IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2095acc-b576-490f-be2a-e88ee9820c13.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_d2095acc-b576-490f-be2a-e88ee9820c13.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\e90a4853-d3f2-4de9-8f20-71f9d94802fe (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\e90a4853-d3f2-4de9-8f20-71f9d94802fe.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2204 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9360d544-258c-40b5-a705-da6290788a6c} 7888 "\\.\pipe\gecko-crash-server-pipe.7888" 149c916d910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3840 -parentBuildID 20230927232528 -prefsHandle 4052 -prefMapHandle 3756 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4731ba06-e2a7-4d6f-bfe3-821b0451661e} 7888 "\\.\pipe\gecko-crash-server-pipe.7888" 149d8f2ff10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5144 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3476 -prefMapHandle 5344 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c82f3dcb-940f-40be-aa64-48f297a6d19a} 7888 "\\.\pipe\gecko-crash-server-pipe.7888" 149dafc0d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
https://www.olx.pl/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
unknown
https://support.mozilla.org/
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://www.google.com/complete/search
unknown
https://watch.sling.com/
unknown
https://getpocket.com/firefox/new_tab_learn_more/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/google/closure-compiler/issues/3177
unknown
https://www.google.com/complete/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.1.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
172.217.18.14
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.16.206
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.217.18.14
youtube.com
United States
151.101.1.91
services.addons.mozilla.org
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
149DA0F4000
trusted library allocation
page read and write
149E2EAA000
trusted library allocation
page read and write
149DAA74000
trusted library allocation
page read and write
173C000
heap
page read and write
149DC3BD000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149CFE74000
heap
page read and write
149CFE33000
heap
page read and write
149DB766000
trusted library allocation
page read and write
149E3495000
trusted library allocation
page read and write
149DB77C000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E1755000
trusted library allocation
page read and write
225F45E6000
heap
page read and write
149D8A1D000
trusted library allocation
page read and write
149D87F2000
heap
page read and write
149CFE55000
heap
page read and write
149CFE41000
heap
page read and write
D609FE000
unkown
page readonly
149CFE41000
heap
page read and write
149E1562000
trusted library allocation
page read and write
149E5C64000
trusted library allocation
page read and write
149DC3F0000
trusted library allocation
page read and write
149E6850000
trusted library allocation
page read and write
149DADBB000
trusted library allocation
page read and write
149D876E000
heap
page read and write
149CFE3E000
heap
page read and write
149E13A5000
trusted library allocation
page read and write
149DC3E0000
trusted library allocation
page read and write
149E2EDB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DB899000
trusted library allocation
page read and write
225F3EA0000
trusted library allocation
page read and write
225F4644000
heap
page read and write
149CFE40000
heap
page read and write
149CFEBF000
heap
page read and write
149E5974000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149CFE46000
heap
page read and write
149D9876000
trusted library allocation
page read and write
149DACF8000
trusted library allocation
page read and write
149DA7A9000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE52000
heap
page read and write
149CFE4F000
heap
page read and write
149D98F4000
trusted library allocation
page read and write
149D87B9000
heap
page read and write
149CFEB7000
heap
page read and write
149D8796000
heap
page read and write
149CFE96000
heap
page read and write
149DC3C3000
trusted library allocation
page read and write
149D8556000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149D5DCC000
trusted library allocation
page read and write
149DAFAA000
trusted library allocation
page read and write
149E2EB3000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE52000
heap
page read and write
149D8C04000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE20000
heap
page read and write
149E25EB000
trusted library allocation
page read and write
149E2731000
trusted library allocation
page read and write
149E2EB3000
trusted library allocation
page read and write
149D4ED6000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE56000
heap
page read and write
149DAC10000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DA0E5000
trusted library allocation
page read and write
149E24B2000
trusted library allocation
page read and write
149DABB6000
trusted library allocation
page read and write
149E6A91000
trusted library allocation
page read and write
149DAAFA000
trusted library allocation
page read and write
149E24DB000
trusted library allocation
page read and write
149D91A5000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DC2E0000
trusted library allocation
page read and write
149D5F13000
trusted library allocation
page read and write
1743000
heap
page read and write
149D8C9E000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE50000
heap
page read and write
1D27EC11000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DADBD000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149DAAA2000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E1731000
trusted library allocation
page read and write
149D879E000
heap
page read and write
1690000
heap
page read and write
149CFE50000
heap
page read and write
149E35DD000
trusted library allocation
page read and write
149DB8F6000
trusted library allocation
page read and write
149DA7B5000
trusted library allocation
page read and write
149DB869000
trusted library allocation
page read and write
149DAC77000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
C1E763E000
unkown
page readonly
149DA9C2000
trusted library allocation
page read and write
149E1790000
trusted library allocation
page read and write
