IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_610bfe9f-7e62-46a8-8c71-7fb061771aa6.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_610bfe9f-7e62-46a8-8c71-7fb061771aa6.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\86OU6OT4HZVJW3A9ET1M.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ES0NNDMUGD779OQA0ARP.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\08189688-e817-407b-a4e7-e014f81f19e0 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\08189688-e817-407b-a4e7-e014f81f19e0.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5764 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5764 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5764 bytes
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aab533d8-a973-49df-af8e-2a2d2e8eca71} 7644 "\\.\pipe\gecko-crash-server-pipe.7644" 20b9176d110 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1552 -parentBuildID 20230927232528 -prefsHandle 1568 -prefMapHandle 3876 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0c04207-d988-4604-93b1-3fc9de6d621b} 7644 "\\.\pipe\gecko-crash-server-pipe.7644" 20b91742910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5456 -prefMapHandle 5408 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e09085be-52c2-4e9a-a064-f9a8b5c45ee7} 7644 "\\.\pipe\gecko-crash-server-pipe.7644" 20baab68510 utility

URLs

Name
IP
Malicious
http://json-schema.org/draft-04/schema#(version
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features
unknown
http://mozilla.org/#/properties/proposedEnrollment
unknown
http://detectportal.firefox.com/
unknown
http://mozilla.org/#/properties/schemaVersion
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://www.youtube.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://mozilla.org/#/properties/channel
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
http://mozilla.org/#/properties/branches
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://mozilla.org/#/properties/userFacingName
unknown
https://www.msn.com
unknown
http://mozilla.org/#/properties/bucketConfig/properties/namespace
unknown
http://mozilla.org/#/properties/bucketConfig/properties/startA
unknown
http://mozilla.org/#/properties/outcomes/items/properties/slug
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/valuehtt
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://mozilla.org/#/properties/branches/anyOf/2
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/value
unknown
http://mozilla.org/#/properties/featureValidationOptOuthttp://mozilla.org/#/properties/localizations
unknown
http://mozilla.org/#/properties/outcomes/items
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
unknown
https://www.youtube.com/accountbl
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://www.youtube.com/accountC:
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
http://mozilla.org/#/properties/isRollout
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/enabled
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
unknown
http://mozilla.org/#/properties/bucketConfig/properties/countVersion
unknown
http://mozilla.org/#/properties/endDate
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/ratio
unknown
http://mozilla.org/#/properties/localizations/anyOf/0/additionalProperties
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
http://mozilla.org/#/properties/proposedDurationhttp://mozilla.org/#/properties/referenceBranch
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://mozilla.org/#/properties/outcomes/items/properties/priority
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/itemshttp://mozilla.org/#
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://mozilla.org/#/properties/enrollmentEndDate
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features
unknown
http://mozilla.org/#/properties/branches/anyOf/1/itemsTesting
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
143.204.215.115
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
push.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 20 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
143.204.215.115
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
142.250.186.110
youtube-ui.l.google.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenX
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|ScreenY
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Width
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Height
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Maximized
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Flags
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|CssToDevPixelScaling
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|UrlbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SearchbarCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|SpringsCSSSpan
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20B9ED63000
trusted library allocation
page read and write
20BB0D12000
trusted library allocation
page read and write
20BA9452000
trusted library allocation
page read and write
20B9E733000
trusted library allocation
page read and write
20BA3D6F000
trusted library allocation
page read and write
20BAB195000
trusted library allocation
page read and write
12C8F377000
heap
page read and write
20B984D7000
heap
page read and write
20BA9674000
trusted library allocation
page read and write
20BA2ED2000
trusted library allocation
page read and write
20BA95DE000
trusted library allocation
page read and write
20BB11AA000
trusted library allocation
page read and write
20BA96E5000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984BC000
heap
page read and write
20BA1AC0000
trusted library allocation
page read and write
20BAAB92000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20BB11FA000
trusted library allocation
page read and write
1692ADDB000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B9853C000
heap
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
20BAAF3C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984B3000
heap
page read and write
20BB11FA000
trusted library allocation
page read and write
20BAAB10000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA1D72000
trusted library allocation
page read and write
20BA0F68000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9D582000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
20BA94F8000
trusted library allocation
page read and write
20BA3EC7000
trusted library allocation
page read and write
20BAA6E2000
trusted library allocation
page read and write
20BA1570000
trusted library allocation
page read and write
20BADB20000
trusted library allocation
page read and write
20BAAF9E000
trusted library allocation
page read and write
20BA2EF1000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20B984C0000
heap
page read and write
20BA9690000
trusted library allocation
page read and write
20BAA070000
trusted library allocation
page read and write
20BA17FD000
trusted library allocation
page read and write
20BA3DA6000
trusted library allocation
page read and write
20BA98B9000
trusted library allocation
page read and write
12C8E530000
unclassified section
page read and write
20B984F9000
heap
page read and write
54C1000
heap
page read and write
20B984D5000
heap
page read and write
54C1000
heap
page read and write
20BB17A2000
heap
page read and write
20BAAF9E000
trusted library allocation
page read and write
20BA329B000
trusted library allocation
page read and write
20BA32FD000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984FC000
heap
page read and write
54C1000
heap
page read and write
20BA17DE000
trusted library allocation
page read and write
20B9ED62000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
54C1000
heap
page read and write
20BAABDE000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA14C8000
trusted library allocation
page read and write
20B9E7C1000
trusted library allocation
page read and write
20BA1A17000
trusted library allocation
page read and write
20BA156F000
trusted library allocation
page read and write
1692AD5D000
trusted library allocation
page read and write
12C8F26C000
heap
page read and write
20BA17EE000
trusted library allocation
page read and write
20BA28F7000
trusted library allocation
page read and write
20BA94CE000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
1692AB00000
trusted library allocation
page read and write
20BB2625000
trusted library allocation
page read and write
20B9EDBD000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAABDC000
trusted library allocation
page read and write
20BA9475000
trusted library allocation
page read and write
12C8E6BB000
trusted library allocation
page read and write
20BA959C000
trusted library allocation
page read and write
20BAB3DF000
trusted library allocation
page read and write
20BA1A9E000
trusted library allocation
page read and write
20BAB8C2000
trusted library allocation
page read and write
20BA33E1000
trusted library allocation
page read and write
54C1000
heap
page read and write
1692A910000
remote allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B9851C000
heap
page read and write
20B9853C000
heap
page read and write
20B984C2000
heap
page read and write
20B984FC000
heap
page read and write
20BAE2CD000
trusted library allocation
page read and write
20BA95FE000
trusted library allocation
page read and write
20BA15A3000
trusted library allocation
page read and write
74D000
unkown
page readonly
20B984DA000
heap
page read and write
20BA3EE3000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98507000
heap
page read and write
20BAE1E1000
trusted library allocation
page read and write
21E8000
heap
page read and write
20BAAF53000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96EE000
trusted library allocation
page read and write
20BA3F5C000
trusted library allocation
page read and write
20BB260A000
trusted library allocation
page read and write
20BA3200000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984D5000
heap
page read and write
1692A980000
heap
page read and write
20B984D1000
heap
page read and write
20B984CD000
heap
page read and write
20BB11E9000
trusted library allocation
page read and write
20BA96CF000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B9853C000
heap
page read and write
20BA942C000
trusted library allocation
page read and write
20BA15EB000
trusted library allocation
page read and write
20B9E6D7000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
20B984A8000
heap
page read and write
20BA95EF000
trusted library allocation
page read and write
12C8F263000
heap
page read and write
20BA28F9000
trusted library allocation
page read and write
20B9E6C5000
trusted library allocation
page read and write
620000
unkown
page readonly
20B984D0000
heap
page read and write
20B984FC000
heap
page read and write
20B984D1000
heap
page read and write
20BAB857000
trusted library allocation
page read and write
272B73B03000
trusted library allocation
page read and write
20BA156C000
trusted library allocation
page read and write
1692ADC4000
trusted library allocation
page read and write
20BAAB64000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA1A39000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9E4CB000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA28F7000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B9E7C7000
trusted library allocation
page read and write
20BAB467000
trusted library allocation
page read and write
20BA1FE4000
trusted library allocation
page read and write
6EC000
unkown
page execute and write copy
20BA2E28000
trusted library allocation
page read and write
20BB1174000
trusted library allocation
page read and write
20BA2EBD000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA2EBD000
trusted library allocation
page read and write
20BA32DA000
trusted library allocation
page read and write
20BAB0E4000
trusted library allocation
page read and write
54C1000
heap
page read and write
1692AC64000
heap
page read and write
20B984E9000
heap
page read and write
20B98501000
heap
page read and write
20BB11A8000
trusted library allocation
page read and write
20BB19FC000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
54C1000
heap
page read and write
ED3DFFF000
stack
page read and write
20BA15A6000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
28F87892000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
20BA963E000
trusted library allocation
page read and write
20BA9599000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984EC000
heap
page read and write
20BA3298000
trusted library allocation
page read and write
20BA96FB000
trusted library allocation
page read and write
20B9D513000
trusted library allocation
page read and write
20BA9643000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9493000
trusted library allocation
page read and write
20BAB121000
trusted library allocation
page read and write
20BA1300000
heap
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20B984C5000
heap
page read and write
20BA962B000
trusted library allocation
page read and write
20BAB867000
trusted library allocation
page read and write
20BAB58A000
trusted library allocation
page read and write
20BA0F6E000
trusted library allocation
page read and write
20BA9465000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
5314000
direct allocation
page execute and read and write
20B984A7000
heap
page read and write
20BA1544000
trusted library allocation
page read and write
20BAB8E5000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E0000
heap
page read and write
20BB10B0000
trusted library allocation
page read and write
20BAB882000
trusted library allocation
page read and write
20B9E7F4000
trusted library allocation
page read and write
1692B000000
trusted library allocation
page read and write
20BA96E1000
trusted library allocation
page read and write
35FF94E000
unkown
page readonly
20BAAB00000
trusted library allocation
page read and write
20BA95DA000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
20BA3DFE000
trusted library allocation
page read and write
20BA964A000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA3A7A000
trusted library allocation
page read and write
20BA9585000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
27CDC479000
heap
page read and write
20B984DE000
heap
page read and write
20B984C7000
heap
page read and write
20B984C0000
heap
page read and write
20B984CE000
heap
page read and write
54C1000
heap
page read and write
20BA3AF0000
trusted library allocation
page read and write
20BA1AFA000
trusted library allocation
page read and write
20BAAB47000
trusted library allocation
page read and write
20BA9643000
trusted library allocation
page read and write
1AA84971E000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BADF00000
trusted library allocation
page read and write
20BAE22E000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
20BA965F000
trusted library allocation
page read and write
12C8F25F000
heap
page read and write
20BA2E09000
trusted library allocation
page read and write
20BAA0EC000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20B9FDC7000
trusted library allocation
page read and write
20BB10DB000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20BAAF1B000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA2E09000
trusted library allocation
page read and write
20BAABFE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA2EC9000
trusted library allocation
page read and write
20BB1133000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BA32F6000
trusted library allocation
page read and write
20BA950B000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA1DC9000
trusted library allocation
page read and write
20BB2478000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BAB6F0000
trusted library allocation
page read and write
20BA95D5000
trusted library allocation
page read and write
20BA156C000
trusted library allocation
page read and write
20B9E6BC000
trusted library allocation
page read and write
20BA4068000
trusted library allocation
page read and write
2068000
heap
page read and write
20B984F0000
heap
page read and write
20B984C7000
heap
page read and write
20B98501000
heap
page read and write
20B984B3000
heap
page read and write
20BA17FB000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9851C000
heap
page read and write
20BA157D000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984C2000
heap
page read and write
20B984DE000
heap
page read and write
20BA3DE2000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984D1000
heap
page read and write
20B984CE000
heap
page read and write
20B984C2000
heap
page read and write
20BAAF53000
trusted library allocation
page read and write
1130BFE000
stack
page read and write
20B984CB000
heap
page read and write
54C1000
heap
page read and write
20BA9643000
trusted library allocation
page read and write
12C8F2F1000
heap
page read and write
20BA9573000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20B984C4000
heap
page read and write
20BAB340000
trusted library allocation
page read and write
20BAB4A7000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BAAF2B000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA17C8000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA9416000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20B984CD000
heap
page read and write
20BA96F7000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20B984F4000
heap
page read and write
20B984D7000
heap
page read and write
20BA1D65000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20BA9688000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20B984E0000
heap
page read and write
20B984C6000
heap
page read and write
54C1000
heap
page read and write
20BA9585000
trusted library allocation
page read and write
20BA966A000
trusted library allocation
page read and write
20BB11E2000
trusted library allocation
page read and write
20BB11FD000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B9E79D000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA96EB000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BAB1F8000
trusted library allocation
page read and write
20BA1A6F000
trusted library allocation
page read and write
20BAB452000
trusted library allocation
page read and write
20BA2EC9000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA32F7000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA3DDC000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
20B9E7C7000
trusted library allocation
page read and write
2347000
heap
page read and write
6EC000
unkown
page execute and read and write
20BAAB17000
trusted library allocation
page read and write
20BB19E7000
trusted library allocation
page read and write
12C8E1E0000
unclassified section
page readonly
20B984CD000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA96AC000
trusted library allocation
page read and write
20BB11C5000
trusted library allocation
page read and write
20BA15F7000
trusted library allocation
page read and write
20BAAF73000
trusted library allocation
page read and write
20BB10B6000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAAB9F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20BB1998000
trusted library allocation
page read and write
28F87620000
heap
page read and write
20BB11ED000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
C30557E000
unkown
page readonly
28F87918000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA96F3000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA1DCF000
trusted library allocation
page read and write
20BA17F9000
trusted library allocation
page read and write
20B984C5000
heap
page read and write
20BA1D6D000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA1D4B000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20B984F5000
heap
page read and write
20BA95B6000
trusted library allocation
page read and write
2E3FD07E000
trusted library allocation
page execute read
20B984C7000
heap
page read and write
20B984B0000
heap
page read and write
20BA4A7F000
trusted library allocation
page read and write
20BA96CF000
trusted library allocation
page read and write
20BA9599000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984E1000
heap
page read and write
20BA2EBD000
trusted library allocation
page read and write
20BAABF0000
trusted library allocation
page read and write
20BA95BA000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B9853C000
heap
page read and write
20B9853C000
heap
page read and write
20BA3314000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA3F70000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA15F2000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BAA63F000
trusted library allocation
page read and write
25C5AF00000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BB11ED000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA15A3000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
20BA1DC6000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20B9FDF0000
trusted library allocation
page read and write
20BA1A1E000
trusted library allocation
page read and write
20BA3DA2000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20B984C7000
heap
page read and write
20B9E4FE000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BAA0C7000
trusted library allocation
page read and write
20BA96EE000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BAB1FB000
trusted library allocation
page read and write
54C1000
heap
page read and write
28F87900000
trusted library allocation
page read and write
25C5B100000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20BAA60D000
trusted library allocation
page read and write
25C5C9B7000
heap
page read and write
1C74000
heap
page read and write
20B984DE000
heap
page read and write
20BA956C000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20BA0FD6000
trusted library allocation
page read and write
20BA3E54000
trusted library allocation
page read and write
20BA9468000
trusted library allocation
page read and write
20BA0F8A000
trusted library allocation
page read and write
20BA9688000
trusted library allocation
page read and write
20BA946F000
trusted library allocation
page read and write
20BAB5B0000
trusted library allocation
page read and write
20BAAF1B000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA968E000
trusted library allocation
page read and write
20BB198F000
trusted library allocation
page read and write
20BA3326000
trusted library allocation
page read and write
20B9ED9C000
trusted library allocation
page read and write
20B9E6A1000
trusted library allocation
page read and write
756000
unkown
page execute and read and write
20BADF7C000
trusted library allocation
page read and write
20BA3E5C000
trusted library allocation
page read and write
20BA33D7000
trusted library allocation
page read and write
20BAE428000
trusted library allocation
page read and write
20BAE434000
trusted library allocation
page read and write
20BAA676000
trusted library allocation
page read and write
20B9E742000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA2697000
trusted library allocation
page read and write
20B9FD63000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA3DA6000
trusted library allocation
page read and write
20BA2E95000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984FC000
heap
page read and write
20B984D1000
heap
page read and write
20BAA623000
trusted library allocation
page read and write
20BA2EA5000
trusted library allocation
page read and write
20BA9688000
trusted library allocation
page read and write
20BAB686000
trusted library allocation
page read and write
20BB2622000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA32F2000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB1BC000
trusted library allocation
page read and write
20BAA63D000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20B984F0000
heap
page read and write
20B984BB000
heap
page read and write
20B98501000
heap
page read and write
20BB260F000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B9E7F1000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20BA9599000
trusted library allocation
page read and write
20BA955F000
trusted library allocation
page read and write
20B984CA000
heap
page read and write
20BAE20F000
trusted library allocation
page read and write
20BA4ADE000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA4AF1000
trusted library allocation
page read and write
20BA32BE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA159B000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA1D3C000
trusted library allocation
page read and write
20BA159B000
trusted library allocation
page read and write
20BB195C000
trusted library allocation
page read and write
20BA28FE000
trusted library allocation
page read and write
20BAE4BA000
trusted library allocation
page read and write
20B9851D000
heap
page read and write
20BAA63D000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA95DE000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984E8000
heap
page read and write
20B9851C000
heap
page read and write
20B984FC000
heap
page read and write
20B984E1000
heap
page read and write
1E28000
heap
page read and write
20BA1A5F000
trusted library allocation
page read and write
