
stack
page read and write
46D800B98000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
1DD7FFE000
stack
page read and write
46D80191C000
trusted library allocation
page read and write
19B03E00000
heap
page read and write
16066C0B000
heap
page read and write
3DCF000
heap
page read and write
1997000
heap
page read and write
14C0002C4000
trusted library allocation
page read and write
46D800A2C000
trusted library allocation
page read and write
1AE005C2000
trusted library allocation
page read and write
3E14022C7000
trusted library allocation
page read and write
17EC94EB000
heap
page read and write
1455000
heap
page read and write
2E58038A4000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
3E1402384000
trusted library allocation
page read and write
46D800BD3000
trusted library allocation
page read and write
2E580400C000
trusted library allocation
page read and write
20500302000
trusted library allocation
page read and write
1AE00DA4000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
1AE00F42000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
25CAA699000
heap
page read and write
20500541000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
46D801234000
trusted library allocation
page read and write
46D8008B3000
trusted library allocation
page read and write
160EA4B0000
unclassified section
page read and write
21406453000
heap
page read and write
2E58040D9000
trusted library allocation
page read and write
26C8002C4000
trusted library allocation
page read and write
2E5801A4E000
trusted library allocation
page read and write
2E58020D4000
trusted library allocation
page read and write
17EC4133000
heap
page read and write
17EC417F000
heap
page read and write
46D8012E4000
trusted library allocation
page read and write
B2C000
unkown
page execute and read and write
2E580368C000
trusted library allocation
page read and write
E1383FE000
unkown
page readonly
7FFF4D460000
direct allocation
page execute read
46D80136B000
trusted library allocation
page read and write
592C002B0000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
16066C25000
heap
page read and write
46D8018B1000
trusted library allocation
page read and write
1AE00307000
trusted library allocation
page read and write
E50002D0000
direct allocation
page read and write
74800118000
trusted library allocation
page read and write
1AE0080B000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
41A0000
remote allocation
page read and write
2E5802007000
trusted library allocation
page read and write
207000220000
trusted library allocation
page read and write
1248002D4000
trusted library allocation
page read and write
7A2C0029C000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1E765E68000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
2E5800B04000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
46D800674000
trusted library allocation
page read and write
257800264000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
74007FE000
unkown
page readonly
1AE005CE000
trusted library allocation
page read and write
748003B7000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
16066C2D000
heap
page read and write
AD2BFFE000
stack
page read and write
2E5800E38000
trusted library allocation
page read and write
920005D8000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
29EBB77F000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2E5803F87000
trusted library allocation
page read and write
48B2DFE000
stack
page read and write
46D80186C000
trusted library allocation
page read and write
20500907000
trusted library allocation
page read and write
3E1403190000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
2E5803824000
trusted library allocation
page read and write
748000CA000
trusted library allocation
page read and write
2E5801560000
trusted library allocation
page read and write
1AE00E43000
trusted library allocation
page read and write
2214000C4000
trusted library allocation
page read and write
2E5801974000
trusted library allocation
page read and write
46D800B4C000
trusted library allocation
page read and write
7480011E000
trusted library allocation
page read and write
53C80028C000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
161400201000
trusted library allocation
page read and write
46D8008A0000
trusted library allocation
page read and write
3D1400278000
trusted library allocation
page read and write
205004C0000
trusted library allocation
page read and write
4F1400288000
direct allocation
page read and write
F2000288000
trusted library allocation
page read and write
1F8800254000
trusted library allocation
page read and write
160EAED0000
unclassified section
page read and write
46D801410000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
3E14023D8000
trusted library allocation
page read and write
5D4C002B0000
direct allocation
page read and write
1AE005C0000
trusted library allocation
page read and write
74187FE000
unkown
page readonly
E11B3FE000
unkown
page readonly
2E58006A8000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
46D801886000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
27C85B02000
heap
page read and write
46D801924000
trusted library allocation
page read and write
1AE015FA000
trusted library allocation
page read and write
17EC4105000
heap
page read and write
46D8018FD000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
3D9E000
heap
page read and write
E78000
unkown
page execute and read and write
2E58037C4000
trusted library allocation
page read and write
221400050000
trusted library allocation
page read and write
5D60002C8000
trusted library allocation
page read and write
1FCE7CB4000
trusted library allocation
page read and write
1AE01512000
trusted library allocation
page read and write
592C0028C000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D80065E000
trusted library allocation
page read and write
92001544000
trusted library allocation
page read and write
16066C5F000
heap
page read and write
2E5804099000
trusted library allocation
page read and write
92000C64000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
143B000
heap
page read and write
F200012C000
trusted library allocation
page read and write
46D8017F3000
trusted library allocation
page read and write
2E580236A000
trusted library allocation
page read and write
6F0000050000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
5528002B8000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
1F88002B8000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
4F14002D0000
direct allocation
page read and write
3104002A4000
direct allocation
page read and write
2E5800E5C000
trusted library allocation
page read and write
2E58040C5000
trusted library allocation
page read and write
1B8F7C71000
heap
page read and write
42E0002A8000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
2E5803EDC000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
2E58009C1000
trusted library allocation
page read and write
1AE00DA6000
trusted library allocation
page read and write
2E58008B0000
trusted library allocation
page read and write
748001D6000
trusted library allocation
page read and write
2E580383C000
trusted library allocation
page read and write
2E5802270000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
748001D4000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
1AE01342000
trusted library allocation
page read and write
143C000
heap
page read and write
29EBE2BC000
heap
page read and write
2E58036E4000
trusted library allocation
page read and write
46D8012F4000
trusted library allocation
page read and write
2214000D4000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
7FFF7A284000
trusted library allocation
page execute and read and write
1AE00844000
trusted library allocation
page read and write
2E5803758000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
309800284000
trusted library allocation
page read and write
1435000
heap
page read and write
2E5802072000
trusted library allocation
page read and write
17EC412E000
heap
page read and write
21401102000
heap
page read and write
46D8018F8000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D800C0C000
trusted library allocation
page read and write
748003CB000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
2E5801B58000
trusted library allocation
page read and write
1AE00D7A000
trusted library allocation
page read and write
3D52000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
2418F62B000
heap
page read and write
592C00124000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2F800108000
trusted library allocation
page read and write
3098002C0000
trusted library allocation
page read and write
25CAA6F8000
heap
page read and write
FDBE1FE000
unkown
page readonly
1404002C4000
trusted library allocation
page read and write
2E5800BA8000
trusted library allocation
page read and write
E111BF9000
stack
page read and write
26C8002AC000
trusted library allocation
page read and write
46D801290000
trusted library allocation
page read and write
3B000238000
direct allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
1360000
heap
page read and write
1464000
heap
page read and write
2E5800B4C000
trusted library allocation
page read and write
2E5803764000
trusted library allocation
page read and write
2E5800A94000
trusted library allocation
page read and write
46D80170C000
trusted library allocation
page read and write
2E5801AE4000
trusted library allocation
page read and write
2E580378C000
trusted library allocation
page read and write
17EC419B000
heap
page read and write
145E000
heap
page read and write
2E58016E7000
trusted library allocation
page read and write
2E580167A000
trusted library allocation
page read and write
920007B2000
trusted library allocation
page read and write
5D6000140000
trusted library allocation
page read and write
42E0002C0000
trusted library allocation
page read and write
46D8018AE000
trusted library allocation
page read and write
1404002CC000
trusted library allocation
page read and write
221400108000
trusted library allocation
page read and write
2050050D000
trusted library allocation
page read and write
E6400250000
trusted library allocation
page read and write
E135BFC000
stack
page read and write
25CAA6C5000
heap
page read and write
29EBB431000
heap
page read and write
46D801994000
trusted library allocation
page read and write
2E5803F11000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
47A000324000
direct allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
2E580368A000
trusted library allocation
page read and write
205004F3000
trusted library allocation
page read and write
19B03DB0000
trusted library section
page readonly
2E5803762000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
46D801412000
trusted library allocation
page read and write
740DFFE000
stack
page read and write
46D801924000
trusted library allocation
page read and write
21401135000
heap
page read and write
50FD000
stack
page read and write
1478002BC000
direct allocation
page read and write
9200011C000
trusted library allocation
page read and write
E107BFB000
stack
page read and write
1AE005C0000
trusted library allocation
page read and write
F2000082000
trusted library allocation
page read and write
92000290000
trusted library allocation
page read and write
20500518000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
2E580407D000
trusted library allocation
page read and write
5D4C00284000
direct allocation
page read and write
4BC0C000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
205008B2000
trusted library allocation
page read and write
9DC00248000
trusted library allocation
page read and write
25CAD48F000
heap
page read and write
46D801918000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
9200133B000
trusted library allocation
page read and write
2E58036CD000
trusted library allocation
page read and write
1AE00582000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5800F74000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801914000
trusted library allocation
page read and write
323000080000
trusted library allocation
page read and write
53C800298000
trusted library allocation
page read and write
1435000
heap
page read and write
43F0000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
1B8F7C5D000
heap
page read and write
2E5801B00000
trusted library allocation
page read and write
2E5803F74000
trusted library allocation
page read and write
F2000292000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
29EBB440000
heap
page read and write
3E1402394000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
21401052000
heap
page read and write
2E5800A50000
trusted library allocation
page read and write
AD297FE000
unkown
page readonly
46D801930000
trusted library allocation
page read and write
2E580386C000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E58015E4000
trusted library allocation
page read and write
21401142000
heap
page read and write
46D801924000
trusted library allocation
page read and write
2E58040AF000
trusted library allocation
page read and write
592C000D8000
trusted library allocation
page read and write
1FC64813000
heap
page read and write
46D800352000
trusted library allocation
page read and write
9DC00258000
trusted library allocation
page read and write
1443000
heap
page read and write
E1163FE000
unkown
page readonly
92000B50000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D800898000
trusted library allocation
page read and write
29EBB300000
remote allocation
page read and write
2E9C002C0000
direct allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
1AE00D49000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
1AE007FD000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801240000
trusted library allocation
page read and write
5D600026A000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2404002A0000
direct allocation
page read and write
1AE00D56000
trusted library allocation
page read and write
26C800288000
trusted library allocation
page read and write
4EE40029C000
direct allocation
page read and write
2E5803884000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
1FCE7AA7000
unclassified section
page read and write
2E5800898000
trusted library allocation
page read and write
748004A0000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
46D801590000
trusted library allocation
page read and write
19B03E6C000
heap
page read and write
16066C25000
heap
page read and write
21402F12000
heap
page read and write
748003C8000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
3E1402885000
trusted library allocation
page read and write
1473000
heap
page read and write
2E580371C000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
146F000
heap
page read and write
21BC0028C000
trusted library allocation
page read and write
46D8018FF000
trusted library allocation
page read and write
147800238000
direct allocation
page read and write
2E5803EE2000
trusted library allocation
page read and write
2E580227F000
trusted library allocation
page read and write
1AE0148A000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
3E140251A000
trusted library allocation
page read and write
21406412000
heap
page read and write
1AE005C2000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
46D801370000
trusted library allocation
page read and write
2E5800C20000
trusted library allocation
page read and write
4BD60000
trusted library allocation
page read and write
92001384000
trusted library allocation
page read and write
25CAA470000
heap
page read and write
2418F665000
heap
page read and write
3D6A000
heap
page read and write
2E5803714000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
199A000
heap
page read and write
1471000
heap
page read and write
592C0020C000
trusted library allocation
page read and write
2E58042F8000
trusted library allocation
page read and write
3E14027D8000
trusted library allocation
page read and write
2F8000E0000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58016EB000
trusted library allocation
page read and write
20500582000
trusted library allocation
page read and write
1AE007C8000
trusted library allocation
page read and write
46D801860000
trusted library allocation
page read and write
2E5803740000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5800AB4000
trusted library allocation
page read and write
3D1400254000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
2F800028000
trusted library allocation
page read and write
2E5800E30000
trusted library allocation
page read and write
C2B17FE000
stack
page read and write
E64002BC000
trusted library allocation
page read and write
1482000
heap
page read and write
1464000
heap
page read and write
46D80130C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D80123C000
trusted library allocation
page read and write
2E58034CC000
trusted library allocation
page read and write
7477BFC000
stack
page read and write
16066C10000
heap
page read and write
161400288000
trusted library allocation
page read and write
46D80060C000
trusted library allocation
page read and write
74800114000
trusted library allocation
page read and write
7480022C000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
46D8003D0000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
1E765E70000
heap
page read and write
46D801880000
trusted library allocation
page read and write
46D8018FA000
trusted library allocation
page read and write
124800220000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
99C03FE000
stack
page read and write
2E5801A2C000
trusted library allocation
page read and write
16066C25000
heap
page read and write
920002B0000
trusted library allocation
page read and write
2E58022E8000
trusted library allocation
page read and write
7480000C000
trusted library allocation
page read and write
140400268000
trusted library allocation
page read and write
2745B6F7000
unclassified section
page read and write
74177FE000
unkown
page readonly
16066C10000
heap
page read and write
46D80191A000
trusted library allocation
page read and write
2E5801B48000
trusted library allocation
page read and write
74800510000
trusted library allocation
page read and write
1614002E4000
trusted library allocation
page read and write
16066C11000
heap
page read and write
143F000
heap
page read and write
5D600026A000
trusted library allocation
page read and write
2E58015F4000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
46D800418000
trusted library allocation
page read and write
2578002E8000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
46D800F20000
trusted library allocation
page read and write
146A000
heap
page read and write
2E5801C5C000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
1AE0150F000
trusted library allocation
page read and write
6F0000044000
trusted library allocation
page read and write
25CAD4AA000
heap
page read and write
46D801928000
trusted library allocation
page read and write
46D80139A000
trusted library allocation
page read and write
46D800330000
trusted library allocation
page read and write
25CAA702000
heap
page read and write
46D801950000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
5D60001A4000
trusted library allocation
page read and write
3860002A0000
trusted library allocation
page read and write
257800355000
trusted library allocation
page read and write
92000B65000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
143C000
heap
page read and write
746FBFD000
stack
page read and write
1454000
heap
page read and write
1AE00686000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
3E140251F000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5803ABC000
trusted library allocation
page read and write
21408B40000
unkown
page readonly
46D8003E8000
trusted library allocation
page read and write
1AE00600000
trusted library allocation
page read and write
5D600006C000
trusted library allocation
page read and write
1AE00DA0000
trusted library allocation
page read and write
46D800A15000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5F9000238000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
74800464000
trusted library allocation
page read and write
43F35FB000
stack
page read and write
1FC647E7000
unclassified section
page read and write
2E580368A000
trusted library allocation
page read and write
2E5800B88000
trusted library allocation
page read and write
2E58040B8000
trusted library allocation
page read and write
2E5804348000
trusted library allocation
page read and write
74107FE000
unkown
page readonly
46D80192C000
trusted library allocation
page read and write
92001377000
trusted library allocation
page read and write
5D4C002A0000
direct allocation
page read and write
2E58016DF000
trusted library allocation
page read and write
2E5801E94000
trusted library allocation
page read and write
46D8018AC000
trusted library allocation
page read and write
74800482000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
46D8012EC000
trusted library allocation
page read and write
160EBB5D000
unclassified section
page read and write
46D801996000
trusted library allocation
page read and write
1AE01680000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58023C1000
trusted library allocation
page read and write
74800117000
trusted library allocation
page read and write
2E58008AC000
trusted library allocation
page read and write
7068000
heap
page read and write
54D39FE000
unkown
page readonly
46D801930000
trusted library allocation
page read and write
1AE00D82000
trusted library allocation
page read and write
74800070000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
3DD2000
heap
page read and write
2E5803F74000
trusted library allocation
page read and write
E6400211000
trusted library allocation
page read and write
1AE015F8000
trusted library allocation
page read and write
1AE00F82000
trusted library allocation
page read and write
592C0027A000
trusted library allocation
page read and write
2E9C00264000
direct allocation
page read and write
2E58040C0000
trusted library allocation
page read and write
205004E8000
trusted library allocation
page read and write
46D8017CF000
trusted library allocation
page read and write
92000244000
trusted library allocation
page read and write
3DED000
heap
page read and write
1AE00F83000
trusted library allocation
page read and write
E1213FE000
unkown
page readonly
1464000
heap
page read and write
C15BBFE000
stack
page read and write
14C0002C4000
trusted library allocation
page read and write
74077FE000
unkown
page readonly
323000110000
trusted library allocation
page read and write
2E5800A9C000
trusted library allocation
page read and write
2E58036D2000
trusted library allocation
page read and write
46D80130C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5800AB4000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
46D801996000
trusted library allocation
page read and write
740CFFE000
stack
page read and write
46D801910000
trusted library allocation
page read and write
2E5800B04000
trusted library allocation
page read and write
29EBB802000
heap
page read and write
16066C10000
heap
page read and write
46D801918000
trusted library allocation
page read and write
51C00023C000
trusted library allocation
page read and write
143F000
heap
page read and write
17EC9402000
heap
page read and write
E640031C000
trusted library allocation
page read and write
2AC800201000
direct allocation
page read and write
9DC00230000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
43F8DFC000
stack
page read and write
16066C0B000
heap
page read and write
21400ED0000
heap
page read and write
754E000
stack
page read and write
46D800AD8000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
14C0002B4000
trusted library allocation
page read and write
1B884A02000
heap
page read and write
2E58036F4000
trusted library allocation
page read and write
1E40002E4000
trusted library allocation
page read and write
2E9C002A0000
direct allocation
page read and write
C2AF7FE000
stack
page read and write
46D800B45000
trusted library allocation
page read and write
2F800110000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
1455000
heap
page read and write
5D4C002C0000
direct allocation
page read and write
27C85A1C000
heap
page read and write
2E580369C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
7FFF7A304000
trusted library allocation
page execute and read and write
2E580399C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
3098002E0000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
F200013B000
trusted library allocation
page read and write
19B03E5A000
heap
page read and write
398800268000
trusted library allocation
page read and write
748004D7000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E58037C4000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
746DBFE000
stack
page read and write
74800194000
trusted library allocation
page read and write
2E5804095000
trusted library allocation
page read and write
2E58016DB000
trusted library allocation
page read and write
16066C10000
heap
page read and write
17EC4000000
heap
page read and write
5D60000FC000
trusted library allocation
page read and write
17EC4129000
heap
page read and write
2E5801AC0000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
4BCB0000
trusted library allocation
page read and write
74800178000
trusted library allocation
page read and write
2E5803742000
trusted library allocation
page read and write
3B00020C000
direct allocation
page read and write
1442000
heap
page read and write
46D801932000
trusted library allocation
page read and write
2E5803F87000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
5D6000280000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1B8F7C5C000
heap
page read and write
309800254000
trusted library allocation
page read and write
2E58037A4000
trusted library allocation
page read and write
2E580164C000
trusted library allocation
page read and write
1AE0103A000
trusted library allocation
page read and write
240400274000
direct allocation
page read and write
46D800B08000
trusted library allocation
page read and write
46D8018B1000
trusted library allocation
page read and write
21BC002B0000
trusted library allocation
page read and write
2E5803EF4000
trusted library allocation
page read and write
309800201000
trusted library allocation
page read and write
2E58009F8000
trusted library allocation
page read and write
46D80089C000
trusted library allocation
page read and write
718C00424000
trusted library allocation
page read and write
2E5800F2C000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
2E5803A54000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
2E9C00284000
direct allocation
page read and write
3DA6000
heap
page read and write
F2000038000
trusted library allocation
page read and write
74800339000
trusted library allocation
page read and write
29EBE2C0000
heap
page read and write
21406383000
unkown
page readonly
5D600026C000
trusted library allocation
page read and write
2E5803EE0000
trusted library allocation
page read and write
2E58038A7000
trusted library allocation
page read and write
46D800718000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E58037BE000
trusted library allocation
page read and write
9200001D000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
46D8002B0000
trusted library allocation
page read and write
3E1402EA0000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
27BBFFC000
stack
page read and write
C2BE7FE000
stack
page read and write
1AE00E52000
trusted library allocation
page read and write
2E5800338000
trusted library allocation
page read and write
16066C09000
heap
page read and write
20500182000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
47A00030D000
direct allocation
page read and write
207000310000
trusted library allocation
page read and write
2E5803F74000
trusted library allocation
page read and write
1AE00B82000
trusted library allocation
page read and write
29EBB4FF000
heap
page read and write
16066C09000
heap
page read and write
1E4000254000
trusted library allocation
page read and write
46D801280000
trusted library allocation
page read and write
3E14023B4000
trusted library allocation
page read and write
16066C10000
heap
page read and write
21401130000
heap
page read and write
2E580310A000
trusted library allocation
page read and write
AD2FFFE000
stack
page read and write
46D8009D8000
trusted library allocation
page read and write
2E58040EB000
trusted library allocation
page read and write
53C80020C000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
F200029C000
trusted library allocation
page read and write
2E58008A6000
trusted library allocation
page read and write
592C0014D000
trusted library allocation
page read and write
2E58036E2000
trusted library allocation
page read and write
54D79FE000
unkown
page readonly
592C00278000
trusted library allocation
page read and write
2E58040BE000
trusted library allocation
page read and write
2E5800B04000
trusted library allocation
page read and write
748003C8000
trusted library allocation
page read and write
46D8003B9000
trusted library allocation
page read and write
46D80039C000
trusted library allocation
page read and write
17EC941E000
heap
page read and write
25CAA562000
unclassified section
page read and write
C04000
unkown
page execute and write copy
1AE007DA000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
92000E74000
trusted library allocation
page read and write
4BC34000
trusted library allocation
page read and write
1454000
heap
page read and write
46D801916000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
3E14030F4000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E5803CD4000
trusted library allocation
page read and write
E123BFE000
stack
page read and write
2E58036CC000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
26C800238000
trusted library allocation
page read and write
205004F3000
trusted library allocation
page read and write
17EC4129000
heap
page read and write
29EBB478000
heap
page read and write
74800118000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
2E5800FC8000
trusted library allocation
page read and write
2E9C002AC000
direct allocation
page read and write
2E5803864000
trusted library allocation
page read and write
16066C60000
heap
page read and write
46D801319000
trusted library allocation
page read and write
1AE013C0000
trusted library allocation
page read and write
74800694000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D8012A2000
trusted library allocation
page read and write
4BD10000
trusted library allocation
page read and write
7A2C00268000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
3098002A0000
trusted library allocation
page read and write
2E5800BC4000
trusted library allocation
page read and write
140E7E3C000
heap
page read and write
1482000
heap
page read and write
53C800268000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
160EAE90000
unclassified section
page read and write
3988002C4000
trusted library allocation
page read and write
16066C10000
heap
page read and write
1466000
heap
page read and write
14040023C000
trusted library allocation
page read and write
E12ABFE000
stack
page read and write
2E5802094000
trusted library allocation
page read and write
2E58040B1000
trusted library allocation
page read and write
9DC00238000
trusted library allocation
page read and write
3B0002B4000
direct allocation
page read and write
74800380000
trusted library allocation
page read and write
46D8006FC000
trusted library allocation
page read and write
1FC64360000
heap
page read and write
592C0027C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
748001C0000
trusted library allocation
page read and write
46D8019E0000
trusted library allocation
page read and write
146F000
heap
page read and write
16066C0A000
heap
page read and write
3230000AC000
trusted library allocation
page read and write
2E580206E000
trusted library allocation
page read and write
592C001D8000
trusted library allocation
page read and write
1404002B8000
trusted library allocation
page read and write
1AE011C2000
trusted library allocation
page read and write
2A3177C0000
trusted library allocation
page read and write
17EC3FF0000
heap
page read and write
20500082000
trusted library allocation
page read and write
2E580074C000
trusted library allocation
page read and write
1AE00808000
trusted library allocation
page read and write
17EC40B8000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
21401154000
heap
page read and write
3E14030DC000
trusted library allocation
page read and write
16066C09000
heap
page read and write
16066C09000
heap
page read and write
3230000C3000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
17EC3FB0000
heap
page readonly
16066C25000
heap
page read and write
2E5800B10000
trusted library allocation
page read and write
1AE007D1000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
46D801498000
trusted library allocation
page read and write
1AE01065000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
5D4C00234000
direct allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
1454000
heap
page read and write
25CAD4BB000
heap
page read and write
E500027C000
direct allocation
page read and write
1404002B0000
trusted library allocation
page read and write
74800191000
trusted library allocation
page read and write
2E5803EEE000
trusted library allocation
page read and write
160EBB21000
unclassified section
page read and write
4087000
heap
page read and write
1AE00D06000
trusted library allocation
page read and write
1AE00955000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D800B4C000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
1482000
heap
page read and write
5D6000282000
trusted library allocation
page read and write
2E58040D0000
trusted library allocation
page read and write
1473000
heap
page read and write
2E58040E0000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
92000BE0000
trusted library allocation
page read and write
1435000
heap
page read and write
920005E8000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
1AE00E83000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801924000
trusted library allocation
page read and write
2E58037CC000
trusted library allocation
page read and write
1482000
heap
page read and write
42E0002F0000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
46D8014A0000
trusted library allocation
page read and write
2E5800A0C000
trusted library allocation
page read and write
2A31ACD0000
unclassified section
page read and write
2E580156C000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
1AE00378000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
2E5803F87000
trusted library allocation
page read and write
748006FF000
trusted library allocation
page read and write
2E5801681000
trusted library allocation
page read and write
46D801316000
trusted library allocation
page read and write
5D4C00244000
direct allocation
page read and write
1AE0123A000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
1AE00AC2000
trusted library allocation
page read and write
2E5800E64000
trusted library allocation
page read and write
5D6000098000
trusted library allocation
page read and write
2E5803F6F000
trusted library allocation
page read and write
26C8002A0000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D80133A000
trusted library allocation
page read and write
74800260000
trusted library allocation
page read and write
205001C2000
trusted library allocation
page read and write
2E58037A4000
trusted library allocation
page read and write
6F0000098000
trusted library allocation
page read and write
142E000
heap
page read and write
3E14031A3000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
2140641C000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E5803AF4000
trusted library allocation
page read and write
2E5800A40000
trusted library allocation
page read and write
3D8E000
heap
page read and write
17EC4127000
heap
page read and write
4F14002B0000
direct allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D80191A000
trusted library allocation
page read and write
2E5800E0C000
trusted library allocation
page read and write
1F88002D4000
trusted library allocation
page read and write
2E58020CC000
trusted library allocation
page read and write
46D8008A4000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
2E5800F6C000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
E1113FE000
unkown
page readonly
1434000
heap
page read and write
3D1400258000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
25CAD458000
heap
page read and write
20500508000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
74027FE000
unkown
page readonly
E129BFE000
stack
page read and write
592C0005C000
trusted library allocation
page read and write
2214000FC000
trusted library allocation
page read and write
AD2F7FE000
unkown
page readonly
3D28000
heap
page read and write
17EC4127000
heap
page read and write
46D801930000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58038B4000
trusted library allocation
page read and write
2E5800F98000
trusted library allocation
page read and write
25CAA6FB000
heap
page read and write
46D801932000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
1F8800244000
trusted library allocation
page read and write
1442000
heap
page read and write
2E58036F4000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
74800110000
trusted library allocation
page read and write
46D80027C000
trusted library allocation
page read and write
25CAA668000
heap
page read and write
2E5800A68000
trusted library allocation
page read and write
2E5803568000
trusted library allocation
page read and write
2E58037EC000
trusted library allocation
page read and write
46D800770000
trusted library allocation
page read and write
1B8F7CB8000
heap
page read and write
B9133FE000
unkown
page readonly
46D8018B1000
trusted library allocation
page read and write
16066C10000
heap
page read and write
205004E9000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E58037EC000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
1AE00D52000
trusted library allocation
page read and write
92000B97000
trusted library allocation
page read and write
2E5800FE0000
trusted library allocation
page read and write
1E765D70000
heap
page read and write
1483000
heap
page read and write
C2A97FA000
stack
page read and write
E12CBFE000
stack
page read and write
2050054C000
trusted library allocation
page read and write
2AC8002CC000
direct allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
99C5BFE000
unkown
page readonly
16066C0A000
heap
page read and write
3230000E0000
trusted library allocation
page read and write
2E5803744000
trusted library allocation
page read and write
140400270000
trusted library allocation
page read and write
2E5804028000
trusted library allocation
page read and write
FDC01FE000
unkown
page readonly
3880000
heap
page read and write
46D801260000
trusted library allocation
page read and write
7404FFE000
stack
page read and write
3210002D4000
direct allocation
page read and write
2E5800B88000
trusted library allocation
page read and write
3E1402674000
trusted library allocation
page read and write
1AE00F80000
trusted library allocation
page read and write
2E58003EC000
trusted library allocation
page read and write
1AE0120D000
trusted library allocation
page read and write
74800088000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
C15C3FE000
unkown
page readonly
2E5800614000
trusted library allocation
page read and write
17EC9C7F000
heap
page read and write
46D8012A0000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
17EC406C000
heap
page read and write
205004EA000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
20500517000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
4EE4002A8000
direct allocation
page read and write
46D8009F9000
trusted library allocation
page read and write
2E5800AC2000
trusted library allocation
page read and write
74800550000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
17EC4149000
heap
page read and write
16066C10000
heap
page read and write
2E5800D1C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2418F669000
heap
page read and write
29EBB4F9000
heap
page read and write
46D8018B1000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
C2AC7FE000
stack
page read and write
2E5800AC4000
trusted library allocation
page read and write
240400250000
direct allocation
page read and write
46D80192C000
trusted library allocation
page read and write
19B03E7B000
heap
page read and write
17EC4143000
heap
page read and write
741CFFE000
stack
page read and write
5D6000268000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
124800230000
trusted library allocation
page read and write
14C0002D8000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
207000290000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
74800358000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
19B03E45000
heap
page read and write
16066C10000
heap
page read and write
2E5803FA4000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
46D80031C000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
3E1402FCC000