149E345E000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
225F462A000
heap
page read and write
149DAF9B000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DADBB000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149DC3C9000
trusted library allocation
page read and write
149D8A58000
trusted library allocation
page read and write
149D9888000
trusted library allocation
page read and write
149CFE46000
heap
page read and write
149CFE55000
heap
page read and write
149DB3F3000
trusted library allocation
page read and write
225F45E3000
heap
page read and write
149DB876000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149E28D1000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
2054D103000
trusted library allocation
page read and write
149DC2D1000
trusted library allocation
page read and write
1F536900000
trusted library allocation
page read and write
1D27EA10000
heap
page read and write
149DB777000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149D4DFE000
trusted library allocation
page read and write
149DAD3D000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E3464000
trusted library allocation
page read and write
149CFE6C000
heap
page read and write
149DB85E000
trusted library allocation
page read and write
149D98B8000
trusted library allocation
page read and write
149DC245000
trusted library allocation
page read and write
149E28B7000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
149DA3AC000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE7B000
heap
page read and write
149CFE4F000
heap
page read and write
149CFE52000
heap
page read and write
149CFE47000
heap
page read and write
1737000
heap
page read and write
D60B3E000
stack
page read and write
149DA7C1000
trusted library allocation
page read and write
149D5DF5000
trusted library allocation
page read and write
149E2AD6000
trusted library allocation
page read and write
149E35C6000
trusted library allocation
page read and write
149D8C82000
trusted library allocation
page read and write
225F4600000
heap
page read and write
225F3968000
trusted library allocation
page read and write
149D8598000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFEBF000
heap
page read and write
149D87F2000
heap
page read and write
149CFE35000
heap
page read and write
2054D10F000
trusted library allocation
page read and write
149E24B2000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E34B7000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE41000
heap
page read and write
149CFE82000
heap
page read and write
149CFE52000
heap
page read and write
149CFE2C000
heap
page read and write
149DB8BE000
trusted library allocation
page read and write
149D7263000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149D8DE9000
trusted library allocation
page read and write
149D9876000
trusted library allocation
page read and write
1D27EC74000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149E246A000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DC3C9000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149D8AAB000
trusted library allocation
page read and write
149DAFB0000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE55000
heap
page read and write
149CFE64000
heap
page read and write
149E16AF000
trusted library allocation
page read and write
1660000
heap
page read and write
149DB7D6000
trusted library allocation
page read and write
149D60C7000
trusted library allocation
page read and write
149E245D000
trusted library allocation
page read and write
149DA7BE000
trusted library allocation
page read and write
149DA9AF000
trusted library allocation
page read and write
149DAA64000
trusted library allocation
page read and write
149E68AA000
trusted library allocation
page read and write
149DB78E000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E6A88000
trusted library allocation
page read and write
149E1712000
trusted library allocation
page read and write
149D4E6A000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DADE7000
trusted library allocation
page read and write
225F457D000
heap
page read and write
149CFE96000
heap
page read and write
149CFE2E000
heap
page read and write
149E248F000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DAC11000
trusted library allocation
page read and write
149DAD2F000
trusted library allocation
page read and write
149D8A13000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149E3468000
trusted library allocation
page read and write
149E5E24000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149E343C000
trusted library allocation
page read and write
149E34EF000
trusted library allocation
page read and write
1F536775000
heap
page read and write
149E6AE9000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE7B000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE20000
heap
page read and write
149D87B5000
heap
page read and write
149DB7AC000
trusted library allocation
page read and write
149E13E1000
trusted library allocation
page read and write
BFA8BFF000
stack
page read and write
149D4E9E000
trusted library allocation
page read and write
149DC34F000
trusted library allocation
page read and write
149E34BF000
trusted library allocation
page read and write
149DACDF000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DC3C0000
trusted library allocation
page read and write
149E1789000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
9FD9EBE000
stack
page read and write
149E16FB000
trusted library allocation
page read and write
149D8D58000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149D8D86000
trusted library allocation
page read and write
149DAA6B000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE40000
heap
page read and write
149E68AA000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE3F000
heap
page read and write
149D8548000
trusted library allocation
page read and write
149DAC7D000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E34EF000
trusted library allocation
page read and write
149DCDBC000
trusted library allocation
page read and write
149D72CA000
trusted library allocation
page read and write
149E17BA000
trusted library allocation
page read and write
149DCDB8000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFEA7000
heap
page read and write
149E7300000
trusted library allocation
page read and write
149DACA7000
trusted library allocation
page read and write