20B9E7FE000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAB89B000
trusted library allocation
page read and write
20B9E7EB000
trusted library allocation
page read and write
20BAAB92000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAB191000
trusted library allocation
page read and write
20BA3F73000
trusted library allocation
page read and write
20B984E4000
heap
page read and write
12C8F2E8000
heap
page read and write
20BA1AC0000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BA95B1000
trusted library allocation
page read and write
20BB10A3000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20BA963D000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984F1000
heap
page read and write
20BAB46D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20B984D6000
heap
page read and write
20BAA680000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
54C1000
heap
page read and write
20BAB5EB000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
20BB100D000
trusted library allocation
page read and write
20F8000
heap
page read and write
20B984E6000
heap
page read and write
20BB11AA000
trusted library allocation
page read and write
20BA96CF000
trusted library allocation
page read and write
20BB11E4000
trusted library allocation
page read and write
20BA95FB000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA947E000
trusted library allocation
page read and write
20B9E7C7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96CD000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95D9000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BAB4C8000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAAB64000
trusted library allocation
page read and write
20BA33C3000
trusted library allocation
page read and write
20B9ED72000
trusted library allocation
page read and write
20BAB3D6000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984C1000
heap
page read and write
28F8767F000
unclassified section
page read and write
20BA965F000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA96EB000
trusted library allocation
page read and write
20BB1732000
trusted library allocation
page read and write
20BA2EB1000
trusted library allocation
page read and write
20BA2EEC000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B9851C000
heap
page read and write
20B984DE000
heap
page read and write
20BA0F73000
trusted library allocation
page read and write
20BA15DE000
trusted library allocation
page read and write
20B984CE000
heap
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20B9851C000
heap
page read and write
20BAAB20000
trusted library allocation
page read and write
20BB11F9000
trusted library allocation
page read and write
20BA0F62000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984F7000
heap
page read and write
54C1000
heap
page read and write
20B984DA000
heap
page read and write
20BA95FB000
trusted library allocation
page read and write
20BAE5D3000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9EDB3000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BB11F9000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
54C1000
heap
page read and write
20BA95DA000
trusted library allocation
page read and write
20B98501000
heap
page read and write
1692AD7B000
trusted library allocation
page read and write
20BA2E2C000
trusted library allocation
page read and write
20BA2EFA000
trusted library allocation
page read and write
20B984EA000
heap
page read and write
54C1000
heap
page read and write
112FBD8000
stack
page read and write
6A2E000
stack
page read and write
20BB10BF000
trusted library allocation
page read and write
20BA3D58000
trusted library allocation
page read and write
20BAB894000
trusted library allocation
page read and write
20BA95F5000
trusted library allocation
page read and write
20BAABDA000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
20BA33B4000
trusted library allocation
page read and write
20BAB467000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA2ECF000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BA2E74000
trusted library allocation
page read and write
20B9E469000
trusted library allocation
page read and write
1692AC12000
unclassified section
page read and write
20BA1A5E000
trusted library allocation
page read and write
531C000
direct allocation
page execute and read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984CC000
heap
page read and write
2126000
heap
page read and write
20BA2EB1000
trusted library allocation
page read and write
20BA9416000
trusted library allocation
page read and write
20BA959A000
trusted library allocation
page read and write
20BA1AD2000
trusted library allocation
page read and write
20BAAF21000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B984E7000
heap
page read and write
20B9E446000
trusted library allocation
page read and write
20BAE2DE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984F6000
heap
page read and write
20BAA0CB000
trusted library allocation
page read and write
20B9851D000
heap
page read and write
54C1000
heap
page read and write
20BAB57C000
trusted library allocation
page read and write
20B984DD000
heap
page read and write
20BAB1CD000
trusted library allocation
page read and write
20BA32E0000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA96FB000
trusted library allocation
page read and write
20BA96D4000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAB86D000
trusted library allocation
page read and write
25C5B0F0000
heap
page read and write
20BA32E0000
trusted library allocation
page read and write
12C8E666000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1D7C000
trusted library allocation
page read and write
20BA1AD5000
trusted library allocation
page read and write
20BB112F000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA15A6000
trusted library allocation
page read and write
20BA9663000
trusted library allocation
page read and write
20BA9663000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984BA000
heap
page read and write
11323FE000
unkown
page readonly
C3054FE000
unkown
page readonly
20B984FC000
heap
page read and write
20BAAF2B000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA1A3B000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
20B984E4000
heap
page read and write
20BAB469000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984FC000
heap
page read and write
20BA96E5000
trusted library allocation
page read and write
20BA0FA9000
trusted library allocation
page read and write
20BA9D63000
trusted library allocation
page read and write
1692AD8F000
trusted library allocation
page read and write
2E3FD156000
trusted library allocation
page execute read
20B984F0000
heap
page read and write
20BB0D12000
trusted library allocation
page read and write
20BAAB7A000
trusted library allocation
page read and write
20B9E7F6000
trusted library allocation
page read and write
1C74000
heap
page read and write
5329000
direct allocation
page execute and read and write
20BAB4AB000
trusted library allocation
page read and write
20BA1AA8000
trusted library allocation
page read and write
20BA2EF5000
trusted library allocation
page read and write
20BAB0CD000
trusted library allocation
page read and write
27CDC70A000
trusted library allocation
page read and write
12C8F260000
heap
page read and write
20BAB886000
trusted library allocation
page read and write
20BA9495000
trusted library allocation
page read and write
20BA17CD000
trusted library allocation
page read and write
20BA280B000
trusted library allocation
page read and write
20BAE585000
trusted library allocation
page read and write
20BA2E0B000
trusted library allocation
page read and write
12C8F25C000
heap
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20B984CD000
heap
page read and write
20BB18BA000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
1692AC66000
heap
page read and write
54C1000
heap
page read and write
20BA96E0000
trusted library allocation
page read and write
20BAE3DE000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20B984E1000
heap
page read and write
20BA9664000
trusted library allocation
page read and write
1C74000
heap
page read and write
20B9851D000
heap
page read and write
20B984C6000
heap
page read and write
20BAE2AB000
trusted library allocation
page read and write
20BA15B3000
trusted library allocation
page read and write
20BAE5F0000
trusted library allocation
page read and write
20BA96A4000
trusted library allocation
page read and write
20BAB1F5000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA94DB000
trusted library allocation
page read and write
20BA2E7C000
trusted library allocation
page read and write
20B9D423000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20B984E8000
heap
page read and write
20B984DE000
heap
page read and write
20B984A8000
heap
page read and write
20BA20A7000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20BA9416000
trusted library allocation
page read and write
12C8F2ED000
heap
page read and write
20BA946F000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
54C1000
heap
page read and write
20BA95CF000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2E95000
trusted library allocation
page read and write
20BA95BA000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
12C8F358000
heap
page read and write
12C8F2ED000
heap
page read and write
20BA963D000
trusted library allocation
page read and write
20BA96A7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9853C000
heap
page read and write
20B984FC000
heap
page read and write
20BAAB54000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA96FE000
trusted library allocation
page read and write
20BA947E000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20BA94DD000
trusted library allocation
page read and write
20B9E6A3000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BB10C7000
trusted library allocation
page read and write
20BAAB65000
trusted library allocation
page read and write
20BAE585000
trusted library allocation
page read and write
20BA9E30000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BAA098000
trusted library allocation
page read and write
20B9EDB3000
trusted library allocation
page read and write
20BA96A4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1759000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB181000
trusted library allocation
page read and write
20BAA0EC000
trusted library allocation
page read and write
1C74000
heap
page read and write
20B9E4DB000
trusted library allocation
page read and write
20BA940B000
trusted library allocation
page read and write
20BA95E7000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984DE000
heap
page read and write
20BAB45E000
trusted library allocation
page read and write
20BA159E000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
621000
unkown
page execute and read and write
20B98501000
heap
page read and write
20BAAD00000
trusted library allocation
page read and write
20BAB8F9000
trusted library allocation
page read and write
20BA9674000
trusted library allocation
page read and write
20BA1AAC000
trusted library allocation
page read and write
20BA9588000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA9E1F000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
12C8F32B000
heap
page read and write
20B984F5000
heap
page read and write
20BA325E000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BA9693000
trusted library allocation
page read and write
20BA96F2000
trusted library allocation
page read and write
20BA9688000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20B984DB000
heap
page read and write
20B9851C000
heap
page read and write
20BAB81F000
trusted library allocation
page read and write
20B9E7BE000
trusted library allocation
page read and write
12C8E564000
heap
page read and write
20B984FC000
heap
page read and write
54C1000
heap
page read and write
20B984F0000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
20BA408F000
trusted library allocation
page read and write
20BB11F3000
trusted library allocation
page read and write
25D7000
heap
page read and write
20B9851C000
heap
page read and write
20B984C2000
heap
page read and write
20BA96DE000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
20BA1A22000
trusted library allocation
page read and write
20B9E74E000
trusted library allocation
page read and write
20BAE2A0000
trusted library allocation
page read and write
20BAE208000
trusted library allocation
page read and write
20BA1D74000
trusted library allocation
page read and write
1692AC70000
unclassified section
page readonly
20BADF5D000
trusted library allocation
page read and write
20BA17FE000
trusted library allocation
page read and write
20BA32D1000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA98B5000
trusted library allocation
page read and write
20BAE46C000
trusted library allocation
page read and write
20BA1AA8000
trusted library allocation
page read and write
20BA9585000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
260B000
heap
page read and write
20BA15A3000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA17E8000
trusted library allocation
page read and write
12C8E669000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BAA678000
trusted library allocation
page read and write
20BAB1E2000
trusted library allocation
page read and write
20BA1597000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20B9D526000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9650000
trusted library allocation
page read and write
20BA0FD6000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20B984FC000
heap
page read and write
20BA0F54000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984B3000
heap
page read and write
20BA9651000
trusted library allocation
page read and write
20BA0F93000
trusted library allocation
page read and write
20BAA05B000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984C0000
heap
page read and write
5304000
direct allocation
page execute and read and write
20BA95A0000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20BB11F3000
trusted library allocation
page read and write
20BA3DCE000
trusted library allocation
page read and write
20BAB373000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BA142C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB894000
trusted library allocation
page read and write
20B98501000
heap
page read and write
1BEF000
stack
page read and write
20B984F0000
heap
page read and write
20BA96FB000
trusted library allocation
page read and write
12C8F260000
heap
page read and write
20BB2675000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA159D000
trusted library allocation
page read and write
12C8F2F1000
heap
page read and write
20B984C6000
heap
page read and write
20BA3A25000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
217B000
heap
page read and write
20BAE230000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
20B9E439000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984DB000
heap
page read and write
20BAABDE000
trusted library allocation
page read and write
20BA3D7F000
trusted library allocation
page read and write
54C0000
heap
page read and write
20B984F4000
heap
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
20B9851C000
heap
page read and write
20BAAB4E000
trusted library allocation
page read and write
20B984F2000
heap
page read and write
20B984BA000
heap
page read and write
20BA947A000
trusted library allocation
page read and write
20BA2EFA000
trusted library allocation
page read and write
20BA3F73000
trusted library allocation
page read and write
12C8E65F000
trusted library allocation
page read and write
54C1000
heap
page read and write
12C8F358000
heap
page read and write
22CC000
heap
page read and write
20BB2504000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1595000
trusted library allocation
page read and write
20BA9482000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA33CD000
trusted library allocation
page read and write
20B984C8000
heap
page read and write
20BB1754000
heap
page read and write
20B984CB000
heap
page read and write
20BAA0EC000
trusted library allocation
page read and write
20BAA63B000
trusted library allocation
page read and write
20BB11E7000
trusted library allocation
page read and write
20BAAF68000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA949B000
trusted library allocation
page read and write
20B9EDDA000
trusted library allocation
page read and write
20BAE475000
trusted library allocation
page read and write
20BAB6FE000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA1498000
trusted library allocation
page read and write
20BA9588000
trusted library allocation
page read and write
20B9853E000
heap
page read and write
20B984D6000
heap
page read and write
203B000
heap
page read and write
20BA39ED000
trusted library allocation
page read and write
20B9E73E000
trusted library allocation
page read and write
20BB1A01000
trusted library allocation
page read and write
20B9FDFB000
trusted library allocation
page read and write
20BAB00B000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20BAAB70000
trusted library allocation
page read and write
20BAB46F000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
1692AC1F000
unclassified section
page read and write
12C8F377000
heap
page read and write
20BA96F9000
trusted library allocation
page read and write
20BA9683000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA281D000
trusted library allocation
page read and write
20BAA0A2000
trusted library allocation
page read and write
20BA17C9000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB8F3000
trusted library allocation
page read and write
12C8EB82000
heap
page read and write
20B984F0000
heap
page read and write
54C1000
heap
page read and write
20B9E6D0000
trusted library allocation
page read and write
20BAE2FE000
trusted library allocation
page read and write
C3065FE000
unkown
page readonly
20BAAF2B000
trusted library allocation
page read and write
20BA968E000
trusted library allocation
page read and write
208B000
heap
page read and write
20BB17B5000
heap
page read and write
20B984DE000
heap
page read and write
20BA3305000
trusted library allocation
page read and write
20BA1A99000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB10BC000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BA1498000
trusted library allocation
page read and write
1692AD66000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9FD57000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984E4000
heap
page read and write
20BA949F000
trusted library allocation
page read and write
20BA1A99000
trusted library allocation
page read and write
20BAA67B000
trusted library allocation
page read and write
20BAB0FA000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA3DFE000
trusted library allocation
page read and write
20BA3A74000
trusted library allocation
page read and write
20BA963E000
trusted library allocation
page read and write
20BA2EE4000
trusted library allocation
page read and write
20BB2583000
trusted library allocation
page read and write
20BAAB9F000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
C3055BE000
stack
page read and write
20BA15D1000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BA2E6F000
trusted library allocation
page read and write
12C8F36A000
heap
page read and write
6A98000
heap
page read and write
54C1000
heap
page read and write
28F876B6000
heap
page read and write
20BAB575000
trusted library allocation
page read and write
20BA0F4D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D6000
heap
page read and write
20BA964C000
trusted library allocation
page read and write
20BA957A000
trusted library allocation
page read and write
20BA9634000
trusted library allocation
page read and write
20BA3D4B000
trusted library allocation
page read and write
20BAE4DE000
trusted library allocation
page read and write
20BAA68E000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
12C8F2E8000
heap
page read and write
112F12E000
unkown
page readonly
20B9CE9E000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
20BA1482000
trusted library allocation
page read and write
20B984C9000
heap
page read and write
20B9E492000
trusted library allocation
page read and write
20BA1D2B000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA946F000
trusted library allocation
page read and write
20BAAF53000
trusted library allocation
page read and write
20B9E7F6000
trusted library allocation
page read and write
20BA9663000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C2000
heap
page read and write
20BA15E6000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20BA145F000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BA96CD000
trusted library allocation
page read and write
20BB11ED000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAB476000
trusted library allocation
page read and write
6E2000
unkown
page execute and read and write
20B984BA000
heap
page read and write
20B984FC000
heap
page read and write
20BB1194000
trusted library allocation
page read and write
20BAAEE6000
trusted library allocation
page read and write
20BB11E7000
trusted library allocation
page read and write
20BA17EE000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAAB32000
trusted library allocation
page read and write
20BAA64D000
trusted library allocation
page read and write
54C1000
heap
page read and write
4F60000
heap
page read and write
20BA1A17000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984E0000
heap
page read and write
12C8F269000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95A9000
trusted library allocation
page read and write
20BAB86D000
trusted library allocation
page read and write
20BA95E4000
trusted library allocation
page read and write
20BA0F50000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20BA3DA4000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B984E7000
heap
page read and write
20B98501000
heap
page read and write
20B984B0000
heap
page read and write
20BAA657000
trusted library allocation
page read and write
20BA40F5000
trusted library allocation
page read and write
20B9E469000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA15A4000
trusted library allocation
page read and write
20BAA0F7000
trusted library allocation
page read and write
20BA1772000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95B3000
trusted library allocation
page read and write
20BA0F68000
trusted library allocation
page read and write
20BAB860000
trusted library allocation
page read and write
20BA0F1D000
trusted library allocation
page read and write
20BA9476000
trusted library allocation
page read and write
12C8E5D0000
unkown
page execute read
20BA94E8000
trusted library allocation
page read and write
20BAA685000
trusted library allocation
page read and write
20BA9475000
trusted library allocation
page read and write
20BA4AED000
trusted library allocation
page read and write
20BA2E95000
trusted library allocation
page read and write
20BB1959000
trusted library allocation
page read and write
20BA3257000
trusted library allocation
page read and write
20BAE451000
trusted library allocation
page read and write
20B9E4FB000
trusted library allocation
page read and write
2E3FD120000
trusted library allocation
page execute read
20BAB132000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
12C8F358000
heap
page read and write
20BA50FE000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20B984DB000
heap
page read and write
20BB179C000
heap
page read and write
20BA9688000
trusted library allocation
page read and write
28F87680000
heap
page read and write
20BA1D6D000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20B984B7000
heap
page read and write
20BA2EBD000
trusted library allocation
page read and write
20B9E7AA000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BAA680000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
20BA157D000
trusted library allocation
page read and write
12C8F25F000
heap
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
20B984B3000
heap
page read and write
20B9E7C1000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BAA644000
trusted library allocation
page read and write
20BAA638000
trusted library allocation
page read and write
20BAB1B2000
trusted library allocation
page read and write
20BA95CA000
trusted library allocation
page read and write
20B9E6D0000
trusted library allocation
page read and write
20BA95AE000
trusted library allocation
page read and write
20BA96F7000
trusted library allocation
page read and write
20BA28EF000
trusted library allocation
page read and write
1692AD19000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAB4FC000
trusted library allocation
page read and write
20BB10A3000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BA3E46000
trusted library allocation
page read and write
12C8F28A000
heap
page read and write
20BAE475000
trusted library allocation
page read and write
20BAB863000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B984C7000
heap
page read and write
1C74000
heap
page read and write
20BAAB64000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984BE000
heap
page read and write
20BA2EC7000
trusted library allocation
page read and write