trusted library allocation
page read and write
2E580378C000
trusted library allocation
page read and write
9200134C000
trusted library allocation
page read and write
2E5803464000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
1AE001AF000
trusted library allocation
page read and write
160EA550000
unclassified section
page read and write
48B55FE000
stack
page read and write
1FC64869000
heap
page read and write
2E5800E20000
trusted library allocation
page read and write
2E5803508000
trusted library allocation
page read and write
2E580368C000
trusted library allocation
page read and write
92000EA3000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5804258000
trusted library allocation
page read and write
4BDC8000
trusted library allocation
page read and write
2E580420C000
trusted library allocation
page read and write
3230000D8000
trusted library allocation
page read and write
2E5803694000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
17EC4146000
heap
page read and write
12480020C000
trusted library allocation
page read and write
46D801877000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
1E765E2F000
heap
page read and write
70E8000
heap
page read and write
2E5804320000
trusted library allocation
page read and write
20500A02000
trusted library allocation
page read and write
2E580399C000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
5D4C0029C000
direct allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
2E5801AC8000
trusted library allocation
page read and write
21401128000
heap
page read and write
2E5803FE4000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E58037C4000
trusted library allocation
page read and write
2E580238C000
trusted library allocation
page read and write
2E5803EDE000
trusted library allocation
page read and write
2E5800B70000
trusted library allocation
page read and write
3988002B8000
trusted library allocation
page read and write
2E5804064000
trusted library allocation
page read and write
1AE0080C000
trusted library allocation
page read and write
92000DD0000
trusted library allocation
page read and write
25CAD502000
heap
page read and write
1248002C8000
trusted library allocation
page read and write
16066C26000
heap
page read and write
46D801904000
trusted library allocation
page read and write
6F00000C4000
trusted library allocation
page read and write
1442000
heap
page read and write
17EC412F000
heap
page read and write
99C73FC000
stack
page read and write
47A000316000
direct allocation
page read and write
9DC00264000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
9DC002C0000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E580368A000
trusted library allocation
page read and write
2E5800EEC000
trusted library allocation
page read and write
2E5800F72000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
16066BDD000
unclassified section
page read and write
5D6000268000
trusted library allocation
page read and write
5F90002C0000
trusted library allocation
page read and write
321000234000
direct allocation
page read and write
92000695000
trusted library allocation
page read and write
2E580078C000
trusted library allocation
page read and write
46D80089E000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
2A317825000
heap
page read and write
160EBF80000
unclassified section
page read and write
160E9C90000
unclassified section
page read and write
16066C10000
heap
page read and write
1AE0068D000
trusted library allocation
page read and write
1614002A4000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D8008A4000
trusted library allocation
page read and write
16066C11000
heap
page read and write
2E5800F70000
trusted library allocation
page read and write
1AE001AF000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
20700020C000
trusted library allocation
page read and write
46D801908000
trusted library allocation
page read and write
74800110000
trusted library allocation
page read and write
16066C10000
heap
page read and write
7475BFC000
stack
page read and write
46D80074C000
trusted library allocation
page read and write
7A2C00220000
trusted library allocation
page read and write
4BD82000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
F200000C000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
5F90002C8000
trusted library allocation
page read and write
7407FFE000
stack
page read and write
F200007C000
trusted library allocation
page read and write
161400220000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
1442000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
74800109000
trusted library allocation
page read and write
2404002C0000
direct allocation
page read and write
46D801888000
trusted library allocation
page read and write
1AE0081E000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
92000EC0000
trusted library allocation
page read and write
3230000F0000
trusted library allocation
page read and write
2E580372C000
trusted library allocation
page read and write
143A000
heap
page read and write
46D8018F8000
trusted library allocation
page read and write
2418F654000
heap
page read and write
2E5803F74000
trusted library allocation
page read and write
748000F0000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
1AE00D44000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
20500567000
trusted library allocation
page read and write
47A000312000
direct allocation
page read and write
92000234000
trusted library allocation
page read and write
74800714000
trusted library allocation
page read and write
747D3FE000
unkown
page readonly
70F1000
heap
page read and write
5F9000404000
trusted library allocation
page read and write
142C000
heap
page read and write
1AE00182000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
1AE00182000
trusted library allocation
page read and write
160EACEB000
unclassified section
page read and write
46D8009E4000
trusted library allocation
page read and write
2E58039D4000
trusted library allocation
page read and write
2E5800D94000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
1DCDFFE000
stack
page read and write
16066C2B000
heap
page read and write
46D8018E6000
trusted library allocation
page read and write
19B06A02000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
16066C0A000
heap
page read and write
46D801368000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
46D8012E4000
trusted library allocation
page read and write
46D801992000
trusted library allocation
page read and write
2E5800BBC000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
3098002A4000
trusted library allocation
page read and write
2E5800C10000
trusted library allocation
page read and write
1B8F7CA3000
heap
page read and write
46D801898000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E580369C000
trusted library allocation
page read and write
25CAD45E000
heap
page read and write
46D801880000
trusted library allocation
page read and write
205004F5000
trusted library allocation
page read and write
3E1402454000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
160E9E94000
trusted library allocation
page read and write
46D80191A000
trusted library allocation
page read and write
5D4C002D8000
direct allocation
page read and write
2E5802379000
trusted library allocation
page read and write
46D800E04000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
20500982000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
6FA0000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
16066C10000
heap
page read and write
20500540000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801990000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
1AE00E02000
trusted library allocation
page read and write
46D801536000
trusted library allocation
page read and write
140E7E1B000
heap
page read and write
5D60002DC000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
46D8003E9000
trusted library allocation
page read and write
1464000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
29EBB760000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
1F8800220000
trusted library allocation
page read and write
21406520000
heap
page read and write
6F000005C000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
29EBB813000
heap
page read and write
3E14029B8000
trusted library allocation
page read and write
1AE01007000
trusted library allocation
page read and write
2E580207A000
trusted library allocation
page read and write
17EC4146000
heap
page read and write
16066C2B000
heap
page read and write
5F90002A0000
trusted library allocation
page read and write
74753FE000
unkown
page readonly
143C000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
25CAA6BD000
heap
page read and write
221400114000
trusted library allocation
page read and write
20500882000
trusted library allocation
page read and write
E10ABFE000
stack
page read and write
C2C00238000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2E5800408000
trusted library allocation
page read and write
1442000
heap
page read and write
1FCE7AAD000
unclassified section
page read and write
2E580388C000
trusted library allocation
page read and write
1435000
heap
page read and write
F2000278000
trusted library allocation
page read and write
48B45FB000
stack
page read and write
748001A0000
trusted library allocation
page read and write
2E5802349000
trusted library allocation
page read and write
1AE00E82000
trusted library allocation
page read and write
2E5800D94000
trusted library allocation
page read and write
3860002C0000
trusted library allocation
page read and write
2E5803685000
trusted library allocation
page read and write
2E58009B9000
trusted library allocation
page read and write
3DBB000
heap
page read and write
2140640C000
heap
page read and write
17EC4145000
heap
page read and write
2745B700000
unclassified section
page read and write
1437000
heap
page read and write
2E5804174000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D8012B4000
trusted library allocation
page read and write
5D6000266000
trusted library allocation
page read and write
1464000
heap
page read and write
46D801930000
trusted library allocation
page read and write
1DD87FE000
unkown
page readonly
1AE00902000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5800BD5000
trusted library allocation
page read and write
46D8018BC000
trusted library allocation
page read and write
2E5800E18000
trusted library allocation
page read and write
2E58012CC000
trusted library allocation
page read and write
1444000
heap
page read and write
707B000
heap
page read and write
25CAD4BD000
heap
page read and write
2E5800AC0000
trusted library allocation
page read and write
221400001000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
1AE0080D000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
21406453000
heap
page read and write
748001C0000
trusted library allocation
page read and write
257800211000
trusted library allocation
page read and write
2F80011C000
trusted library allocation
page read and write
192E000
stack
page read and write
2E5801570000
trusted library allocation
page read and write
2E5800BEC000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
53C8002A4000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1483000
heap
page read and write
46D801240000
trusted library allocation
page read and write
16066C09000
heap
page read and write
17EC4128000
heap
page read and write
2E580384C000
trusted library allocation
page read and write
21405ED0000
trusted library section
page read and write
1AE007E5000
trusted library allocation
page read and write
17EC4102000
heap
page read and write
140400258000
trusted library allocation
page read and write
46D80189F000
trusted library allocation
page read and write
19B03E7A000
heap
page read and write
46D8009F0000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
160E9ECF000
trusted library allocation
page read and write
398800238000
trusted library allocation
page read and write
F2000260000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
74800636000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
20500180000
trusted library allocation
page read and write
46D80187A000
trusted library allocation
page read and write
2E58036B2000
trusted library allocation
page read and write
2050087F000
trusted library allocation
page read and write
748006F4000
trusted library allocation
page read and write
27BEFFE000
stack
page read and write
46D800BA8000
trusted library allocation
page read and write
2E580406B000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
46D800A18000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
25CAA634000
heap
page read and write
46D8009F0000
trusted library allocation
page read and write
592C00228000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
2E58016D4000
trusted library allocation
page read and write
46D801278000
trusted library allocation
page read and write
99BBBFE000
unkown
page readonly
46D800B08000
trusted library allocation
page read and write
2E5800FE8000
trusted library allocation
page read and write
2E5800FF0000
trusted library allocation
page read and write
2E58007F4000
trusted library allocation
page read and write
99C13FC000
stack
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5800C3B000
trusted library allocation
page read and write
2E58040F1000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
748004CF000
trusted library allocation
page read and write
196E000
stack
page read and write
92000BCC000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
46D8014C3000
trusted library allocation
page read and write
74800348000
trusted library allocation
page read and write
709B000
heap
page read and write
748001D4000
trusted library allocation
page read and write
2E5800AC2000
trusted library allocation
page read and write
46D801926000
trusted library allocation
page read and write
3E14022C5000
trusted library allocation
page read and write
2E5803763000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
1442000
heap
page read and write
2E58036EC000
trusted library allocation
page read and write
2E5801B20000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
2E5801B30000
trusted library allocation
page read and write
3E1402304000
trusted library allocation
page read and write
5D6000266000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
1437000
heap
page read and write
1AE00DD3000
trusted library allocation
page read and write
5D6000124000
trusted library allocation
page read and write
1442000
heap
page read and write
46D801890000
trusted library allocation
page read and write
46D801268000
trusted library allocation
page read and write
46D801368000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
5D600026B000
trusted library allocation
page read and write
1B8F7CC9000
heap
page read and write
592C0007C000
trusted library allocation
page read and write
4BC7C000
trusted library allocation
page read and write
2E5800E7C000
trusted library allocation
page read and write
2E5800FC8000
trusted library allocation
page read and write
143A000
heap
page read and write
1467000
heap
page read and write
160EBB14000
unclassified section
page read and write
2F800038000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
17EC9C02000
heap
page read and write
5D6000024000
trusted library allocation
page read and write
46D80084A000
trusted library allocation
page read and write
2E580158C000
trusted library allocation
page read and write
2E58036DA000
trusted library allocation
page read and write
3098002F0000
trusted library allocation
page read and write
4BCFC000
trusted library allocation
page read and write
143C000
heap
page read and write
F200028D000
trusted library allocation
page read and write
46D8008A9000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
3D39000
heap
page read and write
46D8008AD000
trusted library allocation
page read and write
27C85D20000
trusted library allocation
page read and write
4BCC8000
trusted library allocation
page read and write
2E5800CE4000
trusted library allocation
page read and write
2E5800BCC000
trusted library allocation
page read and write
AD267FE000
unkown
page readonly
2E5800B4C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
74800694000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
1B8F7C85000
heap
page read and write
748003C0000
trusted library allocation
page read and write
46D8008C0000
trusted library allocation
page read and write
4EE400220000
direct allocation
page read and write
2E9C002B0000
direct allocation
page read and write
1467000
heap
page read and write
F200035C000
trusted library allocation
page read and write
2F800058000
trusted library allocation
page read and write
142C000
heap
page read and write
46D801870000
trusted library allocation
page read and write
2E5800674000
trusted library allocation
page read and write
2E5800718000
trusted library allocation
page read and write
1AE01040000
trusted library allocation
page read and write
16066C11000
heap
page read and write
46D801918000
trusted library allocation
page read and write
205004E5000
trusted library allocation
page read and write
2E580061C000
trusted library allocation
page read and write
3098002CC000
trusted library allocation
page read and write
2E5803EDE000
trusted library allocation
page read and write
42E000418000
trusted library allocation
page read and write
46D8003BC000
trusted library allocation
page read and write
2E5800D18000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
17EC9245000
unkown
page readonly
16066C2B000
heap
page read and write
AD357FE000
unkown
page readonly
2AC800250000
direct allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5804078000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
16066C0A000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
1AE008B4000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
3860002B4000
trusted library allocation
page read and write
2E5800BF4000
trusted library allocation
page read and write
46D80060C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
3E1403034000
trusted library allocation
page read and write
46D800290000
trusted library allocation
page read and write
C2C002BC000
trusted library allocation
page read and write
2E58009B9000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
1AE01342000
trusted library allocation
page read and write
257800328000
trusted library allocation
page read and write
21BC00230000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5802358000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2F800105000
trusted library allocation
page read and write
7480047F000
trusted library allocation
page read and write
2E5800AF0000
trusted library allocation
page read and write
3B000254000
direct allocation
page read and write
2E580380C000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
2E5803FA0000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
3E1402601000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
25CAA63C000
heap
page read and write
17EC4141000
heap
page read and write
1970000
heap
page read and write
46D8018A4000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
7061000
heap
page read and write
207000348000
trusted library allocation
page read and write
3D4E000
heap
page read and write
4F1400264000
direct allocation
page read and write
2E5803F27000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E5800E48000
trusted library allocation
page read and write
2E5801B70000
trusted library allocation
page read and write
1455000
heap
page read and write
16066C2B000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
1AE00DD4000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
16066C0A000
heap
page read and write
124800290000
trusted library allocation
page read and write
4EE40027C000
direct allocation
page read and write
20500602000
trusted library allocation
page read and write
323000180000
trusted library allocation
page read and write
74227FE000
unkown
page readonly
2E5800F74000
trusted library allocation
page read and write
2F800095000
trusted library allocation
page read and write
2E580371A000
trusted library allocation
page read and write
1E76AA00000
unkown
page readonly
46D801880000
trusted library allocation
page read and write
718C00408000
trusted library allocation
page read and write
146F000
heap
page read and write
21402E02000
heap
page read and write
6F0000114000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
29EBB7A7000
unclassified section
page read and write
1434000
heap
page read and write
16066C10000
heap
page read and write
1AE00A02000
trusted library allocation
page read and write
2E5800D00000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
1AE00D79000
trusted library allocation
page read and write
42E00032B000
trusted library allocation
page read and write
2E5802226000
trusted library allocation
page read and write
C2C00278000
trusted library allocation
page read and write
3230000A0000
trusted library allocation
page read and write
99BF3FE000
stack
page read and write
748000EA000
trusted library allocation
page read and write
92000C34000
trusted library allocation
page read and write
146E000
heap
page read and write
17EC4127000
heap
page read and write
2E5804088000
trusted library allocation
page read and write
92000201000
trusted library allocation
page read and write
16066C25000
heap
page read and write
21BC0027C000
trusted library allocation
page read and write
2E5802804000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
53C800211000
trusted library allocation
page read and write
2E580237D000
trusted library allocation
page read and write
3E1402358000
trusted library allocation
page read and write
46D8018E8000
trusted library allocation
page read and write
46D8012BB000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
17EC9400000
heap
page read and write
2E58040D6000
trusted library allocation
page read and write
3E14029C8000
trusted library allocation
page read and write
20500539000
trusted library allocation
page read and write
7405FFE000
stack
page read and write
2E5803714000
trusted library allocation
page read and write
592C001DC000
trusted library allocation
page read and write
7480037C000
trusted library allocation
page read and write
74800390000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5801BD0000
trusted library allocation
page read and write
17EC8E70000
trusted library section
page read and write
2E58036B4000
trusted library allocation
page read and write
2E58008A6000
trusted library allocation
page read and write
9200143C000
trusted library allocation
page read and write
321000408000
direct allocation
page read and write
46D800F10000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
746CBFB000
stack
page read and write
3E1402464000
trusted library allocation
page read and write
4EE40025C000
direct allocation
page read and write
221400090000
trusted library allocation
page read and write
1AE0090B000
trusted library allocation
page read and write
25780028C000
trusted library allocation
page read and write
70C0000
heap
page read and write
20700040C000
trusted library allocation
page read and write
27C0002B0000
direct allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
46D8012DC000
trusted library allocation
page read and write
3E1403094000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
9200012C000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1AE00888000
trusted library allocation
page read and write
16066BC0000
unclassified section
page read and write
5D60002A8000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
17EC4141000
heap
page read and write
27C874E0000
heap
page read and write
19B03E37000
heap
page read and write
46D80170C000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
17EC4129000
heap
page read and write
2050053C000
trusted library allocation
page read and write
2E580387C000
trusted library allocation
page read and write
2E5804044000
trusted library allocation
page read and write
14C000238000
trusted library allocation
page read and write
16066C10000
heap
page read and write
17EC414D000
heap
page read and write
1473000
heap
page read and write
2E5803FBC000
trusted library allocation
page read and write
20500980000
trusted library allocation
page read and write
2E5801B40000
trusted library allocation
page read and write
17ECB604000
trusted library allocation
page read and write
B910BFE000
stack
page read and write
3E140245C000
trusted library allocation
page read and write
205008D7000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
C2BF7FE000
stack
page read and write
2E5800F74000
trusted library allocation
page read and write
7A2C00404000
trusted library allocation
page read and write
7A2C00408000
trusted library allocation
page read and write
16066C10000
heap
page read and write
16066C0A000
heap
page read and write
2E5800898000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
2418F61B000
heap
page read and write
C2AA7FE000
stack
page read and write
1460000
heap
page read and write
5D6000158000
trusted library allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
46D800B68000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
2A31AD87000
unclassified section
page read and write
592C0027F000
trusted library allocation
page read and write
1470000
heap
page read and write
17EC4144000
heap
page read and write
46D8012AC000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801910000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
1444000
heap
page read and write
46D80191E000
trusted library allocation
page read and write
2E5800C7F000
trusted library allocation
page read and write
74147FE000
unkown
page readonly
29EBB49C000
heap
page read and write
53C80027C000
trusted library allocation
page read and write
2E58006B6000
trusted library allocation
page read and write
323000164000
trusted library allocation
page read and write
1AE00BC2000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5803748000
trusted library allocation
page read and write
3DAB000
heap
page read and write
74800118000
trusted library allocation
page read and write
16066C25000
heap
page read and write
148E000
heap
page read and write
46D801910000
trusted library allocation
page read and write
74800601000
trusted library allocation
page read and write
1AE00D6F000
trusted library allocation
page read and write
207000250000
trusted library allocation
page read and write
2070002F8000
trusted library allocation
page read and write
1F8800284000
trusted library allocation
page read and write
16066C25000
heap
page read and write
9DC002F0000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E58023AA000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D801894000
trusted library allocation
page read and write
53C8002B4000
trusted library allocation
page read and write
1AE00843000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
F2000230000
trusted library allocation
page read and write
2E5803894000
trusted library allocation
page read and write
46D800B4A000
trusted library allocation
page read and write
3D1D000
heap
page read and write
17EC4013000
heap
page read and write
46D801922000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
920005D9000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5803EDC000
trusted library allocation
page read and write
2E5803F9C000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
21401129000
heap
page read and write
4F1400230000
direct allocation
page read and write
C2B87FE000
stack
page read and write
46D801968000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1466000
heap
page read and write
20500989000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
92000070000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D8012B4000
trusted library allocation
page read and write
46D801BF2000
trusted library allocation
page read and write
21401140000
heap
page read and write
2E58002B8000
trusted library allocation
page read and write
17EC4146000
heap
page read and write
2E5800ADD000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
5D600007C000
trusted library allocation
page read and write
2E58020EB000
trusted library allocation
page read and write
741EFFE000
stack
page read and write
46D801928000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
618800318000
direct allocation
page read and write
6FF0002A8000
trusted library allocation
page read and write
74127FE000
unkown
page readonly
592C002A7000
trusted library allocation
page read and write
2E58037DD000
trusted library allocation
page read and write
2E580379A000
trusted library allocation
page read and write
9200022C000
trusted library allocation
page read and write
46D80191E000
trusted library allocation
page read and write
7A2C002E8000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E58040B6000
trusted library allocation
page read and write
2E5801580000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
1AE00E7C000
trusted library allocation
page read and write
99BD3F5000
stack
page read and write
2E5800730000
trusted library allocation
page read and write
741AFFB000
stack
page read and write
46D801894000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2140641D000
heap
page read and write
25CAA600000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D800674000
trusted library allocation
page read and write
25CAA6E7000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
99BE3FB000
stack
page read and write
2E580371C000
trusted library allocation
page read and write
2E5800BA0000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
3B000201000
direct allocation
page read and write
2E58040DA000
trusted library allocation
page read and write
1AE00D02000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
920005D8000
trusted library allocation
page read and write
920005D8000
trusted library allocation
page read and write
39880020C000
trusted library allocation
page read and write
4BC6C000
trusted library allocation
page read and write
2418F613000
heap
page read and write
207000278000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
4BC24000
trusted library allocation
page read and write
2E580236E000
trusted library allocation
page read and write
2070002F1000
trusted library allocation
page read and write
E50002B8000
direct allocation
page read and write
46D80192C000
trusted library allocation
page read and write
1AE006C2000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
1AE00949000
trusted library allocation
page read and write
1AE00E02000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
66400020C000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D800BE4000
trusted library allocation
page read and write
46D800624000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
2E580157C000
trusted library allocation
page read and write
46D800378000
trusted library allocation
page read and write
25CAA62B000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
9200013C000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E5800A55000
trusted library allocation
page read and write
43F7DFE000
stack
page read and write
21406559000
heap
page read and write
1AE00E13000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
1DCE7FE000
unkown
page readonly
5D6000268000
trusted library allocation
page read and write
2E58040B1000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
2E5800829000
trusted library allocation
page read and write
46D801935000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
1AE0081F000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
5D6000290000
trusted library allocation
page read and write
2E5800F76000
trusted library allocation
page read and write
16066C58000
heap
page read and write
2E5801A4E000
trusted library allocation
page read and write
2E5804066000
trusted library allocation
page read and write
205004F5000
trusted library allocation
page read and write
1471000
heap
page read and write
592C00244000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
27C000211000
direct allocation
page read and write
3E1402274000
trusted library allocation
page read and write
2E5801645000
trusted library allocation
page read and write
3DCC000
heap
page read and write
43F4DFF000
stack
page read and write
2E5803CAC000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
2E5803C74000
trusted library allocation
page read and write
2E5803F30000
trusted library allocation
page read and write
1B8F7C71000
heap
page read and write
3DD1000
heap
page read and write
92000DDB000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
46D8012EC000
trusted library allocation
page read and write
2E5800A60000
trusted library allocation
page read and write
748006C8000
trusted library allocation
page read and write
6ACD000
stack
page read and write
43F1DE5000
stack
page read and write
1404002B8000
trusted library allocation
page read and write
5D60002AA000
trusted library allocation
page read and write
2E5801B00000
trusted library allocation
page read and write
143F000
heap
page read and write
1AE00142000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
C2C00258000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
1AE00D74000
trusted library allocation
page read and write
1452000
heap
page read and write
2E5800B10000
trusted library allocation
page read and write
5D6000184000
trusted library allocation
page read and write
2E5801594000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
27C85D00000
heap
page read and write
46D8018AC000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1AE00842000
trusted library allocation
page read and write
5D600026A000
trusted library allocation
page read and write
3D5A000
heap
page read and write
2E5801588000
trusted library allocation
page read and write
2E5803732000
trusted library allocation
page read and write
E12DBFD000
stack
page read and write
2E58008A0000
trusted library allocation
page read and write
2E5801F38000
trusted library allocation
page read and write
2E5800F7C000
trusted library allocation
page read and write
2E580399C000
trusted library allocation
page read and write
46D801922000
trusted library allocation
page read and write
1AE00D5B000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
3104002A0000
direct allocation
page read and write
2E5800A70000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
143A000
heap
page read and write
2E5800E48000
trusted library allocation
page read and write
1AE00D54000
trusted library allocation
page read and write
2578002A8000
trusted library allocation
page read and write
17EC9457000
heap
page read and write
2E580372A000
trusted library allocation
page read and write
21406393000
unkown
page readonly
46D801914000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
321000254000
direct allocation
page read and write
5D600029F000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2404002D8000
direct allocation
page read and write
9200024A000
trusted library allocation
page read and write
207000335000
trusted library allocation
page read and write
2140117F000
heap
page read and write
1486000
heap
page read and write
2AC8002A4000
direct allocation
page read and write
46D801902000
trusted library allocation
page read and write
46D80065B000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
42E000408000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
3B000284000
direct allocation
page read and write
46D801884000
trusted library allocation
page read and write
2E5803722000
trusted library allocation
page read and write
5D60001AE000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
AD26FFE000
stack
page read and write
2E5803714000
trusted library allocation
page read and write
1AE00D47000
trusted library allocation
page read and write
2E5803FCC000
trusted library allocation
page read and write
1AE0152C000
trusted library allocation
page read and write
323000001000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
6FAC000
heap
page read and write
46D801874000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
AD25FFE000
stack
page read and write
2E580209F000
trusted library allocation
page read and write
7480020C000
trusted library allocation
page read and write
46D801934000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
C2C002C8000
trusted library allocation
page read and write
2E580167D000
trusted library allocation
page read and write
25CAA66B000
heap
page read and write
7479BFB000
stack
page read and write
16066C0B000
heap
page read and write
5528002B8000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5804064000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
2E5804194000
trusted library allocation
page read and write
1AE007F6000
trusted library allocation
page read and write
2E5800E6C000
trusted library allocation
page read and write
1B8F7C60000
heap
page read and write
39880026C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801884000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58040BC000
trusted library allocation
page read and write
2214000A8000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5803CCC000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
748001B4000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2E5803F84000
trusted library allocation
page read and write
2E58036E7000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
7419FFB000
stack
page read and write
2E58040AF000
trusted library allocation
page read and write
46D8012EC000
trusted library allocation
page read and write
3B0002F4000
direct allocation
page read and write
1AE00376000
trusted library allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
205004FB000
trusted library allocation
page read and write
1AE006A8000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
592C000ED000
trusted library allocation
page read and write
46D800BC0000
trusted library allocation
page read and write
7408FFC000
stack
page read and write
2E5804066000
trusted library allocation
page read and write
26C800250000
trusted library allocation
page read and write
2E580375C000
trusted library allocation
page read and write
2418F662000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
2E5800A55000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
4BCD8000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
2E580371D000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5800C30000
trusted library allocation
page read and write
161400230000
trusted library allocation
page read and write
46D80163A000
trusted library allocation
page read and write
740C7FE000
unkown
page readonly
46D801876000
trusted library allocation
page read and write
2E5803774000
trusted library allocation
page read and write
46D80191E000
trusted library allocation
page read and write
46D800316000
trusted library allocation
page read and write
592C000C4000
trusted library allocation
page read and write
46D800EFE000
trusted library allocation
page read and write
2E58009EC000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
21402F12000
heap
page read and write
46D8008AF000
trusted library allocation
page read and write
2E58022C2000
trusted library allocation
page read and write
205008C7000
trusted library allocation
page read and write
19B03E6D000
heap
page read and write
16066C0A000
heap
page read and write
3E140220C000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
99BC3FC000
stack
page read and write
2E5800AD8000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
F2000340000
trusted library allocation
page read and write
AD29FFE000
stack
page read and write
3DBE000
heap
page read and write
16066C24000
heap
page read and write
46D80192A000
trusted library allocation
page read and write
46D8008AF000
trusted library allocation
page read and write
16066C24000
heap
page read and write
27C85A02000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
41AD1FE000
unkown
page readonly
1AE0036C000
trusted library allocation
page read and write
1483000
heap
page read and write
2E5800AC0000
trusted library allocation
page read and write
1439000
heap
page read and write
5D60000C4000
trusted library allocation
page read and write
2080000C000
trusted library allocation
page read and write
46D8019D8000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
5F9000288000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
3E1402E81000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
17EC94BB000
heap
page read and write
160E9EBA000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
E50002A8000
direct allocation
page read and write
1AE007D7000
trusted library allocation
page read and write
E1193FE000
unkown
page readonly
74800424000
trusted library allocation
page read and write
1AE00D05000
trusted library allocation
page read and write
1AE01002000
trusted library allocation
page read and write
39880028C000
trusted library allocation
page read and write
16066C27000
heap
page read and write
140400220000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
47A000304000
direct allocation
page read and write
46D801204000
trusted library allocation
page read and write
46D8018AC000
trusted library allocation
page read and write
9DC00404000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5803EDC000
trusted library allocation
page read and write
9200020C000