2054CFC8000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE50000
heap
page read and write
15C4000
heap
page read and write
149E34ED000
trusted library allocation
page read and write
149E67AB000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DB7B0000
trusted library allocation
page read and write
149D94BE000
trusted library allocation
page read and write
149E170B000
trusted library allocation
page read and write
149E27B2000
trusted library allocation
page read and write
2054CBA0000
heap
page read and write
149CFE5A000
heap
page read and write
149CFE55000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE41000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE51000
heap
page read and write
149E3495000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149CFE67000
heap
page read and write
149D94E5000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149E3432000
trusted library allocation
page read and write
149D8772000
heap
page read and write
149CFE45000
heap
page read and write
149D855A000
trusted library allocation
page read and write
149DA799000
trusted library allocation
page read and write
225F4564000
heap
page read and write
149E17BD000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149D8C82000
trusted library allocation
page read and write
149DA9AD000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149E34F3000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE55000
heap
page read and write
149D985D000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DAFD9000
trusted library allocation
page read and write
149CFE49000
heap
page read and write
149E16FB000
trusted library allocation
page read and write
149DC3F0000
trusted library allocation
page read and write
149E2EEA000
trusted library allocation
page read and write
149DAFD4000
trusted library allocation
page read and write
149CFE4F000
heap
page read and write
211000
unkown
page execute read
149DAD23000
trusted library allocation
page read and write
2E0000
unkown
page write copy
149DAE90000
trusted library allocation
page read and write
149E28AF000
trusted library allocation
page read and write
149CFE63000
heap
page read and write
149DA9C0000
trusted library allocation
page read and write
149DB7AC000
trusted library allocation
page read and write
149D92B7000
trusted library allocation
page read and write
149DB816000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE40000
heap
page read and write
149CFE41000
heap
page read and write
149E149F000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
225F4501000
heap
page read and write
149E2794000
trusted library allocation
page read and write
149E16CD000
trusted library allocation
page read and write
225F45A1000
heap
page read and write
149D4EF0000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE69000
heap
page read and write
149CFE4C000
heap
page read and write
2D2000
unkown
page readonly
149D6052000
trusted library allocation
page read and write
149D876E000
heap
page read and write
149E34F5000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149CFE45000
heap
page read and write
149D5D30000
trusted library allocation
page read and write
149D98F6000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE5B000
heap
page read and write
149DB7E2000
trusted library allocation
page read and write
2054CF96000
trusted library allocation
page read and write
149CFE36000
heap
page read and write
149CFE52000
heap
page read and write
149CFE40000
heap
page read and write
149D60C1000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
225F3900000
trusted library allocation
page read and write
149DC3BD000
trusted library allocation
page read and write
149DA99D000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149E34CA000
trusted library allocation
page read and write
149DCDC9000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149CFE53000
heap
page read and write
149CFE9B000
heap
page read and write
2054CAF0000
unclassified section
page readonly
149CFE55000
heap
page read and write
1737000
heap
page read and write
149D852D000
trusted library allocation
page read and write
149DA759000
trusted library allocation
page read and write
149DA77F000
trusted library allocation
page read and write
149D60A1000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149DB7BE000
trusted library allocation
page read and write
149D9838000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149D87BD000
heap
page read and write
149DB752000
trusted library allocation
page read and write
149D5DDA000
trusted library allocation
page read and write
149D9883000
trusted library allocation
page read and write
2054CF23000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E2ED9000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149D4EF0000
trusted library allocation
page read and write
149D8563000
trusted library allocation
page read and write
149D8C6A000
trusted library allocation
page read and write
149E28B0000
trusted library allocation
page read and write
149D98D2000
trusted library allocation
page read and write
149D7274000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE46000
heap
page read and write
149E2794000
trusted library allocation
page read and write
149CFE6C000
heap
page read and write
149CFE40000
heap
page read and write
79561FF000
stack
page read and write
149CFE96000
heap
page read and write
149D72BC000
trusted library allocation
page read and write
149DB3D7000
trusted library allocation
page read and write
149D8A56000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE96000
heap
page read and write
149CFE52000
heap
page read and write
149E13C1000
trusted library allocation
page read and write
149CFE68000
heap
page read and write
149E6A48000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE7B000
heap
page read and write
149E2E71000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149DA77A000
trusted library allocation
page read and write
149D7262000
trusted library allocation
page read and write
149D9EF9000
trusted library allocation
page read and write
D60B7E000
unkown
page readonly
149D98F4000
trusted library allocation
page read and write
149D9AAD000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D98C4000
trusted library allocation
page read and write
1D27EF0C000
trusted library allocation
page read and write
149E3599000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
D60A7E000
unkown
page readonly
149CFEB9000
heap
page read and write