20BB11E9000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20BA9583000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
12C8F32B000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BAAF68000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
54C1000
heap
page read and write
20B984D5000
heap
page read and write
20B984E7000
heap
page read and write
20BAAB7A000
trusted library allocation
page read and write
20BAAF12000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE28B000
trusted library allocation
page read and write
20BAE230000
trusted library allocation
page read and write
20BAAB47000
trusted library allocation
page read and write
20B9E7FE000
trusted library allocation
page read and write
20BA0F97000
trusted library allocation
page read and write
20BB11E2000
trusted library allocation
page read and write
20BB19F9000
trusted library allocation
page read and write
27CDC870000
heap
page read and write
20BAE1DB000
trusted library allocation
page read and write
20BAA62B000
trusted library allocation
page read and write
20BA95FE000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA94E8000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B9853C000
heap
page read and write
20BA96C4000
trusted library allocation
page read and write
20BA965C000
trusted library allocation
page read and write
20BA9DF2000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB10A7000
trusted library allocation
page read and write
5329000
direct allocation
page execute and read and write
20BA943C000
trusted library allocation
page read and write
20BAB0FA000
trusted library allocation
page read and write
12C8E5C0000
trusted library allocation
page read and write
20BA947E000
trusted library allocation
page read and write
20BA9E28000
trusted library allocation
page read and write
20BB17AD000
heap
page read and write
1C74000
heap
page read and write
20BA2EF0000
trusted library allocation
page read and write
20B9E6A3000
trusted library allocation
page read and write
20BAB8C8000
trusted library allocation
page read and write
25C5AE43000
heap
page read and write
20BA0F8A000
trusted library allocation
page read and write
20BAE4E6000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA9493000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1573000
trusted library allocation
page read and write
20BB11C5000
trusted library allocation
page read and write
20B9E73E000
trusted library allocation
page read and write
20BA40D0000
trusted library allocation
page read and write
20BAA6F8000
trusted library allocation
page read and write
20BA15EE000
trusted library allocation
page read and write
54C1000
heap
page read and write
ED3EFFF000
stack
page read and write
20BB0D00000
trusted library allocation
page read and write
20BA33BA000
trusted library allocation
page read and write
20BA9681000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA1A15000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
258D000
heap
page read and write
20BA2E45000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
54C1000
heap
page read and write
20BA3AAB000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BB10D3000
trusted library allocation
page read and write
20BA37C9000
trusted library allocation
page read and write
12C8F24D000
heap
page read and write
20BB0D7C000
trusted library allocation
page read and write
20BA3DFA000
trusted library allocation
page read and write
20BA32B6000
trusted library allocation
page read and write
20BA3DA4000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984D0000
heap
page read and write
20B9851C000
heap
page read and write
20BA96A4000
trusted library allocation
page read and write
20BAA6D9000
trusted library allocation
page read and write
20BB1723000
trusted library allocation
page read and write
20BA95F5000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAB8B1000
trusted library allocation
page read and write
20BA0F57000
trusted library allocation
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
20BAE46C000
trusted library allocation
page read and write
20BA3DA0000
trusted library allocation
page read and write
28F878B7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C0000
heap
page read and write
20BA1D68000
trusted library allocation
page read and write
20B984D3000
heap
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20BAB46F000
trusted library allocation
page read and write
1692AC20000
heap
page read and write
20BA33DF000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20B9853C000
heap
page read and write
20BA32F2000
trusted library allocation
page read and write
12C8F377000
heap
page read and write
20BAB626000
trusted library allocation
page read and write
12C8E674000
trusted library allocation
page read and write
620000
unkown
page readonly
20B984C7000
heap
page read and write
20BA3DFC000
trusted library allocation
page read and write
20B984F7000
heap
page read and write
1692AD69000
trusted library allocation
page read and write
20BA32C6000
trusted library allocation
page read and write
20BAE2DA000
trusted library allocation
page read and write
20BA96EB000
trusted library allocation
page read and write
20BAB62C000
trusted library allocation
page read and write
20BA1AA1000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
12C8F344000
heap
page read and write
20B984C7000
heap
page read and write
20B984D4000
heap
page read and write
20B984F7000
heap
page read and write
20BA96AE000
trusted library allocation
page read and write
20BA1A3B000
trusted library allocation
page read and write
20B984F3000
heap
page read and write
54C1000
heap
page read and write
20B984B0000
heap
page read and write
20BA96C4000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B984F0000
heap
page read and write
5310000
direct allocation
page execute and read and write
20BA9681000
trusted library allocation
page read and write
20BA96F7000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20BA4065000
trusted library allocation
page read and write
20BAB47D000
trusted library allocation
page read and write
20BA3DF4000
trusted library allocation
page read and write
20BAE227000
trusted library allocation
page read and write
20BAAB20000
trusted library allocation
page read and write
27CDC600000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20B984E7000
heap
page read and write
20B984D5000
heap
page read and write
20B984D5000
heap
page read and write
54C1000
heap
page read and write
25C5AE34000
heap
page read and write
20BAAB70000
trusted library allocation
page read and write
20BA1595000
trusted library allocation
page read and write
20BA96CF000
trusted library allocation
page read and write
28F87490000
unclassified section
page readonly
20B9EDDE000
trusted library allocation
page read and write
20BA96CF000
trusted library allocation
page read and write
20BA9683000
trusted library allocation
page read and write
20BA956F000
trusted library allocation
page read and write
20BA2EA8000
trusted library allocation
page read and write
20BAE257000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984E6000
heap
page read and write
20BAE224000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
20BA957C000
trusted library allocation
page read and write
28F8791A000
trusted library allocation
page read and write
4E70000
heap
page read and write
54C1000
heap
page read and write
20B984C0000
heap
page read and write
20B9853C000
heap
page read and write
20BA3DE2000
trusted library allocation
page read and write
20B9E7BC000
trusted library allocation
page read and write
4E73000
heap
page read and write
20B984DE000
heap
page read and write
20B984D4000
heap
page read and write
20B98501000
heap
page read and write
20B984E3000
heap
page read and write
5260000
heap
page read and write
54C1000
heap
page read and write
20B984C6000
heap
page read and write
20B9D5E4000
trusted library allocation
page read and write
20B9E4FB000
trusted library allocation
page read and write
20BAAB3D000
trusted library allocation
page read and write
20BAB863000
trusted library allocation
page read and write
20BB0D28000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B9853C000
heap
page read and write
20BAB8DD000
trusted library allocation
page read and write
28F8748D000
remote allocation
page execute read
20B9E45D000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20B984E8000
heap
page read and write
20BA15E6000
trusted library allocation
page read and write
20BB11A6000
trusted library allocation
page read and write
20BA4A78000
trusted library allocation
page read and write
20B984F9000
heap
page read and write
20BA3D48000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20B9CEB3000
trusted library allocation
page read and write
20BA1AC0000
trusted library allocation
page read and write
20BA2EC9000
trusted library allocation
page read and write
20BA32D4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D6000
heap
page read and write
20BA3D5B000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BA32F4000
trusted library allocation
page read and write
54C1000
heap
page read and write
6A30000
heap
page read and write
20B9E657000
trusted library allocation
page read and write
20BAA0E4000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
20BA944A000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA96F9000
trusted library allocation
page read and write
20BA50EE000
trusted library allocation
page read and write
20B984CA000
heap
page read and write
20B984C5000
heap
page read and write
20BA3D61000
trusted library allocation
page read and write
28F87897000
trusted library allocation
page read and write
20BA9439000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE477000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BA96F7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE3C9000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
1C74000
heap
page read and write
54C1000
heap
page read and write
20BAAF3C000
trusted library allocation
page read and write
20B984BD000
heap
page read and write
20B984D4000
heap
page read and write
20B984C0000
heap
page read and write
20BA32B6000
trusted library allocation
page read and write
20BA0F51000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BA965F000
trusted library allocation
page read and write
20BA1556000
trusted library allocation
page read and write
1692A9E0000
heap
page read and write
20BA2E45000
trusted library allocation
page read and write
20BA3AEE000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
20BAA08A000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20BAB0FA000
trusted library allocation
page read and write
20BAB588000
trusted library allocation
page read and write
20BA32D1000
trusted library allocation
page read and write
1692AD24000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA96F2000
trusted library allocation
page read and write
20BAB3E7000
trusted library allocation
page read and write
20B984BE000
heap
page read and write
20BAABB2000
trusted library allocation
page read and write
20BB1966000
trusted library allocation
page read and write
20BA96D4000
trusted library allocation
page read and write
20BAA680000
trusted library allocation
page read and write
20BAE241000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
54C1000
heap
page read and write
20B984EC000
heap
page read and write
20BADF28000
trusted library allocation
page read and write
20BA95DE000
trusted library allocation
page read and write
20BAB686000
trusted library allocation
page read and write
12C8ED00000
heap
page read and write
20B984DE000
heap
page read and write
20B984D2000
heap
page read and write
20B984C7000
heap
page read and write
20B984E7000
heap
page read and write
20B9EDA0000
trusted library allocation
page read and write
622E000
stack
page read and write
20B984C7000
heap
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
112F0AE000
unkown
page readonly
20BA965A000
trusted library allocation
page read and write
20BA95A3000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB082000
trusted library allocation
page read and write
20BAE4E2000
trusted library allocation
page read and write
20BA96F9000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BB10C0000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BB19B4000
trusted library allocation
page read and write
20BA33F3000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20B984F5000
heap
page read and write
20BA1AF7000
trusted library allocation
page read and write
12C8F2FC000
heap
page read and write
20BA1A79000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA33E6000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
12C8F2FC000
heap
page read and write
20BA1560000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
54C1000
heap
page read and write
20BA1345000
heap
page read and write
20B9851D000
heap
page read and write
20BA2C02000
trusted library allocation
page read and write
20BB10EF000
trusted library allocation
page read and write
20B9851D000
heap
page read and write
20B9851C000
heap
page read and write
2401000
heap
page read and write
20BA9423000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BAA627000
trusted library allocation
page read and write
20BAA40C000
trusted library allocation
page read and write
20BAE255000
trusted library allocation
page read and write
20BAB0CD000
trusted library allocation
page read and write
1692AD62000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984E1000
heap
page read and write
6AC7000
heap
page read and write
20BAB4FC000
trusted library allocation
page read and write
20BA96A7000
trusted library allocation
page read and write
20BAB4CA000
trusted library allocation
page read and write
54C1000
heap
page read and write
12C8F32B000
heap
page read and write
20BA9432000
trusted library allocation
page read and write
20B9E7EB000
trusted library allocation
page read and write
5314000
direct allocation
page execute and read and write
20BAAF45000
trusted library allocation
page read and write
20BA4096000
trusted library allocation
page read and write
20BB10C4000
trusted library allocation
page read and write
20B9D5E4000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA15DB000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1498000
trusted library allocation
page read and write
20BA1481000
trusted library allocation
page read and write
20BA40CE000
trusted library allocation
page read and write
20BAABDE000
trusted library allocation
page read and write
20BA2EF0000
trusted library allocation
page read and write
20BAAF21000
trusted library allocation
page read and write
20BAB0EF000
trusted library allocation
page read and write
259F000
heap
page read and write
20BAE44C000
trusted library allocation
page read and write
20BA2EE4000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20BAAF45000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984DE000
heap
page read and write
25C5C9BE000
heap
page read and write
20B984E1000
heap
page read and write
20BAB8E3000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B984C1000
heap
page read and write
20BA96BF000
trusted library allocation
page read and write
20BB190A000
trusted library allocation
page read and write
12C8F2FC000
heap
page read and write
20BA948B000
trusted library allocation
page read and write
12C8F2E0000
heap
page read and write
20BAAB70000
trusted library allocation
page read and write
20BA1D74000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2C05000
trusted library allocation
page read and write
20B9E6C2000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
20B9FDF8000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
54C1000
heap
page read and write
20B9851C000
heap
page read and write
20B984FC000
heap
page read and write
20B984C0000
heap
page read and write
20BA2E9C000
trusted library allocation
page read and write
20BAB5D3000
trusted library allocation
page read and write
28F87881000
trusted library allocation
page read and write
28F8787B000
trusted library allocation
page read and write
20BA15B5000
trusted library allocation
page read and write
20BA3A87000
trusted library allocation
page read and write
20BB194D000
trusted library allocation
page read and write
12C8E240000
remote allocation
page execute read
20BA40BA000
trusted library allocation
page read and write
12C8F2ED000
heap
page read and write
5314000
direct allocation
page execute and read and write
54C1000
heap
page read and write
20B9ED62000
trusted library allocation
page read and write
20BA3FA8000
trusted library allocation
page read and write
20BAABF2000
trusted library allocation
page read and write
20BB1095000
trusted library allocation
page read and write
20BA96F9000
trusted library allocation
page read and write
12C8F377000
heap
page read and write
20BA2EC2000
trusted library allocation
page read and write
20BA955F000
trusted library allocation
page read and write
20BA96CD000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C0000
heap
page read and write
20BA32D1000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAB863000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA9674000
trusted library allocation
page read and write
28F87847000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB5B2000
trusted library allocation
page read and write
ED3DFFC000
stack
page read and write
20B984DE000
heap
page read and write
20BAB476000
trusted library allocation
page read and write
5240000
heap
page read and write
20B984C0000
heap
page read and write
20BA3257000
trusted library allocation
page read and write
20BA0F50000
trusted library allocation
page read and write
20BB170B000
heap
page read and write
20B9851C000
heap
page read and write
20BA1A3D000
trusted library allocation
page read and write
20BA15DB000
trusted library allocation
page read and write
20BA1454000
trusted library allocation
page read and write
20BAAB3D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984CE000
heap
page read and write
20B984BC000
heap
page read and write
20BA149F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA2EF9000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20B984D1000
heap
page read and write
20BA948F000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B9E4D5000
trusted library allocation
page read and write
20BB2625000
trusted library allocation
page read and write
74D000
unkown
page readonly
20B9D57D000
trusted library allocation
page read and write
20BA33F6000
trusted library allocation
page read and write
12C8E5E0000
trusted library allocation
page read and write
20BA964E000
trusted library allocation
page read and write
20BA328B000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B9FD69000
trusted library allocation
page read and write
20BAB452000
trusted library allocation
page read and write
20BAAB92000
trusted library allocation
page read and write
12C8F269000
heap
page read and write
20BA9E80000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE1DE000
trusted library allocation
page read and write
20B9FDFB000
trusted library allocation
page read and write
20B984DA000
heap
page read and write
20B984B0000
heap
page read and write
20BAA623000
trusted library allocation
page read and write
25C5C9AD000
heap
page read and write
20BA40D8000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BAB68F000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20B984D0000
heap
page read and write
20BAB095000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
54C1000
heap
page read and write
20B9CE90000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20BAABDA000
trusted library allocation
page read and write
20BA39BD000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA159B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB256A000
trusted library allocation
page read and write
20B984C9000
heap
page read and write
20B984EC000
heap
page read and write
20B9E7DD000
trusted library allocation
page read and write
20BA15D1000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
28F87A10000
heap
page read and write
745000
unkown
page execute and write copy
20BB11DC000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B9851C000
heap
page read and write
20B98501000
heap
page read and write
20B9851C000
heap
page read and write
20B9853C000
heap
page read and write
20BA96FE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984FC000
heap
page read and write
20BA95DA000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
20BB1732000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA3DF6000
trusted library allocation
page read and write
20BA3E6E000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA1597000
trusted library allocation
page read and write
20BAB1F0000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B984FC000
heap
page read and write
20BB0D7C000
trusted library allocation
page read and write
20BAB373000
trusted library allocation
page read and write
20BA40C8000
trusted library allocation
page read and write
621000
unkown
page execute and write copy
20BA9556000
trusted library allocation
page read and write
20BA4AE1000
trusted library allocation
page read and write
20BAE241000
trusted library allocation
page read and write
20BA96BF000
trusted library allocation
page read and write
20BA3AF6000
trusted library allocation
page read and write
20BA95B1000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BA159B000
trusted library allocation
page read and write
20B9E7A6000
trusted library allocation
page read and write
20BAB47D000
trusted library allocation
page read and write
20BAA629000
trusted library allocation
page read and write
20BAAF12000
trusted library allocation
page read and write
20BA28FE000
trusted library allocation
page read and write
20BA1441000
trusted library allocation
page read and write
20BB2496000
trusted library allocation
page read and write
20BA156F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9E822000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96C4000
trusted library allocation
page read and write
20BA3AFB000
trusted library allocation
page read and write
20BA3ECB000
trusted library allocation
page read and write
20BB0D0A000
trusted library allocation
page read and write
20BA95E4000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20BAE22E000
trusted library allocation
page read and write
20BB2800000
trusted library allocation
page read and write
20BAA05B000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20BAAB23000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984FC000
heap
page read and write
20B984C2000
heap
page read and write
20BAABF0000
trusted library allocation
page read and write
20BA96AE000
trusted library allocation
page read and write
20BA2EAC000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20B984DD000
heap
page read and write
20B9D4F6000
trusted library allocation
page read and write
20BAE241000
trusted library allocation
page read and write
20BA9643000
trusted library allocation
page read and write
20BAA60D000
trusted library allocation
page read and write
20BA9683000
trusted library allocation
page read and write
20BAE3F7000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20B9D5FC000
trusted library allocation
page read and write
20BAE4A9000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20B984BC000
heap
page read and write
54C1000
heap
page read and write
20BAE21D000
trusted library allocation
page read and write
20BAE477000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9853C000
heap
page read and write
20BA95AE000
trusted library allocation
page read and write
20BA50FE000
trusted library allocation
page read and write
20BA94FE000
trusted library allocation
page read and write
25C5AE45000
heap
page read and write
1C74000
heap
page read and write
20B984E1000
heap
page read and write
20B984B0000
heap
page read and write
20BA146C000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BB19BB000
trusted library allocation
page read and write
20BA4091000
trusted library allocation
page read and write
20BB19CA000
trusted library allocation
page read and write
20B984C9000
heap
page read and write
20BAB3CF000
trusted library allocation
page read and write
20BAE5FC000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
20BAE5CF000
trusted library allocation
page read and write
20BA1AD2000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA3259000
trusted library allocation
page read and write
20BA96E1000
trusted library allocation
page read and write
20BA325A000
trusted library allocation
page read and write
20BA32C6000
trusted library allocation
page read and write
20BAE5D3000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B9E757000
trusted library allocation
page read and write
20B9CEEF000
trusted library allocation
page read and write
20BA4AD9000
trusted library allocation
page read and write
20BAA6E2000
trusted library allocation
page read and write
20BA17C8000
trusted library allocation
page read and write
20BA96F3000
trusted library allocation
page read and write
20BA3DFC000
trusted library allocation
page read and write
20BADF7C000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20BA943C000
trusted library allocation
page read and write
2E3FD121000
trusted library allocation
page execute read
20BAA0EC000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA9588000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BA9539000