trusted library allocation
page read and write
207000340000
trusted library allocation
page read and write
42E0002A4000
trusted library allocation
page read and write
257800278000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
3098002DC000
trusted library allocation
page read and write
6FFF000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
37E0000
heap
page read and write
1443000
heap
page read and write
46D8012A0000
trusted library allocation
page read and write
140E7DC0000
heap
page read and write
147D000
heap
page read and write
398800230000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D8013D9000
trusted library allocation
page read and write
46D80139D000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
46D801880000
trusted library allocation
page read and write
F20001A8000
trusted library allocation
page read and write
2E5800BA0000
trusted library allocation
page read and write
1AE0099A000
trusted library allocation
page read and write
7412FFE000
stack
page read and write
2E5803824000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
160EA5B1000
unclassified section
page read and write
70C0000
heap
page read and write
1AE00143000
trusted library allocation
page read and write
5D6000168000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
1AE00E59000
trusted library allocation
page read and write
3E1402220000
trusted library allocation
page read and write
2E58037D4000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D801266000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
1AE00300000
trusted library allocation
page read and write
54D89FE000
unkown
page readonly
46D801974000
trusted library allocation
page read and write
1470000
heap
page read and write
3E14023A0000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
46D8006E4000
trusted library allocation
page read and write
9DC00244000
trusted library allocation
page read and write
3B0002D4000
direct allocation
page read and write
2E5803824000
trusted library allocation
page read and write
17EC4130000
heap
page read and write
1404002DC000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
4BCA4000
trusted library allocation
page read and write
2050050F000
trusted library allocation
page read and write
46D801318000
trusted library allocation
page read and write
2E58038C4000
trusted library allocation
page read and write
2E5804086000
trusted library allocation
page read and write
2E5803EE2000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D80191E000
trusted library allocation
page read and write
17EC9423000
heap
page read and write
46D801930000
trusted library allocation
page read and write
2E58041FD000
trusted library allocation
page read and write
7A2C00230000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E5800624000
trusted library allocation
page read and write
2E5800A74000
trusted library allocation
page read and write
7480044C000
trusted library allocation
page read and write
5F90002A4000
trusted library allocation
page read and write
1E765E5D000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
46D800BE4000
trusted library allocation
page read and write
257800244000
trusted library allocation
page read and write
2E5803834000
trusted library allocation
page read and write
2140112E000
heap
page read and write
27BAFFE000
stack
page read and write
3230000BC000
trusted library allocation
page read and write
1AE007D4000
trusted library allocation
page read and write
F20001A0000
trusted library allocation
page read and write
48B1DE6000
stack
page read and write
2E5800F74000
trusted library allocation
page read and write
1AE002C2000
trusted library allocation
page read and write
46D801414000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
1443000
heap
page read and write
46D80040C000
trusted library allocation
page read and write
19B06950000
heap
page read and write
7A2C0023C000
trusted library allocation
page read and write
1AE005D2000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
16066C09000
heap
page read and write
1AE01480000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
46D8018C1000
trusted library allocation
page read and write
7A2C00248000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D801922000
trusted library allocation
page read and write
2E5803762000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
2050050A000
trusted library allocation
page read and write
2E5803814000
trusted library allocation
page read and write
16066C24000
heap
page read and write
46D801910000
trusted library allocation
page read and write
E11ABFB000
stack
page read and write
143D000
heap
page read and write
2E580389D000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
1E4000258000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
F200010C000
trusted library allocation
page read and write
140E7E13000
heap
page read and write
4800000
trusted library allocation
page read and write
E125BFE000
stack
page read and write
2E58019EC000
trusted library allocation
page read and write
143C000
heap
page read and write
310400284000
direct allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
2E580408C000
trusted library allocation
page read and write
7A2C00211000
trusted library allocation
page read and write
46D801994000
trusted library allocation
page read and write
3E1402630000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
309800404000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
1AE00D1F000
trusted library allocation
page read and write
2E5802032000
trusted library allocation
page read and write
5D60001F0000
trusted library allocation
page read and write
20500102000
trusted library allocation
page read and write
2E58015E8000
trusted library allocation
page read and write
21BC002A0000
trusted library allocation
page read and write
1AE008B5000
trusted library allocation
page read and write
5D4C00250000
direct allocation
page read and write
92000598000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
46D80194A000
trusted library allocation
page read and write
2E5801AB8000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
48B4DFE000
stack
page read and write
16066C2B000
heap
page read and write
16066C0A000
heap
page read and write
2E5803714000
trusted library allocation
page read and write
C2C00248000
trusted library allocation
page read and write
2E58015C4000
trusted library allocation
page read and write
25CAD4D1000
heap
page read and write
46D800B2C000
trusted library allocation
page read and write
143C000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
146E000
heap
page read and write
46D80140C000
trusted library allocation
page read and write
161400274000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D6000284000
trusted library allocation
page read and write
718C00334000
trusted library allocation
page read and write
29EBE2DF000
heap
page read and write
7480034C000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
1AE00D6D000
trusted library allocation
page read and write
16066C11000
heap
page read and write
1390000
heap
page read and write
20500503000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
21401140000
heap
page read and write
C2BEFFE000
unkown
page readonly
1AE007C2000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
7480021C000
trusted library allocation
page read and write
1DD6FFE000
stack
page read and write
46D801948000
trusted library allocation
page read and write
99C4BFE000
unkown
page readonly
2E58041F1000
trusted library allocation
page read and write
C2BB7FE000
stack
page read and write
3D28000
heap
page read and write
46D801918000
trusted library allocation
page read and write
74733FE000
unkown
page readonly
46D80190C000
trusted library allocation
page read and write
92000CEB000
trusted library allocation
page read and write
42E000258000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
2E58032F4000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
140E7E0D000
heap
page read and write
2E5801689000
trusted library allocation
page read and write
160EBB18000
unclassified section
page read and write
5D60002A8000
trusted library allocation
page read and write
207000238000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
1E765E3D000
heap
page read and write
46D8009F0000
trusted library allocation
page read and write
21BC00264000
trusted library allocation
page read and write
1442000
heap
page read and write
46D801300000
trusted library allocation
page read and write
F200009C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
22140007C000
trusted library allocation
page read and write
46D800BEC000
trusted library allocation
page read and write
2E580205B000
trusted library allocation
page read and write
21406AB0000
unkown
page readonly
2E5804144000
trusted library allocation
page read and write
4EE400230000
direct allocation
page read and write
9200029F000
trusted library allocation
page read and write
AD327FE000
unkown
page readonly
5D60002B8000
trusted library allocation
page read and write
29EBE2A7000
heap
page read and write
2418F65D000
heap
page read and write
2AC800284000
direct allocation
page read and write
21406453000
heap
page read and write
2E5800C40000
trusted library allocation
page read and write
2E580381C000
trusted library allocation
page read and write
2E580391C000
trusted library allocation
page read and write
2E5800F2C000
trusted library allocation
page read and write
21406561000
heap
page read and write
2E5800F64000
trusted library allocation
page read and write
2E58042B1000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
2E5801641000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
1AE00B42000
trusted library allocation
page read and write
2E580433C000
trusted library allocation
page read and write
92000246000
trusted library allocation
page read and write
25CAD512000
heap
page read and write
2418F646000
heap
page read and write
74800374000
trusted library allocation
page read and write
3B000298000
direct allocation
page read and write
2E5802015000
trusted library allocation
page read and write
16066C10000
heap
page read and write
92000158000
trusted library allocation
page read and write
16066C57000
heap
page read and write
7478BFD000
stack
page read and write
46D8012B4000
trusted library allocation
page read and write
2E9C00254000
direct allocation
page read and write
142C000
heap
page read and write
46D8018E3000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
21401130000
heap
page read and write
3D1400264000
trusted library allocation
page read and write
3DF6000
heap
page read and write
1AE013C5000
trusted library allocation
page read and write
1AE00946000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
48B75FF000
stack
page read and write
2E5800AB5000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2F800114000
trusted library allocation
page read and write
205000C2000
trusted library allocation
page read and write
46D8012D4000
trusted library allocation
page read and write
20500519000
trusted library allocation
page read and write
54D61FE000
stack
page read and write
46D8013A4000
trusted library allocation
page read and write
46D800B16000
trusted library allocation
page read and write
2E5803702000
trusted library allocation
page read and write
2E5802045000
trusted library allocation
page read and write
46D8018B1000
trusted library allocation
page read and write
3E14029CC000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
E10CBFE000
stack
page read and write
20500342000
trusted library allocation
page read and write
1383000
heap
page read and write
2E5800D00000
trusted library allocation
page read and write
1AE007C7000
trusted library allocation
page read and write
4EE40026C000
direct allocation
page read and write
1456000
heap
page read and write
2E58009B2000
trusted library allocation
page read and write
6FF000294000
trusted library allocation
page read and write
1437000
heap
page read and write
1AE00E55000
trusted library allocation
page read and write
5D6000178000
trusted library allocation
page read and write
46D800BEC000
trusted library allocation
page read and write
5D4C00220000
direct allocation
page read and write
2E5801EB4000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58039C4000
trusted library allocation
page read and write
1448000
heap
page read and write
20500509000
trusted library allocation
page read and write
16066C24000
heap
page read and write
2E5804060000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
17EC4097000
heap
page read and write
2E58008AC000
trusted library allocation
page read and write
46D800B1C000
trusted library allocation
page read and write
160EA592000
unclassified section
page read and write
27458182000
unclassified section
page read and write
92001510000
trusted library allocation
page read and write
E108BFF000
stack
page read and write
21401135000
heap
page read and write
46D801914000
trusted library allocation
page read and write
74800128000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
E5000230000
direct allocation
page read and write
5528002A4000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
920000D8000
trusted library allocation
page read and write
2E5800E6C000
trusted library allocation
page read and write
2E580203A000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
2E5801A4C000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
1B8F7CCD000
heap
page read and write
2E5803784000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
2E5800A94000
trusted library allocation
page read and write
2140640C000
heap
page read and write
2E5803772000
trusted library allocation
page read and write
2E58037DC000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
1467000
heap
page read and write
3DA6000
heap
page read and write
321000201000
direct allocation
page read and write
1404002B8000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801912000
trusted library allocation
page read and write
2E5803B34000
trusted library allocation
page read and write
2E5800A14000
trusted library allocation
page read and write
26C800230000
trusted library allocation
page read and write
2E58022A4000
trusted library allocation
page read and write
746D3FE000
unkown
page readonly
16066C24000
heap
page read and write
700C000
heap
page read and write
16066C2B000
heap
page read and write
74800450000
trusted library allocation
page read and write
257800408000
trusted library allocation
page read and write
2E580169B000
trusted library allocation
page read and write
205008D9000
trusted library allocation
page read and write
17EC9C9A000
heap
page read and write
240400220000
direct allocation
page read and write
5D4C00288000
direct allocation
page read and write
321000274000
direct allocation
page read and write
2E58009B8000
trusted library allocation
page read and write
92000C18000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
92000DE5000
trusted library allocation
page read and write
42E0002C8000
trusted library allocation
page read and write
592C001B0000
trusted library allocation
page read and write
F2000134000
trusted library allocation
page read and write
46D800B0A000
trusted library allocation
page read and write
1AE00D42000
trusted library allocation
page read and write
1AE008E8000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
92000C36000
trusted library allocation
page read and write
2E5800B10000
trusted library allocation
page read and write
2E5801AD8000
trusted library allocation
page read and write
47A000319000
direct allocation
page read and write
5D6000266000
trusted library allocation
page read and write
1443000
heap
page read and write
21401140000
heap
page read and write
46D8008A9000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
2E5800E18000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5801632000
trusted library allocation
page read and write
2E5800CA8000
trusted library allocation
page read and write
C2B67FE000
stack
page read and write
6FF3000
heap
page read and write
1AE00900000
trusted library allocation
page read and write
2E5801AB0000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
3DF6000
heap
page read and write
16066C54000
heap
page read and write
5D60002D4000
trusted library allocation
page read and write
21401140000
heap
page read and write
42E0002C8000
trusted library allocation
page read and write
3D6C000
heap
page read and write
5D60000E3000
trusted library allocation
page read and write
2E5801663000
trusted library allocation
page read and write
2070002BC000
trusted library allocation
page read and write
41A99FC000
stack
page read and write
1E4000264000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
221400104000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
25CAD390000
unclassified section
page readonly
46D800B90000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D801886000
trusted library allocation
page read and write
3860002DC000
trusted library allocation
page read and write
C2B5FFE000
unkown
page readonly
E122BFE000
stack
page read and write
1AE00040000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
FDBE9FE000
stack
page read and write
AD2E7FE000
unkown
page readonly
5D60002B2000
trusted library allocation
page read and write
AD2B7FE000
unkown
page readonly
2E58023C8000
trusted library allocation
page read and write
46D801998000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
323000144000
trusted library allocation
page read and write
27BE7FE000
unkown
page readonly
74800334000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
2E5803F6A000
trusted library allocation
page read and write
1AE007F7000
trusted library allocation
page read and write
29EBE293000
heap
page read and write
5D600029F000
trusted library allocation
page read and write
2E580409C000
trusted library allocation
page read and write
6F0000128000
trusted library allocation
page read and write
14C0002C8000
trusted library allocation
page read and write
42E000230000
trusted library allocation
page read and write
1437000
heap
page read and write
2E58036A4000
trusted library allocation
page read and write
592C001C4000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
27458200000
heap
page read and write
1E400028C000
trusted library allocation
page read and write
7473BFB000
stack
page read and write
E1353FE000
unkown
page readonly
46D80073C000
trusted library allocation
page read and write
21406381000
unkown
page readonly
2E5800E18000
trusted library allocation
page read and write
7A2C00290000
trusted library allocation
page read and write
2E5800B4C000
trusted library allocation
page read and write
E115BF9000
stack
page read and write
46D80191C000
trusted library allocation
page read and write
21BC00240000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2AC8002A8000
direct allocation
page read and write
1AE002AE000
trusted library allocation
page read and write
1AE0100F000
trusted library allocation
page read and write
1AE00821000
trusted library allocation
page read and write
E6400244000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D800B1C000
trusted library allocation
page read and write
5D4C00264000
direct allocation
page read and write
1AE00820000
trusted library allocation
page read and write
748005D0000
trusted library allocation
page read and write
5D60000E1000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
FDBD9FD000
stack
page read and write
748005D4000
trusted library allocation
page read and write
2E5800F2C000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1467000
heap
page read and write
1B8F7B90000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
2E58023EE000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
1AE01486000
trusted library allocation
page read and write
748004A0000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
2E5800AF3000
trusted library allocation
page read and write
592C0000C000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
2E5803AC4000
trusted library allocation
page read and write
6FF000284000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
41AD9FE000
stack
page read and write
21BC00298000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
16066C0B000
heap
page read and write
2E5803774000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
25CAD456000
heap
page read and write
46D80194C000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
27BF7FE000
unkown
page readonly
51C0002B8000
trusted library allocation
page read and write
46D8008A8000
trusted library allocation
page read and write
F2000178000
trusted library allocation
page read and write
46D800B90000
trusted library allocation
page read and write
3F4F000
stack
page read and write
3B9D000
stack
page read and write
46D801924000
trusted library allocation
page read and write
207000310000
trusted library allocation
page read and write
1AE007D3000
trusted library allocation
page read and write
214010DE000
heap
page read and write
2E5800662000
trusted library allocation
page read and write
1AE00282000
trusted library allocation
page read and write
1E4000230000
trusted library allocation
page read and write
2E580231C000
trusted library allocation
page read and write
1443000
heap
page read and write
46D800B11000
trusted library allocation
page read and write
B913BFE000
stack
page read and write
92000280000
trusted library allocation
page read and write
16066C10000
heap
page read and write
6D0D000
stack
page read and write
1455000
heap
page read and write
2E58008AF000
trusted library allocation
page read and write
2E5801AF8000
trusted library allocation
page read and write
1470000
heap
page read and write
2A3175A0000
unclassified section
page readonly
1AE008C4000
trusted library allocation
page read and write
592C00165000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
1B882570000
trusted library allocation
page read and write
205005C2000
trusted library allocation
page read and write
29EBB3C0000
trusted library allocation
page read and write
1AE00F82000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
2E5804084000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
1473000
heap
page read and write
46D801314000
trusted library allocation
page read and write
21401141000
heap
page read and write
2E5803794000
trusted library allocation
page read and write
207000424000
trusted library allocation
page read and write
1AE00FAB000
trusted library allocation
page read and write
24194020000
unkown
page readonly
E1343FE000
unkown
page readonly
2E58002C8000
trusted library allocation
page read and write
1E765DA0000
heap
page readonly
2E5800B10000
trusted library allocation
page read and write
9DC00408000
trusted library allocation
page read and write
2050087E000
trusted library allocation
page read and write
2E58003EC000
trusted library allocation
page read and write
46D802204000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
46D80188A000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2E5800AA4000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
46D80082E000
trusted library allocation
page read and write
5D6000169000
trusted library allocation
page read and write
16066C2D000
heap
page read and write
17ECB643000
trusted library allocation
page read and write
2E5801AC8000
trusted library allocation
page read and write
2E58009C4000
trusted library allocation
page read and write
70A0000
heap
page read and write
16066C25000
heap
page read and write
AD34FFE000
stack
page read and write
2E580200D000
trusted library allocation
page read and write
25CAA5FF000
trusted library allocation
page read and write
21406453000
heap
page read and write
2E58036E4000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
2E58040CE000
trusted library allocation
page read and write
92001506000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
2E580378C000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
27458041000
remote allocation
page execute read
AD237FE000
unkown
page readonly
46D800B0C000
trusted library allocation
page read and write
9200059E000
trusted library allocation
page read and write
5F9000408000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
FDBA9FB000
stack
page read and write
309800244000
trusted library allocation
page read and write
748001A4000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2E5800724000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E5800AE8000
trusted library allocation
page read and write
74713FE000
unkown
page readonly
2E58009BA000
trusted library allocation
page read and write
46D8018C6000
trusted library allocation
page read and write
592C002A4000
trusted library allocation
page read and write
46D80193C000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
21401129000
heap
page read and write
2E580225A000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
3DB3000
heap
page read and write
2E5800FD8000
trusted library allocation
page read and write
74067FE000
unkown
page readonly
2E5800AF0000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
46D8006BC000
trusted library allocation
page read and write
46D800BD4000
trusted library allocation
page read and write
678D000
stack
page read and write
2E5800BD6000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
30980032B000
trusted library allocation
page read and write
21406200000
unkown
page readonly
29EBE256000
heap
page read and write
5D600029F000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
2E580398C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5800C6E000
trusted library allocation
page read and write
2E58036DA000
trusted library allocation
page read and write
17EC9C73000
heap
page read and write
1AE01207000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
E1313FE000
unkown
page readonly
2E58036AA000
trusted library allocation
page read and write
17EC94BB000
heap
page read and write
46D80190C000
trusted library allocation
page read and write
30D00010000
trusted library allocation
page read and write
6188002D0000
direct allocation
page read and write
21401130000
heap
page read and write
2E58016A7000
trusted library allocation
page read and write
46D800894000
trusted library allocation
page read and write
F2000340000
trusted library allocation
page read and write
7480065C000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
16066C11000
heap
page read and write
2E5803CC4000
trusted library allocation
page read and write
46D800718000
trusted library allocation
page read and write
2E5801A3C000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
205008FD000
trusted library allocation
page read and write
2E580405E000
trusted library allocation
page read and write
21BC002BC000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
321000250000
direct allocation
page read and write
99BABFE000
unkown
page readonly
2E5800AD8000
trusted library allocation
page read and write
21401140000
heap
page read and write
2E580233A000
trusted library allocation
page read and write
20500840000
trusted library allocation
page read and write
19B06910000
trusted library allocation
page read and write
4BDBC000
trusted library allocation
page read and write
7480013C000
trusted library allocation
page read and write
22140001C000
trusted library allocation
page read and write
46D8002E4000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
46D800634000
trusted library allocation
page read and write
3D93000
heap
page read and write
367D000
stack
page read and write
46D800B24000
trusted library allocation
page read and write
2418F600000
heap
page read and write
1AE01508000
trusted library allocation
page read and write
AD257FE000
unkown
page readonly
1AE005BF000
trusted library allocation
page read and write
25CAA661000
heap
page read and write
46D801948000
trusted library allocation
page read and write
25CAD4B6000
heap
page read and write
1471000
heap
page read and write
221400044000
trusted library allocation
page read and write
21406399000
unkown
page readonly
16066C10000
heap
page read and write
257800404000
trusted library allocation
page read and write
E127BFD000
stack
page read and write
46D801920000
trusted library allocation
page read and write
46D801884000
trusted library allocation
page read and write
92000CE8000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
26C800240000
trusted library allocation
page read and write
5D6000218000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
2E58016B2000
trusted library allocation
page read and write
2E58016C1000
trusted library allocation
page read and write
F2000084000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
3DAD000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
21406561000
heap
page read and write
1437000
heap
page read and write
46D801928000
trusted library allocation
page read and write
2E58040CC000
trusted library allocation
page read and write
205004E3000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
3D14002A0000
trusted library allocation
page read and write
29EBE200000
heap
page read and write
7005000
heap
page read and write
2E580382A000
trusted library allocation
page read and write
17EC3FD0000
heap
page read and write
618800307000
direct allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D800B1C000
trusted library allocation
page read and write
2E5801AA8000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
2E5802269000
trusted library allocation
page read and write
1486000
heap
page read and write
2214000B4000
trusted library allocation
page read and write
2E58037D4000
trusted library allocation
page read and write
74800460000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5801A24000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
1404002DC000
trusted library allocation
page read and write
F2000001000
trusted library allocation
page read and write
46D801890000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2E5800BBC000
trusted library allocation
page read and write
46D80175C000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
E1243FE000
unkown
page readonly
2E5801B30000
trusted library allocation
page read and write
920001B4000
trusted library allocation
page read and write
48B3DFD000
stack
page read and write
3E1402F14000
trusted library allocation
page read and write
1AE00D20000
trusted library allocation
page read and write
42E000300000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
2A31ACF0000
unclassified section
page read and write
46D801898000
trusted library allocation
page read and write
2E5800BF4000
trusted library allocation
page read and write
592C00104000
trusted library allocation
page read and write
2578002A4000
trusted library allocation
page read and write
F2000164000
trusted library allocation
page read and write
1481000
heap
page read and write
7480043F000
trusted library allocation
page read and write
1E765F05000
heap
page read and write
140E7DA0000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
92001387000
trusted library allocation
page read and write
46D800793000
trusted library allocation
page read and write
2E5804064000
trusted library allocation
page read and write
664000230000
trusted library allocation
page read and write
20500340000
trusted library allocation
page read and write
E5000201000
direct allocation
page read and write
1E765E00000
heap
page read and write
3D14002A8000
trusted library allocation
page read and write
2E5800338000
trusted library allocation
page read and write
1B8F7C63000
heap
page read and write
1AE00CC8000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
1E40002E4000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
1AE00D58000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
3E4E000
stack
page read and write
46D8015B2000
trusted library allocation
page read and write
46D80136D000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
17EC412E000
heap
page read and write
2E58036BC000
trusted library allocation
page read and write
5F9000260000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
2E5800770000
trusted library allocation
page read and write
4EE40024C000
direct allocation
page read and write
F2000264000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
41A79FE000
stack
page read and write
2E5800BE4000
trusted library allocation
page read and write
1464000
heap
page read and write
46D801930000
trusted library allocation
page read and write
4F1400250000
direct allocation
page read and write
46D8002F4000
trusted library allocation
page read and write
17EC407E000
heap
page read and write
27458202000
heap
page read and write
16066C25000
heap
page read and write
46D801930000
trusted library allocation
page read and write
C2C00254000
trusted library allocation
page read and write
2E5800A2C000
trusted library allocation
page read and write
2E580375C000
trusted library allocation
page read and write
74800118000
trusted library allocation
page read and write
160EBFAD000
unclassified section
page read and write
2E5803752000
trusted library allocation
page read and write
2E5800BC4000
trusted library allocation
page read and write
6640002CC000
trusted library allocation
page read and write
1473000
heap
page read and write
1AE0103F000
trusted library allocation
page read and write
1472000
heap
page read and write
2E5800418000
trusted library allocation
page read and write
17EC940F000
heap
page read and write
5D60002D4000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
3E1402ED4000
trusted library allocation
page read and write
1429000
heap
page read and write
16066C0A000
heap
page read and write
46D8018CC000
trusted library allocation
page read and write
E12FBFE000
stack
page read and write
74800024000
trusted library allocation
page read and write
5D6000178000
trusted library allocation
page read and write
46D80038C000
trusted library allocation
page read and write
2745B79A000
unclassified section
page read and write
1AE00691000
trusted library allocation
page read and write
5D6000240000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
E131BFE000
stack
page read and write
160EAD50000
unclassified section
page read and write
29EBB3A0000
heap
page read and write
46D8012FC000
trusted library allocation
page read and write
2E5804234000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
F200021C000
trusted library allocation
page read and write
2E580126B000
trusted library allocation
page read and write
16066C09000
heap
page read and write
54D99FE000
unkown
page readonly
16066C0A000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
3E1402454000
trusted library allocation
page read and write
2E5803721000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
42E000211000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
3E14025AC000
trusted library allocation
page read and write
F2000288000
trusted library allocation
page read and write
592C00223000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
16066C27000
heap
page read and write
1AE00E50000
trusted library allocation
page read and write
3DA8000
heap
page read and write
2E5801584000
trusted library allocation
page read and write
1F8800258000
trusted library allocation
page read and write
27C000254000
direct allocation
page read and write
92000310000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
5D60001E0000
trusted library allocation
page read and write
7416FFE000
stack
page read and write
2214000B8000
trusted library allocation
page read and write
3210002CC000
direct allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
160EBB3F000
unclassified section
page read and write
16066C2B000
heap
page read and write
99C43FE000
stack
page read and write
29EBE2AC000
heap
page read and write
1AE0086D000
trusted library allocation
page read and write
5528002C4000
trusted library allocation
page read and write
17EC9C9C000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
2E5803694000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
1F8800274000
trusted library allocation
page read and write
2E5801C58000
trusted library allocation
page read and write
17EC4174000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
74800680000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D800A48000
trusted library allocation
page read and write
19B03E8A000
heap
page read and write
46D8018B1000
trusted library allocation
page read and write
2E5803F8C000
trusted library allocation
page read and write
664000238000
trusted library allocation
page read and write
2E58016C9000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
9200021C000
trusted library allocation
page read and write
1DD17FE000
unkown
page readonly
27C000244000
direct allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5801ED4000
trusted library allocation
page read and write
7480042C000
trusted library allocation
page read and write
E64002CC000
trusted library allocation
page read and write
2E580377A000
trusted library allocation
page read and write
9DC002A0000
trusted library allocation
page read and write
160EAD02000
unclassified section
page read and write
2E5803EE4000
trusted library allocation
page read and write
21401131000
heap
page read and write
3104002B0000
direct allocation
page read and write
1AE00640000
trusted library allocation
page read and write
42E00028C000
trusted library allocation
page read and write
74800144000
trusted library allocation
page read and write
592C000E7000
trusted library allocation
page read and write
1AE00D1D000
trusted library allocation
page read and write
3DED000
heap
page read and write
25CAD4CE000
heap
page read and write
25CAA65C000
heap
page read and write
1AE01598000
trusted library allocation
page read and write
160EAD1B000
unclassified section
page read and write
46D8012D8000
trusted library allocation
page read and write
2A317660000
unclassified section
page readonly
46D801914000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
2E5803D88000
trusted library allocation
page read and write
42E000404000
trusted library allocation
page read and write
2418F66E000
heap
page read and write
6F00000A8000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
46D8006F0000
trusted library allocation
page read and write
323000054000
trusted library allocation
page read and write
E500024C000
direct allocation
page read and write
5D600026A000
trusted library allocation
page read and write
21406400000
heap
page read and write
664000250000
trusted library allocation
page read and write
20500516000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
7480066C000
trusted library allocation
page read and write
17EC4154000
heap
page read and write
17EC412F000
heap
page read and write
E110BFE000
stack
page read and write
143A000
heap
page read and write
20500842000
trusted library allocation
page read and write
2E9C00244000
direct allocation
page read and write
2E5800FF4000
trusted library allocation
page read and write
1614002B8000
trusted library allocation
page read and write
19B03E13000
heap
page read and write
B914BFC000
stack
page read and write
14040026C000
trusted library allocation
page read and write
2E5800A7C000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
205004C2000
trusted library allocation
page read and write
46D8018AC000
trusted library allocation
page read and write
1AE007C3000
trusted library allocation
page read and write
41A91FE000
unkown
page readonly
46D800B0C000
trusted library allocation
page read and write
17EC4126000
heap
page read and write
16066C10000
heap
page read and write
140400201000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2A31781B000
heap
page read and write
6F00000B8000
trusted library allocation
page read and write
2E5800E8C000
trusted library allocation
page read and write
1AE007FF000
trusted library allocation
page read and write
618800234000
direct allocation
page read and write
74097FE000
unkown
page readonly
2E580378C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5803F24000
trusted library allocation
page read and write
2E58007C0000
trusted library allocation
page read and write
46D8012D4000
trusted library allocation
page read and write
29EC0C30000
trusted library allocation
page read and write
7089000
heap
page read and write
2E5803845000
trusted library allocation
page read and write
1FC64863000
heap
page read and write
2E58036A4000
trusted library allocation
page read and write
6F000006C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
46D801290000
trusted library allocation
page read and write
29EBE2A3000
heap
page read and write
748001D7000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
2E5801E0C000
trusted library allocation
page read and write
2E58003D6000
trusted library allocation
page read and write
2E58023B9000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
C2B4FFE000
unkown
page readonly
2E5803714000
trusted library allocation
page read and write
2E5800F3C000
trusted library allocation
page read and write
46D801874000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
2E58036FC000
trusted library allocation
page read and write
3DCA000
heap
page read and write
46D801890000
trusted library allocation
page read and write
46D800614000
trusted library allocation
page read and write
1F880020F000
trusted library allocation
page read and write
42E000288000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2070002B8000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