149D989E000
trusted library allocation
page read and write
BFA83FE000
stack
page read and write
149DB7FB000
trusted library allocation
page read and write
149D87B5000
heap
page read and write
149DA7D3000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE53000
heap
page read and write
149E27A0000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DAC51000
trusted library allocation
page read and write
149D4EAB000
trusted library allocation
page read and write
1D27EC66000
trusted library allocation
page read and write
149E27AD000
trusted library allocation
page read and write
149D8C5E000
trusted library allocation
page read and write
149E178C000
trusted library allocation
page read and write
149E24DB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DB7B4000
trusted library allocation
page read and write
149DA9A5000
trusted library allocation
page read and write
149E35C2000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E6A5F000
trusted library allocation
page read and write
149E2AA3000
trusted library allocation
page read and write
225F45E8000
heap
page read and write
149CFE4C000
heap
page read and write
149E6AA3000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
225F4658000
heap
page read and write
149D8D8C000
trusted library allocation
page read and write
225F37D0000
heap
page read and write
149D8521000
trusted library allocation
page read and write
1D27EC8F000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149E3450000
trusted library allocation
page read and write
149E7147000
heap
page read and write
149E34EB000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149E28EE000
trusted library allocation
page read and write
149E34A3000
trusted library allocation
page read and write
2E4000
unkown
page readonly
149DA79D000
trusted library allocation
page read and write
149DAD64000
trusted library allocation
page read and write
225F35A0000
unclassified section
page readonly
149DA7B8000
trusted library allocation
page read and write
149E2E57000
trusted library allocation
page read and write
149D6091000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
2054D0F4000
heap
page read and write
225F4669000
heap
page read and write
149DAA64000
trusted library allocation
page read and write
149E34C8000
trusted library allocation
page read and write
149DACAD000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149E6A88000
trusted library allocation
page read and write
149DAB92000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149D60C7000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DAA74000
trusted library allocation
page read and write
149E164A000
trusted library allocation
page read and write
C1E5DFE000
stack
page read and write
149E6ABF000
trusted library allocation
page read and write
149E1559000
trusted library allocation
page read and write
149E17E5000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE47000
heap
page read and write
149D4E9E000
trusted library allocation
page read and write
149E34F7000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE35000
heap
page read and write
149E35C2000
trusted library allocation
page read and write
149DAD43000
trusted library allocation
page read and write
149E2742000
trusted library allocation
page read and write
149D5D42000
trusted library allocation
page read and write
149DB400000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149E27AD000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149CFE9B000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE72000
heap
page read and write
149E34B7000
trusted library allocation
page read and write
149E6A50000
trusted library allocation
page read and write
149DC398000
trusted library allocation
page read and write
1D27E760000
heap
page read and write
149DC34D000
trusted library allocation
page read and write
149DB81B000
trusted library allocation
page read and write
149E5BEF000
trusted library allocation
page read and write
149E17AA000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149E28B0000
trusted library allocation
page read and write
225F4644000
heap
page read and write
149DC3C3000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149DC3E0000
trusted library allocation
page read and write
149D985D000
trusted library allocation
page read and write
149DA7D3000
trusted library allocation
page read and write
149E5E23000
trusted library allocation
page read and write
149DB077000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149DABD1000
trusted library allocation
page read and write
149DC3C0000
trusted library allocation
page read and write
149DAEF1000
trusted library allocation
page read and write
225F4677000
heap
page read and write
149D9479000
trusted library allocation
page read and write
149E71B8000
heap
page read and write
149E7101000
heap
page read and write
1F53820F000
heap
page read and write
200B3DA9000
heap
page read and write
149D8D84000
trusted library allocation
page read and write
149E35E9000
trusted library allocation
page read and write
149D85F4000
trusted library allocation
page read and write
149D4EAE000
trusted library allocation
page read and write
149DAC8D000
trusted library allocation
page read and write
149E288B000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE2C000
heap
page read and write
149D8D5E000
trusted library allocation
page read and write
149DB7B4000
trusted library allocation
page read and write
149E13D0000
trusted library allocation
page read and write
149D98B8000
trusted library allocation
page read and write
149DABF7000
trusted library allocation
page read and write
149E34F5000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE65000
heap
page read and write
149CFEA7000
heap
page read and write
149D5D50000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E2EB5000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149DA9AD000
trusted library allocation
page read and write
149DACDF000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE3A000
heap
page read and write
2054CC90000
heap
page read and write
149E14F6000
trusted library allocation
page read and write
149D87A6000
heap
page read and write
225F457D000
heap
page read and write
149CFE74000
heap
page read and write
149D87A3000
heap
page read and write
149E5948000
trusted library allocation
page read and write
149DACF0000
trusted library allocation
page read and write