trusted library allocation
page read and write
20B984A9000
heap
page read and write
20BA0F6E000
trusted library allocation
page read and write
20BAB3B6000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
20BAA6D5000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BAA689000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984CD000
heap
page read and write
20BAABF2000
trusted library allocation
page read and write
20BAB850000
trusted library allocation
page read and write
20BAB4E3000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B984B3000
heap
page read and write
20B984CD000
heap
page read and write
20B984DE000
heap
page read and write
12C8F33B000
heap
page read and write
20B9E781000
trusted library allocation
page read and write
20BB2612000
trusted library allocation
page read and write
20BA9495000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
1692AD70000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20BA9E12000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA3D7B000
trusted library allocation
page read and write
20BB0D30000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
28F87932000
trusted library allocation
page read and write
20BA3324000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20BA9423000
trusted library allocation
page read and write
20BA1443000
trusted library allocation
page read and write
20B9ED33000
trusted library allocation
page read and write
20BA98B9000
trusted library allocation
page read and write
20BAB850000
trusted library allocation
page read and write
20BAB185000
trusted library allocation
page read and write
1692AD78000
trusted library allocation
page read and write
20B9D51A000
trusted library allocation
page read and write
20BAB8A2000
trusted library allocation
page read and write
20BAA0E4000
trusted library allocation
page read and write
20BAB68F000
trusted library allocation
page read and write
20BA1459000
trusted library allocation
page read and write
20BAB455000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20BA15A4000
trusted library allocation
page read and write
12C8F2F2000
heap
page read and write
20B984C0000
heap
page read and write
20BA3A8A000
trusted library allocation
page read and write
20BA96AE000
trusted library allocation
page read and write
20BA94CE000
trusted library allocation
page read and write
20BA9662000
trusted library allocation
page read and write
20BA1A1B000
trusted library allocation
page read and write
20BA965C000
trusted library allocation
page read and write
20BAAD00000
trusted library allocation
page read and write
20BAAF3C000
trusted library allocation
page read and write
20BA4AE4000
trusted library allocation
page read and write
20BAB45E000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB11F9000
trusted library allocation
page read and write
20BAB5DE000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20B984E0000
heap
page read and write
20B984F3000
heap
page read and write
20BAAEC8000
trusted library allocation
page read and write
20BA9683000
trusted library allocation
page read and write
20B984CF000
heap
page read and write
12C8F25C000
heap
page read and write
20BB0D5D000
trusted library allocation
page read and write
12C8F25C000
heap
page read and write
20BA9664000
trusted library allocation
page read and write
20BAA0CF000
trusted library allocation
page read and write
20BAAB32000
trusted library allocation
page read and write
20BA96E5000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA15DF000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3AEE000
trusted library allocation
page read and write
20BA9493000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2EE4000
trusted library allocation
page read and write
12C8E400000
trusted library allocation
page read and write
20BB10AB000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAA43F000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAE21D000
trusted library allocation
page read and write
20BA9416000
trusted library allocation
page read and write
20BAB4FC000
trusted library allocation
page read and write
20B9CEC9000
trusted library allocation
page read and write
20BAE27F000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA95FB000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20BA951B000
trusted library allocation
page read and write
20BAB8F7000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
20BA15DF000
trusted library allocation
page read and write
20BA98B5000
trusted library allocation
page read and write
20B984C4000
heap
page read and write
20B984E1000
heap
page read and write
20B984F5000
heap
page read and write
20BA32F2000
trusted library allocation
page read and write
20BA96CD000
trusted library allocation
page read and write
20B984F3000
heap
page read and write
20BA940B000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA9476000
trusted library allocation
page read and write
20BA9475000
trusted library allocation
page read and write
20BAB46D000
trusted library allocation
page read and write
20BB117A000
trusted library allocation
page read and write
20BA95C3000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
20BAAFFE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA2EC2000
trusted library allocation
page read and write
20BAA0BD000
trusted library allocation
page read and write
28F87660000
heap
page readonly
20BAB6F7000
trusted library allocation
page read and write
20BA2E73000
trusted library allocation
page read and write
12C8E66F000
trusted library allocation
page read and write
C3021BD000
stack
page read and write
20B98501000
heap
page read and write
20B984C2000
heap
page read and write
12C8E6F3000
trusted library allocation
page read and write
20B984F9000
heap
page read and write
20B984F9000
heap
page read and write
1692AD30000
trusted library allocation
page read and write
20BA95B1000
trusted library allocation
page read and write
20BA3FDB000
trusted library allocation
page read and write
20BA95DF000
trusted library allocation
page read and write
20BAA091000
trusted library allocation
page read and write
12C8E681000
trusted library allocation
page read and write
20BAE44C000
trusted library allocation
page read and write
20B9EDC3000
trusted library allocation
page read and write
25C5AD70000
heap
page read and write
54C1000
heap
page read and write
20BA1A1F000
trusted library allocation
page read and write
20B9EDC7000
trusted library allocation
page read and write
12C8F25F000
heap
page read and write
C3044FE000
unkown
page readonly
20B984E6000
heap
page read and write
20B984DE000
heap
page read and write
20B984E8000
heap
page read and write
1FC2000
heap
page read and write
20BA15F7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB1154000
trusted library allocation
page read and write
20BAA652000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
112F16E000
stack
page read and write
20B9853C000
heap
page read and write
20BA2E6F000
trusted library allocation
page read and write
20BAA627000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
25C5AE2F000
heap
page read and write
54C1000
heap
page read and write
20B984BC000
heap
page read and write
20B984D0000
heap
page read and write
20B984E1000
heap
page read and write
54C1000
heap
page read and write
20BA9432000
trusted library allocation
page read and write
20BA1776000
trusted library allocation
page read and write
20BAA689000
trusted library allocation
page read and write
20BA33DC000
trusted library allocation
page read and write
20BAE5CB000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA1539000
trusted library allocation
page read and write
20B9D471000
trusted library allocation
page read and write
20BA2EBD000
trusted library allocation
page read and write
20BAB482000
trusted library allocation
page read and write
20BAE2BC000
trusted library allocation
page read and write
20B984EE000
heap
page read and write
20B984D1000
heap
page read and write
20B984C7000
heap
page read and write
20BAB193000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
20BA949B000
trusted library allocation
page read and write
20B9E751000
trusted library allocation
page read and write
20BADF30000
trusted library allocation
page read and write
20BA17EB000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20BA9688000
trusted library allocation
page read and write
20BAE459000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20B984D7000
heap
page read and write
20BB2625000
trusted library allocation
page read and write
20BAB8A8000
trusted library allocation
page read and write
20B9E6D0000
trusted library allocation
page read and write
20BA9E00000
trusted library allocation
page read and write
20B984F3000
heap
page read and write
12C8F36A000
heap
page read and write
20BA947A000
trusted library allocation
page read and write
12C8F260000
heap
page read and write
20BA9432000
trusted library allocation
page read and write
12C8E3D0000
heap
page read and write
20BA281A000
trusted library allocation
page read and write
28F87A18000
heap
page read and write
20B984DE000
heap
page read and write
20BA0F54000
trusted library allocation
page read and write
28F87A00000
heap
page read and write
20B98501000
heap
page read and write
20BA95A0000
trusted library allocation
page read and write
20BA1ABC000
trusted library allocation
page read and write
20BAAF3C000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
54C1000
heap
page read and write
20BAAD1B000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA15DF000
trusted library allocation
page read and write
20BA96AE000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA1718000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9EDEF000
trusted library allocation
page read and write
20B9E7A1000
trusted library allocation
page read and write
20BA9475000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B9ED32000
trusted library allocation
page read and write
20BAAF53000
trusted library allocation
page read and write
20BA1D7C000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20B984A8000
heap
page read and write
20B984D4000
heap
page read and write
20BA951F000
trusted library allocation
page read and write
20BA96CD000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA964C000
trusted library allocation
page read and write
20BA32CF000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20BAB865000
trusted library allocation
page read and write
20BA3EF6000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
12C8F300000
heap
page read and write
20BAA091000
trusted library allocation
page read and write
C78F3FF000
stack
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20BAB8BB000
trusted library allocation
page read and write
5314000
direct allocation
page execute and read and write
20BB26A8000
trusted library allocation
page read and write
20BAE4DE000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B984BA000
heap
page read and write
20B9FDF6000
trusted library allocation
page read and write
12C8F379000
heap
page read and write
20BADF30000
trusted library allocation
page read and write
20BAAF0A000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B9853C000
heap
page read and write
20BA96AE000
trusted library allocation
page read and write
20B984C8000
heap
page read and write
6FC000
unkown
page execute and read and write
20B984F3000
heap
page read and write
20BA1417000
trusted library allocation
page read and write
20BB1723000
trusted library allocation
page read and write
20BA965C000
trusted library allocation
page read and write
54C1000
heap
page read and write
25C5AE10000
heap
page read and write
20BAE5CB000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20BAE22E000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BA1537000
trusted library allocation
page read and write
28F8786E000
trusted library allocation
page read and write
20BAA0CF000
trusted library allocation
page read and write
20BB24E1000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
28F87864000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B984F5000
heap
page read and write
20B9FDCD000
trusted library allocation
page read and write
20BA332F000
trusted library allocation
page read and write
20BA96D0000
trusted library allocation
page read and write
20BA9E1F000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2EBD000
trusted library allocation
page read and write
20BA9589000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20B9EDEE000
trusted library allocation
page read and write
20BAA091000
trusted library allocation
page read and write
20BA33C8000
trusted library allocation
page read and write
20BAA67C000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA1D74000
trusted library allocation
page read and write
20BAA0D4000
trusted library allocation
page read and write
20BB1A58000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95D1000
trusted library allocation
page read and write
12C8F329000
heap
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20B984D5000
heap
page read and write
20B98501000
heap
page read and write
20B984D6000
heap
page read and write
28F878BA000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BB18FC000
trusted library allocation
page read and write
20BA95C9000
trusted library allocation
page read and write
20B984CA000
heap
page read and write
20BA96EB000
trusted library allocation
page read and write
20BA0F57000
trusted library allocation
page read and write
20BB10B0000
trusted library allocation
page read and write
2171000
heap
page read and write
24FA000
heap
page read and write
20BA965A000
trusted library allocation
page read and write
20BA9E00000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20B984DB000
heap
page read and write
20BAE451000
trusted library allocation
page read and write
20BA1D7A000
trusted library allocation
page read and write
20BA95B3000
trusted library allocation
page read and write
20B984E4000
heap
page read and write
20BA156C000
trusted library allocation
page read and write
20BA32CF000
trusted library allocation
page read and write
2516000
heap
page read and write
20BA947A000
trusted library allocation
page read and write
20BA9423000
trusted library allocation
page read and write
20BAABE0000
trusted library allocation
page read and write
20BA96F9000
trusted library allocation
page read and write
20B984CC000
heap
page read and write
12C8F29C000
heap
page read and write
20BA966D000
trusted library allocation
page read and write
20B9E744000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
20BA4AE1000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20B984FC000
heap
page read and write
20B984C7000
heap
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
20B984DD000
heap
page read and write
28F874D0000
heap
page read and write
20BB1961000
trusted library allocation
page read and write
20BA9465000
trusted library allocation
page read and write
20BB11E4000
trusted library allocation
page read and write
20BA3FA9000
trusted library allocation
page read and write
20BA1539000
trusted library allocation
page read and write
20BAAEFC000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
54C1000
heap
page read and write
20BA96C4000
trusted library allocation
page read and write
25C5B0F5000
heap
page read and write
20BA3FA9000
trusted library allocation
page read and write
20BA96CD000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA0F73000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
20BA147D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
1C74000
heap
page read and write
25C5C9AC000
heap
page read and write
20B984FC000
heap
page read and write
20BA9D23000
trusted library allocation
page read and write
20BA158F000
trusted library allocation
page read and write
20BA943C000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
6F4000
unkown
page execute and write copy
20BA40B2000
trusted library allocation
page read and write
20BA1A74000
trusted library allocation
page read and write
20BB1042000
trusted library allocation
page read and write
20BA1AD2000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAA0B1000
trusted library allocation
page read and write
20BA28EF000
trusted library allocation
page read and write
20BA0F7A000
trusted library allocation
page read and write
20BAE237000
trusted library allocation
page read and write
20BB11ED000
trusted library allocation
page read and write
20B9ED23000
trusted library allocation
page read and write
1692AF03000
trusted library allocation
page read and write
20BA3AF9000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
1692AD82000
trusted library allocation
page read and write
20BAA686000
trusted library allocation
page read and write
20BAA410000
trusted library allocation
page read and write
20BAE443000
trusted library allocation
page read and write
20BA965C000
trusted library allocation
page read and write
20B9D4FE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95C8000
trusted library allocation
page read and write
20BB11C9000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
6ADF000
heap
page read and write
20BA947A000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984F0000
heap
page read and write
20B984C2000
heap
page read and write
28F87A03000
heap
page read and write
54C1000
heap
page read and write
20BAE25F000
trusted library allocation
page read and write
20BA9482000
trusted library allocation
page read and write
12C8F2F1000
heap
page read and write
2E3FD101000
trusted library allocation
page execute read
20B984DE000
heap
page read and write
20BA95C6000
trusted library allocation
page read and write
20BA33BF000
trusted library allocation
page read and write
20BA50EE000
trusted library allocation
page read and write
20B984BE000
heap
page read and write
1692AF07000
trusted library allocation
page read and write
20BA39B1000
trusted library allocation
page read and write
12C8F27F000
heap
page read and write
20BA3AFB000
trusted library allocation
page read and write
20BA208B000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20B98501000
heap
page read and write
20BA3ABF000
trusted library allocation
page read and write
20BA9423000
trusted library allocation
page read and write
20BA32B6000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1A31000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20BAB61E000
trusted library allocation
page read and write
12C8F27D000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
20BA9681000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20B984C0000
heap
page read and write
20B984CA000
heap
page read and write
20BA2097000
trusted library allocation
page read and write
20BA0FCA000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
54C1000
heap
page read and write
20BAE230000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
20B984C5000
heap
page read and write
20BB26F1000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984F0000
heap
page read and write
20BA965B000
trusted library allocation
page read and write
20BAA6F8000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA50B6000
trusted library allocation
page read and write
20B984D9000
heap
page read and write
20B9853C000
heap
page read and write
54C1000
heap
page read and write
20BB108D000
trusted library allocation
page read and write
20B9D600000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984DD000
heap
page read and write
20BA2EC4000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20B984DE000
heap
page read and write
20BA1533000
trusted library allocation
page read and write
20BAAEBD000
trusted library allocation
page read and write
20BAAF9E000
trusted library allocation
page read and write
20BA943C000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984D9000
heap
page read and write
20B9851C000
heap
page read and write
20BAAB92000
trusted library allocation
page read and write
20BA2E9B000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
1692ADB7000
trusted library allocation
page read and write
20BB11F9000
trusted library allocation
page read and write
20BB260A000
trusted library allocation
page read and write
20B9CE98000
trusted library allocation
page read and write
20B9E650000
trusted library allocation
page read and write
20BAA68A000
trusted library allocation
page read and write
20BA145F000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984D9000
heap
page read and write
35817FE000
stack
page read and write
20B98501000
heap
page read and write
20BAB888000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984DA000
heap
page read and write
20BA956F000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAAB4E000
trusted library allocation
page read and write
6BC000
unkown
page execute and write copy
54C1000
heap
page read and write
20BA4ADE000
trusted library allocation
page read and write
28F87910000
trusted library allocation
page read and write
5303000
direct allocation
page execute and read and write
20BA98B9000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B984D0000
heap
page read and write
20B98501000
heap
page read and write
12C8E661000
trusted library allocation
page read and write
20BA949B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95E4000
trusted library allocation
page read and write
20BA9445000
trusted library allocation
page read and write
54C1000
heap
page read and write
C305DFE000
stack
page read and write
20B9E499000
trusted library allocation
page read and write
20BA96F7000
trusted library allocation
page read and write
20BA9585000
trusted library allocation
page read and write
28F875EA000
heap
page read and write
20BA9673000
trusted library allocation
page read and write
20BAB064000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20BB1751000
heap
page read and write
20BAB096000
trusted library allocation
page read and write
20BA2667000
trusted library allocation
page read and write
20BAB622000
trusted library allocation
page read and write
20B9E7BC000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20B984DE000
heap
page read and write
20BAB0B2000
trusted library allocation
page read and write
20BA3EBA000
trusted library allocation
page read and write
20BB11C9000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20BB1A39000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984DB000
heap
page read and write
20BAB4BA000
trusted library allocation
page read and write
20BADF5D000
trusted library allocation
page read and write
1692A8A0000
unclassified section
page readonly
20BA98CD000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAB87D000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
20BA0F93000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B984C0000
heap
page read and write
25C5C9B9000
heap
page read and write
20BAB482000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20BA947F000
trusted library allocation
page read and write
12C8E53F000
unclassified section
page read and write
1692ADF4000
trusted library allocation
page read and write
20BA33B1000
trusted library allocation
page read and write
20BA1A3B000
trusted library allocation
page read and write
20BA4A57000
trusted library allocation
page read and write
12C8E6C6000
trusted library allocation
page read and write
20BA96AC000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA32CD000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984E5000
heap
page read and write
20B984CD000
heap
page read and write
20BAAB47000
trusted library allocation
page read and write
20BAB465000
trusted library allocation
page read and write
20BA0F6C000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20B984CA000
heap
page read and write
20BA98B5000
trusted library allocation
page read and write
20BAE4A9000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20BB109D000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20BAB3FB000
trusted library allocation
page read and write
20BAE2AB000
trusted library allocation
page read and write
20BAAF45000
trusted library allocation
page read and write
54C1000
heap
page read and write
12C8E250000
unclassified section
page readonly
20B984DE000
heap
page read and write
20BB173C000
trusted library allocation
page read and write
20BAE221000
trusted library allocation
page read and write
20B9851D000
heap
page read and write
20BA32F0000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20B984F9000
heap
page read and write
25C5AE00000
heap
page read and write
20B9851C000
heap
page read and write
20B984D0000
heap
page read and write
20B984D4000
heap
page read and write
20B984F0000
heap
page read and write
20BAE2FE000
trusted library allocation
page read and write
20BAE4E2000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA3DD0000
trusted library allocation
page read and write
20BA95B1000
trusted library allocation
page read and write
20BA267B000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984C0000
heap
page read and write
20BAA6D5000
trusted library allocation
page read and write
20BA949B000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984D6000
heap
page read and write
54C1000
heap
page read and write
20BAA63B000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20BB1123000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BAA098000
trusted library allocation
page read and write
20BA95A8000
trusted library allocation