16066C2B000
heap
page read and write
46D8008E8000
trusted library allocation
page read and write
2E580089A000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D8013D6000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
2E5803EE2000
trusted library allocation
page read and write
705D000
heap
page read and write
1AE008C2000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
29EBE2E3000
heap
page read and write
46D801918000
trusted library allocation
page read and write
2E580222D000
trusted library allocation
page read and write
46D8012F4000
trusted library allocation
page read and write
46D801316000
trusted library allocation
page read and write
17EC4135000
heap
page read and write
46D80194C000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D8018B8000
trusted library allocation
page read and write
5D60000DF000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
3E1402A8E000
trusted library allocation
page read and write
2E5803764000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
592C00298000
trusted library allocation
page read and write
592C00134000
trusted library allocation
page read and write
323000058000
trusted library allocation
page read and write
21406500000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5800C20000
trusted library allocation
page read and write
21402F00000
heap
page read and write
16066C2B000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
46D800AB0000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E58015F8000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
2214000D8000
trusted library allocation
page read and write
1FC64700000
heap
page readonly
21406453000
heap
page read and write
46D801926000
trusted library allocation
page read and write
1B00000C000
trusted library allocation
page read and write
17EC414D000
heap
page read and write
2E5803F89000
trusted library allocation
page read and write
2E5800C80000
trusted library allocation
page read and write
46D801270000
trusted library allocation
page read and write
6F0000090000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
2E5800A94000
trusted library allocation
page read and write
2E5800A60000
trusted library allocation
page read and write
205004EB000
trusted library allocation
page read and write
46D80088C000
trusted library allocation
page read and write
1AE01303000
trusted library allocation
page read and write
160EA4CD000
unclassified section
page read and write
46D8018E6000
trusted library allocation
page read and write
2E58040A4000
trusted library allocation
page read and write
2AC800298000
direct allocation
page read and write
92000D90000
trusted library allocation
page read and write
3E140233C000
trusted library allocation
page read and write
92000280000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D800AB0000
trusted library allocation
page read and write
746EBFE000
stack
page read and write
2E580205F000
trusted library allocation
page read and write
46D800848000
trusted library allocation
page read and write
6F00000D4000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
1E765E2B000
heap
page read and write
41B51FE000
unkown
page readonly
17EC9406000
heap
page read and write
46D800B1C000
trusted library allocation
page read and write
5D60002AA000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
16066C24000
heap
page read and write
20500981000
trusted library allocation
page read and write
2AC800220000
direct allocation
page read and write
7409FFD000
stack
page read and write
1473000
heap
page read and write
1F8800288000
trusted library allocation
page read and write
207000308000
trusted library allocation
page read and write
27C000264000
direct allocation
page read and write
9200001F000
trusted library allocation
page read and write
160EBF8F000
unclassified section
page read and write
46D80189D000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
2E5803A0C000
trusted library allocation
page read and write
2E5802332000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
5E5F000
stack
page read and write
2E5800AC4000
trusted library allocation
page read and write
21401148000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
1437000
heap
page read and write
46D800AD8000
trusted library allocation
page read and write
1AE00D08000
trusted library allocation
page read and write
1E765F02000
heap
page read and write
46D800BDC000
trusted library allocation
page read and write
46D800BC0000
trusted library allocation
page read and write
1444000
heap
page read and write
46D800730000
trusted library allocation
page read and write
2E58020B9000
trusted library allocation
page read and write
17ECC010000
heap
page read and write
748000D8000
trusted library allocation
page read and write
2E58022FE000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
323000024000
trusted library allocation
page read and write
2E5800E9C000
trusted library allocation
page read and write
6FD2000
heap
page read and write
2E580385C000
trusted library allocation
page read and write
C2ADFFE000
unkown
page readonly
25CAA550000
heap
page readonly
46D80192E000
trusted library allocation
page read and write
99C6BFE000
unkown
page readonly
46D801892000
trusted library allocation
page read and write
1411000
heap
page read and write
2E5803FA0000
trusted library allocation
page read and write
20500402000
trusted library allocation
page read and write
F2000268000
trusted library allocation
page read and write
143A000
heap
page read and write
46D801932000
trusted library allocation
page read and write
46D801884000
trusted library allocation
page read and write
3E140245A000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E58036DF000
trusted library allocation
page read and write
41A49FC000
stack
page read and write
46D801950000
trusted library allocation
page read and write
2E5801B38000
trusted library allocation
page read and write
5D60002C4000
trusted library allocation
page read and write
4EE40028C000
direct allocation
page read and write
2E5800338000
trusted library allocation
page read and write
29EBE276000
heap
page read and write
46D80186C000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
1404002DD000
trusted library allocation
page read and write
207000418000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
17EC4176000
heap
page read and write
1B882380000
trusted library section
page readonly
46D8009F9000
trusted library allocation
page read and write
748003A0000
trusted library allocation
page read and write
3E140261C000
trusted library allocation
page read and write
160667E0000
heap
page read and write
46D801932000
trusted library allocation
page read and write
21406502000
heap
page read and write
2140112F000
heap
page read and write
46D801414000
trusted library allocation
page read and write
748004AA000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E5803774000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
47A000321000
direct allocation
page read and write
2E5802067000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
5D6000266000
trusted library allocation
page read and write
552800294000
trusted library allocation
page read and write
160EBB30000
unclassified section
page read and write
310400294000
direct allocation
page read and write
9DC0040C000
trusted library allocation
page read and write
2E5803756000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
7480061B000
trusted library allocation
page read and write
29EBB42B000
heap
page read and write
2050050C000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D800BB8000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
21408A10000
unkown
page readonly
2E5803784000
trusted library allocation
page read and write
1AE00682000
trusted library allocation
page read and write
43F45FB000
stack
page read and write
42E000220000
trusted library allocation
page read and write
E11F3FE000
unkown
page readonly
2E5803687000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
3E14023F0000
trusted library allocation
page read and write
2E58036FC000
trusted library allocation
page read and write
3D6F000
heap
page read and write
2E5801AF0000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
17EC9498000
heap
page read and write
1AE00F02000
trusted library allocation
page read and write
46D800BB0000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
1AE01042000
trusted library allocation
page read and write
22140006C000
trusted library allocation
page read and write
92000C0C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2E58036E2000
trusted library allocation
page read and write
6FF8000
heap
page read and write
2E58040DC000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
AD21FFE000
stack
page read and write
46D801902000
trusted library allocation
page read and write
21408B20000
unkown
page readonly
1FC67AA0000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
17EC940B000
heap
page read and write
46D800BD4000
trusted library allocation
page read and write
1AE00F42000
trusted library allocation
page read and write
2140112E000
heap
page read and write
20500A00000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
4BC90000
trusted library allocation
page read and write
1437000
heap
page read and write
592C00254000
trusted library allocation
page read and write
6F90000
heap
page read and write
2E5800F74000
trusted library allocation
page read and write
2E58036D2000
trusted library allocation
page read and write
323000038000
trusted library allocation
page read and write
2E5800FD0000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
144B000
heap
page read and write
2E580375C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
2E58015D0000
trusted library allocation
page read and write
2140114F000
heap
page read and write
AD22FFE000
stack
page read and write
310400250000
direct allocation
page read and write
46D800AD8000
trusted library allocation
page read and write
1E4000220000
trusted library allocation
page read and write
14C0002B0000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D800730000
trusted library allocation
page read and write
2E5803CCC000
trusted library allocation
page read and write
6FF0002A8000
trusted library allocation
page read and write
16066C66000
heap
page read and write
3E1402554000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
16066C09000
heap
page read and write
46D801314000
trusted library allocation
page read and write
2E580077E000
trusted library allocation
page read and write
1AE00DC2000
trusted library allocation
page read and write
3DAA000
heap
page read and write
46D801928000
trusted library allocation
page read and write
2E58009A4000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
21406AE0000
unkown
page readonly
17EC4128000
heap
page read and write
4BD44000
trusted library allocation
page read and write
25CAA902000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
53C80031C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
3E1401001000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E580383A000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D8019E4000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2050086E000
trusted library allocation
page read and write
5D6000266000
trusted library allocation
page read and write
21401129000
heap
page read and write
2E5800B07000
trusted library allocation
page read and write
2A317A02000
heap
page read and write
2E5801F27000
trusted library allocation
page read and write
2E5800AE8000
trusted library allocation
page read and write
205004E2000
trusted library allocation
page read and write
2E5804064000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
2E5800BB4000
trusted library allocation
page read and write
748006A3000
trusted library allocation
page read and write
99C1BFE000
unkown
page readonly
46D800708000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
F200022C000
trusted library allocation
page read and write
3E140289D000
trusted library allocation
page read and write
1AE0086C000
trusted library allocation
page read and write
46D8009D8000
trusted library allocation
page read and write
E134BFB000
stack
page read and write
1AE000C2000
trusted library allocation
page read and write
29EBB360000
heap
page readonly
46D80189A000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
E1173FE000
unkown
page readonly
FE5000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E5801B60000
trusted library allocation
page read and write
1464000
heap
page read and write
2E5800AE2000
trusted library allocation
page read and write
592C001A5000
trusted library allocation
page read and write
46D8008A4000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5800684000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
46D8012CC000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
46D8012F2000
trusted library allocation
page read and write
3E140254F000
trusted library allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
2E5800A48000
trusted library allocation
page read and write
C2BD7FE000
stack
page read and write
46D80191C000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
46D8012D4000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
160EA4C7000
unclassified section
page read and write
E64002A0000
trusted library allocation
page read and write
92000280000
trusted library allocation
page read and write
17EC94CD000
heap
page read and write
2E5803692000
trusted library allocation
page read and write
E6400300000
trusted library allocation
page read and write
16066C68000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
74047FE000
unkown
page readonly
74800197000
trusted library allocation
page read and write
3E140254C000
trusted library allocation
page read and write
26C8002B4000
trusted library allocation
page read and write
1AE01442000
trusted library allocation
page read and write
398800278000
trusted library allocation
page read and write
54DC1FE000
stack
page read and write
17EC412F000
heap
page read and write
17EC5F02000
heap
page read and write
99C3BFE000
unkown
page readonly
25CAA5F0000
trusted library allocation
page read and write
2E5800D94000
trusted library allocation
page read and write
14C0002B0000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
20500507000
trusted library allocation
page read and write
160EBB23000
unclassified section
page read and write
5D6000224000
trusted library allocation
page read and write
7472BF9000
stack
page read and write
46D801535000
trusted library allocation
page read and write
1455000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
2E5800F7C000
trusted library allocation
page read and write
C15A3FE000
unkown
page readonly
207000401000
trusted library allocation
page read and write
2E5801AF0000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066B60000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
748001C0000
trusted library allocation
page read and write
43F55FE000
stack
page read and write
2E58009BB000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
2E580200A000
trusted library allocation
page read and write
2E58036AB000
trusted library allocation
page read and write
2AC800234000
direct allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
748004A3000
trusted library allocation
page read and write
29EBB3F0000
heap
page read and write
5D600029C000
trusted library allocation
page read and write
F20000F4000
trusted library allocation
page read and write
1B8F7C9D000
heap
page read and write
46D801734000
trusted library allocation
page read and write
E128BFE000
stack
page read and write
74800144000
trusted library allocation
page read and write
16066C10000
heap
page read and write
1E765DE0000
trusted library allocation
page read and write
41A69FE000
stack
page read and write
2E580069A000
trusted library allocation
page read and write
1AE007DC000
trusted library allocation
page read and write
20500782000
trusted library allocation
page read and write
1AE00D07000
trusted library allocation
page read and write
1473000
heap
page read and write
46D801930000
trusted library allocation
page read and write
26C800274000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E5803824000
trusted library allocation
page read and write
1990000
heap
page read and write
46D801932000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
E126BFE000
stack
page read and write
46D801970000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
592C002AD000
trusted library allocation
page read and write
146E000
heap
page read and write
46D8003C4000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
3E1402FDC000
trusted library allocation
page read and write
B9163FE000
unkown
page readonly
5D600029F000
trusted library allocation
page read and write
1E4000248000
trusted library allocation
page read and write
F2000024000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
1B8F7B70000
heap
page readonly
5D6000268000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
17EC4145000
heap
page read and write
46D8012FF000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
9200006A000
trusted library allocation
page read and write
2E58007BC000
trusted library allocation
page read and write
20500322000
trusted library allocation
page read and write
1AE01302000
trusted library allocation
page read and write
398800220000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
143E000
heap
page read and write
2E580370C000
trusted library allocation
page read and write
24040029C000
direct allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E9C00288000
direct allocation
page read and write
2E580202F000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
592C00218000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
E112BFB000
stack
page read and write
46D801868000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E58036FA000
trusted library allocation
page read and write
17EC9434000
heap
page read and write
17EC4140000
heap
page read and write
21406425000
heap
page read and write
92001504000
trusted library allocation
page read and write
5D6000185000
trusted library allocation
page read and write
14C0002A4000
trusted library allocation
page read and write
1AE00868000
trusted library allocation
page read and write
618800354000
direct allocation
page read and write
1AE015FC000
trusted library allocation
page read and write
41B09FE000
stack
page read and write
2E5803EE4000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
22140000C000
trusted library allocation
page read and write
2E58036FC000
trusted library allocation
page read and write
7A2C00418000
trusted library allocation
page read and write
3230000C1000
trusted library allocation
page read and write
1B8F7C98000
heap
page read and write
46D801924000
trusted library allocation
page read and write
C2C002B0000
trusted library allocation
page read and write
92000EC0000
trusted library allocation
page read and write
2F800080000
trusted library allocation
page read and write
FDC21FE000
unkown
page readonly
46D801930000
trusted library allocation
page read and write
160EA56A000
unclassified section
page read and write
2E5801A0C000
trusted library allocation
page read and write
2E5800614000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E58040BE000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
1AE007D8000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D8018C1000
trusted library allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
27C000220000
direct allocation
page read and write
46D80192C000
trusted library allocation
page read and write
7A2C00328000
trusted library allocation
page read and write
74800201000
trusted library allocation
page read and write
257800248000
trusted library allocation
page read and write
1FC64809000
heap
page read and write
1AE00A42000
trusted library allocation
page read and write
160E9ECB000
trusted library allocation
page read and write
7012000
heap
page read and write
3DA6000
heap
page read and write
46D80196C000
trusted library allocation
page read and write
2E58040D2000
trusted library allocation
page read and write
99C53FE000
stack
page read and write
2E5800CE4000
trusted library allocation
page read and write
618800304000
direct allocation
page read and write
46D80189F000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
1DD77FE000
unkown
page readonly
3E14022F4000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
1AE0103C000
trusted library allocation
page read and write
46D800A2C000
trusted library allocation
page read and write
21406453000
heap
page read and write
310400201000
direct allocation
page read and write
2E580165F000
trusted library allocation
page read and write
5D6000201000
trusted library allocation
page read and write
2418F590000
heap
page read and write
1FC64502000
heap
page read and write
5F900031C000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E580380C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
1444000
heap
page read and write
46D801928000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
1434000
heap
page read and write
46D8018DC000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
16066C08000
heap
page read and write
1442000
heap
page read and write
46D80191E000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E58040A6000
trusted library allocation
page read and write
2E58016AB000
trusted library allocation
page read and write
2E580078B000
trusted library allocation
page read and write
748003A4000
trusted library allocation
page read and write
29EBB502000
heap
page read and write
2E5800824000
trusted library allocation
page read and write
21402D40000
trusted library section
page readonly
3098002A0000
trusted library allocation
page read and write
2E58039EC000
trusted library allocation
page read and write
48B85FB000
stack
page read and write
2E5803704000
trusted library allocation
page read and write
1DD37FE000
unkown
page readonly
3E140240C000
trusted library allocation
page read and write
4BCB0000
trusted library allocation
page read and write
1AE00C82000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
41A0000
remote allocation
page read and write
2E9C00220000
direct allocation
page read and write
25CAD500000
heap
page read and write
2E9C002D8000
direct allocation
page read and write
1AE007FA000
trusted library allocation
page read and write
3E14027D8000
trusted library allocation
page read and write
4F1400274000
direct allocation
page read and write
2E58009E0000
trusted library allocation
page read and write
20500742000
trusted library allocation
page read and write
46D8013F4000
trusted library allocation
page read and write
2E58040CC000
trusted library allocation
page read and write
1614002A4000
trusted library allocation
page read and write
F200016C000
trusted library allocation
page read and write
1AE01582000
trusted library allocation
page read and write
2E5800E48000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
2E5800B06000
trusted library allocation
page read and write
3DBE000
heap
page read and write
46D801270000
trusted library allocation
page read and write
20500282000
trusted library allocation
page read and write
748003A0000
trusted library allocation
page read and write
3E1402240000
trusted library allocation
page read and write
2E5802089000
trusted library allocation
page read and write
46D8018AC000
trusted library allocation
page read and write
2E580377C000
trusted library allocation
page read and write
1404002A4000
trusted library allocation
page read and write
1458000
heap
page read and write
2E5803F74000
trusted library allocation
page read and write
46D80190E000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
92000CB8000
trusted library allocation
page read and write
3E1402454000
trusted library allocation
page read and write
214010E5000
heap
page read and write
309800264000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
21408304000
trusted library allocation
page read and write
3E14022E4000
trusted library allocation
page read and write
3B000280000
direct allocation
page read and write
F20003AC000
trusted library allocation
page read and write
74057FE000
unkown
page readonly
2E580155C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
20500876000
trusted library allocation
page read and write
2E5803C9C000
trusted library allocation
page read and write
2E58015EC000
trusted library allocation
page read and write
3988002AC000
trusted library allocation
page read and write
1AE00302000
trusted library allocation
page read and write
1E765E2F000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
21401148000
heap
page read and write
9DC002A4000
trusted library allocation
page read and write
2214000DD000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5802076000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E58020B2000
trusted library allocation
page read and write
E11BBFC000
stack
page read and write
207000370000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
2E5801B08000
trusted library allocation
page read and write
3B00027C000
direct allocation
page read and write
2E58037CC000
trusted library allocation
page read and write
46D8009C2000
trusted library allocation
page read and write
E1333FE000
unkown
page readonly
2E580407A000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
2578002F0000
trusted library allocation
page read and write
C15CBFE000
stack
page read and write
748006D0000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5802404000
trusted library allocation
page read and write
5D600005C000
trusted library allocation
page read and write
21401133000
heap
page read and write
5F900040C000
trusted library allocation
page read and write
2E5802235000
trusted library allocation
page read and write
7014000
heap
page read and write
46D8019BE000
trusted library allocation
page read and write
2E58009B0000
trusted library allocation
page read and write
20500552000
trusted library allocation
page read and write
25CAA440000
heap
page read and write
2E5803EEE000
trusted library allocation
page read and write
2E5800BE4000
trusted library allocation
page read and write
1AE00A39000
trusted library allocation
page read and write
20500988000
trusted library allocation
page read and write
C2C002D8000
trusted library allocation
page read and write
1412000
heap
page read and write
46D801934000
trusted library allocation
page read and write
2E580375E000
trusted library allocation
page read and write
46D8018A4000
trusted library allocation
page read and write
748000AC000
trusted library allocation
page read and write
48B25FE000
stack
page read and write
1E765E3A000
heap
page read and write
2E5803714000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
5D60002B8000
trusted library allocation
page read and write
32300000C000
trusted library allocation
page read and write
2E5800B78000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
2E580380C000
trusted library allocation
page read and write
74800570000
trusted library allocation
page read and write
92000BC4000
trusted library allocation
page read and write
92000B34000
trusted library allocation
page read and write
1AE00742000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
1B8825B0000
heap
page read and write
1443000
heap
page read and write
26C8002DC000
trusted library allocation
page read and write
46D80189A000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
54D49FE000
unkown
page readonly
17EC5E13000
heap
page read and write
5D6000248000
trusted library allocation
page read and write
2E580372C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
16066C25000
heap
page read and write
46D8018CE000
trusted library allocation
page read and write
46D8009E4000
trusted library allocation
page read and write
2E5800794000
trusted library allocation
page read and write
21BC00254000
trusted library allocation
page read and write
2E58009D8000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
2E58008B0000
trusted library allocation
page read and write
2E5803CBC000
trusted library allocation
page read and write
46D80130C000
trusted library allocation
page read and write
2E580413C000
trusted library allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
16066C11000
heap
page read and write
920002A4000
trusted library allocation
page read and write
E11DBFD000
stack
page read and write
1F880020C000
trusted library allocation
page read and write
124800201000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
1FC6472A000
unclassified section
page read and write
1454000
heap
page read and write
17EC94AA000
heap
page read and write
42E000310000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
748004CC000
trusted library allocation
page read and write
592C00284000
trusted library allocation
page read and write
1482000
heap
page read and write
2070002C4000
trusted library allocation
page read and write
5528002A4000
trusted library allocation
page read and write
748001D4000
trusted library allocation
page read and write
2E5801A14000
trusted library allocation
page read and write
46D8008B3000
trusted library allocation
page read and write
3104002B4000
direct allocation
page read and write
1B8F7C81000
heap
page read and write
17EC9700000
heap
page read and write
43F85FD000
stack
page read and write
46D80191C000
trusted library allocation
page read and write
7401FFD000
stack
page read and write
2E58036F2000
trusted library allocation
page read and write
4EE400248000
direct allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
2E5800B0C000
trusted library allocation
page read and write
16066C24000
heap
page read and write
17EC940B000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D800614000
trusted library allocation
page read and write
5D60000D8000
trusted library allocation
page read and write
46D800634000
trusted library allocation
page read and write
29EBB790000
unclassified section
page read and write
5D60002DC000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
29EBB458000
heap
page read and write
7FFF7A30C000
trusted library allocation
page execute and read and write
3D1400244000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58020D0000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
21401129000
heap
page read and write
27C000201000
direct allocation
page read and write
1435000
heap
page read and write
2E58008AF000
trusted library allocation
page read and write
3DEA000
heap
page read and write
9DC0032B000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
205001AF000
trusted library allocation
page read and write
2E5803F59000
trusted library allocation
page read and write
1455000
heap
page read and write
257800254000
trusted library allocation
page read and write
46D800788000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
74800144000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
5D60000EC000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
92000DF1000
trusted library allocation
page read and write
748001C0000
trusted library allocation
page read and write
C2BBFFE000
unkown
page readonly
21401154000
heap
page read and write
16066C09000
heap
page read and write
748006D6000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
205008DB000
trusted library allocation
page read and write
1AE01200000
trusted library allocation
page read and write
1AE008B2000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
16066C25000
heap
page read and write
5D600026C000
trusted library allocation
page read and write
41B41FE000
unkown
page readonly
1AE01002000
trusted library allocation
page read and write
5F9000220000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
3E1402201000
trusted library allocation
page read and write
2E5800E28000
trusted library allocation
page read and write
2E5800BEC000
trusted library allocation
page read and write
2A31782B000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801998000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
2E58023E6000
trusted library allocation
page read and write
41B11FE000
unkown
page readonly
27C000250000
direct allocation
page read and write
92000EC0000
trusted library allocation
page read and write
25CAA656000
heap
page read and write
740BFFE000
stack
page read and write
46D801930000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
F2000138000
trusted library allocation
page read and write
2E580106A000
trusted library allocation
page read and write
2E58002C8000
trusted library allocation
page read and write
46D801972000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
74800364000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
5D4C00254000
direct allocation
page read and write
46D8008B3000
trusted library allocation
page read and write
AD287FE000
unkown
page readonly
2E58037E4000
trusted library allocation
page read and write
2E58036EF000
trusted library allocation
page read and write
7480011D000
trusted library allocation
page read and write
74800270000
trusted library allocation
page read and write
161400254000
trusted library allocation
page read and write
718C0040C000
trusted library allocation
page read and write
20500521000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D80176C000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
5D600000C000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
92000BC8000
trusted library allocation
page read and write
46D801880000
trusted library allocation
page read and write
4F1400284000
direct allocation
page read and write
46D800818000
trusted library allocation
page read and write
618800306000
direct allocation
page read and write
2140651B000
heap
page read and write
3860002EC000
trusted library allocation
page read and write
FDBB9FE000
stack
page read and write
2E5800AD8000
trusted library allocation
page read and write
92000DE0000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
2E58022AB000
trusted library allocation
page read and write
920007B0000
trusted library allocation
page read and write
4BCB8000
trusted library allocation
page read and write
2E58023A3000
trusted library allocation
page read and write
5F90002B4000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
E640029C000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
92000283000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
3104002C4000
direct allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
1AE015F2000
trusted library allocation
page read and write
160EA5F0000
unclassified section
page read and write
2E5803EAC000
trusted library allocation
page read and write
2E580370C000
trusted library allocation
page read and write
2E580159C000
trusted library allocation
page read and write
2E5801AF8000
trusted library allocation
page read and write
3E14024B4000
trusted library allocation
page read and write
2E58037A4000
trusted library allocation
page read and write
46D800313000
trusted library allocation
page read and write
5D6000238000
trusted library allocation
page read and write
21401142000
heap
page read and write
2E5800B04000
trusted library allocation
page read and write
46D800BF4000
trusted library allocation
page read and write
2E5802350000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
6FF0002B8000
trusted library allocation
page read and write
2050050B000
trusted library allocation
page read and write
1AE000C2000
trusted library allocation
page read and write
2E580148C000
trusted library allocation
page read and write
5F90002D4000
trusted library allocation
page read and write
E10E3FE000
unkown
page readonly
46D8018FF000
trusted library allocation
page read and write
4BC5C000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
592C00230000
trusted library allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
2E5803784000
trusted library allocation
page read and write
3E140245A000
trusted library allocation
page read and write
7480015C000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
2E58038FC000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
6F000008C000
trusted library allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
1AE01000000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
29EBE25E000
heap
page read and write
48B6DFB000
stack
page read and write
E121BFC000
stack
page read and write
29EBB4C8000
heap
page read and write
3860002C0000
trusted library allocation
page read and write
1AE007D6000
trusted library allocation
page read and write
1AE0150A000
trusted library allocation
page read and write
2E5800F42000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
1AE00F02000
trusted library allocation
page read and write
2E5804258000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
2050051A000
trusted library allocation
page read and write
99BB3FB000
stack
page read and write
46D80030D000
trusted library allocation
page read and write
F2000134000
trusted library allocation
page read and write
16066813000
heap
page read and write
2E5803684000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
2E5800730000
trusted library allocation
page read and write
1DCFFFE000
stack
page read and write
74800118000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
205008E6000
trusted library allocation
page read and write
16066C0D000
heap
page read and write
2E5800AC0000
trusted library allocation
page read and write
92000244000
trusted library allocation
page read and write
205003C2000
trusted library allocation
page read and write
2E5800624000
trusted library allocation
page read and write
2E58008A9000
trusted library allocation
page read and write
2E580390C000
trusted library allocation
page read and write
46D800764000
trusted library allocation
page read and write
2E58036EA000
trusted library allocation
page read and write
3FDC000
stack
page read and write
E117BFC000
stack
page read and write
46D80190C000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
5D60000C1000
trusted library allocation
page read and write
1E4000278000
trusted library allocation
page read and write
2E5803FCC000
trusted library allocation
page read and write
46D800BD0000
trusted library allocation
page read and write
1AE008A8000
trusted library allocation
page read and write
2E5800C48000
trusted library allocation
page read and write
29EBE28D000
heap
page read and write
160EA910000
unclassified section
page read and write
7403FFC000
stack
page read and write
5D6000268000
trusted library allocation
page read and write
205004E6000
trusted library allocation
page read and write
2E58033E4000
trusted library allocation
page read and write
3E1400801000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
4EE4002AC000
direct allocation
page read and write
46D80194C000
trusted library allocation
page read and write
257800230000
trusted library allocation
page read and write
46D80074C000
trusted library allocation
page read and write
2E5800B08000
trusted library allocation
page read and write
46D800EFF000
trusted library allocation
page read and write
2578002C0000
trusted library allocation
page read and write
143C000
heap
page read and write
46D8012A0000
trusted library allocation
page read and write
4BD0C000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
46D8008E0000
trusted library allocation
page read and write
5F9000418000
trusted library allocation
page read and write
17EC402B000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
5D60002D7000
trusted library allocation
page read and write
F200029C000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E5800828000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
46D8003DC000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
E10C3FE000
unkown
page readonly
25CAD4D5000
heap
page read and write
FDC19FC000
stack
page read and write
B9153FE000
unkown
page readonly
2E5800E0C000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
1FCE7AC5000
unclassified section
page read and write
46D800834000
trusted library allocation
page read and write
920001B8000
trusted library allocation
page read and write
1F88002C4000
trusted library allocation
page read and write
46D8018B1000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
17EC40E6000
heap
page read and write
46D801934000
trusted library allocation
page read and write
2E5802011000
trusted library allocation
page read and write
3E14030A8000
trusted library allocation
page read and write
46D801288000
trusted library allocation
page read and write
146E000
heap
page read and write
46D801E4C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
2E5803F8C000
trusted library allocation
page read and write
F2000060000
trusted library allocation
page read and write
2E5800B03000
trusted library allocation
page read and write
19B03E77000
heap
page read and write
3E1400201000
trusted library allocation
page read and write
2E58040BA000
trusted library allocation
page read and write
705D000
heap
page read and write
2E58036F2000
trusted library allocation
page read and write
B9143FE000
unkown
page readonly
46D800EC4000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
146E000
heap
page read and write
3E140286C000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
1AE00C02000
trusted library allocation
page read and write
1B8F7C7A000
heap
page read and write
46D801270000
trusted library allocation
page read and write