149E7D83000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DAC16000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DC3EC000
trusted library allocation
page read and write
149E5E01000
trusted library allocation
page read and write
1D27ECA7000
trusted library allocation
page read and write
225F455C000
heap
page read and write
149E6D00000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149D987E000
trusted library allocation
page read and write
149E27E9000
trusted library allocation
page read and write
149D91EE000
trusted library allocation
page read and write
2054CFCB000
trusted library allocation
page read and write
225F4563000
heap
page read and write
149E245D000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
1D27ECF4000
trusted library allocation
page read and write
149D8C9E000
trusted library allocation
page read and write
149D878D000
heap
page read and write
149D87BD000
heap
page read and write
149D8772000
heap
page read and write
149CFEBE000
heap
page read and write
1F536782000
heap
page read and write
149DB8BE000
trusted library allocation
page read and write
149D5F83000
trusted library allocation
page read and write
149D98B8000
trusted library allocation
page read and write
149DADBD000
trusted library allocation
page read and write
149D9883000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149DB787000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149CFEBF000
heap
page read and write
149DAC7B000
trusted library allocation
page read and write
149D5F1E000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149E2E3C000
trusted library allocation
page read and write
149E15C6000
trusted library allocation
page read and write
149E12FC000
trusted library allocation
page read and write
149DCDED000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149E5C62000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149CFE96000
heap
page read and write
149CFE33000
heap
page read and write
149CFE33000
heap
page read and write
149CFE68000
heap
page read and write
149DAFE4000
trusted library allocation
page read and write
149E2433000
trusted library allocation
page read and write
149DC2D4000
trusted library allocation
page read and write
149D985D000
trusted library allocation
page read and write
149D5DD3000
trusted library allocation
page read and write
149CFE29000
heap
page read and write
149D87B5000
heap
page read and write
1743000
heap
page read and write
149CFE96000
heap
page read and write
149CFEB6000
heap
page read and write
149DC374000
trusted library allocation
page read and write
149E5C6C000
trusted library allocation
page read and write
149DACF8000
trusted library allocation
page read and write
149E34F7000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
225F3923000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149E34A5000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149DAC4C000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E5C66000
trusted library allocation
page read and write
149DAA56000
trusted library allocation
page read and write
225F455C000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE45000
heap
page read and write
149DB3EE000
trusted library allocation
page read and write
149E174C000
trusted library allocation
page read and write
225F4677000
heap
page read and write
1733000
heap
page read and write
149E249B000
trusted library allocation
page read and write
149DAFAD000
trusted library allocation
page read and write
149E13B9000
trusted library allocation
page read and write
200B3F00000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DAD61000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
149E2ED1000
trusted library allocation
page read and write
149D9881000
trusted library allocation
page read and write
149E13EA000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149DB0B5000
trusted library allocation
page read and write
225F4677000
heap
page read and write
149CFE5C000
heap
page read and write
149D9425000
trusted library allocation
page read and write
2054CF72000
trusted library allocation
page read and write
149E13B3000
trusted library allocation
page read and write
149D8D67000
trusted library allocation
page read and write
149E1545000
trusted library allocation
page read and write
149D98F4000
trusted library allocation
page read and write
149DAD5A000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D5D5C000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE20000
heap
page read and write
149E248D000
trusted library allocation
page read and write
3DFDB761000
trusted library allocation
page execute read
149D8C9E000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
2054CF2E000
trusted library allocation
page read and write
149DACEF000
trusted library allocation
page read and write
1D27E9D0000
heap
page read and write
149E5BC0000
trusted library allocation
page read and write
149CFE36000
heap
page read and write
149E6843000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D8561000
trusted library allocation
page read and write
149D6080000
trusted library allocation
page read and write
149D6099000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149DC3C3000
trusted library allocation
page read and write
149E5BFB000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149CFE50000
heap
page read and write
149D87F2000
heap
page read and write
149D8A78000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149D8D3B000
trusted library allocation
page read and write
149E26EC000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFEB9000
heap
page read and write
149D98F4000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
225F45E3000
heap
page read and write
149CFE7B000
heap
page read and write
149E6A5F000
trusted library allocation
page read and write
149E243D000
trusted library allocation
page read and write
149D8DD3000
trusted library allocation
page read and write
149DC38C000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E2717000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E28BE000
trusted library allocation
page read and write
149D72E9000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D989B000
trusted library allocation
page read and write
149E25EB000
trusted library allocation
page read and write
149DAD3D000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE2E000
heap
page read and write
149CFE74000
heap
page read and write
149CFE2E000
heap
page read and write
149CFE55000
heap
page read and write