page read and write
20BB1993000
trusted library allocation
page read and write
20B9E6BD000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984E7000
heap
page read and write
20BAE48D000
trusted library allocation
page read and write
20BAA0D4000
trusted library allocation
page read and write
20BAB8DC000
trusted library allocation
page read and write
20BA95A8000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA1D86000
trusted library allocation
page read and write
20BA944A000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAE1EF000
trusted library allocation
page read and write
20BA28FB000
trusted library allocation
page read and write
20BA966F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20BAA6F3000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BAAFE0000
trusted library allocation
page read and write
20BA964C000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA3D8C000
trusted library allocation
page read and write
20BB10B3000
trusted library allocation
page read and write
20BA9DFC000
trusted library allocation
page read and write
20BA3D8A000
trusted library allocation
page read and write
1131BFE000
stack
page read and write
20B984E7000
heap
page read and write
20BA17D9000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BA32D1000
trusted library allocation
page read and write
20BA9432000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAB13F000
trusted library allocation
page read and write
12C8E60A000
trusted library allocation
page read and write
12C8E676000
trusted library allocation
page read and write
20BA1AB6000
trusted library allocation
page read and write
20BAABE0000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984DE000
heap
page read and write
20BAABFE000
trusted library allocation
page read and write
20BA96FB000
trusted library allocation
page read and write
20BAE27B000
trusted library allocation
page read and write
C78C3FB000
stack
page read and write
20B98501000
heap
page read and write
20BA40B5000
trusted library allocation
page read and write
20BA50EE000
trusted library allocation
page read and write
20BB2622000
trusted library allocation
page read and write
20BA3FDB000
trusted library allocation
page read and write
54C1000
heap
page read and write
28F878C9000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
12C8E6E8000
trusted library allocation
page read and write
20BA3B00000
trusted library allocation
page read and write
20BA96E1000
trusted library allocation
page read and write
20BAB58F000
trusted library allocation
page read and write
20BAE23E000
trusted library allocation
page read and write
20BA33EA000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96AA000
trusted library allocation
page read and write
20BA9493000
trusted library allocation
page read and write
20BAB1C2000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA956F000
trusted library allocation
page read and write
20BA143D000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BB10A9000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BAB805000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
1692ADF6000
trusted library allocation
page read and write
20BA96E5000
trusted library allocation
page read and write
20BAA436000
trusted library allocation
page read and write
28F8785B000
trusted library allocation
page read and write
20B984ED000
heap
page read and write
20B984DE000
heap
page read and write
20B984D5000
heap
page read and write
20BA1A3B000
trusted library allocation
page read and write
20B984CF000
heap
page read and write
20BA175E000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA2EB5000
trusted library allocation
page read and write
54C1000
heap
page read and write
2E3FD141000
trusted library allocation
page execute read
20BA331A000
trusted library allocation
page read and write
20BB10A9000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BB11A6000
trusted library allocation
page read and write
20B984AE000
heap
page read and write
20BAB3B9000
trusted library allocation
page read and write
28F878E7000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA2E74000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA0F6C000
trusted library allocation
page read and write
20BA2E45000
trusted library allocation
page read and write
12C8F2F1000
heap
page read and write
20B984D6000
heap
page read and write
20BA28F5000
trusted library allocation
page read and write
20BAE281000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
4F00000
trusted library allocation
page read and write
20BA9432000
trusted library allocation
page read and write
20BA2E34000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
20BA9531000
trusted library allocation
page read and write
20BA3AA1000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
20B984C0000
heap
page read and write
20B984F5000
heap
page read and write
20BA9DF4000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BA15A4000
trusted library allocation
page read and write
20BAA08A000
trusted library allocation
page read and write
20BA2EC2000
trusted library allocation
page read and write
20BA9660000
trusted library allocation
page read and write
20BAA0B1000
trusted library allocation
page read and write
20B9E4AA000
trusted library allocation
page read and write
20B93024000
heap
page read and write
20BAB5CF000
trusted library allocation
page read and write
20B9EDDE000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B9853C000
heap
page read and write
20B984DE000
heap
page read and write
20BA942C000
trusted library allocation
page read and write
20B9EDDA000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
54C1000
heap
page read and write
20BA9688000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAA657000
trusted library allocation
page read and write
20BAE5CB000
trusted library allocation
page read and write
20BAB58F000
trusted library allocation
page read and write
20B9E7DC000
trusted library allocation
page read and write
20BB1022000
trusted library allocation
page read and write
20BAE5D7000
trusted library allocation
page read and write
20BAAFA6000
trusted library allocation
page read and write
20BA9439000
trusted library allocation
page read and write
20BA3F5C000
trusted library allocation
page read and write
12C8E5F4000
unkown
page execute read
54C1000
heap
page read and write
20BA4AFE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
FF890000
direct allocation
page execute and read and write
20B984C0000
heap
page read and write
20B984FC000
heap
page read and write
20BA9443000
trusted library allocation
page read and write
20BA32D9000
trusted library allocation
page read and write
20BAAB07000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1751000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA14C8000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20BA15F7000
trusted library allocation
page read and write
20BA96AC000
trusted library allocation
page read and write
20BB19B9000
trusted library allocation
page read and write
20BA1787000
trusted library allocation
page read and write
20BAE29E000
trusted library allocation
page read and write
1C70000
heap
page read and write
20B984C0000
heap
page read and write
12C8F2F1000
heap
page read and write
20BAB3DF000
trusted library allocation
page read and write
20BA2EB1000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984C2000
heap
page read and write
20BA2EF5000
trusted library allocation
page read and write
20BA1A31000
trusted library allocation
page read and write
20BA9662000
trusted library allocation
page read and write
1C50000
heap
page read and write
20B98501000
heap
page read and write
20B9EDB3000
trusted library allocation
page read and write
20BA1539000
trusted library allocation
page read and write
12C8F26C000
heap
page read and write
20BAB877000
trusted library allocation
page read and write
20B9FDF8000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20B9E4FB000
trusted library allocation
page read and write
20BAABB2000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B9853C000
heap
page read and write
20B98501000
heap
page read and write
20B984D4000
heap
page read and write
20BA1A9F000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984DE000
heap
page read and write
20BAAB54000
trusted library allocation
page read and write
20BAB151000
trusted library allocation
page read and write
20BA40A1000
trusted library allocation
page read and write
20BAB051000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20B984EC000
heap
page read and write
20B984F0000
heap
page read and write
20BA964C000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BAE25B000
trusted library allocation
page read and write
20B9E7F6000
trusted library allocation
page read and write
20B9CEEF000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
20B984FC000
heap
page read and write
20BA96FE000
trusted library allocation
page read and write
12C8E678000
trusted library allocation
page read and write
20BA957E000
trusted library allocation
page read and write
20BA96A4000
trusted library allocation
page read and write
12C8E5DA000
unkown
page execute read
20BAAB87000
trusted library allocation
page read and write
20BADF12000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
12C8F344000
heap
page read and write
20B984F0000
heap
page read and write
112F06B000
stack
page read and write
C78DBFF000
stack
page read and write
20BA95C8000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
28F87800000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
54C1000
heap
page read and write
20BA9643000
trusted library allocation
page read and write
1F6F000
heap
page read and write
12C8E603000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA2ED1000
trusted library allocation
page read and write
20BA949F000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
12C8E2CA000
heap
page read and write
20BA94DB000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20B9853C000
heap
page read and write
20B984F0000
heap
page read and write
1692AD03000
trusted library allocation
page read and write
1AA849724000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BAA0A9000
trusted library allocation
page read and write
20BAAB4E000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
20BAAB3D000
trusted library allocation
page read and write
20BA2E9C000
trusted library allocation
page read and write
20BA0F3D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D0000
heap
page read and write
12C8E65C000
trusted library allocation
page read and write
20BA9DF4000
trusted library allocation
page read and write
5314000
direct allocation
page execute and read and write
20B98501000
heap
page read and write
20B984E1000
heap
page read and write
20B984D3000
heap
page read and write
20BAA627000
trusted library allocation
page read and write
20B984E9000
heap
page read and write
20BA9472000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20B98501000
heap
page read and write
1C74000
heap
page read and write
20BAB4AB000
trusted library allocation
page read and write
20BA33CA000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20BA95BF000
trusted library allocation
page read and write
20BA9588000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAA0A7000
trusted library allocation
page read and write
20BAA0A0000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
20B984DD000
heap
page read and write
20BA1A31000
trusted library allocation
page read and write
20B98501000
heap
page read and write
25CC000
heap
page read and write
20BA33B1000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20B984E1000
heap
page read and write
2250000
heap
page read and write
20B984E8000
heap
page read and write
20BA32E0000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE219000
trusted library allocation
page read and write
20BB11C9000
trusted library allocation
page read and write
25B9000
heap
page read and write
20BA1300000
heap
page read and write
54C1000
heap
page read and write
20B9EDBD000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BA3A66000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BB2625000
trusted library allocation
page read and write
20BA3DF8000
trusted library allocation
page read and write
20BAB197000
trusted library allocation
page read and write
20B9E756000
trusted library allocation
page read and write
20BA28ED000
trusted library allocation
page read and write
20BAA685000
trusted library allocation
page read and write
20BA28FB000
trusted library allocation
page read and write
20BA4A33000
trusted library allocation
page read and write
20B9EDA0000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BAE5F4000
trusted library allocation
page read and write
20BA1A5F000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
28F87500000
heap
page read and write
20BA4A51000
trusted library allocation
page read and write
20B9E788000
trusted library allocation
page read and write
1692AC60000
heap
page read and write
20BA3D8A000
trusted library allocation
page read and write
20B984CA000
heap
page read and write
20BAABDA000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984CE000
heap
page read and write
20BADB07000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95DA000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BB11E7000
trusted library allocation
page read and write
20BAB6D9000
trusted library allocation
page read and write
20BAE455000
trusted library allocation
page read and write
20BA963B000
trusted library allocation
page read and write
C3055FE000
unkown
page readonly
12C8F208000
heap
page read and write
20BB1A24000
trusted library allocation
page read and write
20B984EA000
heap
page read and write
20BB1A01000
trusted library allocation
page read and write
1C74000
heap
page read and write
20B9D476000
trusted library allocation
page read and write
20BA9569000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984F5000
heap
page read and write
12C8F344000
heap
page read and write
20B9CE81000
trusted library allocation
page read and write
20BA1A3B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE5CF000
trusted library allocation
page read and write
20B984B7000
heap
page read and write
20B9D577000
trusted library allocation
page read and write
20BAA6D9000
trusted library allocation
page read and write
20BA3295000
trusted library allocation
page read and write
20BA12EE000
heap
page read and write
20B984D4000
heap
page read and write
22BA000
heap
page read and write
20BAB34C000
trusted library allocation
page read and write
20BADF00000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA968E000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA3304000
trusted library allocation
page read and write
20BB0D5D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA14C8000
trusted library allocation
page read and write
20BA0F63000
trusted library allocation
page read and write
20BA95D6000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
54C1000
heap
page read and write
20B984F0000
heap
page read and write
54C1000
heap
page read and write
20B984FC000
heap
page read and write
20B984B3000
heap
page read and write
54C1000
heap
page read and write
20BAA0D4000
trusted library allocation
page read and write
20BAE237000
trusted library allocation
page read and write
C304CFE000
stack
page read and write
C3021FE000
unkown
page readonly
20BA39D5000
trusted library allocation
page read and write
20BA9469000
trusted library allocation
page read and write
20BA94D6000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20B98501000
heap
page read and write
1692A960000
heap
page read and write
20BA2EA1000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BADF00000
trusted library allocation
page read and write
20B9E796000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20B984D9000
heap
page read and write
24B9000
heap
page read and write
20B984FC000
heap
page read and write
20BA955F000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20BAB4E3000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B9E7DD000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA1A5F000
trusted library allocation
page read and write
20BA9400000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
20BA95CF000
trusted library allocation
page read and write
20BA1AD5000
trusted library allocation
page read and write
20BAA405000
trusted library allocation
page read and write
5320000
direct allocation
page execute and read and write
20B984C8000
heap
page read and write
21C5000
heap
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
12C8E570000
trusted library section
page readonly
12C8F2A1000
heap
page read and write
1C74000
heap
page read and write
1692AD45000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA965C000
trusted library allocation
page read and write
C78CBFE000
stack
page read and write
20BA3A7E000
trusted library allocation
page read and write
20B984EB000
heap
page read and write
20B984E1000
heap
page read and write
20B984C2000
heap
page read and write
20BA948F000
trusted library allocation
page read and write
20BA15D1000
trusted library allocation
page read and write
20B984FA000
heap
page read and write
20BA0F54000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C2000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20BAB5C6000
trusted library allocation
page read and write
20BA17BE000
trusted library allocation
page read and write
20BA0F7A000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAB44C000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
54C1000
heap
page read and write
20B984E1000
heap
page read and write
20BA50BA000
trusted library allocation
page read and write
20BA95E4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20BA1A5E000
trusted library allocation
page read and write
5314000
direct allocation
page execute and read and write
20B9E43A000
trusted library allocation
page read and write
20BB173C000
trusted library allocation
page read and write
20BA9453000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB816000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA3E3D000
trusted library allocation
page read and write
20BAAF53000
trusted library allocation
page read and write
28F87A15000
heap
page read and write
20B984BC000
heap
page read and write
20B984D2000
heap
page read and write
20B984E0000
heap
page read and write
20B984A8000
heap
page read and write
20B984C0000
heap
page read and write
20B984F0000
heap
page read and write
20BAB86D000
trusted library allocation
page read and write
20B984EB000
heap
page read and write
12C8F344000
heap
page read and write
20BA1A5E000
trusted library allocation
page read and write
20BAE4C7000
trusted library allocation
page read and write
C42000
unkown
page execute and read and write
1692AD13000
trusted library allocation
page read and write
20BA95BC000
trusted library allocation
page read and write
20B984D3000
heap
page read and write
20BAB1C2000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BAB079000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
1E3C000
heap
page read and write
28F876B0000
heap
page read and write
20BAB87A000
trusted library allocation
page read and write
3582FFE000
unkown
page readonly
20BA1544000
trusted library allocation
page read and write
20BA147D000
trusted library allocation
page read and write
20B984D8000
heap
page read and write
20B984D1000
heap
page read and write
20BA33B4000
trusted library allocation
page read and write
20BA32DA000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B9853C000
heap
page read and write
20B9E7EB000
trusted library allocation
page read and write
20BA9633000
trusted library allocation
page read and write
20BAB863000
trusted library allocation
page read and write
20BA40FA000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
54C1000
heap
page read and write
EE5000
unkown
page execute and read and write
20BA9674000
trusted library allocation
page read and write
20BB1120000
trusted library allocation
page read and write
20BA962B000
trusted library allocation
page read and write
25C5C9BD000
heap
page read and write
20BA3A0C000
trusted library allocation
page read and write
20BA9663000
trusted library allocation
page read and write
12C8F32D000
heap
page read and write
1DF0000
direct allocation
page execute and read and write
ED3E7FF000
stack
page read and write
54C1000
heap
page read and write
20BB11C9000
trusted library allocation
page read and write
4DFE000
stack
page read and write
20BA14C8000
trusted library allocation
page read and write
20BA0F93000
trusted library allocation
page read and write
20BAA0CA000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA965A000
trusted library allocation
page read and write
4F40000
heap
page read and write
35FFC3E000
stack
page read and write
20BAA638000
trusted library allocation
page read and write
20BA9683000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAA674000
trusted library allocation
page read and write
20BAB3AE000
trusted library allocation
page read and write
20B984C4000
heap
page read and write
20B9851C000
heap
page read and write
20BB11ED000
trusted library allocation
page read and write
20BA3AA8000
trusted library allocation
page read and write
20B9EDEB000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
12C8E560000
heap
page read and write
231F000
heap
page read and write
20BAB83B000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
2E1F000
stack
page read and write
20BAE2E6000
trusted library allocation
page read and write
20BB19B1000
trusted library allocation
page read and write
20BA966A000
trusted library allocation
page read and write
28F87903000
trusted library allocation
page read and write
1C00000
heap
page read and write
241C000
heap
page read and write
20BB10DB000
trusted library allocation
page read and write
20BB1169000
trusted library allocation
page read and write
20BAA64D000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20B9E494000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B9E657000
trusted library allocation
page read and write
20BAB4CA000
trusted library allocation
page read and write
20BAA6D9000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B984E7000
heap
page read and write
20BA1A31000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
1C74000
heap
page read and write
54C1000
heap
page read and write
20BA9475000
trusted library allocation
page read and write
20BAA6F3000
trusted library allocation
page read and write
20BB1714000
trusted library allocation
page read and write
20BB11F9000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAB0D6000
trusted library allocation
page read and write
20BA2E9B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9684000
trusted library allocation
page read and write
20B9E648000
trusted library allocation
page read and write
20BA96A7000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA96CD000
trusted library allocation
page read and write
20BA171E000
trusted library allocation
page read and write
20BAA676000
trusted library allocation
page read and write
20B9EDA0000
trusted library allocation
page read and write
28F8782E000
trusted library allocation
page read and write
20BADB02000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20BB11ED000
trusted library allocation
page read and write
20BA32F2000
trusted library allocation
page read and write
20B984E4000
heap
page read and write
20B9853C000
heap
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
20B984B3000
heap
page read and write
1E64000
heap
page read and write
20B984CD000
heap
page read and write
28F876B4000
heap
page read and write
20BA329F000
trusted library allocation
page read and write
1F14000
heap
page read and write
20B984FC000
heap
page read and write
20BA4A1B000
trusted library allocation
page read and write
20B984CE000
heap
page read and write
20BAE4A9000
trusted library allocation
page read and write
20BAA680000
trusted library allocation
page read and write
20B9E488000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20B9853C000
heap
page read and write
9C90000
heap
page read and write
20BA0F05000
trusted library allocation
page read and write
20B9D5E4000
trusted library allocation
page read and write
20BA3AF4000
trusted library allocation
page read and write
20B9E798000
trusted library allocation
page read and write
20BA953C000
trusted library allocation
page read and write
20BA3ECF000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA963D000
trusted library allocation
page read and write
20B984E2000
heap
page read and write
20BA40C6000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20BA3AF0000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
54C1000
heap
page read and write
20BAAB70000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B9CEF8000
trusted library allocation
page read and write
20B9D4FB000
trusted library allocation
page read and write
20B984B7000
heap
page read and write
20B984E5000
heap
page read and write
20BA96AB000
trusted library allocation
page read and write
1692AD11000
trusted library allocation
page read and write
20BADF7C000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA2C07000
trusted library allocation
page read and write
20B984E9000
heap
page read and write
20BA3A4D000
trusted library allocation
page read and write
28F8791D000