618800324000
direct allocation
page read and write
2E5800BB4000
trusted library allocation
page read and write
2E58023B2000
trusted library allocation
page read and write
9DC002CC000
trusted library allocation
page read and write
2E5800AC2000
trusted library allocation
page read and write
46D80074C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
748004A0000
trusted library allocation
page read and write
41A39FB000
stack
page read and write
2E5804084000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
21406518000
heap
page read and write
2E5802036000
trusted library allocation
page read and write
46D801490000
trusted library allocation
page read and write
2E5800C7C000
trusted library allocation
page read and write
2E5801A4C000
trusted library allocation
page read and write
46D8018D8000
trusted library allocation
page read and write
1E765DC0000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
22140008C000
trusted library allocation
page read and write
2E58008AD000
trusted library allocation
page read and write
140E7E02000
heap
page read and write
41AE9FD000
stack
page read and write
3E1402518000
trusted library allocation
page read and write
1AE002AB000
trusted library allocation
page read and write
46D800330000
trusted library allocation
page read and write
46D801896000
trusted library allocation
page read and write
1AE00942000
trusted library allocation
page read and write
7021000
heap
page read and write
2E5800CA8000
trusted library allocation
page read and write
2E5804390000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
592C000E3000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
E12B3FE000
unkown
page readonly
92000030000
trusted library allocation
page read and write
46D801784000
trusted library allocation
page read and write
6FF0002B4000
trusted library allocation
page read and write
205004E1000
trusted library allocation
page read and write
1AE00603000
trusted library allocation
page read and write
AD24FFE000
stack
page read and write
16066C24000
heap
page read and write
16066C11000
heap
page read and write
46D8012FC000
trusted library allocation
page read and write
46D801926000
trusted library allocation
page read and write
741E7FE000
unkown
page readonly
99BCBFE000
unkown
page readonly
69A0000
heap
page read and write
41AF1FE000
unkown
page readonly
5D600029C000
trusted library allocation
page read and write
2E58009B4000
trusted library allocation
page read and write
592C0014F000
trusted library allocation
page read and write
16066C27000
heap
page read and write
E50002C4000
direct allocation
page read and write
27458213000
heap
page read and write
46D800B68000
trusted library allocation
page read and write
46D801996000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
3E140243D000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
46D801882000
trusted library allocation
page read and write
207000201000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E58037C4000
trusted library allocation
page read and write
2E580369C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
5D6000178000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
21401113000
heap
page read and write
46D8013D8000
trusted library allocation
page read and write
14040023C000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
46D800B68000
trusted library allocation
page read and write
46D800B70000
trusted library allocation
page read and write
2E58023D0000
trusted library allocation
page read and write
1B8F7CB3000
heap
page read and write
3E14025D4000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
3DC3000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
2E58020AB000
trusted library allocation
page read and write
46D8018DE000
trusted library allocation
page read and write
1AE007D5000
trusted library allocation
page read and write
46D800424000
trusted library allocation
page read and write
9DC002B0000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1464000
heap
page read and write
207000230000
trusted library allocation
page read and write
2E5800638000
trusted library allocation
page read and write
2E5804099000
trusted library allocation
page read and write
160EAE60000
unclassified section
page read and write
2E5801C54000
trusted library allocation
page read and write
741FFFE000
stack
page read and write
2E5803F24000
trusted library allocation
page read and write
3DB5000
heap
page read and write
16066C2B000
heap
page read and write
92000254000
trusted library allocation
page read and write
17EC94A4000
heap
page read and write
205008CC000
trusted library allocation
page read and write
2E580371F000
trusted library allocation
page read and write
46D800BC8000
trusted library allocation
page read and write
29EBE2BE000
heap
page read and write
46D800724000
trusted library allocation
page read and write
1FC64802000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
46D800F00000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
17EC4141000
heap
page read and write
2E5801694000
trusted library allocation
page read and write
21401154000
heap
page read and write
46D801914000
trusted library allocation
page read and write
7480019B000
trusted library allocation
page read and write
2AC800294000
direct allocation
page read and write
5D6000050000
trusted library allocation
page read and write
920005DB000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D801984000
trusted library allocation
page read and write
21BC00238000
trusted library allocation
page read and write
C2B37FE000
stack
page read and write
1434000
heap
page read and write
1B8F7CCB000
heap
page read and write
46D801876000
trusted library allocation
page read and write
6FF000298000
trusted library allocation
page read and write
21401149000
heap
page read and write
207000304000
trusted library allocation
page read and write
21401149000
heap
page read and write
2E5803EAC000
trusted library allocation
page read and write
3E1402439000
trusted library allocation
page read and write
92000EA6000
trusted library allocation
page read and write
3098002E8000
trusted library allocation
page read and write
592C00248000
trusted library allocation
page read and write
F200023C000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E58037B4000
trusted library allocation
page read and write
46D8008AD000
trusted library allocation
page read and write
27C85C00000
heap
page read and write
2E58008AD000
trusted library allocation
page read and write
1DD47FE000
unkown
page readonly
46D801932000
trusted library allocation
page read and write
1AE00911000
trusted library allocation
page read and write
2E5803EE0000
trusted library allocation
page read and write
2E5804342000
trusted library allocation
page read and write
2E58040B4000
trusted library allocation
page read and write
1AE007FE000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E5803C7C000
trusted library allocation
page read and write
2E5803EF4000
trusted library allocation
page read and write
160EAE8D000
unclassified section
page read and write
5D6000264000
trusted library allocation
page read and write
1AE002F3000
trusted library allocation
page read and write
46D8008B3000
trusted library allocation
page read and write
1435000
heap
page read and write
1FC64869000
heap
page read and write
2E5804064000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
46D8008AD000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
53C800404000
trusted library allocation
page read and write
205008C2000
trusted library allocation
page read and write
2E5800BDC000
trusted library allocation
page read and write
46D8008A0000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E58040AA000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
9DC00418000
trusted library allocation
page read and write
46D80196A000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
240400290000
direct allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
17EC4103000
heap
page read and write
1FC64770000
trusted library allocation
page read and write
C2C0028C000
trusted library allocation
page read and write
42E0002E4000
trusted library allocation
page read and write
124800268000
trusted library allocation
page read and write
2E58009E4000
trusted library allocation
page read and write
124800248000
trusted library allocation
page read and write
3098002C0000
trusted library allocation
page read and write
592C00001000
trusted library allocation
page read and write
E1263FE000
unkown
page readonly
2E5800C88000
trusted library allocation
page read and write
2E5804374000
trusted library allocation
page read and write
748003CD000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
1E765E4C000
heap
page read and write
46D801930000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
5D6000134000
trusted library allocation
page read and write
2E5800BD4000
trusted library allocation
page read and write
2E5800654000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2AC8002BC000
direct allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
21406453000
heap
page read and write
16066C0A000
heap
page read and write
748005EC000
trusted library allocation
page read and write
2E5804090000
trusted library allocation
page read and write
46D800BD4000
trusted library allocation
page read and write
46D8018E3000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
160EA55D000
unclassified section
page read and write
309800418000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
3D94000
heap
page read and write
17EC4145000
heap
page read and write
2E58036AA000
trusted library allocation
page read and write
74800149000
trusted library allocation
page read and write
618800314000
direct allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
16066C25000
heap
page read and write
748003C4000
trusted library allocation
page read and write
2E58008AE000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E5800BE4000
trusted library allocation
page read and write
46D800638000
trusted library allocation
page read and write
21401154000
heap
page read and write
3E14029CC000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
3D1400274000
trusted library allocation
page read and write
C2B2FFE000
unkown
page readonly
2AC800288000
direct allocation
page read and write
46D801924000
trusted library allocation
page read and write
2E5803FE4000
trusted library allocation
page read and write
741DFFC000
stack
page read and write
2E5804084000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D801224000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
7471BFE000
stack
page read and write
46D801920000
trusted library allocation
page read and write
1B8F7C7A000
heap
page read and write
7429000
trusted library allocation
page read and write
27458402000
heap
page read and write
27C0002A4000
direct allocation
page read and write
1434000
heap
page read and write
16066C10000
heap
page read and write
1AE0151B000
trusted library allocation
page read and write
2E9C00211000
direct allocation
page read and write
26C800260000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D8013A6000
trusted library allocation
page read and write
1AE00FC2000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
592C00117000
trusted library allocation
page read and write
748005E0000
trusted library allocation
page read and write
2E5800FE8000
trusted library allocation
page read and write
140B000
heap
page read and write
2E58036E4000
trusted library allocation
page read and write
5D60002A4000
trusted library allocation
page read and write
2E58036F2000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
1404002F0000
trusted library allocation
page read and write
F2000148000
trusted library allocation
page read and write
C1593FE000
unkown
page readonly
46D801928000
trusted library allocation
page read and write
29EBB770000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
5F9000270000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
1AE00D73000
trusted library allocation
page read and write
17EC94EE000
heap
page read and write
21BC0028C000
trusted library allocation
page read and write
1AE00E42000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E580160A000
trusted library allocation
page read and write
2E5800B10000
trusted library allocation
page read and write
2E5801F08000
trusted library allocation
page read and write
46D8012DC000
trusted library allocation
page read and write
16066C24000
heap
page read and write
748006C3000
trusted library allocation
page read and write
3E1402444000
trusted library allocation
page read and write
145B000
heap
page read and write
46D801924000
trusted library allocation
page read and write
3D1400248000
trusted library allocation
page read and write
74800450000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
2E5800771000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
AD2A7FE000
unkown
page readonly
46D801914000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
1443000
heap
page read and write
2E5802286000
trusted library allocation
page read and write
1FC643C0000
remote allocation
page read and write
1AE01051000
trusted library allocation
page read and write
2E5800B0C000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
46D801368000
trusted library allocation
page read and write
19B03E87000
heap
page read and write
48B8DFC000
stack
page read and write
46D801990000
trusted library allocation
page read and write
3DED000
heap
page read and write
1AE00D48000
trusted library allocation
page read and write
5F9000304000
trusted library allocation
page read and write
20500917000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
E5000294000
direct allocation
page read and write
2E58008A6000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
21401128000
heap
page read and write
2E580370C000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
1E40002A4000
trusted library allocation
page read and write
F2000340000
trusted library allocation
page read and write
25CAA802000
heap
page read and write
46D801930000
trusted library allocation
page read and write
92000066000
trusted library allocation
page read and write
145B000
heap
page read and write
1434000
heap
page read and write
740EFFE000
stack
page read and write
46D8018AC000
trusted library allocation
page read and write
2E58016E3000
trusted library allocation
page read and write
1AE00864000
trusted library allocation
page read and write
46D802304000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
92000BC8000
trusted library allocation
page read and write
3D90000
heap
page read and write
46D8018A4000
trusted library allocation
page read and write
20500482000
trusted library allocation
page read and write
29EBB46E000
heap
page read and write
2E580383C000
trusted library allocation
page read and write
3E140242C000
trusted library allocation
page read and write
21401140000
heap
page read and write
46D8018E1000
trusted library allocation
page read and write
25CAA641000
heap
page read and write
2E5803704000
trusted library allocation
page read and write
17EC5E02000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
17EC941E000
heap
page read and write
14C0002B0000
trusted library allocation
page read and write
F2000288000
trusted library allocation
page read and write
16066BD7000
unclassified section
page read and write
5D6000268000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
2E58037A2000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
E10EBFE000
stack
page read and write
748006A8000
trusted library allocation
page read and write
46D8012DC000
trusted library allocation
page read and write
5D60002AA000
trusted library allocation
page read and write
7480016C000
trusted library allocation
page read and write
2050058E000
trusted library allocation
page read and write
2E5801B10000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D8003A0000
trusted library allocation
page read and write
2E58020E3000
trusted library allocation
page read and write
2E58037F2000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
1B8F7CB1000
heap
page read and write
257800238000
trusted library allocation
page read and write
E1273FE000
unkown
page readonly
9200000C000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
46D802028000
trusted library allocation
page read and write
2E5800FF0000
trusted library allocation
page read and write
3D5D000
heap
page read and write
1AE00F13000
trusted library allocation
page read and write
1AE00C42000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D8013F0000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
46D800614000
trusted library allocation
page read and write
46D800662000
trusted library allocation
page read and write
41AC9FE000
stack
page read and write
46D8018A2000
trusted library allocation
page read and write
4BCE4000
trusted library allocation
page read and write
E12C3FE000
unkown
page readonly
2E5800888000
trusted library allocation
page read and write
2E58020DB000
trusted library allocation
page read and write
1AE0080A000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E9C00250000
direct allocation
page read and write
160667B0000
remote allocation
page read and write
2418F702000
heap
page read and write
5D60002C8000
trusted library allocation
page read and write
16066863000
heap
page read and write
48B35EF000
stack
page read and write
39880023C000
trusted library allocation
page read and write
2E5801624000
trusted library allocation
page read and write
9DC00278000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066C11000
heap
page read and write
1AE00D9B000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
42E000238000
trusted library allocation
page read and write
664000280000
trusted library allocation
page read and write
46D8017AB000
trusted library allocation
page read and write
7480065C000
trusted library allocation
page read and write
3DCF000
heap
page read and write
5D4C00290000
direct allocation
page read and write
21406240000
trusted library section
page read and write
5528002C4000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
5D60001E4000
trusted library allocation
page read and write
1443000
heap
page read and write
748003A0000
trusted library allocation
page read and write
16066C10000
heap
page read and write
16000010000
trusted library allocation
page read and write
F2000138000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
46D8018E3000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2404002CC000
direct allocation
page read and write
46D801250000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
46D800EFF000
trusted library allocation
page read and write
74800464000
trusted library allocation
page read and write
E10F3FE000
unkown
page readonly
46D801924000
trusted library allocation
page read and write
3DDC000
heap
page read and write
2E5803832000
trusted library allocation
page read and write
53C80024C000
trusted library allocation
page read and write
16066C25000
heap
page read and write
25CAA3C0000
heap
page read and write
46D801882000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
46D801533000
trusted library allocation
page read and write
46D8008B1000
trusted library allocation
page read and write
2E5804062000
trusted library allocation
page read and write
1437000
heap
page read and write
2E580362C000
trusted library allocation
page read and write
3E14022D8000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
160EA588000
unclassified section
page read and write
1483000
heap
page read and write
16066C5B000
heap
page read and write
740B7FE000
unkown
page readonly
46D801932000
trusted library allocation
page read and write
4BC3C000
trusted library allocation
page read and write
2E5801A34000
trusted library allocation
page read and write
53C8002E8000
trusted library allocation
page read and write
9DC00274000
trusted library allocation
page read and write
2E5801804000
trusted library allocation
page read and write
17EC40FA000
heap
page read and write
16066C2B000
heap
page read and write
21406402000
heap
page read and write
1AE00D6C000
trusted library allocation
page read and write
2E5800F4C000
trusted library allocation
page read and write
74800110000
trusted library allocation
page read and write
1435000
heap
page read and write
2E5803F29000
trusted library allocation
page read and write
46D800B54000
trusted library allocation
page read and write
29EBE258000
heap
page read and write
20500442000
trusted library allocation
page read and write
F2000194000
trusted library allocation
page read and write
1380000
heap
page read and write
148E000
heap
page read and write
5D6000268000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
5F9000254000
trusted library allocation
page read and write
21406802000
heap
page read and write
46D801876000
trusted library allocation
page read and write
21BC00258000
trusted library allocation
page read and write
21406257000
trusted library section
page read and write
2E5804308000
trusted library allocation
page read and write
46D8018AC000
trusted library allocation
page read and write
1AE00A82000
trusted library allocation
page read and write
2E58036FC000
trusted library allocation
page read and write
2E58015A4000
trusted library allocation
page read and write
E1093FE000
unkown
page readonly
46D801874000
trusted library allocation
page read and write
39880024C000
trusted library allocation
page read and write
2E5803AAC000
trusted library allocation
page read and write
1AE01003000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
2E58037BA000
trusted library allocation
page read and write
46D800685000
trusted library allocation
page read and write
21401131000
heap
page read and write
21406453000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
E6400284000
trusted library allocation
page read and write
2E5803994000
trusted library allocation
page read and write
16066C10000
heap
page read and write
3210002A4000
direct allocation
page read and write
1AE00D46000
trusted library allocation
page read and write
2E5802098000
trusted library allocation
page read and write
2E5800A40000
trusted library allocation
page read and write
2E9C00201000
direct allocation
page read and write
747F3FE000
unkown
page readonly
7480011C000
trusted library allocation
page read and write
310400288000
direct allocation
page read and write
2E580374A000
trusted library allocation
page read and write
2E58041A4000
trusted library allocation
page read and write
2E580372A000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
5D4C00230000
direct allocation
page read and write
20500536000
trusted library allocation
page read and write
2E5800BC4000
trusted library allocation
page read and write
2E5803844000
trusted library allocation
page read and write
747E3FE000
unkown
page readonly
29EBE2B5000
heap
page read and write
2E5802252000
trusted library allocation
page read and write
2E5804094000
trusted library allocation
page read and write
1445000
heap
page read and write
3DAA000
heap
page read and write
2E58036D2000
trusted library allocation
page read and write
5D6000090000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
20500880000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
2E58040CC000
trusted library allocation
page read and write
2E5802027000
trusted library allocation
page read and write
3D4A000
heap
page read and write
2E580370A000
trusted library allocation
page read and write
7003000
heap
page read and write
2E5804064000
trusted library allocation
page read and write
124800280000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
16066C24000
heap
page read and write
4BC48000
trusted library allocation
page read and write
47A000314000
direct allocation
page read and write
1466000
heap
page read and write
16066C11000
heap
page read and write
E1363FE000
unkown
page readonly
46D801924000
trusted library allocation
page read and write
C2C00274000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
1440000
heap
page read and write
5D6000290000
trusted library allocation
page read and write
2E5801620000
trusted library allocation
page read and write
2E5801AD0000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
2E5803794000
trusted library allocation
page read and write
2050098B000
trusted library allocation
page read and write
21406402000
heap
page read and write
46D800724000
trusted library allocation
page read and write
2E5800730000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2418F641000
heap
page read and write
74800336000
trusted library allocation
page read and write
3D4D000
heap
page read and write
2E58009E0000
trusted library allocation
page read and write
2E5800E6C000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E5800A74000
trusted library allocation
page read and write
2E5803764000
trusted library allocation
page read and write
46D8008A4000
trusted library allocation
page read and write
309800300000
trusted library allocation
page read and write
1E4000201000
trusted library allocation
page read and write
4EE40023C000
direct allocation
page read and write
2E58016C5000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
257800310000
trusted library allocation
page read and write
323000144000
trusted library allocation
page read and write
1435000
heap
page read and write
46D801368000
trusted library allocation
page read and write
1AE00E54000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
17EC4148000
heap
page read and write
92000BA0000
trusted library allocation
page read and write
30980040C000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
19B03E2B000
heap
page read and write
46D80190C000
trusted library allocation
page read and write
46D8012A4000
trusted library allocation
page read and write
16066C25000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
F20000C0000
trusted library allocation
page read and write
2E5801B50000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
AD28FFE000
stack
page read and write
17EC4195000
heap
page read and write
5D60002D4000
trusted library allocation
page read and write
20500902000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
1AE00D9D000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E58037CA000
trusted library allocation
page read and write
7024000
heap
page read and write
2E58003D4000
trusted library allocation
page read and write
1B88257F000
trusted library allocation
page read and write
592C00148000
trusted library allocation
page read and write
5F90002EC000
trusted library allocation
page read and write
29EBE302000
heap
page read and write
46D800B44000
trusted library allocation
page read and write
2E58039F4000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
1614002A4000
trusted library allocation
page read and write
74800291000
trusted library allocation
page read and write
2E580370C000
trusted library allocation
page read and write
2050053F000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
1AE008D1000
trusted library allocation
page read and write
5D60002AC000
trusted library allocation
page read and write
747C3FE000
unkown
page readonly
2E5804060000
trusted library allocation
page read and write
2E5801690000
trusted library allocation
page read and write
140400280000
trusted library allocation
page read and write
19B03E7A000
heap
page read and write
1FC678C7000
unclassified section
page read and write
3D1400284000
trusted library allocation
page read and write
C2AD7FE000
stack
page read and write
46D80121C000
trusted library allocation
page read and write
9200030C000
trusted library allocation
page read and write
2E5800CEC000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
74037FE000
unkown
page readonly
2E58037A4000
trusted library allocation
page read and write
2E5803F74000
trusted library allocation
page read and write
7A2C0031C000
trusted library allocation
page read and write
3210002A8000
direct allocation
page read and write
5D600026C000
trusted library allocation
page read and write
2E580205D000
trusted library allocation
page read and write
2E58040E0000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2E5800730000
trusted library allocation
page read and write
592C00260000
trusted library allocation
page read and write
2E5800BDC000
trusted library allocation
page read and write
2E5800A40000
trusted library allocation
page read and write
C2B07FE000
stack
page read and write
1AE00E82000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
310400230000
direct allocation
page read and write
2E5803FCC000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
F2000350000
trusted library allocation
page read and write
46D80177C000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
2E5801627000
trusted library allocation
page read and write
310400220000
direct allocation
page read and write
2E58040D6000
trusted library allocation
page read and write
2E58040C2000
trusted library allocation
page read and write
46D8018CA000
trusted library allocation
page read and write
4BCA4000
trusted library allocation
page read and write
2AC8002C0000
direct allocation
page read and write
46D801910000
trusted library allocation
page read and write
1F8800238000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
74763FE000
unkown
page readonly
92001534000
trusted library allocation
page read and write
17EC4127000
heap
page read and write
2E5801568000
trusted library allocation
page read and write
16066C09000
heap
page read and write
5F9000244000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
17EC9C02000
heap
page read and write
2E58016B6000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1B8F7CB9000
heap
page read and write
4BCC8000
trusted library allocation
page read and write
46D800A18000
trusted library allocation
page read and write
6D4D000
stack
page read and write
323000044000
trusted library allocation
page read and write
2E580065B000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
3DA6000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
19B03D60000
heap
page read and write
46D801994000
trusted library allocation
page read and write
5D6000266000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
2E58009C1000
trusted library allocation
page read and write
1465000
heap
page read and write
1AE007F8000
trusted library allocation
page read and write
321000284000
direct allocation
page read and write
46D801968000
trusted library allocation
page read and write
46D801280000
trusted library allocation
page read and write
1AE007E4000
trusted library allocation
page read and write
1455000
heap
page read and write
74800290000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E58009A4000
trusted library allocation
page read and write
2E5801672000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
70F1000
heap
page read and write
310400274000
direct allocation
page read and write
143C000
heap
page read and write
618800316000
direct allocation
page read and write
29EBB7C0000
unclassified section
page read and write
2E580372A000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
2E5803914000
trusted library allocation
page read and write
257800418000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
160EAE50000
unclassified section
page read and write
2E5802295000
trusted library allocation
page read and write
4BD1C000
trusted library allocation
page read and write
6F0000104000
trusted library allocation
page read and write
46D8009E4000
trusted library allocation
page read and write
1AE007FB000
trusted library allocation
page read and write
5D60002C8000
trusted library allocation
page read and write
16066A10000
heap
page read and write
2E5804054000
trusted library allocation
page read and write
99BA3FE000
stack
page read and write
1AE00955000
trusted library allocation
page read and write
16066B30000
heap
page read and write
2E5800F64000
trusted library allocation
page read and write
2E5800FC8000
trusted library allocation
page read and write
2E5800E40000
trusted library allocation
page read and write
920001A0000
trusted library allocation
page read and write
3E1402324000
trusted library allocation
page read and write
2E5801AF0000
trusted library allocation
page read and write
1473000
heap
page read and write
2E5803724000
trusted library allocation
page read and write
74117FE000
unkown
page readonly
46D80186C000
trusted library allocation
page read and write
2E5800D1C000
trusted library allocation
page read and write
5D6000171000
trusted library allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
E137BFD000
stack
page read and write
2E58022D8000
trusted library allocation
page read and write
6F0000001000
trusted library allocation
page read and write
E11C3FE000
unkown
page readonly
21BC0020C000
trusted library allocation
page read and write
46D80197A000
trusted library allocation
page read and write
16066C24000
heap
page read and write
25CAA6EF000
heap
page read and write
2E5804084000
trusted library allocation
page read and write
5D60000D4000
trusted library allocation
page read and write
5D6000001000
trusted library allocation
page read and write
2E5800F54000
trusted library allocation
page read and write
1AE013C2000
trusted library allocation
page read and write
25CAD444000
heap
page read and write
16066C25000
heap
page read and write
26C800244000
trusted library allocation
page read and write
46D801414000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
1AE014C0000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
257800288000
trusted library allocation
page read and write
26C800201000
trusted library allocation
page read and write
160EAD07000
unclassified section
page read and write
2E5803F59000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
F20000D0000
trusted library allocation
page read and write
2E58040AC000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E5803D38000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5804097000
trusted library allocation
page read and write
74800510000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
21406397000
unkown
page readonly
4F14002A0000
direct allocation
page read and write
17EC94F7000
heap
page read and write
46D80128A000
trusted library allocation
page read and write
54D41FE000
stack
page read and write
16066C0A000
heap
page read and write
16066C0A000
heap
page read and write
1FC64858000
heap
page read and write
E1153FE000
unkown
page readonly
2E58007EC000
trusted library allocation
page read and write
3E140248C000
trusted library allocation
page read and write
146E000
heap
page read and write
2E58015A8000
trusted library allocation
page read and write
7A2C0027C000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
207000430000
trusted library allocation
page read and write
124800238000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
E6400418000
trusted library allocation
page read and write
46D800340000
trusted library allocation
page read and write
46D800829000
trusted library allocation
page read and write
19B03D30000
heap
page read and write
2E5800B80000
trusted library allocation
page read and write
F20001E0000
trusted library allocation
page read and write
3D3F000
heap
page read and write
46D8018E1000
trusted library allocation
page read and write
1489000
heap
page read and write
46D8012D4000
trusted library allocation
page read and write
2E580400C000
trusted library allocation
page read and write
46D8012DC000
trusted library allocation
page read and write
42E00040C000
trusted library allocation
page read and write
3DF6000
heap
page read and write
1248002BC000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
1AE00082000
trusted library allocation
page read and write
7008000
heap
page read and write
46D801270000
trusted library allocation
page read and write
1473000
heap
page read and write
2E580136C000
trusted library allocation
page read and write
16066C27000
heap
page read and write
1DD0FFE000
stack
page read and write
3E14026C0000
trusted library allocation
page read and write
1AE00DAF000
trusted library allocation
page read and write
46D800F00000
trusted library allocation
page read and write
323000028000
trusted library allocation
page read and write
1B8F7C85000
heap
page read and write
2E580208C000
trusted library allocation
page read and write
37BF000
stack
page read and write
1482000
heap
page read and write
1AE01612000
trusted library allocation
page read and write
46D800408000
trusted library allocation
page read and write
2E5800A48000
trusted library allocation
page read and write
5F90002E0000
trusted library allocation
page read and write
2E5801A4E000
trusted library allocation
page read and write
21401145000
heap
page read and write
1AE00DAE000
trusted library allocation
page read and write
46D8008AD000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
21402E13000
heap
page read and write
1AE00A00000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
5D6000254000
trusted library allocation
page read and write
17EC4141000
heap
page read and write
2E580439C000
trusted library allocation
page read and write
2E5801AC8000
trusted library allocation
page read and write
748006CE000
trusted library allocation
page read and write
ECD000
unkown
page execute and read and write
F20000E0000
trusted library allocation
page read and write
2E58015B0000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
2E580369C000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5804054000
trusted library allocation
page read and write
310400254000
direct allocation
page read and write
3E14023E0000
trusted library allocation
page read and write
46D800624000
trusted library allocation
page read and write
1AE00803000
trusted library allocation
page read and write
20500040000
trusted library allocation
page read and write
20500942000
trusted library allocation
page read and write
1FC67AB0000
trusted library allocation
page read and write
17EC4149000
heap
page read and write
46D801898000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
9DC00201000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
70E2000
heap
page read and write
E5000248000
direct allocation
page read and write
46D801890000
trusted library allocation
page read and write
7048000
heap
page read and write
C15B3FE000
unkown
page readonly
16066C2B000
heap
page read and write
27C000288000
direct allocation
page read and write
2E5802217000
trusted library allocation
page read and write
2140640C000
heap
page read and write
2E5800BF4000
trusted library allocation
page read and write
747DBFD000
stack
page read and write
5D60001CC000
trusted library allocation
page read and write
C2C0027C000
trusted library allocation
page read and write
16066C24000
heap
page read and write
25CAD270000
trusted library allocation
page read and write
77AD000
stack
page read and write
7480023C000
trusted library allocation
page read and write
2E5804066000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
F200010C000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
F2000260000
trusted library allocation
page read and write
46D8012DC000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E58023D7000
trusted library allocation
page read and write
46D800254000
trusted library allocation
page read and write
5D60002B1000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
160EA574000
unclassified section
page read and write
143E000
heap
page read and write
4030000
heap
page read and write
160667CC000
remote allocation
page execute read
25CAD400000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
74197FE000
unkown
page readonly
2E5801661000
trusted library allocation
page read and write
3104002D0000
direct allocation
page read and write
16066C09000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
2E58020C5000
trusted library allocation
page read and write
4BCB8000
trusted library allocation
page read and write
6F00000FC000
trusted library allocation
page read and write
16140028C000
trusted library allocation
page read and write
1482000
heap
page read and write
F200018C000
trusted library allocation
page read and write
1435000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
32300016C000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
20700032B000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5803C8C000
trusted library allocation
page read and write
29EBB43E000
heap
page read and write
16066C10000
heap
page read and write
46D80191A000
trusted library allocation
page read and write
99C0BFE000
unkown
page readonly
161400264000
trusted library allocation
page read and write
2E5800BDC000
trusted library allocation
page read and write
74793FE000
unkown
page readonly
25CAD476000
heap
page read and write
27BDFFE000
stack
page read and write
398800201000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
1AE00D53000
trusted library allocation
page read and write
12480026C000
trusted library allocation
page read and write
92000EE0000
trusted library allocation
page read and write
29EBB320000
heap
page read and write
2E5801AD0000
trusted library allocation
page read and write
748004A0000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
1AE00642000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D800B60000
trusted library allocation
page read and write
FDC31FE000
unkown
page readonly
46D801924000