149CFE82000
heap
page read and write
149CFE3E000
heap
page read and write
149E16DD000
trusted library allocation
page read and write
149E34EF000
trusted library allocation
page read and write
149E6AA6000
trusted library allocation
page read and write
149E25EB000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E17E2000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DC3D6000
trusted library allocation
page read and write
149DB3F8000
trusted library allocation
page read and write
149E68F6000
trusted library allocation
page read and write
149DAC51000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE3F000
heap
page read and write
149DACC4000
trusted library allocation
page read and write
149E358B000
trusted library allocation
page read and write
149E5CF9000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE64000
heap
page read and write
149D8516000
trusted library allocation
page read and write
225F39C7000
trusted library allocation
page read and write
149E2EB3000
trusted library allocation
page read and write
149E6A79000
trusted library allocation
page read and write
149CFE60000
heap
page read and write
225F4669000
heap
page read and write
C1E436E000
stack
page read and write
149D98F7000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149D8C8A000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE50000
heap
page read and write
149E13C7000
trusted library allocation
page read and write
149E5DB4000
trusted library allocation
page read and write
3F71000
heap
page read and write
149D4D23000
trusted library allocation
page read and write
149E17E5000
trusted library allocation
page read and write
149E3400000
trusted library allocation
page read and write
149D722F000
trusted library allocation
page read and write
149DB816000
trusted library allocation
page read and write
149D87A6000
heap
page read and write
149CFE50000
heap
page read and write
149E27C2000
trusted library allocation
page read and write
149DA9A5000
trusted library allocation
page read and write
149E34BF000
trusted library allocation
page read and write
149D8A72000
trusted library allocation
page read and write
149E28F0000
trusted library allocation
page read and write
149DAC1E000
trusted library allocation
page read and write
149E28E2000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149E28CA000
trusted library allocation
page read and write
2054CC00000
heap
page read and write
149E68D4000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E0E00000
trusted library allocation
page read and write
149D8D68000
trusted library allocation
page read and write
149D9EC3000
trusted library allocation
page read and write
149E246E000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149CFE74000
heap
page read and write
149D98CB000
trusted library allocation
page read and write
149DB783000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149E34C8000
trusted library allocation
page read and write
149E2E2B000
trusted library allocation
page read and write
149E14A8000
trusted library allocation
page read and write
149CFE49000
heap
page read and write
149CFE60000
heap
page read and write
149D879E000
heap
page read and write
149E6892000
trusted library allocation
page read and write
149D8D84000
trusted library allocation
page read and write
C1E43AE000
unkown
page readonly
149DADBD000
trusted library allocation
page read and write
149D5F90000
trusted library allocation
page read and write
149E27B2000
trusted library allocation
page read and write
149DB896000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE41000
heap
page read and write
149E1465000
trusted library allocation
page read and write
149CFE39000
heap
page read and write
149DA99D000
trusted library allocation
page read and write
149DAF6D000
trusted library allocation
page read and write
149DAC4C000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149CFE46000
heap
page read and write
200B3D80000
heap
page read and write
149E24C7000
trusted library allocation
page read and write
149D9899000
trusted library allocation
page read and write
149DAC83000
trusted library allocation
page read and write
149DB798000
trusted library allocation
page read and write
149E59D6000
trusted library allocation
page read and write
149DAC3B000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DB7A0000
trusted library allocation
page read and write
225F3593000
remote allocation
page execute read
1F53678D000
heap
page read and write
149D8D3D000
trusted library allocation
page read and write
149DB7FB000
trusted library allocation
page read and write
149DB89C000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149D4EAB000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149E3468000
trusted library allocation
page read and write
149E2783000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D87BD000
heap
page read and write
149DA7E6000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E17AD000
trusted library allocation
page read and write
225F3780000
unclassified section
page read and write
149E6A88000
trusted library allocation
page read and write
149E3466000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE5C000
heap
page read and write
149DB8EC000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E25FB000
trusted library allocation
page read and write
149CFE5C000
heap
page read and write
149E2EB5000
trusted library allocation
page read and write
149DB0F0000
trusted library allocation
page read and write
149DAB7C000
trusted library allocation
page read and write
149DACC9000
trusted library allocation
page read and write
149DAC6D000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE4A000
heap
page read and write
1F53820E000
heap
page read and write
149E0E16000
trusted library allocation
page read and write
149DA9AF000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D47BF000
trusted library allocation
page read and write
149D9E1E000
trusted library allocation
page read and write
149E27AD000
trusted library allocation
page read and write
225F4569000
heap
page read and write
149E6A6F000
trusted library allocation
page read and write
149DAF9B000
trusted library allocation
page read and write
149E68A7000
trusted library allocation
page read and write
149DB787000
trusted library allocation
page read and write
149E1593000
trusted library allocation
page read and write
149E28F0000
trusted library allocation
page read and write
149DAD29000