trusted library allocation
page read and write
20BA2E45000
trusted library allocation
page read and write
20BA15C6000
trusted library allocation
page read and write
20BA3D7B000
trusted library allocation
page read and write
20BAB3F8000
trusted library allocation
page read and write
20BAB461000
trusted library allocation
page read and write
20BAE5F4000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984EB000
heap
page read and write
20BAA64D000
trusted library allocation
page read and write
20B984F7000
heap
page read and write
20BA15D1000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20B9FD4F000
trusted library allocation
page read and write
20BA966D000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA1D60000
trusted library allocation
page read and write
20B9FD85000
trusted library allocation
page read and write
20BA15A3000
trusted library allocation
page read and write
12C8E600000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
12C8F26C000
heap
page read and write
20BA96F3000
trusted library allocation
page read and write
20B984D3000
heap
page read and write
20B984DB000
heap
page read and write
20BB11F1000
trusted library allocation
page read and write
54C1000
heap
page read and write
886000
unkown
page execute and read and write
20BAE24F000
trusted library allocation
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
20BAE22C000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BADF12000
trusted library allocation
page read and write
25C5AE21000
heap
page read and write
54C1000
heap
page read and write
5314000
direct allocation
page execute and read and write
20BAE5F0000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BB17AC000
heap
page read and write
20B984E0000
heap
page read and write
20B984C7000
heap
page read and write
20BAB6E9000
trusted library allocation
page read and write
20BA95D1000
trusted library allocation
page read and write
28F87503000
heap
page read and write
20BB1985000
trusted library allocation
page read and write
20BA15E6000
trusted library allocation
page read and write
20BA4A7B000
trusted library allocation
page read and write
20BA2EAC000
trusted library allocation
page read and write
20BAA05B000
trusted library allocation
page read and write
20BB11ED000
trusted library allocation
page read and write
20BA1537000
trusted library allocation
page read and write
20BAB1F8000
trusted library allocation
page read and write
20BAABF2000
trusted library allocation
page read and write
20BA2EE2000
trusted library allocation
page read and write
20BA948B000
trusted library allocation
page read and write
20BB1701000
heap
page read and write
20BA3EEE000
trusted library allocation
page read and write
20BAE22B000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20BAE5CF000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
20BA96AE000
trusted library allocation
page read and write
20BA94DD000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA147D000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA15F7000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAAFC3000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA176D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9E7D6000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984CD000
heap
page read and write
C78C3FF000
stack
page read and write
20BA15E6000
trusted library allocation
page read and write
20BA3ABF000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA966D000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96EB000
trusted library allocation
page read and write
20BA966A000
trusted library allocation
page read and write
20B9FD5D000
trusted library allocation
page read and write
20BB11C5000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAAF45000
trusted library allocation
page read and write
20BAA67D000
trusted library allocation
page read and write
20BA95E4000
trusted library allocation
page read and write
20BA2EC9000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA964E000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3F73000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20B98501000
heap
page read and write
20B984F0000
heap
page read and write
20BAE48A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA4AE4000
trusted library allocation
page read and write
28F876C0000
unclassified section
page readonly
20BAB853000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B98501000
heap
page read and write
1692B00C000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20B984BC000
heap
page read and write
20BAABF0000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
12C8F358000
heap
page read and write
20BAE434000
trusted library allocation
page read and write
20BAB62C000
trusted library allocation
page read and write
12C8F25F000
heap
page read and write
20B984CF000
heap
page read and write
20BA968B000
trusted library allocation
page read and write
20BA96D8000
trusted library allocation
page read and write
20BB11F1000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
54C1000
heap
page read and write
20BA96A7000
trusted library allocation
page read and write
20BA957A000
trusted library allocation
page read and write
20BA32CF000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
20BB11A8000
trusted library allocation
page read and write
1692AC00000
heap
page readonly
20B984E7000
heap
page read and write
12C8F329000
heap
page read and write
20BA9459000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BAAF1B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAE230000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA1557000
trusted library allocation
page read and write
20BA50B2000
trusted library allocation
page read and write
1692A926000
remote allocation
page execute read
20B9EDBF000
trusted library allocation
page read and write
20B9E467000
trusted library allocation
page read and write
20BB11ED000
trusted library allocation
page read and write
12C8F2E1000
heap
page read and write
20BA32B8000
trusted library allocation
page read and write
1692A8B0000
unclassified section
page readonly
54C1000
heap
page read and write
20B984F5000
heap
page read and write
20BAB18C000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA32F0000
trusted library allocation
page read and write
12C8F2B8000
heap
page read and write
20BAE459000
trusted library allocation
page read and write
20BB10F1000
trusted library allocation
page read and write
20BA145C000
trusted library allocation
page read and write
20B984ED000
heap
page read and write
54C1000
heap
page read and write
20BA0F49000
trusted library allocation
page read and write
1C74000
heap
page read and write
12C8F2ED000
heap
page read and write
20BAB0EF000
trusted library allocation
page read and write
20B984CE000
heap
page read and write
20B984D1000
heap
page read and write
20B984E7000
heap
page read and write
20BA37F6000
trusted library allocation
page read and write
20BAAB10000
trusted library allocation
page read and write
20BA1569000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BADB00000
trusted library allocation
page read and write
20BAB1CD000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BB2622000
trusted library allocation
page read and write
20BAAF2B000
trusted library allocation
page read and write
20BB11DC000
trusted library allocation
page read and write
20BADF28000
trusted library allocation
page read and write
20BA951D000
trusted library allocation
page read and write
20BA1DF7000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
54C1000
heap
page read and write
20BB260A000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA96CF000
trusted library allocation
page read and write
20BA9511000
trusted library allocation
page read and write
20BAB693000
trusted library allocation
page read and write
12C8E540000
trusted library allocation
page read and write
20BA956C000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20B984E3000
heap
page read and write
20BAB1B2000
trusted library allocation
page read and write
20BAA400000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20B984F0000
heap
page read and write
20BAE2FE000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BA9688000
trusted library allocation
page read and write
20BB26F1000
trusted library allocation
page read and write
20BA96D4000
trusted library allocation
page read and write
20B9D471000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20BAE4C7000
trusted library allocation
page read and write
20BA9599000
trusted library allocation
page read and write
20BA9590000
trusted library allocation
page read and write
20BA9416000
trusted library allocation
page read and write
20BAE4C7000
trusted library allocation
page read and write
20BA4AC4000
trusted library allocation
page read and write
54D1000
heap
page read and write
20B984E7000
heap
page read and write
20BA0F00000
trusted library allocation
page read and write
20BAA6F3000
trusted library allocation
page read and write
20BA3E48000
trusted library allocation
page read and write
20B984D7000
heap
page read and write
20BB1133000
trusted library allocation
page read and write
20BAB0E4000
trusted library allocation
page read and write
20BA1DFA000
trusted library allocation
page read and write
20BAAB07000
trusted library allocation
page read and write
20BA966D000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BB0D28000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA17BA000
trusted library allocation
page read and write
20BA1AC0000
trusted library allocation
page read and write
20BA95B1000
trusted library allocation
page read and write
28F8793D000
trusted library allocation
page read and write
20BAE1EF000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA9643000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAA616000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B984ED000
heap
page read and write
20BB10D3000
trusted library allocation
page read and write
20BA3EC2000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA3AF6000
trusted library allocation
page read and write
1DE0000
heap
page read and write
20B984FC000
heap
page read and write
20BAA0DE000
trusted library allocation
page read and write
20BA3FB4000
trusted library allocation
page read and write
20BAAD28000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA1AAC000
trusted library allocation
page read and write
20BA9493000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
20BAB6F5000
trusted library allocation
page read and write
20B984A7000
heap
page read and write
20B984D1000
heap
page read and write
20BAB8AA000
trusted library allocation
page read and write
28F87866000
trusted library allocation
page read and write
20BA17C4000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BA1AD5000
trusted library allocation
page read and write
20BA4AE7000
trusted library allocation
page read and write
20BA2EAC000
trusted library allocation
page read and write
35FF98D000
stack
page read and write
20B984DE000
heap
page read and write
20B984D0000
heap
page read and write
20BA2EF0000
trusted library allocation
page read and write
20BA3AA6000
trusted library allocation
page read and write
12C8E623000
trusted library allocation
page read and write
20BA28F9000
trusted library allocation
page read and write
20BA32F2000
trusted library allocation
page read and write
20BAB4A4000
trusted library allocation
page read and write
20BAB834000
trusted library allocation
page read and write
20BAAF21000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984E1000
heap
page read and write
20BAB193000
trusted library allocation
page read and write
35FFC7E000
unkown
page readonly
20BA1564000
trusted library allocation
page read and write
20BA17EE000
trusted library allocation
page read and write
20BAB455000
trusted library allocation
page read and write
28F87894000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20BAB6EB000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
21B1000
heap
page read and write
20BA15F7000
trusted library allocation
page read and write
28F87872000
trusted library allocation
page read and write
28F87410000
unclassified section
page readonly
20B984B0000
heap
page read and write
20BA1AA1000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BB1700000
trusted library allocation
page read and write
20BAABDC000
trusted library allocation
page read and write
20BB11E2000
trusted library allocation
page read and write
20BAA0B1000
trusted library allocation
page read and write
20BA9432000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20B984A8000
heap
page read and write
20B6000
heap
page read and write
20BAA616000
trusted library allocation
page read and write
20BA2EBE000
trusted library allocation
page read and write
1E20000
heap
page read and write
20BA98CD000
trusted library allocation
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
20BA2EC2000
trusted library allocation
page read and write
20BAB871000
trusted library allocation
page read and write
3581FFE000
unkown
page readonly
20B984D0000
heap
page read and write
20BA94F8000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAA0E4000
trusted library allocation
page read and write
20BAA616000
trusted library allocation
page read and write
20BA32A3000
trusted library allocation
page read and write
20BA40DA000
trusted library allocation
page read and write
20B9E744000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984BC000
heap
page read and write
20BA965D000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA15E6000
trusted library allocation
page read and write
20BAAD12000
trusted library allocation
page read and write
20BAB3E7000
trusted library allocation
page read and write
12C8F329000
heap
page read and write
20B984F0000
heap
page read and write
12C8F28D000
heap
page read and write
20B9851C000
heap
page read and write
20B984D4000
heap
page read and write
20BAB4BA000
trusted library allocation
page read and write
20BAA0CF000
trusted library allocation
page read and write
20B9853E000
heap
page read and write
20BB2527000
trusted library allocation
page read and write
6A4D000
heap
page read and write
20BAB3BB000
trusted library allocation
page read and write
12C8F358000
heap
page read and write
20BAE5FC000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984B3000
heap
page read and write
20B984A6000
heap
page read and write
2313000
heap
page read and write
20BB11F9000
trusted library allocation
page read and write
12C8E612000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984B7000
heap
page read and write
20BB109D000
trusted library allocation
page read and write
20BA3E9E000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9853C000
heap
page read and write
54C1000
heap
page read and write
20B984DD000
heap
page read and write
20BA96E1000
trusted library allocation
page read and write
20BAAD30000
trusted library allocation
page read and write
20BA28ED000
trusted library allocation
page read and write
20B984CF000
heap
page read and write
C303BFE000
stack
page read and write
20BAA0C4000
trusted library allocation
page read and write
20BA956C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA40D6000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C0000
heap
page read and write
12C8EB60000
heap
page read and write
20B984D5000
heap
page read and write
20B984D4000
heap
page read and write
20BA0FD0000
trusted library allocation
page read and write
20BA1460000
trusted library allocation
page read and write
20BA3328000
trusted library allocation
page read and write
20BAAF0A000
trusted library allocation
page read and write
20BAA0BD000
trusted library allocation
page read and write
20BAA63D000
trusted library allocation
page read and write
20B9E750000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B9EDEF000
trusted library allocation
page read and write
12C8F36A000
heap
page read and write
20B984E1000
heap
page read and write
20BA1AFA000
trusted library allocation
page read and write
20BA943C000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984D1000
heap
page read and write
54C1000
heap
page read and write
12C8F2E8000
heap
page read and write
20BA15C5000
trusted library allocation
page read and write
20B9D51E000
trusted library allocation
page read and write
20BAE256000
trusted library allocation
page read and write
20BA968E000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA964E000
trusted library allocation
page read and write
20B9E6D0000
trusted library allocation
page read and write
20B9E43A000
trusted library allocation
page read and write
C30553E000
stack
page read and write
20BA0F68000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA9534000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
12C8F27D000
heap
page read and write
20BAE24A000
trusted library allocation
page read and write
20BA957B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA94DB000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
54C1000
heap
page read and write
20B984F0000
heap
page read and write
20B9ED8E000
trusted library allocation
page read and write
20BA94CE000
trusted library allocation
page read and write
20B984CF000
heap
page read and write
20BA3DF0000
trusted library allocation
page read and write
20BB0D30000
trusted library allocation
page read and write
20BA1D54000
trusted library allocation
page read and write
20BA96D6000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BB0D00000
trusted library allocation
page read and write
20BA2E9C000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
54C1000
heap
page read and write
20BAB8A2000
trusted library allocation
page read and write
20BA96A7000
trusted library allocation
page read and write
20BA95B3000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA96A4000
trusted library allocation
page read and write
20BA3DF8000
trusted library allocation
page read and write
28F878AF000
trusted library allocation
page read and write
4F66000
heap
page read and write
20BA9459000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
20BA95E1000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BB1A2E000
trusted library allocation
page read and write
20BA98CD000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA98B5000
trusted library allocation
page read and write
25C5AC80000
heap
page read and write
54C1000
heap
page read and write
35807D8000
stack
page read and write
2046000
heap
page read and write
20B984F0000
heap
page read and write
20BA96CD000
trusted library allocation
page read and write
12C8E290000
heap
page read and write
20BA98B9000
trusted library allocation
page read and write
20B984E9000
heap
page read and write
20B9851C000
heap
page read and write
20B984C1000
heap
page read and write
20BA20A3000
trusted library allocation
page read and write
20BAE5F4000
trusted library allocation
page read and write
20BA944A000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
1C74000
heap
page read and write
20BA1772000
trusted library allocation
page read and write
2E3FD16F000
trusted library allocation
page execute read
20BA96E6000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20B984B3000
heap
page read and write
20BA9489000
trusted library allocation
page read and write
20BA2E06000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAAF56000
trusted library allocation
page read and write
12C8E686000
trusted library allocation
page read and write
20BA2E84000
trusted library allocation
page read and write
20BB1931000
trusted library allocation
page read and write
20B984BA000
heap
page read and write
20B984F0000
heap
page read and write
20B98501000
heap
page read and write
20BA94DD000
trusted library allocation
page read and write
20BA1AB8000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BB19FE000
trusted library allocation
page read and write
20BA33FC000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
12C8F377000
heap
page read and write
20BA2E28000
trusted library allocation
page read and write
20BA3D88000
trusted library allocation
page read and write
54C1000
heap
page read and write
6AD9000
heap
page read and write
20B9E4C3000
trusted library allocation
page read and write
20BAA674000
trusted library allocation
page read and write
20BAB0CD000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2EC9000
trusted library allocation
page read and write
20BAB8AA000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA12EC000
heap
page read and write
20B984C7000
heap
page read and write
20BA96AC000
trusted library allocation
page read and write
20B984F4000
heap
page read and write
20B9D5E4000
trusted library allocation
page read and write
20BA3A12000
trusted library allocation
page read and write
20BAB85A000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20B984CD000
heap
page read and write
20BA3DF0000
trusted library allocation
page read and write
20B9D5FC000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3DFA000
trusted library allocation
page read and write
20BA2EF0000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA943C000
trusted library allocation
page read and write
20BAB4A7000
trusted library allocation
page read and write
20BA96FB000
trusted library allocation
page read and write
20BAE5D3000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20B984D5000
heap
page read and write
20BA3A92000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA3A7C000
trusted library allocation
page read and write
20BAA6D5000
trusted library allocation
page read and write
20BA95A3000
trusted library allocation
page read and write
20BA1A1B000
trusted library allocation
page read and write
20BAB1B8000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984FC000
heap
page read and write
20BAA62B000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
12C8F201000
heap
page read and write
20B984E0000
heap
page read and write
20BA0F1B000
trusted library allocation
page read and write
20BA9EB4000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAB1E2000
trusted library allocation
page read and write
20BA147D000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
20BAB1B6000
trusted library allocation
page read and write
20BB260F000
trusted library allocation
page read and write
20B984D3000
heap
page read and write
20BA4A3F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984CF000
heap
page read and write
20BA1498000
trusted library allocation
page read and write
1692AD5F000
trusted library allocation
page read and write
20B9E4FE000
trusted library allocation
page read and write
20BA0F0A000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20BA9531000
trusted library allocation
page read and write
20BAB693000
trusted library allocation
page read and write
20BB102A000
trusted library allocation
page read and write
20BB11B8000
trusted library allocation
page read and write
20BAB857000
trusted library allocation
page read and write
20BA9633000
trusted library allocation
page read and write
20BB1700000
trusted library allocation
page read and write
20B9EDCE000
trusted library allocation
page read and write
12C8F2ED000
heap
page read and write
756000
unkown
page execute and write copy
20BA159B000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B9E82C000
trusted library allocation
page read and write
20BAB4DB000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BB11F1000
trusted library allocation
page read and write
20BA15DF000
trusted library allocation
page read and write
20BA1A12000
trusted library allocation
page read and write
20BAE22E000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA9690000
trusted library allocation
page read and write
20BB18EF000
trusted library allocation
page read and write
C302BD8000
stack
page read and write
20B9FD45000
trusted library allocation
page read and write
12C8F2A8000
heap
page read and write
20B984C6000
heap
page read and write
20B984F0000
heap
page read and write
20BA9651000
trusted library allocation
page read and write
20BAB4E3000
trusted library allocation
page read and write
20BA3D90000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984C1000
heap
page read and write
20BADBA8000
trusted library allocation
page read and write
20BAA6E3000
trusted library allocation
page read and write
20BA943C000
trusted library allocation
page read and write
20BA95CF000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20B984F2000
heap
page read and write
20BAAB87000
trusted library allocation
page read and write
20BA2E6F000
trusted library allocation
page read and write
20B9E64B000
trusted library allocation
page read and write
20BA32F4000
trusted library allocation
page read and write
20BA95B1000
trusted library allocation
page read and write
20B9E79A000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B9FD43000
trusted library allocation
page read and write
20B9E4E7000
trusted library allocation
page read and write
20B9E43A000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20BA95B1000
trusted library allocation
page read and write
20BA4A7D000
trusted library allocation
page read and write
12C8E2C0000
heap
page read and write
1C74000
heap
page read and write
54C1000
heap
page read and write
20B984BE000
heap
page read and write
2351000
heap
page read and write
20B984CD000
heap
page read and write
20BA9495000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20B984E1000