trusted library allocation
page read and write
592C00201000
trusted library allocation
page read and write
46D80060C000
trusted library allocation
page read and write
E1133FE000
unkown
page readonly
2050098A000
trusted library allocation
page read and write
C2C002A0000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
C2AE7FE000
stack
page read and write
E124BFE000
stack
page read and write
5D6000284000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2140640C000
heap
page read and write
2E580034C000
trusted library allocation
page read and write
21BC0028C000
trusted library allocation
page read and write
2050051F000
trusted library allocation
page read and write
74800339000
trusted library allocation
page read and write
70A0000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
20700023C000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
1AE0101E000
trusted library allocation
page read and write
54DD9FE000
unkown
page readonly
3988002C4000
trusted library allocation
page read and write
2140106D000
heap
page read and write
2E5803EE6000
trusted library allocation
page read and write
221400098000
trusted library allocation
page read and write
2418F5C0000
heap
page readonly
920010DB000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E580140C000
trusted library allocation
page read and write
46D801912000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
4BC4C000
trusted library allocation
page read and write
92000080000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
3E1400401000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
592C001C0000
trusted library allocation
page read and write
2E5800AD0000
trusted library allocation
page read and write
140400248000
trusted library allocation
page read and write
2F8000E8000
trusted library allocation
page read and write
E6400201000
trusted library allocation
page read and write
2E5801A58000
trusted library allocation
page read and write
1AE005EA000
trusted library allocation
page read and write
2E5803BD4000
trusted library allocation
page read and write
46D8002C0000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E58016D0000
trusted library allocation
page read and write
2E5801A58000
trusted library allocation
page read and write
740A7FE000
unkown
page readonly
2E5803F74000
trusted library allocation
page read and write
2140114F000
heap
page read and write
17EC4141000
heap
page read and write
748005D0000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
20500A02000
trusted library allocation
page read and write
741F7FE000
unkown
page readonly
1466000
heap
page read and write
2E5800A94000
trusted library allocation
page read and write
16066C10000
heap
page read and write
92000238000
trusted library allocation
page read and write
25CAD4DB000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
2E58009F0000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
2E5800BEC000
trusted library allocation
page read and write
4F14002C4000
direct allocation
page read and write
2E5801B78000
trusted library allocation
page read and write
17EC4173000
heap
page read and write
46D800BD0000
trusted library allocation
page read and write
46D8018D3000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
2F800001000
trusted library allocation
page read and write
16066C10000
heap
page read and write
FE0000
heap
page read and write
46D801490000
trusted library allocation
page read and write
2E58036EC000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
17EC4133000
heap
page read and write
2E58036A4000
trusted library allocation
page read and write
F20000ED000
trusted library allocation
page read and write
AD317FE000
unkown
page readonly
2E5803822000
trusted library allocation
page read and write
4BCB0000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
140400230000
trusted library allocation
page read and write
E11EBFC000
stack
page read and write
46D80191C000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
2E58041C4000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
1AE00D78000
trusted library allocation
page read and write
1DD5FFE000
stack
page read and write
5D6000264000
trusted library allocation
page read and write
2E5800AC8000
trusted library allocation
page read and write
2AC80023C000
direct allocation
page read and write
2E5804054000
trusted library allocation
page read and write
140E7E00000
heap
page read and write
205005FF000
trusted library allocation
page read and write
1404002A4000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
E6400260000
trusted library allocation
page read and write
46D8008A9000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
70F2000
heap
page read and write
16066C10000
heap
page read and write
7403FFE000
stack
page read and write
46D80192C000
trusted library allocation
page read and write
27C000284000
direct allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E5800B10000
trusted library allocation
page read and write
E12E3FE000
unkown
page readonly
46D8012DC000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E5801518000
trusted library allocation
page read and write
46D801904000
trusted library allocation
page read and write
E1293FE000
unkown
page readonly
2E5800662000
trusted library allocation
page read and write
1B8F7C60000
heap
page read and write
2E5800898000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
24194010000
heap
page read and write
53C800238000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D800B44000
trusted library allocation
page read and write
2E5801AE8000
trusted library allocation
page read and write
46D801896000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
27BC7FE000
unkown
page readonly
5D60002B2000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D800BF4000
trusted library allocation
page read and write
7A2C0020C000
trusted library allocation
page read and write
74800419000
trusted library allocation
page read and write
46D8006B7000
trusted library allocation
page read and write
E6400328000
trusted library allocation
page read and write
E6400240000
trusted library allocation
page read and write
205004E4000
trusted library allocation
page read and write
46D80189A000
trusted library allocation
page read and write
2E5803685000
trusted library allocation
page read and write
F20000D8000
trusted library allocation
page read and write
16066C24000
heap
page read and write
17EC5F02000
heap
page read and write
17EC4053000
heap
page read and write
144C000
heap
page read and write
46D800730000
trusted library allocation
page read and write
74800344000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D8009F0000
trusted library allocation
page read and write
74800336000
trusted library allocation
page read and write
1AE00E4E000
trusted library allocation
page read and write
1AE00DA7000
trusted library allocation
page read and write
747BBFD000
stack
page read and write
27B7FFE000
stack
page read and write
2140640C000
heap
page read and write
46D801874000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
F200036C000
trusted library allocation
page read and write
20500504000
trusted library allocation
page read and write
3E1402535000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
2E58015C8000
trusted library allocation
page read and write
20500849000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
2E5800F34000
trusted library allocation
page read and write
2E5800FE8000
trusted library allocation
page read and write
2E58037C4000
trusted library allocation
page read and write
1AE00902000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
1404002DC000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
E64002B0000
trusted library allocation
page read and write
2E58036EA000
trusted library allocation
page read and write
740FFFE000
stack
page read and write
17EC4173000
heap
page read and write
748003A4000
trusted library allocation
page read and write
92000C36000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
7A2C002A8000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
2E58020A7000
trusted library allocation
page read and write
323000109000
trusted library allocation
page read and write
5D60001B8000
trusted library allocation
page read and write
E10BBFA000
stack
page read and write
2E58009E4000
trusted library allocation
page read and write
2E5801B48000
trusted library allocation
page read and write
46D8013A8000
trusted library allocation
page read and write
92000DF0000
trusted library allocation
page read and write
2E5801667000
trusted library allocation
page read and write
9200131C000
trusted library allocation
page read and write
1B8F7CF0000
heap
page read and write
1443000
heap
page read and write
3E14026B5000
trusted library allocation
page read and write
16066841000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
1473000
heap
page read and write
1AE00685000
trusted library allocation
page read and write
C2B0FFE000
unkown
page readonly
5D60002C8000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
1E765D90000
heap
page read and write
46D8012D4000
trusted library allocation
page read and write
1AE00142000
trusted library allocation
page read and write
7433000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
2E5800E38000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
46D8013A8000
trusted library allocation
page read and write
92000001000
trusted library allocation
page read and write
1FC64854000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
46D800614000
trusted library allocation
page read and write
1AE01542000
trusted library allocation
page read and write
2E5801B48000
trusted library allocation
page read and write
46D8008AD000
trusted library allocation
page read and write
1AE00D1E000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
1440000
heap
page read and write
2E5800A50000
trusted library allocation
page read and write
E1083FE000
unkown
page readonly
46D801314000
trusted library allocation
page read and write
2E580089A000
trusted library allocation
page read and write
2E9C00234000
direct allocation
page read and write
2E58007FB000
trusted library allocation
page read and write
2E5800614000
trusted library allocation
page read and write
2E5800BB4000
trusted library allocation
page read and write
17EC9494000
heap
page read and write
4F1400234000
direct allocation
page read and write
6FD4000
heap
page read and write
46D800751000
trusted library allocation
page read and write
2E5800F34000
trusted library allocation
page read and write
1AE00DA5000
trusted library allocation
page read and write
21400FD0000
heap
page readonly
592C00240000
trusted library allocation
page read and write
920000BB000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
21401140000
heap
page read and write
46D801920000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
1465000
heap
page read and write
1AE00D76000
trusted library allocation
page read and write
4F1400201000
direct allocation
page read and write
2E58037C4000
trusted library allocation
page read and write
1AE015F0000
trusted library allocation
page read and write
398800258000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E5801C0C000
trusted library allocation
page read and write
5528002C8000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
21403BC0000
unkown
page read and write
5D600029C000
trusted library allocation
page read and write
46D8013F7000
trusted library allocation
page read and write
1AE01382000
trusted library allocation
page read and write
3B000248000
direct allocation
page read and write
7480060C000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58037B4000
trusted library allocation
page read and write
309800238000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E580371C000
trusted library allocation
page read and write
1AE005D8000
trusted library allocation
page read and write
42E000248000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
46D800EFF000
trusted library allocation
page read and write
2E5803FE4000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
19B03E55000
heap
page read and write
46D8012D4000
trusted library allocation
page read and write
1F8800230000
trusted library allocation
page read and write
29EBB76F000
trusted library allocation
page read and write
74800060000
trusted library allocation
page read and write
5F9000201000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
1DCEFFE000
stack
page read and write
E64002E4000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
5D60002C8000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
61880030E000
direct allocation
page read and write
2E58037CD000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
46D800834000
trusted library allocation
page read and write
16000020000
trusted library allocation
page read and write
5528002C8000
trusted library allocation
page read and write
AD27FFE000
stack
page read and write
5D60002B2000
trusted library allocation
page read and write
46D800B60000
trusted library allocation
page read and write
7A2C00201000
trusted library allocation
page read and write
2E5801619000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
205008EA000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
592C000A8000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
1248002BC000
trusted library allocation
page read and write
74800480000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
20500882000
trusted library allocation
page read and write
25CAA5E0000
heap
page read and write
2E5802804000
trusted library allocation
page read and write
25CAD4B1000
heap
page read and write
4F1400220000
direct allocation
page read and write
46D801968000
trusted library allocation
page read and write
5D60002AD000
trusted library allocation
page read and write
1AE00995000
trusted library allocation
page read and write
17EC4145000
heap
page read and write
46D801369000
trusted library allocation
page read and write
748001C0000
trusted library allocation
page read and write
2E580162B000
trusted library allocation
page read and write
7414FFE000
stack
page read and write
46D801898000
trusted library allocation
page read and write
2E5803832000
trusted library allocation
page read and write
2E5802323000
trusted library allocation
page read and write
920001D8000
trusted library allocation
page read and write
3DBE000
heap
page read and write
2745B6E0000
unclassified section
page read and write
748000C8000
trusted library allocation
page read and write
2E58032A4000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
16066C25000
heap
page read and write
2E5800B90000
trusted library allocation
page read and write
5528002C4000
trusted library allocation
page read and write
21401148000
heap
page read and write
46D8018B6000
trusted library allocation
page read and write
19B03D10000
heap
page read and write
1E765E1C000
heap
page read and write
2E5803EDE000
trusted library allocation
page read and write
46D80140C000
trusted library allocation
page read and write
207000408000
trusted library allocation
page read and write
321000294000
direct allocation
page read and write
3DF9000
heap
page read and write
2E580375C000
trusted library allocation
page read and write
2E58040CC000
trusted library allocation
page read and write
1DD57FE000
unkown
page readonly
46D801935000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
3D2A000
heap
page read and write
1AE008B3000
trusted library allocation
page read and write
42E000274000
trusted library allocation
page read and write
2AC800274000
direct allocation
page read and write
2E58037AA000
trusted library allocation
page read and write
2E580368C000
trusted library allocation
page read and write
3A5F000
stack
page read and write
19B03E7A000
heap
page read and write
309800211000
trusted library allocation
page read and write
205008BB000
trusted library allocation
page read and write
2E5803F87000
trusted library allocation
page read and write
F2000295000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
1AE00DBC000
trusted library allocation
page read and write
25CAD45E000
heap
page read and write
2F800118000
trusted library allocation
page read and write
2E5800F88000
trusted library allocation
page read and write
2E58037BC000
trusted library allocation
page read and write
14040020C000
trusted library allocation
page read and write
4F1400294000
direct allocation
page read and write
C2BAFFE000
unkown
page readonly
2E5803712000
trusted library allocation
page read and write
74800698000
trusted library allocation
page read and write
1AE00782000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
4BC34000
trusted library allocation
page read and write
1AE00EC2000
trusted library allocation
page read and write
9DC002A0000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
46D801910000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
F200040C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801404000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
2E5803F74000
trusted library allocation
page read and write
2E58040D6000
trusted library allocation
page read and write
70A7000
heap
page read and write
20500916000
trusted library allocation
page read and write
42E000201000
trusted library allocation
page read and write
1AE00542000
trusted library allocation
page read and write
53C8002D0000
trusted library allocation
page read and write
48B65FF000
stack
page read and write
46D800B98000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
5D60002B4000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
2E5800F70000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D800B11000
trusted library allocation
page read and write
4BCF4000
trusted library allocation
page read and write
618800319000
direct allocation
page read and write
46D800B08000
trusted library allocation
page read and write
2E5800A74000
trusted library allocation
page read and write
C154BFC000
stack
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58009C3000
trusted library allocation
page read and write
920000F8000
trusted library allocation
page read and write
3E1402E78000
trusted library allocation
page read and write
46D8008A0000
trusted library allocation
page read and write
54D31FE000
stack
page read and write
2E580382A000
trusted library allocation
page read and write
74800628000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
F2000120000
trusted library allocation
page read and write
2E5802394000
trusted library allocation
page read and write
2E5801578000
trusted library allocation
page read and write
C159BFC000
stack
page read and write
1AE00DA3000
trusted library allocation
page read and write
3A9D000
stack
page read and write
21401154000
heap
page read and write
46D80190C000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
2E58037DC000
trusted library allocation
page read and write
2E5804300000
trusted library allocation
page read and write
5D6000290000
trusted library allocation
page read and write
2140107E000
heap
page read and write
46D801924000
trusted library allocation
page read and write
2E58008A7000
trusted library allocation
page read and write
221400028000
trusted library allocation
page read and write
1431000
heap
page read and write
3DBE000
heap
page read and write
5D600029C000
trusted library allocation
page read and write
46D801912000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
21406453000
heap
page read and write
2E580370D000
trusted library allocation
page read and write
14C0002C4000
trusted library allocation
page read and write
16066C24000
heap
page read and write
2E5803824000
trusted library allocation
page read and write
1455000
heap
page read and write
2E58039BC000
trusted library allocation
page read and write
6640002A4000
trusted library allocation
page read and write
1AE00682000
trusted library allocation
page read and write
1DCF7FE000
unkown
page readonly
2070002E0000
trusted library allocation
page read and write
664000201000
trusted library allocation
page read and write
2E58036C4000
trusted library allocation
page read and write
2E5800CC8000
trusted library allocation
page read and write
7A2C00258000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
160EAB90000
unclassified section
page read and write
2E58016BD000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
1FC64620000
heap
page read and write
46D801920000
trusted library allocation
page read and write
3210002E4000
direct allocation
page read and write
46D801928000
trusted library allocation
page read and write
748004D0000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
46D801950000
trusted library allocation
page read and write
46D800B4A000
trusted library allocation
page read and write
21BC00220000
trusted library allocation
page read and write
1E40002C8000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
3D14002D4000
trusted library allocation
page read and write
E5000298000
direct allocation
page read and write
92000690000
trusted library allocation
page read and write
1F88002B8000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
29EBE300000
heap
page read and write
5D600026C000
trusted library allocation
page read and write
2E5803F89000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
26C800284000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
99B63FB000
stack
page read and write
3860002C8000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
48B7DFD000
stack
page read and write
592C000E9000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
2E5803774000
trusted library allocation
page read and write
1440000
heap
page read and write
47A00032C000
direct allocation
page read and write
22140005C000
trusted library allocation
page read and write
3D90000
heap
page read and write
5D60002D7000
trusted library allocation
page read and write
F200015C000
trusted library allocation
page read and write
9DC0033C000
trusted library allocation
page read and write
54D69FE000
unkown
page readonly
F2000232000
trusted library allocation
page read and write
46D801886000
trusted library allocation
page read and write
160E9EC7000
trusted library allocation
page read and write
F2000070000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
9DC002C0000
trusted library allocation
page read and write
2E5800E10000
trusted library allocation
page read and write
1AE01605000
trusted library allocation
page read and write
1442000
heap
page read and write
2E58020B6000
trusted library allocation
page read and write
5F9000284000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D800BAE000
trusted library allocation
page read and write
2E5800F76000
trusted library allocation
page read and write
1DD27FE000
unkown
page readonly
21401130000
heap
page read and write
46D80194C000
trusted library allocation
page read and write
46D8018BC000
trusted library allocation
page read and write
E11E3FE000
unkown
page readonly
21406528000
heap
page read and write
2E580203E000
trusted library allocation
page read and write
2E5804061000
trusted library allocation
page read and write
618800314000
direct allocation
page read and write
21406610000
heap
page read and write
16066C10000
heap
page read and write
46D800B44000
trusted library allocation
page read and write
53C800248000
trusted library allocation
page read and write
1FCE8530000
unclassified section
page read and write
205008C0000
trusted library allocation
page read and write
2E580165B000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
2140640C000
heap
page read and write
26C8002D0000
trusted library allocation
page read and write
17EC4184000
heap
page read and write
5D600029F000
trusted library allocation
page read and write
2E58022F6000
trusted library allocation
page read and write
5D6000290000
trusted library allocation
page read and write
7030000
heap
page read and write
1AE00E57000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2E5800FE0000
trusted library allocation
page read and write
16066C25000
heap
page read and write
92000024000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
2E580230D000
trusted library allocation
page read and write
2E5800E9C000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
3B000264000
direct allocation
page read and write
92000248000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
46D801304000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
20500542000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
3DDB000
heap
page read and write
2E5803590000
trusted library allocation
page read and write
3E14027DB000
trusted library allocation
page read and write
46D801926000
trusted library allocation
page read and write
1E765E52000
heap
page read and write
1437000
heap
page read and write
20500522000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
43F75FF000
stack
page read and write
19B03E8E000
heap
page read and write
16066C11000
heap
page read and write
2E5803EE4000
trusted library allocation
page read and write
1AE00938000
trusted library allocation
page read and write
3230000CE000
trusted library allocation
page read and write
46D800730000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
2E58037B4000
trusted library allocation
page read and write
2E58040C4000
trusted library allocation
page read and write
2E58003E0000
trusted library allocation
page read and write
1435000
heap
page read and write
74800510000
trusted library allocation
page read and write
46D800A5A000
trusted library allocation
page read and write
2E58015B8000
trusted library allocation
page read and write
92000C0C000
trusted library allocation
page read and write
747A3FE000
unkown
page readonly
21406510000
heap
page read and write
2050053E000
trusted library allocation
page read and write
46D80140C000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
E500023C000
direct allocation
page read and write
3D1400238000
trusted library allocation
page read and write
43F5DF6000
stack
page read and write
14040025C000
trusted library allocation
page read and write
2E58018EC000
trusted library allocation
page read and write
1AE00342000
trusted library allocation
page read and write
AD337FE000
unkown
page readonly
29EBB4EC000
heap
page read and write
2E5800CA8000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
1606682A000
heap
page read and write
46D8003AA000
trusted library allocation
page read and write
53C800418000
trusted library allocation
page read and write
1FC64444000
heap
page read and write
5D6000250000
trusted library allocation
page read and write
2E58040E0000
trusted library allocation
page read and write
2E5803F89000
trusted library allocation
page read and write
2E5804070000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
16066C5D000
heap
page read and write
2E58015D8000
trusted library allocation
page read and write
7480043C000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
2E5804069000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
4EE4002C8000
direct allocation
page read and write
2E5804194000
trusted library allocation
page read and write
4F1400244000
direct allocation
page read and write
2E58003E0000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
2E5800BB4000
trusted library allocation
page read and write
46D800A68000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5800A18000
trusted library allocation
page read and write
46D8009E4000
trusted library allocation
page read and write
2A317A05000
heap
page read and write
2E58003D4000
trusted library allocation
page read and write
2140112F000
heap
page read and write
2E580079C000
trusted library allocation
page read and write
46D800BB8000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
46D8013A6000
trusted library allocation
page read and write
B9123FE000
unkown
page readonly
2E580061C000
trusted library allocation
page read and write
718C00348000
trusted library allocation
page read and write
2E5801A0C000
trusted library allocation
page read and write
2E5803750000
trusted library allocation
page read and write
205008C0000
trusted library allocation
page read and write
2E5803C3C000
trusted library allocation
page read and write
2E5800824000
trusted library allocation
page read and write
6F0000109000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
1434000
heap
page read and write
16066C64000
heap
page read and write
46D80202C000
trusted library allocation
page read and write
1437000
heap
page read and write
321000288000
direct allocation
page read and write
2E5803694000
trusted library allocation
page read and write
21406529000
heap
page read and write
46D800BA0000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
552800280000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5801ED4000
trusted library allocation
page read and write
2E58037BC000
trusted library allocation
page read and write
46D801934000
trusted library allocation
page read and write
41A0000
remote allocation
page read and write
46D801914000
trusted library allocation
page read and write
C2B57FC000
stack
page read and write
3D5D000
heap
page read and write
748003C4000
trusted library allocation
page read and write
741B7FE000
unkown
page readonly
E1123FE000
unkown
page readonly
2E58008A0000
trusted library allocation
page read and write
74800380000
trusted library allocation
page read and write
92000BC7000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
920000E8000
trusted library allocation
page read and write
46D8013D0000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
143D000
heap
page read and write
46D801918000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D801894000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E580077C000
trusted library allocation
page read and write
24194202000
heap
page read and write
46D8018E6000
trusted library allocation
page read and write
FDC29FE000
stack
page read and write
1AE0100B000
trusted library allocation
page read and write
29EBB4FB000
heap
page read and write
2E5801654000
trusted library allocation
page read and write
2E5800AE2000
trusted library allocation
page read and write
43DB000
stack
page read and write
3D8B000
heap
page read and write
46D8012FC000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
74800570000
trusted library allocation
page read and write
1404002A4000
trusted library allocation
page read and write
46D801214000
trusted library allocation
page read and write
2E5801649000
trusted library allocation
page read and write
17EC416F000
heap
page read and write
2E5803F25000
trusted library allocation
page read and write
16066C25000
heap
page read and write
6BCE000
stack
page read and write
41AF9FE000
stack
page read and write
46D800BA8000
trusted library allocation
page read and write
2E580061C000
trusted library allocation
page read and write
9200024A000
trusted library allocation
page read and write
46D801880000
trusted library allocation
page read and write
17EC4154000
heap
page read and write
2E5800B88000
trusted library allocation
page read and write
1614002B0000
trusted library allocation
page read and write
2E5800338000
trusted library allocation
page read and write
7A2C00298000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
1614002C8000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
1434000
heap
page read and write
1AE00D09000
trusted library allocation
page read and write
9DC002DC000
trusted library allocation
page read and write
7480060F000
trusted library allocation
page read and write
1AE00642000
trusted library allocation
page read and write
146E000
heap
page read and write
20500540000
trusted library allocation
page read and write
7480011E000
trusted library allocation
page read and write
148D000
heap
page read and write
1AE007FC000
trusted library allocation
page read and write
2E580381C000
trusted library allocation
page read and write
1AE01006000
trusted library allocation
page read and write
2E58040B8000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
16066802000
heap
page read and write
5F9000240000
trusted library allocation
page read and write
3E1402F9C000
trusted library allocation
page read and write
29EBE2D9000
heap
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5804160000
trusted library allocation
page read and write
46D8014F0000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
3E14031A0000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
E136BFD000
stack
page read and write
46D801932000
trusted library allocation
page read and write
12480027C000
trusted library allocation
page read and write
26C800254000
trusted library allocation
page read and write
27BCFFE000
stack
page read and write
1AE0160A000
trusted library allocation
page read and write
2E580207D000
trusted library allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
2E58036FC000
trusted library allocation
page read and write
92000174000
trusted library allocation
page read and write
1435000
heap
page read and write
46D801948000
trusted library allocation
page read and write
74800118000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
C2C0020C000
trusted library allocation
page read and write
2E5803F9C000
trusted library allocation
page read and write
2E58036DC000
trusted library allocation
page read and write
2E5802090000
trusted library allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
718C0033F000
trusted library allocation
page read and write
592C000D4000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
16066C10000
heap
page read and write
3B000211000
direct allocation
page read and write
1F88002A8000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D80191E000
trusted library allocation
page read and write
16066B40000
unclassified section
page read and write
1AE007DE000
trusted library allocation
page read and write
29EBB4F5000
heap
page read and write
B915BFE000
stack
page read and write
1E40002A4000
trusted library allocation
page read and write
1F88002B8000
trusted library allocation
page read and write
48B1DDE000
stack
page read and write
2E58022C9000
trusted library allocation
page read and write
2E5800E18000
trusted library allocation
page read and write
2E58016A0000
trusted library allocation
page read and write
92000E78000
trusted library allocation
page read and write
2E5800B4C000
trusted library allocation
page read and write
140400238000
trusted library allocation
page read and write
46D801458000
trusted library allocation
page read and write
2E58009B6000
trusted library allocation
page read and write
1AE00182000
trusted library allocation
page read and write
3D3F000
heap
page read and write
2E580372C000
trusted library allocation
page read and write
5F9000230000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
92000054000
trusted library allocation
page read and write
747CBFC000
stack
page read and write
4400000
trusted library allocation
page read and write
1E40002B0000
trusted library allocation
page read and write
2E58040BE000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
2E5804062000
trusted library allocation
page read and write
2E580117A000
trusted library allocation
page read and write
1AE00982000
trusted library allocation
page read and write
2E5800BEC000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
E1103FE000
unkown
page readonly
46D800404000
trusted library allocation
page read and write
2E5803774000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
592C002BC000
trusted library allocation
page read and write
46D8013F4000
trusted library allocation
page read and write
3E140232C000
trusted library allocation
page read and write
2E58008AB000
trusted library allocation
page read and write
140E7D60000
heap
page readonly
46D801914000
trusted library allocation
page read and write
2E58023DF000
trusted library allocation
page read and write
1AE00DB0000
trusted library allocation
page read and write
592C001E9000
trusted library allocation
page read and write
2E580382B000
trusted library allocation
page read and write
C2A97F6000
stack
page read and write
2E58040D6000
trusted library allocation
page read and write
618800321000
direct allocation
page read and write
46D801918000
trusted library allocation
page read and write
1B8F7D02000
heap
page read and write
3B0002B8000
direct allocation
page read and write
2E5803EF4000
trusted library allocation
page read and write
66400029C000
trusted library allocation
page read and write
42E000254000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
2E580371C000
trusted library allocation
page read and write
4BC01000
trusted library allocation
page read and write
2E5803F2A000
trusted library allocation
page read and write
46D8013F4000
trusted library allocation
page read and write
146E000
heap
page read and write
46D801914000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
592C00152000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
32100023C000
direct allocation
page read and write
17EC410F000
heap
page read and write
3D5D000
heap
page read and write
46D801930000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
16066C25000
heap
page read and write
4EE400201000
direct allocation
page read and write
2E9C00274000
direct allocation
page read and write
592C000DD000
trusted library allocation
page read and write
6F000007C000
trusted library allocation
page read and write
C2C0028C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E580168C000
trusted library allocation
page read and write
3D4F000
heap
page read and write
46D8018E1000
trusted library allocation
page read and write
2E5801564000
trusted library allocation
page read and write
748003C8000
trusted library allocation
page read and write
2E5801B38000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
74137FE000
unkown
page readonly
1AE00608000
trusted library allocation
page read and write
92000DF0000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
3E14030C0000
trusted library allocation
page read and write
46D801880000
trusted library allocation
page read and write
2E5800E18000
trusted library allocation
page read and write
2E5801A98000
trusted library allocation
page read and write
E1323FE000
unkown
page readonly
1AE007DD000
trusted library allocation
page read and write
1404002B8000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58006A0000
trusted library allocation
page read and write
46D800B54000
trusted library allocation
page read and write
552800278000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
592C0017C000
trusted library allocation
page read and write
160EACF4000
unclassified section
page read and write
2E580209B000
trusted library allocation
page read and write
46D8008A4000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E5801AE8000
trusted library allocation
page read and write
160EA546000
unclassified section
page read and write
2E580239B000
trusted library allocation
page read and write
16066C26000
heap
page read and write
5D60002DC000
trusted library allocation
page read and write
46D800A24000
trusted library allocation
page read and write
6C0D000
stack
page read and write
718C0031C000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
3860002D8000
trusted library allocation
page read and write
2A317790000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
2E58040D0000
trusted library allocation
page read and write
C2C00230000
trusted library allocation
page read and write
1404002C4000
trusted library allocation
page read and write
3210002BC000
direct allocation
page read and write
46D80194C000
trusted library allocation
page read and write
2E58009B6000
trusted library allocation
page read and write
592C0019C000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
1AE00D9A000
trusted library allocation
page read and write
3E140245C000
trusted library allocation
page read and write
205008F3000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
46D800EC4000
trusted library allocation
page read and write
2E580202B000
trusted library allocation
page read and write
E11CBFD000
stack
page read and write
B90FBFB000
stack
page read and write
16066C0A000
heap
page read and write
9DC00288000
trusted library allocation
page read and write
1AE00D6E000
trusted library allocation
page read and write
46D800794000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D8018F8000
trusted library allocation
page read and write
2E58036F0000
trusted library allocation
page read and write
2E58040C0000
trusted library allocation
page read and write
2E5801A68000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
9DC0020C000
trusted library allocation
page read and write
1F88002A0000
trusted library allocation
page read and write
605C000
stack
page read and write
46D80192C000
trusted library allocation
page read and write
46D801922000
trusted library allocation
page read and write
2E58037A4000
trusted library allocation
page read and write
1AE015E5000
trusted library allocation
page read and write
5D60002B6000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5803684000
trusted library allocation
page read and write
16066C25000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
27457FD0000
heap
page read and write
46D8016E4000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
748006DC000
trusted library allocation
page read and write
FDC09FE000
stack
page read and write
205004E7000
trusted library allocation
page read and write