trusted library allocation
page read and write
149DAD34000
trusted library allocation
page read and write
149D72CF000
trusted library allocation
page read and write
149E6A3B000
trusted library allocation
page read and write
149D9853000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D87A3000
heap
page read and write
149E71E1000
heap
page read and write
149DA9B1000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149DAC3D000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE55000
heap
page read and write
149D91E2000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFEBE000
heap
page read and write
149E27A9000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149DAB4A000
trusted library allocation
page read and write
149D949F000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149E24A4000
trusted library allocation
page read and write
1D27EE00000
trusted library allocation
page read and write
149DA7CA000
trusted library allocation
page read and write
149DC2EE000
trusted library allocation
page read and write
149E1583000
trusted library allocation
page read and write
BFA7BFF000
stack
page read and write
149DACEB000
trusted library allocation
page read and write
149E245B000
trusted library allocation
page read and write
149DABCC000
trusted library allocation
page read and write
149E343E000
trusted library allocation
page read and write
149D8A00000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149E5E63000
trusted library allocation
page read and write
149E27D8000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E2492000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149E2EDB000
trusted library allocation
page read and write
149CFE72000
heap
page read and write
149CFEA7000
heap
page read and write
149E28D4000
trusted library allocation
page read and write
149D91B8000
trusted library allocation
page read and write
149DAC8D000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E2893000
trusted library allocation
page read and write
149D5FA9000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE2E000
heap
page read and write
149E7101000
heap
page read and write
225F392F000
trusted library allocation
page read and write
149E5CCB000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149DC34D000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149D8548000
trusted library allocation
page read and write
225F462D000
heap
page read and write
149DB0DC000
trusted library allocation
page read and write
149E15DA000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE40000
heap
page read and write
149E34F5000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DA39A000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149CFE49000
heap
page read and write
149E24B6000
trusted library allocation
page read and write
225F4407000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DAFCF000
trusted library allocation
page read and write
149E13DD000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DABA3000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE47000
heap
page read and write
149E5C70000
trusted library allocation
page read and write
149E172E000
trusted library allocation
page read and write
149E68E3000
trusted library allocation
page read and write
149D98C3000
trusted library allocation
page read and write
149D4D76000
trusted library allocation
page read and write
149E14A8000
trusted library allocation
page read and write
149E34B7000
trusted library allocation
page read and write
149D607E000
trusted library allocation
page read and write
225F458A000
heap
page read and write
149D8521000
trusted library allocation
page read and write
149E25DD000
trusted library allocation
page read and write
149E3468000
trusted library allocation
page read and write
149E2ED9000
trusted library allocation
page read and write
225F455F000
heap
page read and write
1F53820C000
heap
page read and write
149CFE74000
heap
page read and write
149CFE96000
heap
page read and write
149DAD7F000
trusted library allocation
page read and write
149E6AC4000
trusted library allocation
page read and write
149DAD1A000
trusted library allocation
page read and write
149D5FE8000
trusted library allocation
page read and write
149DA348000
trusted library allocation
page read and write
149DA9C8000
trusted library allocation
page read and write
149E156A000
trusted library allocation
page read and write
149DABA7000
trusted library allocation
page read and write
149E28D6000
trusted library allocation
page read and write
149CFE4F000
heap
page read and write
149E126C000
trusted library allocation
page read and write
173E000
heap
page read and write
149CFE50000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149D5FC4000
trusted library allocation
page read and write
149DACB2000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E2EEE000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149D8D57000
trusted library allocation
page read and write
149E3443000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DAD30000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE96000
heap
page read and write
149DAD6D000
trusted library allocation
page read and write
149E28EE000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
225F3948000
trusted library allocation
page read and write
149DB8CE000
trusted library allocation
page read and write
149E2748000
trusted library allocation
page read and write
1D27EC49000
trusted library allocation
page read and write
149CFE5D000
heap
page read and write
149DB79C000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149D9E20000
trusted library allocation
page read and write
149D94AE000
trusted library allocation
page read and write
149DAFE4000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149D8C88000
trusted library allocation
page read and write
149D8A36000
trusted library allocation
page read and write
149D6077000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E6A3A000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149CFEA7000
heap
page read and write
149DAF65000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149E6750000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE50000
heap
page read and write
149CFE20000
heap
page read and write
149DAC46000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149DA9C2000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
9FD62AE000
unkown
page readonly
149DB7A0000