heap
page read and write
20BAE4E6000
trusted library allocation
page read and write
20BA1D6D000
trusted library allocation
page read and write
20BA94FE000
trusted library allocation
page read and write
20B9851D000
heap
page read and write
20B984EF000
heap
page read and write
20BA9634000
trusted library allocation
page read and write
20B9D566000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B9851D000
heap
page read and write
20B9853C000
heap
page read and write
20BAE2D7000
trusted library allocation
page read and write
20BAA6F6000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984E7000
heap
page read and write
20B9E7C1000
trusted library allocation
page read and write
20BA1D74000
trusted library allocation
page read and write
20BA96AC000
trusted library allocation
page read and write
20BA0F1D000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
28F87879000
trusted library allocation
page read and write
20BAABE0000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20BA3DA0000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20BA2EBF000
trusted library allocation
page read and write
54C1000
heap
page read and write
1BCF000
stack
page read and write
20BAB857000
trusted library allocation
page read and write
20B984E9000
heap
page read and write
20BA3DF4000
trusted library allocation
page read and write
20BB11B8000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9853E000
heap
page read and write
12C8F2F1000
heap
page read and write
12C8F36A000
heap
page read and write
20B984C7000
heap
page read and write
20BA945E000
trusted library allocation
page read and write
20BA280D000
trusted library allocation
page read and write
20BA4076000
trusted library allocation
page read and write
20BAE25C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E8000
heap
page read and write
20BAABDC000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
EE2000
unkown
page execute and write copy
20B984F0000
heap
page read and write
54C1000
heap
page read and write
20B984BC000
heap
page read and write
1BDB000
stack
page read and write
20BAB8A8000
trusted library allocation
page read and write
20BA2EE2000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
28F87812000
trusted library allocation
page read and write
5660000
heap
page read and write
20BA32C8000
trusted library allocation
page read and write
20BA15F7000
trusted library allocation
page read and write
20BA3F70000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
28F8790D000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA3A9C000
trusted library allocation
page read and write
C78EBFF000
stack
page read and write
20BA9681000
trusted library allocation
page read and write
20BAAF12000
trusted library allocation
page read and write
12C8F2E8000
heap
page read and write
20BA2C0A000
trusted library allocation
page read and write
20B984D1000
heap
page read and write
20B984E7000
heap
page read and write
20BAB4E3000
trusted library allocation
page read and write
20BAA0F7000
trusted library allocation
page read and write
20BAAB9F000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA968A000
trusted library allocation
page read and write
20BAA0B8000
trusted library allocation
page read and write
20BA2ECF000
trusted library allocation
page read and write
20BAB3DF000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B98501000
heap
page read and write
12C8F108000
trusted library allocation
page read and write
20BB11ED000
trusted library allocation
page read and write
54C1000
heap
page read and write
12C8E614000
trusted library allocation
page read and write
20B9EDA0000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
54C1000
heap
page read and write
28F875E0000
heap
page read and write
20B984A8000
heap
page read and write
20BA96F7000
trusted library allocation
page read and write
20B9D5E4000
trusted library allocation
page read and write
20B9CEBF000
trusted library allocation
page read and write
20BA2E84000
trusted library allocation
page read and write
6A3A000
heap
page read and write
20B984E8000
heap
page read and write
20BA9588000
trusted library allocation
page read and write
20BA32F4000
trusted library allocation
page read and write
20BA0FD7000
trusted library allocation
page read and write
20B9ED2A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA963D000
trusted library allocation
page read and write
20BA1716000
trusted library allocation
page read and write
20B9CEDF000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20BA14C8000
trusted library allocation
page read and write
20B9FDC4000
trusted library allocation
page read and write
20BA95DE000
trusted library allocation
page read and write
20BAB118000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA96D8000
trusted library allocation
page read and write
20BA1AC0000
trusted library allocation
page read and write
20BB1196000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA4A27000
trusted library allocation
page read and write
20BAABDE000
trusted library allocation
page read and write
20BA9E16000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3A7E000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
54C1000
heap
page read and write
20BA15A6000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20BA1D68000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BA9476000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
12C8E510000
heap
page readonly
20BA4071000
trusted library allocation
page read and write
20BA3AF2000
trusted library allocation
page read and write
20BADF5D000
trusted library allocation
page read and write
20BA33E1000
trusted library allocation
page read and write
20BAB80E000
trusted library allocation
page read and write
20BA1ABA000
trusted library allocation
page read and write
20BA280A000
trusted library allocation
page read and write
20BA96C4000
trusted library allocation
page read and write
20B984D8000
heap
page read and write
20BA145B000
trusted library allocation
page read and write
20BA2EBD000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BAAF45000
trusted library allocation
page read and write
20BAE455000
trusted library allocation
page read and write
20BA3AB4000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA37C6000
trusted library allocation
page read and write
20BA95C3000
trusted library allocation
page read and write
20BA9E16000
trusted library allocation
page read and write
20BA946F000
trusted library allocation
page read and write
20BB1091000
trusted library allocation
page read and write
25C5B107000
trusted library allocation
page read and write
12C8F2E0000
heap
page read and write
20B984DD000
heap
page read and write
20BA32F7000
trusted library allocation
page read and write
20BA94FC000
trusted library allocation
page read and write
20BB11E9000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAB3AE000
trusted library allocation
page read and write
20BA3EB4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E1000
heap
page read and write
20BA9493000
trusted library allocation
page read and write
20BAA654000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BAABC8000
trusted library allocation
page read and write
20BB10B3000
trusted library allocation
page read and write
20BA17CE000
trusted library allocation
page read and write
20BADF12000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9E6B9000
trusted library allocation
page read and write
20BA94FC000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9564000
trusted library allocation
page read and write
20BA96E1000
trusted library allocation
page read and write
20B984A6000
heap
page read and write
20BB117C000
trusted library allocation
page read and write
20BAE217000
trusted library allocation
page read and write
20BA1A3B000
trusted library allocation
page read and write
12C8F2E9000
heap
page read and write
20BA96CD000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BB260B000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BA3AF9000
trusted library allocation
page read and write
20BA1A1E000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB11F3000
trusted library allocation
page read and write
20BAB44C000
trusted library allocation
page read and write
20BA1FC3000
trusted library allocation
page read and write
20BAE2D7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA15C6000
trusted library allocation
page read and write
20BAB82A000
trusted library allocation
page read and write
20BB11E4000
trusted library allocation
page read and write
20BAE585000
trusted library allocation
page read and write
12C8F2E3000
heap
page read and write
54C1000
heap
page read and write
20BA9567000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA50BA000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20B984FC000
heap
page read and write
20B9EDB6000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
12C8F100000
trusted library allocation
page read and write
20BAE2BF000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BAABF4000
trusted library allocation
page read and write
20BA96AC000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
54C1000
heap
page read and write
20BAB8AE000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
C304478000
stack
page read and write
20BA3E8A000
trusted library allocation
page read and write
12C8F269000
heap
page read and write
23CC000
heap
page read and write
5314000
direct allocation
page execute and read and write
20BA1D7C000
trusted library allocation
page read and write
20BA33CA000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984E6000
heap
page read and write
20BA2E6F000
trusted library allocation
page read and write
20BAE4E6000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
213C000
heap
page read and write
20B984ED000
heap
page read and write
20BA9E30000
trusted library allocation
page read and write
20B984BC000
heap
page read and write
20BA1A23000
trusted library allocation
page read and write
25C5C9B3000
heap
page read and write
20BA96AC000
trusted library allocation
page read and write
20BA96E8000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA95EC000
trusted library allocation
page read and write
20BA95EF000
trusted library allocation
page read and write
20BA96F9000
trusted library allocation
page read and write
1F93000
heap
page read and write
54C1000
heap
page read and write
20B984CF000
heap
page read and write
20B9CECC000
trusted library allocation
page read and write
20BA1A6F000
trusted library allocation
page read and write
20BAE2C9000
trusted library allocation
page read and write
20BA1560000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAB12C000
trusted library allocation
page read and write
28F87803000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA965C000
trusted library allocation
page read and write
20BA50BA000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA95A2000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BB24AD000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20B9E7EB000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
12C8E610000
trusted library allocation
page read and write
20BAE5FC000
trusted library allocation
page read and write
20BAB191000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
20BAABF4000
trusted library allocation
page read and write
12C8F264000
heap
page read and write
20B98501000
heap
page read and write
20B984BA000
heap
page read and write
20B9851C000
heap
page read and write
20B984DE000
heap
page read and write
20BA95B6000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA966D000
trusted library allocation
page read and write
20BA0F38000
trusted library allocation
page read and write
1BBF000
stack
page read and write
54C1000
heap
page read and write
20B984B7000
heap
page read and write
20B984F0000
heap
page read and write
20B984FC000
heap
page read and write
20BAE3ED000
trusted library allocation
page read and write
20BA3309000
trusted library allocation
page read and write
20BA3AF4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BADF30000
trusted library allocation
page read and write
12C8E62F000
trusted library allocation
page read and write
20BA2ECF000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BAA6F6000
trusted library allocation
page read and write
20BAA6D9000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA1A17000
trusted library allocation
page read and write
20BA965A000
trusted library allocation
page read and write
12C8F269000
heap
page read and write
20B9EDDA000
trusted library allocation
page read and write
20BA96D8000
trusted library allocation
page read and write
20BA28EF000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E4000
heap
page read and write
20BAE48D000
trusted library allocation
page read and write
28F87700000
trusted library allocation
page read and write
20B9E469000
trusted library allocation
page read and write
20BAABB0000
trusted library allocation
page read and write
20BA15DF000
trusted library allocation
page read and write
20BA14C8000
trusted library allocation
page read and write
20B9E73C000
trusted library allocation
page read and write
20B9E7A6000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20BA96D4000
trusted library allocation
page read and write
5250000
heap
page read and write
20B984DE000
heap
page read and write
20B984DB000
heap
page read and write
20BAA6E3000
trusted library allocation
page read and write
20BA96FB000
trusted library allocation
page read and write
20BA96AE000
trusted library allocation
page read and write
240E000
heap
page read and write
20BAB82A000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20B984D1000
heap
page read and write
12C8F321000
heap
page read and write
20BA2EC2000
trusted library allocation
page read and write
23DF000
heap
page read and write
20BA145F000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BA9DFC000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA0FB6000
trusted library allocation
page read and write
20BB11F3000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA1A9F000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
20BA2EB4000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20BB17B2000
heap
page read and write
54C1000
heap
page read and write
20BAA63F000
trusted library allocation
page read and write
20BB2462000
trusted library allocation
page read and write
20BA96DA000
trusted library allocation
page read and write
20BA96AE000
trusted library allocation
page read and write
20BA946F000
trusted library allocation
page read and write
20B9D471000
trusted library allocation
page read and write
20B984EE000
heap
page read and write
20B984FC000
heap
page read and write
20B984D3000
heap
page read and write
20BAA65C000
trusted library allocation
page read and write
20BAB595000
trusted library allocation
page read and write
12C8F33B000
heap
page read and write
12C8F2E0000
heap
page read and write
20B984D6000
heap
page read and write
20B984C7000
heap
page read and write
20BA96F3000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA0F68000
trusted library allocation
page read and write
20BA32DA000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA1A0B000
trusted library allocation
page read and write
20B984CC000
heap
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20BA1A17000
trusted library allocation
page read and write
20BA9456000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BB1989000
trusted library allocation
page read and write
1C74000
heap
page read and write
20B984D0000
heap
page read and write
20BAB8D0000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
12C8F12D000
trusted library allocation
page read and write
20BA4A38000
trusted library allocation
page read and write
20BA17DC000
trusted library allocation
page read and write
20BA945E000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20B9ED79000
trusted library allocation
page read and write
20BAA63F000
trusted library allocation
page read and write
12C8E1D0000
unclassified section
page readonly
20BAE5F0000
trusted library allocation
page read and write
20BB1A33000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20BAE229000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984E1000
heap
page read and write
20BAB3EF000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA96D5000
trusted library allocation
page read and write
20BAA070000
trusted library allocation
page read and write
20BA2E45000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
12C8E270000
heap
page read and write
20BAB84B000
trusted library allocation
page read and write
20BAAFCC000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
20BA1ABA000
trusted library allocation
page read and write
20BAE2DD000
trusted library allocation
page read and write
20BA9643000
trusted library allocation
page read and write
20BAE48A000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA9674000
trusted library allocation
page read and write
20BA968A000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20B984C2000
heap
page read and write
1692A930000
unclassified section
page readonly
20BA1595000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20B984C6000
heap
page read and write
54C1000
heap
page read and write
1692A9EA000
heap
page read and write
20BA954D000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
1C74000
heap
page read and write
20BAA63B000
trusted library allocation
page read and write
1EF5000
heap
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
20BAB469000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
1E92000
heap
page read and write
20BA3253000
trusted library allocation
page read and write
54C1000
heap
page read and write
35827FE000
stack
page read and write
20BAAB9F000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
1692AD00000
trusted library allocation
page read and write
20BA145B000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984BC000
heap
page read and write
20BA95C1000
trusted library allocation
page read and write
20BA96FB000
trusted library allocation
page read and write
20BA2E9C000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20B984EC000
heap
page read and write
54C1000
heap
page read and write
20BA949B000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984D7000
heap
page read and write
20BA966A000
trusted library allocation
page read and write
12C8F377000
heap
page read and write
20B984E7000
heap
page read and write
20BAA652000
trusted library allocation
page read and write
20BA15D1000
trusted library allocation
page read and write
20BA159B000
trusted library allocation
page read and write
20BB1042000
trusted library allocation
page read and write
20BA2924000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA2E7E000
trusted library allocation
page read and write
112F0EC000
stack
page read and write
20BB1918000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984E0000
heap
page read and write
54C1000
heap
page read and write
20BAA690000
trusted library allocation
page read and write
20B984E8000
heap
page read and write
20B984F2000
heap
page read and write
20BB0D03000
trusted library allocation
page read and write
20BA95C8000
trusted library allocation
page read and write
20BA3D88000
trusted library allocation
page read and write
20B984DD000
heap
page read and write
20BA2689000
trusted library allocation
page read and write
20BB10A5000
trusted library allocation
page read and write
20BA0F56000
trusted library allocation
page read and write
20BA9690000
trusted library allocation
page read and write
20B9FD59000
trusted library allocation
page read and write
20BAE5D7000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B984E7000
heap
page read and write
20BB260F000
trusted library allocation
page read and write
20BB108A000
trusted library allocation
page read and write
20BA2E84000
trusted library allocation
page read and write
20BA9416000
trusted library allocation
page read and write
20BA3AEC000
trusted library allocation
page read and write
12C8F200000
heap
page read and write
20B984B7000
heap
page read and write
20BADB28000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B984E7000
heap
page read and write
20BA96EB000
trusted library allocation
page read and write
20BA964C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9851C000
heap
page read and write
20BAAB32000
trusted library allocation
page read and write
20BAAB7A000
trusted library allocation
page read and write
20BAE286000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20BAE258000
trusted library allocation
page read and write
20B984B0000
heap
page read and write
54C1000
heap
page read and write
20B984DB000
heap
page read and write
20BAAF68000
trusted library allocation
page read and write
20BA94F8000
trusted library allocation
page read and write
20BA96D5000
trusted library allocation
page read and write
20BA33C8000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9851C000
heap
page read and write
20BAAB7A000
trusted library allocation
page read and write
20BA9416000
trusted library allocation
page read and write
20BAA0E4000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA15C6000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BAE443000
trusted library allocation
page read and write
20BB108A000
trusted library allocation
page read and write
20BA94BE000
trusted library allocation
page read and write
20B9E6A7000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20B98501000
heap
page read and write
20BAA070000
trusted library allocation
page read and write
21BB000
heap
page read and write
20B984F0000
heap
page read and write
20BA208D000
trusted library allocation
page read and write
20B984E3000
heap
page read and write
20B9FDF1000
trusted library allocation
page read and write
20BA3F62000
trusted library allocation
page read and write
20BAB465000
trusted library allocation
page read and write
20B9E7BE000
trusted library allocation
page read and write
20BA96E5000
trusted library allocation
page read and write
20B98501000
heap
page read and write
28F87400000
unclassified section
page readonly
20BAB361000
trusted library allocation
page read and write
20BA3D55000
trusted library allocation
page read and write
20BA0F7A000
trusted library allocation
page read and write
12C8F2E9000
heap
page read and write
20B984C7000
heap
page read and write
20BA1FEA000
trusted library allocation
page read and write
20BA3A8A000
trusted library allocation
page read and write
20BA1794000
trusted library allocation
page read and write
20BAB195000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20BA399E000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20B984CD000
heap
page read and write
20B984DD000
heap
page read and write
20BAABC8000
trusted library allocation
page read and write
20BAE2C5000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
25C5AD90000
heap
page read and write
54C1000
heap
page read and write
20BA964C000
trusted library allocation
page read and write
20BA1444000
trusted library allocation
page read and write
20BA157D000
trusted library allocation
page read and write
20BAE20B000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984DE000
heap
page read and write
202F000
heap
page read and write
20BAE5D7000
trusted library allocation
page read and write
20BA17D6000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E3000
heap
page read and write
20B984E7000
heap
page read and write
20B984F5000
heap
page read and write
20BA1AA5000
trusted library allocation
page read and write
20BAAFFE000
trusted library allocation
page read and write
20BA50C7000
trusted library allocation
page read and write
20BA1573000
trusted library allocation
page read and write
20BA9E74000
trusted library allocation
page read and write
28F874B0000
heap
page read and write
20BB11F1000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C2000
heap
page read and write
20BA1457000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20B984FC000
heap
page read and write
20B9E78C000
trusted library allocation
page read and write
20BA94BE000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20BA9482000
trusted library allocation
page read and write
20B984E4000
heap
page read and write
20BA9643000
trusted library allocation
page read and write
20BA966D000
trusted library allocation
page read and write
28F87672000
unclassified section
page read and write
20BAB4BA000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20B9D42F000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BA1498000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B9851C000
heap
page read and write
20BAB870000
trusted library allocation
page read and write
20BA949B000
trusted library allocation
page read and write
20BAAD15000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20BAE23E000
trusted library allocation
page read and write
2148000
heap
page read and write
20B984DB000
heap
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20B984E7000
heap
page read and write
20BA96BF000
trusted library allocation
page read and write
20BA4AB8000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
1692A950000
heap
page read and write
20BB1799000
heap
page read and write
20BA1AB6000
trusted library allocation
page read and write
20BAA623000
trusted library allocation
page read and write
20BA94FE000
trusted library allocation
page read and write