20500915000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
5D60002B4000
trusted library allocation
page read and write
1464000
heap
page read and write
5D60002D4000
trusted library allocation
page read and write
1437000
heap
page read and write
20500000000
trusted library allocation
page readonly
46D8018AC000
trusted library allocation
page read and write
46D800730000
trusted library allocation
page read and write
1448000
heap
page read and write
99C7BFE000
unkown
page readonly
46D801706000
trusted library allocation
page read and write
2E5800B04000
trusted library allocation
page read and write
207000404000
trusted library allocation
page read and write
46D801298000
trusted library allocation
page read and write
21401145000
heap
page read and write
1E765E02000
heap
page read and write
160EBB12000
unclassified section
page read and write
42E000244000
trusted library allocation
page read and write
17EC417B000
heap
page read and write
AD2CFFB000
stack
page read and write
46D801314000
trusted library allocation
page read and write
20500542000
trusted library allocation
page read and write
6F0000038000
trusted library allocation
page read and write
46D801908000
trusted library allocation
page read and write
1FC6442A000
heap
page read and write
2E58040C0000
trusted library allocation
page read and write
16066C25000
heap
page read and write
16066902000
heap
page read and write
2E5803EC8000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
25CAD27F000
trusted library allocation
page read and write
53C8002E0000
trusted library allocation
page read and write
46D8012FC000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
B912BFD000
stack
page read and write
AD33FFC000
stack
page read and write
2578002C8000
trusted library allocation
page read and write
2AC800244000
direct allocation
page read and write
2E580378C000
trusted library allocation
page read and write
6E4C000
stack
page read and write
2E5800788000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
1466000
heap
page read and write
46D801990000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1437000
heap
page read and write
17EC4064000
heap
page read and write
46D801910000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
5D6000178000
trusted library allocation
page read and write
2E5800E6C000
trusted library allocation
page read and write
27B6FFC000
stack
page read and write
2E5804130000
trusted library allocation
page read and write
E1143FE000
unkown
page readonly
2E58036A5000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D801920000
trusted library allocation
page read and write
1AE00E2A000
trusted library allocation
page read and write
F2000054000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
19B03E77000
heap
page read and write
21401157000
heap
page read and write
29EBE297000
heap
page read and write
2E58020C9000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
2E58003E0000
trusted library allocation
page read and write
2E5803274000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E5800654000
trusted library allocation
page read and write
1AE00D83000
trusted library allocation
page read and write
1435000
heap
page read and write
21406561000
heap
page read and write
9DC00254000
trusted library allocation
page read and write
1AE00E53000
trusted library allocation
page read and write
21406507000
heap
page read and write
16066C10000
heap
page read and write
5528002C8000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
1AE01402000
trusted library allocation
page read and write
124800298000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E5801598000
trusted library allocation
page read and write
E5000280000
direct allocation
page read and write
2F80000C000
trusted library allocation
page read and write
2E5803EF2000
trusted library allocation
page read and write
205008C1000
trusted library allocation
page read and write
2140645B000
heap
page read and write
46D801978000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
92001528000
trusted library allocation
page read and write
1E4000244000
trusted library allocation
page read and write
143C000
heap
page read and write
2E5800BC4000
trusted library allocation
page read and write
2E58036D4000
trusted library allocation
page read and write
46D801980000
trusted library allocation
page read and write
2578002A4000
trusted library allocation
page read and write
46D8018FA000
trusted library allocation
page read and write
1B8F7C9B000
heap
page read and write
1AE00865000
trusted library allocation
page read and write
1434000
heap
page read and write
160E9EB5000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5803EDC000
trusted library allocation
page read and write
46D801904000
trusted library allocation
page read and write
2E5800B90000
trusted library allocation
page read and write
25CAA6F6000
heap
page read and write
2E580370C000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
3DBF000
heap
page read and write
4BC80000
trusted library allocation
page read and write
3E0B000
heap
page read and write
25CAD2A7000
unclassified section
page read and write
2E580089C000
trusted library allocation
page read and write
46D800601000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
2E5803F24000
trusted library allocation
page read and write
7406FFE000
stack
page read and write
46D800BEC000
trusted library allocation
page read and write
2E58037EC000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
5D6000038000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
46D80020C000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
1AE01642000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
46D80190E000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
1E765E3D000
heap
page read and write
46D8006DC000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
1453000
heap
page read and write
92000B94000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
20500040000
trusted library allocation
page readonly
46D800730000
trusted library allocation
page read and write
17EC4170000
heap
page read and write
46D801318000
trusted library allocation
page read and write
398800248000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
46D80144C000
trusted library allocation
page read and write
2E58015A0000
trusted library allocation
page read and write
2E5804242000
trusted library allocation
page read and write
46D8003C1000
trusted library allocation
page read and write
3DE8000
heap
page read and write
46D801314000
trusted library allocation
page read and write
2E5801607000
trusted library allocation
page read and write
5D6000179000
trusted library allocation
page read and write
7A2C002D8000
trusted library allocation
page read and write
1AE00782000
trusted library allocation
page read and write
46D801912000
trusted library allocation
page read and write
92000BC4000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E58037EC000
trusted library allocation
page read and write
2E5800EFC000
trusted library allocation
page read and write
592C002B6000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
46D801434000
trusted library allocation
page read and write
592C00050000
trusted library allocation
page read and write
1471000
heap
page read and write
2E580421C000
trusted library allocation
page read and write
3860002A0000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
1AE00E88000
trusted library allocation
page read and write
1AE00DBD000
trusted library allocation
page read and write
17EC9498000
heap
page read and write
2E5803F84000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
46D801399000
trusted library allocation
page read and write
2E580206A000
trusted library allocation
page read and write
718C00418000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
2E5804068000
trusted library allocation
page read and write
2050051E000
trusted library allocation
page read and write
2E5803771000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5801B10000
trusted library allocation
page read and write
6640002B4000
trusted library allocation
page read and write
27C85CE0000
heap
page readonly
2E5800AC8000
trusted library allocation
page read and write
92000194000
trusted library allocation
page read and write
46D800B54000
trusted library allocation
page read and write
16066C24000
heap
page read and write
25CAA6EB000
heap
page read and write
1B8F7C57000
heap
page read and write
2E58020A3000
trusted library allocation
page read and write
54DB9FE000
unkown
page readonly
5D60002AA000
trusted library allocation
page read and write
1DD4FFC000
stack
page read and write
1B8F7C61000
heap
page read and write
1AE00D5A000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
3B0002B4000
direct allocation
page read and write
3B000230000
direct allocation
page read and write
2E5800AB8000
trusted library allocation
page read and write
1440000
heap
page read and write
41B01FE000
unkown
page readonly
46D801910000
trusted library allocation
page read and write
1FC64808000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
21406453000
heap
page read and write
46D801316000
trusted library allocation
page read and write
74800250000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
160EAA50000
unclassified section
page read and write
2E5800AC2000
trusted library allocation
page read and write
1B8F7C13000
heap
page read and write
1248002A4000
trusted library allocation
page read and write
46D801412000
trusted library allocation
page read and write
1AE00911000
trusted library allocation
page read and write
21401128000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
160EADA7000
unclassified section
page read and write
46D801318000
trusted library allocation
page read and write
2AC800254000
direct allocation
page read and write
205008F9000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5802385000
trusted library allocation
page read and write
257800274000
trusted library allocation
page read and write
46D801901000
trusted library allocation
page read and write
46D8013B8000
trusted library allocation
page read and write
2E580232B000
trusted library allocation
page read and write
2E5802085000
trusted library allocation
page read and write
1AE007C9000
trusted library allocation
page read and write
17EC4129000
heap
page read and write
2E5801698000
trusted library allocation
page read and write
2E58040BE000
trusted library allocation
page read and write
2E5800FDA000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D801952000
trusted library allocation
page read and write
2E58016A3000
trusted library allocation
page read and write
2E580436C000
trusted library allocation
page read and write
1AE00EC2000
trusted library allocation
page read and write
46D8018A2000
trusted library allocation
page read and write
2050050E000
trusted library allocation
page read and write
7A2C0026C000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
74783FE000
unkown
page readonly
1E40002B8000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
1AE01182000
trusted library allocation
page read and write
143C000
heap
page read and write
C15DBFE000
stack
page read and write
46D800B58000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
2A31ACE7000
unclassified section
page read and write
2E5802024000
trusted library allocation
page read and write
748005E4000
trusted library allocation
page read and write
46D8018D6000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58037CA000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
46D801922000
trusted library allocation
page read and write
920007B0000
trusted library allocation
page read and write
2418F681000
heap
page read and write
46D801950000
trusted library allocation
page read and write
2E580162F000
trusted library allocation
page read and write
20500551000
trusted library allocation
page read and write
2E580383C000
trusted library allocation
page read and write
17EC412F000
heap
page read and write
2E58040C2000
trusted library allocation
page read and write
46D800654000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
9200115C000
trusted library allocation
page read and write
2A317813000
heap
page read and write
2E5801611000
trusted library allocation
page read and write
46D800790000
trusted library allocation
page read and write
1AE006C2000
trusted library allocation
page read and write
2E5804057000
trusted library allocation
page read and write
2E5801AE0000
trusted library allocation
page read and write
2A317610000
remote allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
20500543000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
2E5803854000
trusted library allocation
page read and write
1FCE7CD2000
trusted library allocation
page read and write
46D8019D4000
trusted library allocation
page read and write
E6400280000
trusted library allocation
page read and write
46D800AB0000
trusted library allocation
page read and write
3230000CC000
trusted library allocation
page read and write
5D600020C000
trusted library allocation
page read and write
2E58009B8000
trusted library allocation
page read and write
2E5803A4C000
trusted library allocation
page read and write
2745822B000
heap
page read and write
2E58043B8000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E580368A000
trusted library allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
E1233FE000
unkown
page readonly
46D801970000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
1AE006B3000
trusted library allocation
page read and write
27C000294000
direct allocation
page read and write
53C800220000
trusted library allocation
page read and write
2E5802004000
trusted library allocation
page read and write
29EBE2DB000
heap
page read and write
2E5802210000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
92000D08000
trusted library allocation
page read and write
2E58040F4000
trusted library allocation
page read and write
140E7D50000
heap
page read and write
214010C5000
heap
page read and write
2E5800FEC000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
4EE4002D4000
direct allocation
page read and write
46D800330000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
92000BC8000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
46D801978000
trusted library allocation
page read and write
3D94000
heap
page read and write
2E580369C000
trusted library allocation
page read and write
920012FC000
trusted library allocation
page read and write
6990000
heap
page read and write
2E5803874000
trusted library allocation
page read and write
92000D08000
trusted library allocation
page read and write
1466000
heap
page read and write
2E5803684000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E5800D56000
trusted library allocation
page read and write
2E580368C000
trusted library allocation
page read and write
2E58040EF000
trusted library allocation
page read and write
2E580376C000
trusted library allocation
page read and write
2E58037BC000
trusted library allocation
page read and write
7417FFE000
stack
page read and write
16066C63000
heap
page read and write
46D80130C000
trusted library allocation
page read and write
2E5804184000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
3988002AC000
trusted library allocation
page read and write
25CAD486000
heap
page read and write
74800120000
trusted library allocation
page read and write
21406625000
unkown
page readonly
46D800F34000
trusted library allocation
page read and write
16066C11000
heap
page read and write
2E58036F4000
trusted library allocation
page read and write
92000E88000
trusted library allocation
page read and write
16066C10000
heap
page read and write
1AE015DC000
trusted library allocation
page read and write
321000264000
direct allocation
page read and write
46D801998000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
139B000
heap
page read and write
1AE00182000
trusted library allocation
page read and write
E500026C000
direct allocation
page read and write
27458060000
heap
page read and write
2E5803824000
trusted library allocation
page read and write
92000E94000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
74773FE000
unkown
page readonly
2E5803E0C000
trusted library allocation
page read and write
16066C24000
heap
page read and write
2E5800824000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
592C00034000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
2E5800620000
trusted library allocation
page read and write
7058000
heap
page read and write
46D80191C000
trusted library allocation
page read and write
2E580235F000
trusted library allocation
page read and write
46D8018B3000
trusted library allocation
page read and write
16066C27000
heap
page read and write
2070002F4000
trusted library allocation
page read and write
160E9EB2000
trusted library allocation
page read and write
5D6000278000
trusted library allocation
page read and write
2140114B000
heap
page read and write
C2B7FFE000
unkown
page readonly
1AE00DA1000
trusted library allocation
page read and write
2E5804388000
trusted library allocation
page read and write
2E580060C000
trusted library allocation
page read and write
19B03D80000
trusted library allocation
page read and write
7480042C000
trusted library allocation
page read and write
25CAA64E000
heap
page read and write
1437000
heap
page read and write
1AE00D03000
trusted library allocation
page read and write
46D80186C000
trusted library allocation
page read and write
2E580166E000
trusted library allocation
page read and write
25CAD2C0000
unclassified section
page read and write
46D8013DC000
trusted library allocation
page read and write
7467BF2000
stack
page read and write
214010EF000
heap
page read and write
92000CE8000
trusted library allocation
page read and write
20500382000
trusted library allocation
page read and write
1434000
heap
page read and write
46D8018DC000
trusted library allocation
page read and write
398800294000
trusted library allocation
page read and write
2E5802049000
trusted library allocation
page read and write
37F0000
heap
page read and write
C2C00298000
trusted library allocation
page read and write
2E5800AC6000
trusted library allocation
page read and write
124800298000
trusted library allocation
page read and write
4250000
heap
page read and write
46D801914000
trusted library allocation
page read and write
92000BE4000
trusted library allocation
page read and write
3E1402536000
trusted library allocation
page read and write
2E5804060000
trusted library allocation
page read and write
46D800884000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5802278000
trusted library allocation
page read and write
2E5800C20000
trusted library allocation
page read and write
46D8018B3000
trusted library allocation
page read and write
E10FBFD000
stack
page read and write
46D8018A2000
trusted library allocation
page read and write
46D800A40000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D8019C4000
trusted library allocation
page read and write
25CAA644000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
1AE00382000
trusted library allocation
page read and write
99BFBFE000
unkown
page readonly
309800258000
trusted library allocation
page read and write
2E5800FD0000
trusted library allocation
page read and write
2E580166A000
trusted library allocation
page read and write
17EC4145000
heap
page read and write
592C000AC000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E58003E8000
trusted library allocation
page read and write
74800120000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
39880027C000
trusted library allocation
page read and write
3E1402F70000
trusted library allocation
page read and write
46D801896000
trusted library allocation
page read and write
9200151C000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E5800829000
trusted library allocation
page read and write
386000238000
trusted library allocation
page read and write
46D80122C000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
2E580386C000
trusted library allocation
page read and write
92000DD4000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E5802070000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1B42F6D00000
trusted library allocation
page read and write
70E1000
heap
page read and write
240400230000
direct allocation
page read and write
2E5803FA0000
trusted library allocation
page read and write
46D80189F000
trusted library allocation
page read and write
16066C09000
heap
page read and write
46D801932000
trusted library allocation
page read and write
257800258000
trusted library allocation
page read and write
2F8000B4000
trusted library allocation
page read and write
5D60002B4000
trusted library allocation
page read and write
46D80130C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5800A55000
trusted library allocation
page read and write
2E58038E4000
trusted library allocation
page read and write
1AE014ED000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
E133BFE000
stack
page read and write
46D80191A000
trusted library allocation
page read and write
E1283FE000
unkown
page readonly
17EC4144000
heap
page read and write
46D801930000
trusted library allocation
page read and write
25CAD492000
heap
page read and write
C2BFFFE000
unkown
page readonly
F200011C000
trusted library allocation
page read and write
2E58040D4000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
1AE013C2000
trusted library allocation
page read and write
54D21F5000
stack
page read and write
16066C2B000
heap
page read and write
16066C2B000
heap
page read and write
9200022C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D800B88000
trusted library allocation
page read and write
2E5803B64000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
46D8016AC000
trusted library allocation
page read and write
19B03E90000
heap
page read and write
46D80175C000
trusted library allocation
page read and write
2E5800B10000
trusted library allocation
page read and write
48B1DD9000
stack
page read and write
2E5800BD4000
trusted library allocation
page read and write
C2BDFFE000
unkown
page readonly
46D801914000
trusted library allocation
page read and write
1AE007F5000
trusted library allocation
page read and write
1482000
heap
page read and write
17EC412F000
heap
page read and write
26C8002DC000
trusted library allocation
page read and write
46D8003DC000
trusted library allocation
page read and write
E1373FE000
unkown
page readonly
160EBF9E000
unclassified section
page read and write
46D801928000
trusted library allocation
page read and write
2E5800BDC000
trusted library allocation
page read and write
1453000
heap
page read and write
46D801894000
trusted library allocation
page read and write
17EC4128000
heap
page read and write
3DC7000
heap
page read and write
46D801894000
trusted library allocation
page read and write
1FC64740000
heap
page read and write
27458170000
heap
page readonly
7480057F000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
6F000001C000
trusted library allocation
page read and write
46D800201000
trusted library allocation
page read and write
19B03EB5000
heap
page read and write
1DD07FE000
unkown
page readonly
2E5800C88000
trusted library allocation
page read and write
2E5800AE8000
trusted library allocation
page read and write
1AE00FC2000
trusted library allocation
page read and write
2E5801574000
trusted library allocation
page read and write
16066C68000
heap
page read and write
46D80194C000
trusted library allocation
page read and write
2418FC10000
trusted library allocation
page read and write
1AE00D7B000
trusted library allocation
page read and write
1248002AC000
trusted library allocation
page read and write
2E5800634000
trusted library allocation
page read and write
2E58009BE000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
5D60001CC000
trusted library allocation
page read and write
2E5800A60000
trusted library allocation
page read and write
2E5803765000
trusted library allocation
page read and write
2578002C8000
trusted library allocation
page read and write
6FF000284000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
16066C10000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
2E580406B000
trusted library allocation
page read and write
E50002DC000
direct allocation
page read and write
7480011C000
trusted library allocation
page read and write
3E14023C1000
trusted library allocation
page read and write
9DC00220000
trusted library allocation
page read and write
C2B27FE000
stack
page read and write
1AE01508000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5800DCB000
trusted library allocation
page read and write
1AE0031E000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
140400290000
trusted library allocation
page read and write
2E5803822000
trusted library allocation
page read and write
748003A4000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D801312000
trusted library allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
2E5803722000
trusted library allocation
page read and write
E106BF2000
stack
page read and write
46D801978000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D8008AD000
trusted library allocation
page read and write
54D71FE000
stack
page read and write
46D8018AC000
trusted library allocation
page read and write
143E000
heap
page read and write
2E580380C000
trusted library allocation
page read and write
2F80008C000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
92000F2F000
trusted library allocation
page read and write
1AE00DB1000
trusted library allocation
page read and write
92000280000
trusted library allocation
page read and write
74800479000
trusted library allocation
page read and write
5D6000151000
trusted library allocation
page read and write
2E58036EE000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
2E5800AE2000
trusted library allocation
page read and write
2E58038EC000
trusted library allocation
page read and write
20500840000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
1B8F7C7A000
heap
page read and write
2E58003E8000
trusted library allocation
page read and write
46D8006D4000
trusted library allocation
page read and write
46D801990000
trusted library allocation
page read and write
46D800B58000
trusted library allocation
page read and write
61880032C000
direct allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5800B98000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
F2000414000
trusted library allocation
page read and write
1B8F7CC0000
heap
page read and write
16066C2B000
heap
page read and write
99BEBFE000
unkown
page readonly
2E5803B84000
trusted library allocation
page read and write
41A51FE000
unkown
page readonly
C2B1FFE000
unkown
page readonly
2F800024000
trusted library allocation
page read and write
2E58037E4000
trusted library allocation
page read and write
140E7D80000
heap
page read and write
740D7FE000
unkown
page readonly
205008AF000
trusted library allocation
page read and write
17ECBC80000
unkown
page readonly
664000270000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
46D80130C000
trusted library allocation
page read and write
1AE00D6B000
trusted library allocation
page read and write
3860002D8000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
408E000
heap
page read and write
21402D10000
trusted library allocation
page read and write
2140117B000
heap
page read and write
92000B94000
trusted library allocation
page read and write
46D80186E000
trusted library allocation
page read and write
748000CC000
trusted library allocation
page read and write
41AB1FE000
unkown
page readonly
3E1402401000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
1AE00802000
trusted library allocation
page read and write
53C800230000
trusted library allocation
page read and write
C2B77F9000
stack
page read and write
17EC3EB0000
heap
page read and write
1AE00E58000
trusted library allocation
page read and write
1E400020C000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
5D60000A8000
trusted library allocation
page read and write
1AE01482000
trusted library allocation
page read and write
AD367FE000
unkown
page readonly
74157FE000
unkown
page readonly
46D8018E1000
trusted library allocation
page read and write
2E58036CA000
trusted library allocation
page read and write
1AE00D55000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E58040CE000
trusted library allocation
page read and write
718C00238000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E580111B000
trusted library allocation
page read and write
6FDD000
heap
page read and write
26C8002A0000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
6F0000028000
trusted library allocation
page read and write
53C8002DC000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
2E5801636000
trusted library allocation
page read and write
1AE009C2000
trusted library allocation
page read and write
2E58037C7000
trusted library allocation
page read and write
17EC414B000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
E5000288000
direct allocation
page read and write
2E580368C000
trusted library allocation
page read and write
920006C1000
trusted library allocation
page read and write
2E58040BC000
trusted library allocation
page read and write
7480042F000
trusted library allocation
page read and write
27C0002C4000
direct allocation
page read and write
FDBF1FE000
unkown
page readonly
46D800BA8000
trusted library allocation
page read and write
748001D4000
trusted library allocation
page read and write
1473000
heap
page read and write
1443000
heap
page read and write
5D600029C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E58003B4000
trusted library allocation
page read and write
5D6000178000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
7480055F000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
92000E40000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
160EAB50000
unclassified section
page read and write
53C800278000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
46D8018E3000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
46D800B44000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
2E5800A94000
trusted library allocation
page read and write
27458090000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
16066BF7000
unclassified section
page read and write
6F000000C000
trusted library allocation
page read and write
C1563FE000
unkown
page readonly
46D801918000
trusted library allocation
page read and write
3DA1000
heap
page read and write
46D80089C000
trusted library allocation
page read and write
2E5802376000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
3E1402454000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
20500580000
trusted library allocation
page read and write
1B8F7C55000
heap
page read and write
42E00020C000
trusted library allocation
page read and write
29EBB4F3000
heap
page read and write
4BD50000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
7A2C002CC000
trusted library allocation
page read and write
16066C11000
heap
page read and write
592C00024000
trusted library allocation
page read and write
718C00334000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
92001387000
trusted library allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
618800309000
direct allocation
page read and write
46D801970000
trusted library allocation
page read and write
142C000
heap
page read and write
592C00160000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
21401148000
heap
page read and write
46D80190C000
trusted library allocation
page read and write
17EC4135000
heap
page read and write
2E580161C000
trusted library allocation
page read and write
29EBE258000
heap
page read and write
2070002D0000
trusted library allocation
page read and write
920000B9000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D801876000
trusted library allocation
page read and write
748001DC000
trusted library allocation
page read and write
2E5800F78000
trusted library allocation
page read and write
3E1402FAC000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
321000298000
direct allocation
page read and write
74087FE000
unkown
page readonly
2E5803EE4000
trusted library allocation
page read and write
1AE00DC3000
trusted library allocation
page read and write
5D600029C000
trusted library allocation
page read and write
2E5803364000
trusted library allocation
page read and write
2E580060C000
trusted library allocation
page read and write
F200010C000
trusted library allocation
page read and write
46D800A2C000
trusted library allocation
page read and write
2140102B000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
1437000
heap
page read and write
7050000
heap
page read and write
2F8000C0000
trusted library allocation
page read and write
748006B4000
trusted library allocation
page read and write
1AE01515000
trusted library allocation
page read and write
3E1403039000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
1434000
heap
page read and write
46D8012A3000
trusted library allocation
page read and write
27C000274000
direct allocation
page read and write
592C00090000
trusted library allocation
page read and write
2E5800AC4000
trusted library allocation
page read and write
1E765E13000
heap
page read and write
6FF0002B4000
trusted library allocation
page read and write
17EC5F02000
heap
page read and write
46D8012A2000
trusted library allocation
page read and write
2E58041B4000
trusted library allocation
page read and write
2E5800F3C000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
5D60002A8000
trusted library allocation
page read and write
748003B4000
trusted library allocation
page read and write
46D8018B8000
trusted library allocation
page read and write
2E5803C94000
trusted library allocation
page read and write
3E140242C000
trusted library allocation
page read and write
19B03EB9000
heap
page read and write
920000CC000
trusted library allocation
page read and write
76AD000
stack
page read and write
207000288000
trusted library allocation
page read and write
2E58040BC000
trusted library allocation
page read and write
1AE00945000
trusted library allocation
page read and write
146E000
heap
page read and write
AD347FE000
unkown
page readonly
46D801928000
trusted library allocation
page read and write
2E5801E04000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
3DB4000
heap
page read and write
6FF0002B4000
trusted library allocation
page read and write
2418F5E0000
heap
page read and write
2E58036CC000
trusted library allocation
page read and write
16066C24000
heap
page read and write
1AE002A8000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
5D60001E0000
trusted library allocation
page read and write
1AE00102000
trusted library allocation
page read and write
2F800091000
trusted library allocation
page read and write
29EBE2D1000
heap
page read and write
1AE006BF000
trusted library allocation
page read and write
2E5800B00000
trusted library allocation
page read and write
2050051D000
trusted library allocation
page read and write
AD247FE000
unkown
page readonly
2E5803714000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
74800110000
trusted library allocation
page read and write
7070000
heap
page read and write
46D80089E000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D801874000
trusted library allocation
page read and write
161400244000
trusted library allocation
page read and write
99B93FE000
stack
page read and write
747ABFB000
stack
page read and write
5D6000153000
trusted library allocation
page read and write
16066C24000
heap
page read and write
2E5800ADD000
trusted library allocation
page read and write
54D81FE000
stack
page read and write
1FCA7AA0000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
92000DD8000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
1F8800278000
trusted library allocation
page read and write
20500902000
trusted library allocation
page read and write
2E5801AA0000
trusted library allocation
page read and write
29EBE312000
heap
page read and write
46D801948000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
2E5801B08000
trusted library allocation
page read and write
46D8009AC000
trusted library allocation
page read and write
C2AEFFE000
unkown
page readonly
1404002A4000
trusted library allocation
page read and write
46D80192A000
trusted library allocation
page read and write
124800258000
trusted library allocation
page read and write
2E5800B78000
trusted library allocation
page read and write
2E5800A9A000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
3D55000
heap
page read and write
46D8018CC000
trusted library allocation
page read and write
592C0008C000
trusted library allocation
page read and write
E113BFC000
stack
page read and write
7410FFB000
stack
page read and write
2E5800E0C000
trusted library allocation
page read and write
1AE007C4000
trusted library allocation
page read and write
2E5804081000
trusted library allocation
page read and write
46D80078C000
trusted library allocation
page read and write
16066C27000
heap
page read and write
2E5800AD8000
trusted library allocation
page read and write
2F800060000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5800898000
trusted library allocation
page read and write
741D7FE000
unkown
page readonly
2E5800C1C000
trusted library allocation
page read and write
E640020C000
trusted library allocation
page read and write
46D800A60000
trusted library allocation
page read and write
1AE00D7D000
trusted library allocation
page read and write
C2C00201000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D800B08000
trusted library allocation
page read and write
17EC4113000
heap
page read and write
2E5803784000
trusted library allocation
page read and write
E114BFC000
stack
page read and write
748000A0000
trusted library allocation
page read and write
3E1402280000
trusted library allocation
page read and write
2E58007EC000
trusted library allocation
page read and write
17EC4143000
heap
page read and write
46D8012C4000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
1AE01555000
trusted library allocation
page read and write
46D801866000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
1473000
heap
page read and write
46D801920000
trusted library allocation
page read and write
1435000
heap
page read and write
2F80001C000
trusted library allocation
page read and write
9200027C000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D80061C000
trusted library allocation
page read and write
1E4000274000
trusted library allocation
page read and write
46D80077E000
trusted library allocation
page read and write
2E5801A60000
trusted library allocation
page read and write
17EC6BEB000
unkown
page read and write
46D801984000
trusted library allocation
page read and write
46D80143A000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
29EBB902000
heap
page read and write
17EC9C8A000
heap
page read and write
2E58008A7000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
20500982000
trusted library allocation
page read and write
74800336000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
1443000
heap
page read and write
2140112F000
heap
page read and write
2E580033E000
trusted library allocation
page read and write
1482000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
2E58036E4000
trusted library allocation
page read and write
1AE00E89000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
2E5800E10000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
1FC6485F000
heap
page read and write
2E5803F59000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
7480038C000
trusted library allocation
page read and write
25780020C000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
540000
unkown
page readonly
46D80189D000
trusted library allocation
page read and write
2E580201C000
trusted library allocation
page read and write
5D6000290000
trusted library allocation
page read and write
E6400404000
trusted library allocation
page read and write
2E580382C000
trusted library allocation
page read and write
746F3FE000
unkown
page readonly
2E5804060000
trusted library allocation
page read and write
46D8006AC000
trusted library allocation
page read and write
2E58037C9000
trusted library allocation
page read and write
92000114000
trusted library allocation
page read and write
46D80088C000
trusted library allocation
page read and write
2E580163A000
trusted library allocation
page read and write
2E580388F000
trusted library allocation
page read and write
7480040C000
trusted library allocation
page read and write
2E58002D8000
trusted library allocation
page read and write
2E58036F4000
trusted library allocation
page read and write
3E1402EA4000
trusted library allocation
page read and write
46D801250000
trusted library allocation
page read and write
92000DB0000
trusted library allocation
page read and write
46D8002D4000
trusted library allocation
page read and write
257800348000
trusted library allocation
page read and write
1471000
heap
page read and write
2E580224B000
trusted library allocation
page read and write
2E58041EF000
trusted library allocation
page read and write
7411FFB000
stack
page read and write
2E58038F4000
trusted library allocation
page read and write
21401144000
heap
page read and write
46D800824000
trusted library allocation