28F87810000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BB11F9000
trusted library allocation
page read and write
20BB26F1000
trusted library allocation
page read and write
20B984EC000
heap
page read and write
20BAAFCC000
trusted library allocation
page read and write
20BA3DF6000
trusted library allocation
page read and write
20BA156F000
trusted library allocation
page read and write
20B984B3000
heap
page read and write
20B984DE000
heap
page read and write
20B984DE000
heap
page read and write
20BAABF4000
trusted library allocation
page read and write
20BA3A8D000
trusted library allocation
page read and write
20BAB197000
trusted library allocation
page read and write
1692AD0C000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20B9D526000
trusted library allocation
page read and write
20BAA652000
trusted library allocation
page read and write
20B984DB000
heap
page read and write
20BA1A5F000
trusted library allocation
page read and write
20BA964C000
trusted library allocation
page read and write
20BA2EF9000
trusted library allocation
page read and write
20B9E742000
trusted library allocation
page read and write
20BA3D90000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA33DF000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BAB4AB000
trusted library allocation
page read and write
20BAB4FC000
trusted library allocation
page read and write
20BA2692000
trusted library allocation
page read and write
20BB2561000
trusted library allocation
page read and write
20BA0FD3000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BB2622000
trusted library allocation
page read and write
20B984CC000
heap
page read and write
20BB11E4000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
27CDC480000
heap
page read and write
20BAABB2000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B984A8000
heap
page read and write
20BA9432000
trusted library allocation
page read and write
20BA1D80000
trusted library allocation
page read and write
20BA9451000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAABDC000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BADF28000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984FC000
heap
page read and write
20BB253B000
trusted library allocation
page read and write
20BA1D7C000
trusted library allocation
page read and write
20BA4A2C000
trusted library allocation
page read and write
20BA28E3000
trusted library allocation
page read and write
12C8F359000
heap
page read and write
54C1000
heap
page read and write
20BAAEEC000
trusted library allocation
page read and write
20BA3DCE000
trusted library allocation
page read and write
20BA1D7C000
trusted library allocation
page read and write
20BA1D4B000
trusted library allocation
page read and write
12C8F321000
heap
page read and write
20BB2D83000
trusted library allocation
page read and write
20B9E7BE000
trusted library allocation
page read and write
20BA9439000
trusted library allocation
page read and write
20B9E79D000
trusted library allocation
page read and write
20B984D0000
heap
page read and write
20B9853D000
heap
page read and write
20B984D4000
heap
page read and write
20BA32F4000
trusted library allocation
page read and write
25C5C9A0000
heap
page read and write
20B984C1000
heap
page read and write
20BA9423000
trusted library allocation
page read and write
54C1000
heap
page read and write
5070000
direct allocation
page execute and read and write
20B984E7000
heap
page read and write
20B984C2000
heap
page read and write
20B984B0000
heap
page read and write
20BA1A23000
trusted library allocation
page read and write
20B984EA000
heap
page read and write
54C1000
heap
page read and write
20BA2EF0000
trusted library allocation
page read and write
20B984E6000
heap
page read and write
20B9E7EB000
trusted library allocation
page read and write
20BA17D9000
trusted library allocation
page read and write
20BA965C000
trusted library allocation
page read and write
20BA15E6000
trusted library allocation
page read and write
20B984F5000
heap
page read and write
20BAB4A7000
trusted library allocation
page read and write
20B984E0000
heap
page read and write
20BA3254000
trusted library allocation
page read and write
28F8785D000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA946F000
trusted library allocation
page read and write
20BA968E000
trusted library allocation
page read and write
20B984CD000
heap
page read and write
20BAAFCC000
trusted library allocation
page read and write
20BA50FE000
trusted library allocation
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
20BA17EE000
trusted library allocation
page read and write
20BB10EF000
trusted library allocation
page read and write
20BA946F000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA948F000
trusted library allocation
page read and write
20B9E440000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984CE000
heap
page read and write
C3043FE000
unkown
page readonly
20B9853D000
heap
page read and write
20B984E1000
heap
page read and write
20BAABDA000
trusted library allocation
page read and write
112F1AE000
unkown
page readonly
54C1000
heap
page read and write
20BB11E7000
trusted library allocation
page read and write
20BB26F1000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BAA66C000
trusted library allocation
page read and write
20BAA0F7000
trusted library allocation
page read and write
20BA96D4000
trusted library allocation
page read and write
20BAAFEF000
trusted library allocation
page read and write
20BAE4E2000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984E7000
heap
page read and write
20B9D4F6000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984E1000
heap
page read and write
20BAAB54000
trusted library allocation
page read and write
20BAA0F7000
trusted library allocation
page read and write
20BAE23A000
trusted library allocation
page read and write
20BA9591000
trusted library allocation
page read and write
20BA32EA000
trusted library allocation
page read and write
8A0000
unkown
page execute and read and write
20BA9613000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3298000
trusted library allocation
page read and write
20BA3F54000
trusted library allocation
page read and write
1F3C000
heap
page read and write
20BA33C7000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAAF1B000
trusted library allocation
page read and write
1692ADAD000
trusted library allocation
page read and write
20B984D9000
heap
page read and write
20B984D7000
heap
page read and write
20BA95B3000
trusted library allocation
page read and write
119A000
stack
page read and write
20BA3D6F000
trusted library allocation
page read and write
20BA3FAC000
trusted library allocation
page read and write
20B984C6000
heap
page read and write
20BB10B0000
trusted library allocation
page read and write
20BA96EE000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B9853C000
heap
page read and write
20BA968E000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA2E28000
trusted library allocation
page read and write
20BAA0E4000
trusted library allocation
page read and write
20B984D4000
heap
page read and write
20BA32D3000
trusted library allocation
page read and write
20B984F8000
heap
page read and write
20BAA65B000
trusted library allocation
page read and write
20BA32F7000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20B984DE000
heap
page read and write
54C1000
heap
page read and write
C78E3FE000
stack
page read and write
20BA3D8C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BAABC8000
trusted library allocation
page read and write
20BA3A9E000
trusted library allocation
page read and write
20BAAF3C000
trusted library allocation
page read and write
20B9E7A8000
trusted library allocation
page read and write
20BA947A000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BAB595000
trusted library allocation
page read and write
20BAA08A000
trusted library allocation
page read and write
20B9FD49000
trusted library allocation
page read and write
20BA1FC7000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BAE2BD000
trusted library allocation
page read and write
12C8F358000
heap
page read and write
20B984E1000
heap
page read and write
20BAA654000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
1C4E000
stack
page read and write
54C1000
heap
page read and write
20BA95AE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20B984D3000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20B984C2000
heap
page read and write
20BA3DA2000
trusted library allocation
page read and write
54C1000
heap
page read and write
92F000
unkown
page execute and read and write
28F87A05000
heap
page read and write
20BB11F3000
trusted library allocation
page read and write
20BA96D4000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA32F0000
trusted library allocation
page read and write
20BAA6F0000
trusted library allocation
page read and write
20B984C8000
heap
page read and write
54C1000
heap
page read and write
20BA94BC000
trusted library allocation
page read and write
20BAE29B000
trusted library allocation
page read and write
20BAABC8000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20B984C0000
heap
page read and write
20BA409E000
trusted library allocation
page read and write
20BA95A2000
trusted library allocation
page read and write
20BAA63F000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
20B984E7000
heap
page read and write
27CDC700000
trusted library allocation
page read and write
20BAAB87000
trusted library allocation
page read and write
54C1000
heap
page read and write
28F87470000
remote allocation
page read and write
20BA9564000
trusted library allocation
page read and write
20BA2E7E000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
54C1000
heap
page read and write
4E3D000
stack
page read and write
20B984EE000
heap
page read and write
20BAABFE000
trusted library allocation
page read and write
20BAE221000
trusted library allocation
page read and write
235F000
heap
page read and write
27CDC3C0000
heap
page read and write
EE5000
unkown
page execute and write copy
20BA1DC3000
trusted library allocation
page read and write
12C8ECE0000
heap
page read and write
54C1000
heap
page read and write
54C1000
heap
page read and write
20BA946F000
trusted library allocation
page read and write
20BA9643000
trusted library allocation
page read and write
20B93026000
heap
page read and write
54C1000
heap
page read and write
20BA9400000
trusted library allocation
page read and write
20BA1A31000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA0FD3000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BAAD12000
trusted library allocation
page read and write
20BA2E84000
trusted library allocation
page read and write
C78D3FE000
stack
page read and write
20B984F5000
heap
page read and write
54C1000
heap
page read and write
20BAAF12000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20BA2EF0000
trusted library allocation
page read and write
20BA1D74000
trusted library allocation
page read and write
20BAB14A000
trusted library allocation
page read and write
20B9FDF0000
trusted library allocation
page read and write
54C1000
heap
page read and write
2E3FD0C1000
trusted library allocation
page execute read
20B984FC000
heap
page read and write
20BA3AEC000
trusted library allocation
page read and write
20B984FC000
heap
page read and write
20BAAF73000
trusted library allocation
page read and write
12C8F32C000
heap
page read and write
20BA1A76000
trusted library allocation
page read and write
20BA17B4000
trusted library allocation
page read and write
20BAB3B6000
trusted library allocation
page read and write
20BA1AB8000
trusted library allocation
page read and write
20BA96FE000
trusted library allocation
page read and write
20BA95B3000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
54C1000
heap
page read and write
20BAA66C000
trusted library allocation
page read and write
20BA4AE7000
trusted library allocation
page read and write
20BA0F56000
trusted library allocation
page read and write
20B98501000
heap
page read and write
1C74000
heap
page read and write
20BA96EE000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BAB85C000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984BE000
heap
page read and write
54C1000
heap
page read and write
20BA96BF000
trusted library allocation
page read and write
20BA96E5000
trusted library allocation
page read and write
20BA147F000
trusted library allocation
page read and write
20BA0FD6000
trusted library allocation
page read and write
54C3000
heap
page read and write
20BB1182000
trusted library allocation
page read and write
1692AD49000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
27CDC3E0000
heap
page read and write
20BB11A8000
trusted library allocation
page read and write
20B984E1000
heap
page read and write
20BA9443000
trusted library allocation
page read and write
20BAA669000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20BAE22E000
trusted library allocation
page read and write
20BA0F4E000
trusted library allocation
page read and write
20BAAF0A000
trusted library allocation
page read and write
20BA96DC000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
54C1000
heap
page read and write
20BA329B000
trusted library allocation
page read and write
20BA94FC000
trusted library allocation
page read and write
20BAABB0000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BAABED000
trusted library allocation
page read and write
20BB11DC000
trusted library allocation
page read and write
12C8F33B000
heap
page read and write
20BA3288000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA9465000
trusted library allocation
page read and write
20B984D6000
heap
page read and write
20BA39CE000
trusted library allocation
page read and write
20BA0F97000
trusted library allocation
page read and write
20B984A8000
heap
page read and write
20BA94D5000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20B984DC000
heap
page read and write
20B984D1000
heap
page read and write
20BAE4DE000
trusted library allocation
page read and write
20BA958B000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20BA95C1000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA964C000
trusted library allocation
page read and write
35FF90E000
stack
page read and write
20B984E7000
heap
page read and write
20B98501000
heap
page read and write
12C8E6CD000
trusted library allocation
page read and write
20BA1498000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984D6000
heap
page read and write
20BAA0BD000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
20B984FC000
heap
page read and write
28F87670000
unclassified section
page read and write
20B984F0000
heap
page read and write
20B984EC000
heap
page read and write
27CDC707000
trusted library allocation
page read and write
20B98501000
heap
page read and write
20B984FC000
heap
page read and write
20B984C2000
heap
page read and write
1692AF00000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20B984EF000
heap
page read and write
20BA96BF000
trusted library allocation
page read and write
20B984CF000
heap
page read and write
20BA32F6000
trusted library allocation
page read and write
20BA95C8000
trusted library allocation
page read and write
20BB0D00000
trusted library allocation
page read and write
20BA95CA000
trusted library allocation
page read and write
20BB1716000
trusted library allocation
page read and write
20BB1A04000
trusted library allocation
page read and write
20BB18C1000
trusted library allocation
page read and write
20BAA654000
trusted library allocation
page read and write
20BAE22C000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA0F68000
trusted library allocation
page read and write
20B984CB000
heap
page read and write
20BA2E09000
trusted library allocation
page read and write
12C8F28A000
heap
page read and write
20B984E1000
heap
page read and write
20BAA0A7000
trusted library allocation
page read and write
20BA0F8A000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C6000
heap
page read and write
20B984EB000
heap
page read and write
20BA3DD0000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20B984D8000
heap
page read and write
20BA50CD000
trusted library allocation
page read and write
12C8F2AA000
heap
page read and write
1BFF000
stack
page read and write
20B984C7000
heap
page read and write
20BA1D99000
trusted library allocation
page read and write
20BAE2DB000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
54C1000
heap
page read and write
20B984DE000
heap
page read and write
20BA98CD000
trusted library allocation
page read and write
20B984D2000
heap
page read and write
54C1000
heap
page read and write
20BA2E6F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984CE000
heap
page read and write
20BA149F000
trusted library allocation
page read and write
1692A9A0000
heap
page read and write
20BAA0CA000
trusted library allocation
page read and write
20BA2EE7000
trusted library allocation
page read and write
20BA0F73000
trusted library allocation
page read and write
20BB1012000
trusted library allocation
page read and write
20BA1D2F000
trusted library allocation
page read and write
20BAA0CF000
trusted library allocation
page read and write
1692AE00000
heap
page read and write
20BB11AA000
trusted library allocation
page read and write
20B984DD000
heap
page read and write
54C1000
heap
page read and write
20B984E1000
heap
page read and write
20B984BC000
heap
page read and write
20BA95F5000
trusted library allocation
page read and write
20BA96CD000
trusted library allocation
page read and write
20BAA400000
trusted library allocation
page read and write
20BA144D000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20BAA623000
trusted library allocation
page read and write
20BA3AA3000
trusted library allocation
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
20BA96CF000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
20BA3DDC000
trusted library allocation
page read and write
20BA1564000
trusted library allocation
page read and write
20BAB8E5000
trusted library allocation
page read and write
20BB11E9000
trusted library allocation
page read and write
20B984C0000
heap
page read and write
1C74000
heap
page read and write
1692AD76000
trusted library allocation
page read and write
20BAA627000
trusted library allocation
page read and write
20B984CA000
heap
page read and write
20B984E7000
heap
page read and write
20B9E446000
trusted library allocation
page read and write
20B984C1000
heap
page read and write
20BB11F9000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20B984E1000
heap
page read and write
20BA9662000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA15B3000
trusted library allocation
page read and write
20B9E4EB000
trusted library allocation
page read and write
20BA157F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA949F000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA96D5000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B9853C000
heap
page read and write
20B98501000
heap
page read and write
20B98501000
heap
page read and write
54C1000
heap
page read and write
12C8F2E3000
heap
page read and write
20BAE230000
trusted library allocation
page read and write
12C8F2ED000
heap
page read and write
54C1000
heap
page read and write
20B984D4000
heap
page read and write
12C8E648000
trusted library allocation
page read and write
20BA96E1000
trusted library allocation
page read and write
20BAE24A000
trusted library allocation
page read and write
20BA1705000
trusted library allocation
page read and write
12C8F36A000
heap
page read and write
20BAA05B000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984B0000
heap
page read and write
54C1000
heap
page read and write
20BAB1F5000
trusted library allocation
page read and write
20B9EDBD000
trusted library allocation
page read and write
20BA9613000
trusted library allocation
page read and write
20B9853C000
heap
page read and write
20B984C1000
heap
page read and write
20BA2E84000
trusted library allocation
page read and write
20BA1AD4000
trusted library allocation
page read and write
20BAB185000
trusted library allocation
page read and write
20B9FDF1000
trusted library allocation
page read and write
20B9851C000
heap
page read and write
54C1000
heap
page read and write
20BB10B3000
trusted library allocation
page read and write
20BAA0CF000
trusted library allocation
page read and write
54C1000
heap
page read and write
1692AC10000
unclassified section
page read and write
27CDC470000
heap
page read and write
20B98501000
heap
page read and write
20BAB3E7000
trusted library allocation
page read and write
20BAAF73000
trusted library allocation
page read and write
20BAAF21000
trusted library allocation
page read and write
20BA2EE2000
trusted library allocation
page read and write
20BA1AD2000
trusted library allocation
page read and write
54C1000
heap
page read and write
20B984C7000
heap
page read and write
20BA3FB2000
trusted library allocation
page read and write
20BA2EF0000
trusted library allocation
page read and write
2218000
heap
page read and write
20BB11D7000
trusted library allocation
page read and write
20BA9483000
trusted library allocation
page read and write
20BAAEFE000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA147D000
trusted library allocation
page read and write
20BAB461000
trusted library allocation
page read and write
20B9E7DD000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B9851C000
heap
page read and write
20B984C2000
heap
page read and write
20BA0F05000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20BA94E8000
trusted library allocation
page read and write
20BA9570000
trusted library allocation
page read and write
20BAE3BB000
trusted library allocation
page read and write
54C1000
heap
page read and write
20BA3E3F000
trusted library allocation
page read and write
35FF9CE000
unkown
page readonly
12C8F25F000
heap
page read and write
C30447B000
stack
page read and write
20BA95B1000
trusted library allocation
page read and write
1692ADB1000
trusted library allocation
page read and write
20BA1AB6000
trusted library allocation
page read and write
20BAB1C2000
trusted library allocation
page read and write
20BA968E000
trusted library allocation
page read and write
20BA2EA7000
trusted library allocation
page read and write
20BAAB87000
trusted library allocation
page read and write
20BA145F000
trusted library allocation
page read and write
20BA9585000
trusted library allocation
page read and write
20BAB8EB000
trusted library allocation
page read and write
20BA2671000
trusted library allocation
page read and write
20B984CE000
heap
page read and write
20B98501000
heap
page read and write
20BA4A5E000
trusted library allocation
page read and write
27CDC400000
heap
page read and write
20BAA659000
trusted library allocation
page read and write
20BB11B8000
trusted library allocation
page read and write
54C1000
heap
page read and write
1C74000
heap
page read and write
20B9E4FE000
trusted library allocation
page read and write
28F87823000
trusted library allocation
page read and write
20BB11E7000
trusted library allocation
page read and write
20B984C7000
heap
page read and write
54C1000
heap
page read and write
20B98501000
heap
page read and write
20B984D3000
heap
page read and write
20B984C1000
heap
page read and write
20B984E1000
heap
page read and write
20B984EF000
heap
page read and write
20BAA6D9000
trusted library allocation
page read and write
20BA2EC9000
trusted library allocation
page read and write
20BA9475000
trusted library allocation
page read and write
20BA3D7F000
trusted library allocation
page read and write
20BB11F3000
trusted library allocation
page read and write
1692A963000
heap
page read and write
20BA9423000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B9853C000
heap
page read and write
11313FE000
unkown
page readonly
20B984F5000
heap
page read and write
54C1000
heap
page read and write
12C8E532000
unclassified section
page read and write
20BA3AF2000
trusted library allocation
page read and write
20BA149F000
trusted library allocation
page read and write
20BAA458000
trusted library allocation
page read and write
20BA948B000
trusted library allocation
page read and write
20BA173D000
trusted library allocation
page read and write
20BA9DE3000
trusted library allocation
page read and write
20B984D5000
heap
page read and write
20BA0F41000
trusted library allocation
page read and write
20B984EA000
heap
page read and write
20BAB1C0000
trusted library allocation
page read and write
20B984E7000
heap
page read and write
20BA39E0000
trusted library allocation
page read and write
20BA9564000
trusted library allocation
page read and write
20B984F0000
heap
page read and write
20B984DB000
heap
page read and write
20B9E7DC000
trusted library allocation
page read and write
20B984F7000
heap
page read and write
20BB109D000
trusted library allocation
page read and write
20B984C2000
heap
page read and write
20BA157F000
trusted library allocation
page read and write
20BAAFCC000
trusted library allocation
page read and write
20B984DE000
heap
page read and write
20B984ED000
heap
page read and write
20B984C2000
heap
page read and write
20BA1D75000
trusted library allocation
page read and write
There are 4631 hidden memdumps, click here to show them.