page read and write
F98000
stack
page read and write
7422FFE000
stack
page read and write
1442000
heap
page read and write
592C00288000
trusted library allocation
page read and write
2E580378C000
trusted library allocation
page read and write
2E5801650000
trusted library allocation
page read and write
2F80010C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
161400238000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
748003A4000
trusted library allocation
page read and write
1FC64400000
heap
page read and write
AD30FFE000
stack
page read and write
70A4000
heap
page read and write
46D8008A0000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
140E9A02000
heap
page read and write
17EC412E000
heap
page read and write
46D8012AC000
trusted library allocation
page read and write
1FC64860000
heap
page read and write
3E14029CA000
trusted library allocation
page read and write
4190000
heap
page read and write
17EC4135000
heap
page read and write
74800424000
trusted library allocation
page read and write
1B882580000
trusted library allocation
page read and write
160EAD2A000
unclassified section
page read and write
205005B7000
trusted library allocation
page read and write
407E000
stack
page read and write
2E58036D4000
trusted library allocation
page read and write
1473000
heap
page read and write
46D801922000
trusted library allocation
page read and write
2050058A000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
2E58009A4000
trusted library allocation
page read and write
F20003F4000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
7A2C002BC000
trusted library allocation
page read and write
2E5804059000
trusted library allocation
page read and write
221400024000
trusted library allocation
page read and write
2E58007F4000
trusted library allocation
page read and write
9DC00211000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
1464000
heap
page read and write
46D80189D000
trusted library allocation
page read and write
1AE00D7C000
trusted library allocation
page read and write
3E140241C000
trusted library allocation
page read and write
2E58009F0000
trusted library allocation
page read and write
74800118000
trusted library allocation
page read and write
2E5801AC0000
trusted library allocation
page read and write
552800294000
trusted library allocation
page read and write
160EBB4E000
unclassified section
page read and write
3D4D000
heap
page read and write
46D801920000
trusted library allocation
page read and write
2E5800E6C000
trusted library allocation
page read and write
7048000
heap
page read and write
5D600026A000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
46D8018AE000
trusted library allocation
page read and write
748004FF000
trusted library allocation
page read and write
160EAD4C000
unclassified section
page read and write
2E5800E18000
trusted library allocation
page read and write
92001558000
trusted library allocation
page read and write
541000
unkown
page execute and read and write
46D801924000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E580229C000
trusted library allocation
page read and write
21400FF0000
heap
page read and write
3860002B4000
trusted library allocation
page read and write
F2000364000
trusted library allocation
page read and write
25CAD477000
heap
page read and write
17EC4140000
heap
page read and write
16066C0A000
heap
page read and write
1437000
heap
page read and write
3098002B0000
trusted library allocation
page read and write
19B06920000
trusted library allocation
page read and write
1AE00680000
trusted library allocation
page read and write
25CAA590000
heap
page read and write
29EBE299000
heap
page read and write
5D60002DC000
trusted library allocation
page read and write
1455000
heap
page read and write
17EC5CF0000
trusted library allocation
page read and write
257800220000
trusted library allocation
page read and write
41A89FB000
stack
page read and write
2E58036E5000
trusted library allocation
page read and write
1AE00D9E000
trusted library allocation
page read and write
664000240000
trusted library allocation
page read and write
16066C10000
heap
page read and write
17EC40EE000
heap
page read and write
46D80192C000
trusted library allocation
page read and write
92000244000
trusted library allocation
page read and write
1AE00636000
trusted library allocation
page read and write
25CAD472000
heap
page read and write
2E580368C000
trusted library allocation
page read and write
46D8018E6000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
1AE00809000
trusted library allocation
page read and write
3E1400001000
trusted library allocation
page read and write
46D801374000
trusted library allocation
page read and write
2E58015CC000
trusted library allocation
page read and write
1AE00863000
trusted library allocation
page read and write
1AE00602000
trusted library allocation
page read and write
2E5802081000
trusted library allocation
page read and write
74800427000
trusted library allocation
page read and write
92000335000
trusted library allocation
page read and write
46D8018B8000
trusted library allocation
page read and write
46D801748000
trusted library allocation
page read and write
145B000
heap
page read and write
1AE015F5000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58040A2000
trusted library allocation
page read and write
214010A3000
heap
page read and write
46D80120C000
trusted library allocation
page read and write
3DAB000
heap
page read and write
1471000
heap
page read and write
146E000
heap
page read and write
42E0002D4000
trusted library allocation
page read and write
2E58009B0000
trusted library allocation
page read and write
3210002C0000
direct allocation
page read and write
323000178000
trusted library allocation
page read and write
2E5801CA4000
trusted library allocation
page read and write
1B8F7C31000
heap
page read and write
16066C10000
heap
page read and write
46D80200C000
trusted library allocation
page read and write
16066C24000
heap
page read and write
46D80027C000
trusted library allocation
page read and write
54DB1FE000
stack
page read and write
257800300000
trusted library allocation
page read and write
748006A0000
trusted library allocation
page read and write
17EC4142000
heap
page read and write
1AE005EC000
trusted library allocation
page read and write
21408B30000
unkown
page readonly
1B8F7C98000
heap
page read and write
46D800B98000
trusted library allocation
page read and write
2E5800AB4000
trusted library allocation
page read and write
2E5800E7C000
trusted library allocation
page read and write
C155BFE000
stack
page read and write
920005D8000
trusted library allocation
page read and write
46D801950000
trusted library allocation
page read and write
2E580371A000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
2E5804078000
trusted library allocation
page read and write
5D60000FC000
trusted library allocation
page read and write
310400244000
direct allocation
page read and write
46D800B44000
trusted library allocation
page read and write
46D801888000
trusted library allocation
page read and write
5D6000244000
trusted library allocation
page read and write
740AFFD000
stack
page read and write
2E5800FD8000
trusted library allocation
page read and write
2E5800880000
trusted library allocation
page read and write
46D80191A000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
16066C5E000
heap
page read and write
920001E0000
trusted library allocation
page read and write
46D801258000
trusted library allocation
page read and write
27C0002A0000
direct allocation
page read and write
46D801924000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
92000283000
trusted library allocation
page read and write
592C00250000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
46D800B11000
trusted library allocation
page read and write
2E5800794000
trusted library allocation
page read and write
1B8F7CA0000
heap
page read and write
46D80191A000
trusted library allocation
page read and write
2E5800C10000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
46D8018E3000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
2E5801658000
trusted library allocation
page read and write
6E8E000
stack
page read and write
46D800B0C000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
5D600026C000
trusted library allocation
page read and write
46D8018E1000
trusted library allocation
page read and write
19B03E62000
heap
page read and write
1AE00883000
trusted library allocation
page read and write
5F9000250000
trusted library allocation
page read and write
19B03DF0000
heap
page read and write
2E5800F6C000
trusted library allocation
page read and write
46D801970000
trusted library allocation
page read and write
2E5800B10000
trusted library allocation
page read and write
1FC64402000
heap
page read and write
46D801928000
trusted library allocation
page read and write
3D48000
heap
page read and write
21401135000
heap
page read and write
E11A3FE000
unkown
page readonly
5D600026C000
trusted library allocation
page read and write
21401130000
heap
page read and write
29EBE271000
heap
page read and write
21401145000
heap
page read and write
2E580221E000
trusted library allocation
page read and write
92000AA8000
trusted library allocation
page read and write
3860002C8000
trusted library allocation
page read and write
2E5800CAC000
trusted library allocation
page read and write
1404002CC000
trusted library allocation
page read and write
2E5800E40000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
E130BFB000
stack
page read and write
1437000
heap
page read and write
395E000
stack
page read and write
2E5800BB4000
trusted library allocation
page read and write
2E5801A90000
trusted library allocation
page read and write
41AA9F5000
stack
page read and write
46D801928000
trusted library allocation
page read and write
1437000
heap
page read and write
2E5800E30000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
2E5802209000
trusted library allocation
page read and write
46D8012A4000
trusted library allocation
page read and write
1AE00DA9000
trusted library allocation
page read and write
17EC40A7000
heap
page read and write
746BBFE000
stack
page read and write
5D60002B2000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
46D800620000
trusted library allocation
page read and write
1FC64866000
heap
page read and write
46D80120C000
trusted library allocation
page read and write
29EBB400000
heap
page read and write
46D8018A2000
trusted library allocation
page read and write
2E58040AD000
trusted library allocation
page read and write
2E5800A0C000
trusted library allocation
page read and write
2E58040C2000
trusted library allocation
page read and write
2E58022EF000
trusted library allocation
page read and write
46D800EE3000
trusted library allocation
page read and write
2E5802054000
trusted library allocation
page read and write
2E5801590000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
2E5803724000
trusted library allocation
page read and write
F20003E0000
trusted library allocation
page read and write
3E1402447000
trusted library allocation
page read and write
1AE006C2000
trusted library allocation
page read and write
46D801894000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
323000094000
trusted library allocation
page read and write
46D801902000
trusted library allocation
page read and write
2E58020AE000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
2E5801AE0000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
2E5803BBC000
trusted library allocation
page read and write
2745821B000
heap
page read and write
7480017C000
trusted library allocation
page read and write
53C800258000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
46D8018B6000
trusted library allocation
page read and write
386000238000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
3DB7000
heap
page read and write
92000B52000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
E120BFD000
stack
page read and write
5D60002A8000
trusted library allocation
page read and write
46D8006C4000
trusted library allocation
page read and write
5D6000284000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2E5801B68000
trusted library allocation
page read and write
21401140000
heap
page read and write
46D8009F0000
trusted library allocation
page read and write
2E58036F2000
trusted library allocation
page read and write
16066C10000
heap
page read and write
F200039C000
trusted library allocation
page read and write
1DCCFF2000
stack
page read and write
46D801920000
trusted library allocation
page read and write
21401127000
heap
page read and write
92000C34000
trusted library allocation
page read and write
46D801458000
trusted library allocation
page read and write
42E0002B4000
trusted library allocation
page read and write
3D1400220000
trusted library allocation
page read and write
2E5800A2C000
trusted library allocation
page read and write
1E40002A4000
trusted library allocation
page read and write
160EACD5000
unclassified section
page read and write
16066C10000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
1444000
heap
page read and write
46D801994000
trusted library allocation
page read and write
1B8F7C2B000
heap
page read and write
47A000306000
direct allocation
page read and write
2AC8002D4000
direct allocation
page read and write
27BFFFE000
stack
page read and write
2E580115B000
trusted library allocation
page read and write
2E580379C000
trusted library allocation
page read and write
1AE01042000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
46D800BDC000
trusted library allocation
page read and write
2E5802050000
trusted library allocation
page read and write
E119BFD000
stack
page read and write
205008CA000
trusted library allocation
page read and write
3DAA000
heap
page read and write
16066C13000
heap
page read and write
46D801920000
trusted library allocation
page read and write
1404002DC000
trusted library allocation
page read and write
3E1402EE0000
trusted library allocation
page read and write
E6400220000
trusted library allocation
page read and write
4F14002A4000
direct allocation
page read and write
1FC64413000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
142C000
heap
page read and write
2E5803C94000
trusted library allocation
page read and write
2050053B000
trusted library allocation
page read and write
2E58036E2000
trusted library allocation
page read and write
1FC643F0000
heap
page read and write
2E58036DC000
trusted library allocation
page read and write
74017FE000
unkown
page readonly
E500025C000
direct allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
2E5803722000
trusted library allocation
page read and write
2E580375C000
trusted library allocation
page read and write
2E5802243000
trusted library allocation
page read and write
F2000250000
trusted library allocation
page read and write
2E58022BB000
trusted library allocation
page read and write
4EE400234000
direct allocation
page read and write
205008F3000
trusted library allocation
page read and write
92001043000
trusted library allocation
page read and write
16066C10000
heap
page read and write
46D8013A4000
trusted library allocation
page read and write
AD35FFE000
stack
page read and write
F20000A8000
trusted library allocation
page read and write
29EBE286000
heap
page read and write
74800038000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
46D8013A8000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
4BCC0000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
2E58040CE000
trusted library allocation
page read and write
1455000
heap
page read and write
92001528000
trusted library allocation
page read and write
21401063000
heap
page read and write
1438000
heap
page read and write
2E5800B08000
trusted library allocation
page read and write
5528002A8000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
1AE00D75000
trusted library allocation
page read and write
46D80087C000
trusted library allocation
page read and write
46D8018D1000
trusted library allocation
page read and write
1AE01022000
trusted library allocation
page read and write
2E580223C000
trusted library allocation
page read and write
2E58036A4000
trusted library allocation
page read and write
46D8013A4000
trusted library allocation
page read and write
257800201000
trusted library allocation
page read and write
2E5800B08000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
46D801250000
trusted library allocation
page read and write
46D800801000
trusted library allocation
page read and write
F2000264000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
16140020C000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
74800334000
trusted library allocation
page read and write
748001C8000
trusted library allocation
page read and write
2E5802058000
trusted library allocation
page read and write
141C000
heap
page read and write
2E58036A4000
trusted library allocation
page read and write
2AC8002E4000
direct allocation
page read and write
74800054000
trusted library allocation
page read and write
20500142000
trusted library allocation
page read and write
2E58016EF000
trusted library allocation
page read and write
17EC4146000
heap
page read and write
2E58036C4000
trusted library allocation
page read and write
2E58043B0000
trusted library allocation
page read and write
1FC6480B000
heap
page read and write
1FC64857000
heap
page read and write
46D801924000
trusted library allocation
page read and write
2E5800A50000
trusted library allocation
page read and write
27C87602000
heap
page read and write
1AE0081D000
trusted library allocation
page read and write
92000164000
trusted library allocation
page read and write
9200024C000
trusted library allocation
page read and write
32300001C000
trusted library allocation
page read and write
2E580384C000
trusted library allocation
page read and write
2F8000D0000
trusted library allocation
page read and write
4BDB0000
trusted library allocation
page read and write
74800147000
trusted library allocation
page read and write
7070000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
2E580375A000
trusted library allocation
page read and write
2418F5B0000
heap
page read and write
42E0002A4000
trusted library allocation
page read and write
2E580381C000
trusted library allocation
page read and write
92000E8E000
trusted library allocation
page read and write
309800230000
trusted library allocation
page read and write
46D801880000
trusted library allocation
page read and write
2E5803684000
trusted library allocation
page read and write
748004A0000
trusted library allocation
page read and write
1464000
heap
page read and write
3860002D8000
trusted library allocation
page read and write
3860002A0000
trusted library allocation
page read and write
2E580408A000
trusted library allocation
page read and write
3E1402364000
trusted library allocation
page read and write
2AC800230000
direct allocation
page read and write
27C0002E0000
direct allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
3E140226D000
trusted library allocation
page read and write
1DD3FFE000
stack
page read and write
16066C0B000
heap
page read and write
2E58008A6000
trusted library allocation
page read and write
1AE00D59000
trusted library allocation
page read and write
2E5800E0C000
trusted library allocation
page read and write
2E58008A6000
trusted library allocation
page read and write
25780040C000
trusted library allocation
page read and write
7480037C000
trusted library allocation
page read and write
7480042C000
trusted library allocation
page read and write
E5000234000
direct allocation
page read and write
160EA59D000
unclassified section
page read and write
2E58015E0000
trusted library allocation
page read and write
46D80189D000
trusted library allocation
page read and write
2E58015AC000
trusted library allocation
page read and write
29EBE291000
heap
page read and write
16066C25000
heap
page read and write
16066C0A000
heap
page read and write
16066C10000
heap
page read and write
46D80194C000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
46D800BA8000
trusted library allocation
page read and write
21401142000
heap
page read and write
1F8800264000
trusted library allocation
page read and write
46D80197A000
trusted library allocation
page read and write
2E58015B4000
trusted library allocation
page read and write
46D801914000
trusted library allocation
page read and write
3D2C000
heap
page read and write
1AE00102000
trusted library allocation
page read and write
2E5803734000
trusted library allocation
page read and write
74800428000
trusted library allocation
page read and write
1435000
heap
page read and write
2E5804060000
trusted library allocation
page read and write
2E5801AD8000
trusted library allocation
page read and write
99BDBFE000
unkown
page readonly
1B8F7A70000
heap
page read and write
46D80190E000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
2E5800BD4000
trusted library allocation
page read and write
25CAD458000
heap
page read and write
1AE00887000
trusted library allocation
page read and write
17EC9265000
unkown
page readonly
2E580077D000
trusted library allocation
page read and write
2AC800404000
direct allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
240400288000
direct allocation
page read and write
46D800CFC000
trusted library allocation
page read and write
21406453000
heap
page read and write
46D80140C000
trusted library allocation
page read and write
2E580423C000
trusted library allocation
page read and write
240400254000
direct allocation
page read and write
4BDA4000
trusted library allocation
page read and write
2E5803754000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5803694000
trusted library allocation
page read and write
2E5803EDC000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
9DC002E0000
trusted library allocation
page read and write
2E5801A50000
trusted library allocation
page read and write
2A31762A000
remote allocation
page execute read
2E5800E30000
trusted library allocation
page read and write
205009C2000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
2E5802A04000
trusted library allocation
page read and write
2E5803685000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
21BC002CC000
trusted library allocation
page read and write
5F900020C000
trusted library allocation
page read and write
20700029C000
trusted library allocation
page read and write
46D801314000
trusted library allocation
page read and write
41B21FE000
unkown
page readonly
46D8018E8000
trusted library allocation
page read and write
2E580407A000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5800818000
trusted library allocation
page read and write
698E000
stack
page read and write
160E9EC0000
trusted library allocation
page read and write
3D44000
heap
page read and write
1B8F7C00000
heap
page read and write
46D8003B0000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
2A317800000
heap
page read and write
AD2AFFD000
stack
page read and write
592C00220000
trusted library allocation
page read and write
F200020C000
trusted library allocation
page read and write
25CAD4A7000
heap
page read and write
46D8012F4000
trusted library allocation
page read and write
46D80191C000
trusted library allocation
page read and write
160EBB16000
unclassified section
page read and write
2E5801B68000
trusted library allocation
page read and write
1AE00D57000
trusted library allocation
page read and write
46D80123C000
trusted library allocation
page read and write
16066C10000
heap
page read and write
2E5803774000
trusted library allocation
page read and write
39880029C000
trusted library allocation
page read and write
1248002D4000
trusted library allocation
page read and write
E118BFB000
stack
page read and write
16066C10000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
2E58037E4000
trusted library allocation
page read and write
16066C09000
heap
page read and write
2E5802019000
trusted library allocation
page read and write
309800220000
trusted library allocation
page read and write
748000E5000
trusted library allocation
page read and write
5D600026A000
trusted library allocation
page read and write
5D60002A8000
trusted library allocation
page read and write
46D801928000
trusted library allocation
page read and write
2E5804062000
trusted library allocation
page read and write
3E14027A4000
trusted library allocation
page read and write
21402CF0000
heap
page read and write
27458405000
heap
page read and write
2E5801B28000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
2E58020E7000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
2E58037E4000
trusted library allocation
page read and write
592C00038000
trusted library allocation
page read and write
16066C25000
heap
page read and write
1AE00882000
trusted library allocation
page read and write
46D800BD0000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
1AE00690000
trusted library allocation
page read and write
46D800684000
trusted library allocation
page read and write
19B03EA1000
heap
page read and write
46D800B11000
trusted library allocation
page read and write
2E5801EB4000
trusted library allocation
page read and write
19B03E9E000
heap
page read and write
2E5800E30000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D801932000
trusted library allocation
page read and write
29EBE2B9000
heap
page read and write
41AC1FE000
unkown
page readonly
1466000
heap
page read and write
E6400230000
trusted library allocation
page read and write
C2ACFFE000
unkown
page readonly
2E5802063000
trusted library allocation
page read and write
2E5800898000
trusted library allocation
page read and write
748003C4000
trusted library allocation
page read and write
6F8D000
stack
page read and write
1AE008A7000
trusted library allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
1FC64823000
heap
page read and write
2E5803D25000
trusted library allocation
page read and write
46D80088C000
trusted library allocation
page read and write
24194120000
unkown
page readonly
2418F64D000
heap
page read and write
46D801910000
trusted library allocation
page read and write
160E9EBE000
trusted library allocation
page read and write
16066C24000
heap
page read and write
2E580407C000
trusted library allocation
page read and write
1AE00973000
trusted library allocation
page read and write
46D801604000
trusted library allocation
page read and write
3E1402BD8000
trusted library allocation
page read and write
2E5800BD4000
trusted library allocation
page read and write
2E5800B50000
trusted library allocation
page read and write
2E5800B13000
trusted library allocation
page read and write
2E5800AE2000
trusted library allocation
page read and write
142C000
heap
page read and write
2E5801A70000
trusted library allocation
page read and write
2E5800B08000
trusted library allocation
page read and write
5D6000254000
trusted library allocation
page read and write
3DA8000
heap
page read and write
592C0006C000
trusted library allocation
page read and write
F2000350000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
46D801924000
trusted library allocation
page read and write
4BD50000
trusted library allocation
page read and write
53C80040C000
trusted library allocation
page read and write
2E5803764000
trusted library allocation
page read and write
7402FFC000
stack
page read and write
47A00031B000
direct allocation
page read and write
21406518000
heap
page read and write
4BC14000
trusted library allocation
page read and write
1466000
heap
page read and write
9DC00300000
trusted library allocation
page read and write
16066C0A000
heap
page read and write
592C00150000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
2E5803764000
trusted library allocation
page read and write
2E58016AF000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
25CAA420000
remote allocation
page read and write
46D800B0C000
trusted library allocation
page read and write
21BC00240000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
46D80190C000
trusted library allocation
page read and write
1AE00082000
trusted library allocation
page read and write
2E5801B2B000
trusted library allocation
page read and write
274581E0000
trusted library allocation
page read and write
6F00000B4000
trusted library allocation
page read and write
5D60002B2000
trusted library allocation
page read and write
3D1400201000
trusted library allocation
page read and write
43F65FF000
stack
page read and write
46D80188C000
trusted library allocation
page read and write
46D801916000
trusted library allocation
page read and write
46D801968000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
1B8F7C44000
heap
page read and write
46D801894000
trusted library allocation
page read and write
1AE00D1A000
trusted library allocation
page read and write
17EC4140000
heap
page read and write
20500582000
trusted library allocation
page read and write
5F9000211000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
74743FE000
unkown
page readonly
92000CE8000
trusted library allocation
page read and write
3D5A000
heap
page read and write
2E5800BD4000
trusted library allocation
page read and write
12480024C000
trusted library allocation
page read and write
2E5804534000
trusted library allocation
page read and write
2E5800ADD000
trusted library allocation
page read and write
1AE00D9C000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
1466000
heap
page read and write
46D801930000
trusted library allocation
page read and write
46D8008A4000
trusted library allocation
page read and write
3B0002B0000
direct allocation
page read and write
16066C69000
heap
page read and write
16066C62000
heap
page read and write
46D80192A000
trusted library allocation
page read and write
2E5803EE4000
trusted library allocation
page read and write
46D801935000
trusted library allocation
page read and write
2E58009BF000
trusted library allocation
page read and write
3E1402447000
trusted library allocation
page read and write
3E14027E8000
trusted library allocation
page read and write
2E5800F54000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
17EC943A000
heap
page read and write
46D8009F0000
trusted library allocation
page read and write
3E140269C000
trusted library allocation
page read and write
2A317640000
heap
page read and write
46D80123C000
trusted library allocation
page read and write
1FC643DE000
remote allocation
page execute read
2E5800EEC000
trusted library allocation
page read and write
5F9000274000
trusted library allocation
page read and write
1AE007D2000
trusted library allocation
page read and write
2E58036CC000
trusted library allocation
page read and write
592C00185000
trusted library allocation
page read and write
2E5800F74000
trusted library allocation
page read and write
2E5803EEE000
trusted library allocation
page read and write
2E58043C8000
trusted library allocation
page read and write
C158BFE000
stack
page read and write
46D8012FC000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
5D600029F000
trusted library allocation
page read and write
4BD38000
trusted library allocation
page read and write
54D51FE000
stack
page read and write
2E5803792000
trusted library allocation
page read and write
1FC647D0000
unclassified section
page read and write
1310000
heap
page read and write
2E58037B4000
trusted library allocation
page read and write
3DF1000
heap
page read and write
74800118000
trusted library allocation
page read and write
17EC3ED0000
heap
page read and write
5D6000104000
trusted library allocation
page read and write
323000114000
trusted library allocation
page read and write
2A317802000
heap
page read and write
146E000
heap
page read and write
5D60002B2000
trusted library allocation
page read and write
1AE007DB000
trusted library allocation
page read and write
2E580406E000
trusted library allocation
page read and write
2AC800408000
direct allocation
page read and write
21401131000
heap
page read and write
46D8012D4000
trusted library allocation
page read and write
27C85A13000
heap
page read and write
2E5800BE1000
trusted library allocation
page read and write
17EC4129000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
2E5800BD0000
trusted library allocation
page read and write
1FC643E0000
remote allocation
page read and write
2E5801A1C000
trusted library allocation
page read and write
46D8018FD000
trusted library allocation
page read and write
53C800408000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
1AE00DBE000
trusted library allocation
page read and write
1E76A802000
heap
page read and write
9200079C000
trusted library allocation
page read and write
2E5800AF8000
trusted library allocation
page read and write
2E58040E8000
trusted library allocation
page read and write
3E1402EDD000
trusted library allocation
page read and write
2E58015F0000
trusted library allocation
page read and write
46D801410000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
C2B9FFE000
unkown
page readonly
5D60002D7000
trusted library allocation
page read and write
1443000
heap
page read and write
2E5800AB8000
trusted library allocation
page read and write
92000F07000
trusted library allocation
page read and write
53C800328000
trusted library allocation
page read and write
3E14029CA000
trusted library allocation
page read and write
16066C25000
heap
page read and write
2E5803824000
trusted library allocation
page read and write
2E5800E20000
trusted library allocation
page read and write
2E5804078000
trusted library allocation
page read and write
2E5800794000
trusted library allocation
page read and write
2E58009F0000
trusted library allocation
page read and write
5D60002B8000
trusted library allocation
page read and write
C2C00240000
trusted library allocation
page read and write
2E58036BC000
trusted library allocation
page read and write
2E58039CC000
trusted library allocation
page read and write
16066C10000
heap
page read and write
16066C09000
heap
page read and write
1E765E3D000
heap
page read and write
46D800B44000
trusted library allocation
page read and write
2E5803F84000
trusted library allocation
page read and write
148A000
heap
page read and write
46D801918000
trusted library allocation
page read and write
2E580371A000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
F20001D0000
trusted library allocation
page read and write
53C8002C4000
trusted library allocation
page read and write
2E58008AE000
trusted library allocation
page read and write
46D80197A000
trusted library allocation
page read and write
46D800230000
trusted library allocation
page read and write
161400278000
trusted library allocation
page read and write
5D60002B4000
trusted library allocation
page read and write
46D801898000
trusted library allocation
page read and write
5D60002DC000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
5D60002D4000
trusted library allocation
page read and write
92000EA0000
trusted library allocation
page read and write
2E5802004000
trusted library allocation
page read and write
2E5800AC0000
trusted library allocation
page read and write
2E58043BC000
trusted library allocation
page read and write
2E58041EA000
trusted library allocation
page read and write
748000C5000
trusted library allocation
page read and write
46D801918000
trusted library allocation
page read and write
2E58038C4000
trusted library allocation
page read and write
47A000314000
direct allocation
page read and write
1AE007F9000
trusted library allocation
page read and write
5D6000264000
trusted library allocation
page read and write
17EC4141000
heap
page read and write
3D9B000
heap
page read and write
16066C10000
heap
page read and write
46D801930000
trusted library allocation
page read and write
17EC417C000
heap
page read and write
2140642F000
heap
page read and write
46D80192E000
trusted library allocation
page read and write
3B00029C000
direct allocation
page read and write
46D8018DC000
trusted library allocation
page read and write
46D80140C000
trusted library allocation
page read and write
2E5803A44000
trusted library allocation
page read and write
7030000
heap
page read and write
46D801980000
trusted library allocation
page read and write
46D800871000
trusted library allocation
page read and write
92000283000
trusted library allocation
page read and write
46D801930000
trusted library allocation
page read and write
29EBB46B000
heap
page read and write
46D800220000
trusted library allocation
page read and write
2E5802367000
trusted library allocation
page read and write
2E5800DCC000
trusted library allocation
page read and write
7480011C000
trusted library allocation
page read and write
5D60002B4000
trusted library allocation
page read and write
46D801948000
trusted library allocation
page read and write
2E5800AD8000
trusted library allocation
page read and write
1486000
heap
page read and write
2E58036F4000
trusted library allocation
page read and write
2E5803714000
trusted library allocation
page read and write
2E5800662000
trusted library allocation
page read and write
2E5803EE0000
trusted library allocation
page read and write
1AE00D4B000
trusted library allocation
page read and write
2E5803BF4000
trusted library allocation
page read and write
17EC9402000
heap
page read and write
3230000D8000
trusted library allocation
page read and write
2E58036AC000
trusted library allocation
page read and write
2E5803EC8000
trusted library allocation
page read and write
E122BFC000
stack
page read and write
7426000
trusted library allocation
page read and write
664000284000
trusted library allocation
page read and write
2E58039E4000
trusted library allocation
page read and write
2E58008A0000
trusted library allocation
page read and write
F20003E4000
trusted library allocation
page read and write
43F25FE000
stack
page read and write
19B03EC0000
heap
page read and write
2E5804059000
trusted library allocation
page read and write
2E5804062000
trusted library allocation
page read and write
2E5800BDC000
trusted library allocation
page read and write
46D801920000
trusted library allocation
page read and write
92000DD2000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
2E5803704000
trusted library allocation
page read and write
205004C0000
trusted library allocation
page read and write
74800424000
trusted library allocation
page read and write
46D80189F000
trusted library allocation
page read and write
2E5801AE8000
trusted library allocation
page read and write
2E58040D7000
trusted library allocation
page read and write
5D4C002AC000
direct allocation
page read and write
1430000
heap
page read and write
2E58016D8000
trusted library allocation
page read and write
74800118000
trusted library allocation
page read and write
2E5800B18000
trusted library allocation
page read and write
46D80194C000
trusted library allocation
page read and write
46D80188C000
trusted library allocation
page read and write
3E1402F70000
trusted library allocation
page read and write
3DDC000
heap
page read and write
46D801930000
trusted library allocation
page read and write
1DD1FFE000
stack
page read and write
2A3175B0000
heap
page read and write
46D800B0C000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
46D80192C000
trusted library allocation
page read and write
46D8012A0000
trusted library allocation
page read and write
46D801910000
trusted library allocation
page read and write
7413FFD000
stack
page read and write
2E5800338000
trusted library allocation
page read and write
2E58015BC000
trusted library allocation
page read and write
1F8800201000
trusted library allocation
page read and write
1AE00DC2000
trusted library allocation
page read and write
F2000077000
trusted library allocation
page read and write
21406443000
heap
page read and write
1FCE7AB0000
unclassified section
page read and write
2E5803794000
trusted library allocation
page read and write
46D80192E000
trusted library allocation
page read and write
29EBB4C4000
heap
page read and write
4F14002B4000
direct allocation
page read and write
2418F602000
heap
page read and write
5D6000264000
trusted library allocation
page read and write
16066C0B000
heap
page read and write
2E5801AE8000
trusted library allocation
page read and write
5D6000268000
trusted library allocation
page read and write
6FFA000
heap
page read and write
2E58036AC000
trusted library allocation
page read and write
7003000
heap
page read and write
41AE1FE000
unkown
page readonly
2E5804350000
trusted library allocation
page read and write
16066C62000
heap
page read and write
2E58009B0000
trusted library allocation
page read and write
16066C2B000
heap
page read and write
6F0000120000
trusted library allocation
page read and write
17EC94DA000
heap
page read and write
1437000
heap
page read and write
29EBE2C7000
heap
page read and write
143B000
heap
page read and write
2E5801B18000
trusted library allocation
page read and write
7A2C002E4000
trusted library allocation
page read and write
9DC002E8000
trusted library allocation
page read and write
2E5800338000
trusted library allocation
page read and write
E5000210000
direct allocation
page read and write
46D80192C000
trusted library allocation
page read and write
16066C02000
heap
page read and write
5D60002AA000
trusted library allocation
page read and write
There are 8668 hidden memdumps, click here to show them.