trusted library allocation
page read and write
149DAFB8000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
1D27EC69000
trusted library allocation
page read and write
149D72D8000
trusted library allocation
page read and write
149E6ABF000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DABE3000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE5B000
heap
page read and write
149DAC83000
trusted library allocation
page read and write
149CFE21000
heap
page read and write
149CFE82000
heap
page read and write
149CFEBF000
heap
page read and write
149D8C3B000
trusted library allocation
page read and write
149E5B8A000
trusted library allocation
page read and write
149DAC74000
trusted library allocation
page read and write
149CFE51000
heap
page read and write
225F458A000
heap
page read and write
149DA71A000
trusted library allocation
page read and write
149DAAED000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE9B000
heap
page read and write
149D72E2000
trusted library allocation
page read and write
149E6F00000
trusted library allocation
page read and write
149DB2A5000
trusted library allocation
page read and write
149E5997000
trusted library allocation
page read and write
149D8D3D000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFEB9000
heap
page read and write
149DACFC000
trusted library allocation
page read and write
149D98F4000
trusted library allocation
page read and write
149E34F3000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149DACF8000
trusted library allocation
page read and write
2054D11F000
trusted library allocation
page read and write
149E2894000
trusted library allocation
page read and write
149DAC24000
trusted library allocation
page read and write
149E27BF000
trusted library allocation
page read and write
149D8DBA000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E127E000
trusted library allocation
page read and write
149D8D74000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE3A000
heap
page read and write
D6237E000
stack
page read and write
149E2EE4000
trusted library allocation
page read and write
149E34FB000
trusted library allocation
page read and write
149E27B6000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149CFE67000
heap
page read and write
149DB275000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149CFE7B000
heap
page read and write
149DB7B4000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE52000
heap
page read and write
149CFE64000
heap
page read and write
149DAAF7000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFEBE000
heap
page read and write
149D9AD2000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149D60BC000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149DAC0D000
trusted library allocation
page read and write
149DAC48000
trusted library allocation
page read and write
149DADBB000
trusted library allocation
page read and write
149E1520000
trusted library allocation
page read and write
149E244A000
trusted library allocation
page read and write
149DB81B000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149DC3F0000
trusted library allocation
page read and write
149E34BF000
trusted library allocation
page read and write
149DAD43000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D98F6000
trusted library allocation
page read and write
149E7700000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
225F3F61000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE50000
heap
page read and write
149D98C8000
trusted library allocation
page read and write
149D4E7F000
trusted library allocation
page read and write
149D5F69000
trusted library allocation
page read and write
149D8C07000
trusted library allocation
page read and write
149E687F000
trusted library allocation
page read and write
149DACAE000
trusted library allocation
page read and write
149DAC3D000
trusted library allocation
page read and write
225F4560000
heap
page read and write
149CFE55000
heap
page read and write
149CFE20000
heap
page read and write
149CFEBE000
heap
page read and write
149D98D2000
trusted library allocation
page read and write
149DB7C4000
trusted library allocation
page read and write
149DAAB3000
trusted library allocation
page read and write
149D87F2000
heap
page read and write
149CFEA7000
heap
page read and write
149DC285000
trusted library allocation
page read and write
149DAAFC000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D8C56000
trusted library allocation
page read and write
149E177C000
trusted library allocation
page read and write
149DC398000
trusted library allocation
page read and write
149E35C2000
trusted library allocation
page read and write
149E15E2000
trusted library allocation
page read and write
149DAF51000
trusted library allocation
page read and write
149D60F6000
trusted library allocation
page read and write
149E1677000
trusted library allocation
page read and write
149E6A88000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E271F000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
15C4000
heap
page read and write
149E25CE000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE52000
heap
page read and write
149CFE2C000
heap
page read and write
149D4D23000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DACF6000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149D5DC3000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149D8CA5000
trusted library allocation
page read and write
149CFE6F000
heap
page read and write
149D72CF000
trusted library allocation
page read and write
149DA70A000
trusted library allocation
page read and write
149E17AD000
trusted library allocation
page read and write
149D5DA7000
trusted library allocation
page read and write
149D87A6000
heap
page read and write
149E34F7000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E6A6F000
trusted library allocation
page read and write
149E2FE4000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149DAFCF000
trusted library allocation
page read and write
149E3450000
trusted library allocation
page read and write
149E6ABF000
trusted library allocation
page read and write
149E6A69000
trusted library allocation
page read and write
149E67F9000
trusted library allocation
page read and write
149CFE63000
heap
page read and write
149E28F0000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149D72DC000
trusted library allocation
page read and write
149DAD8E000
trusted library allocation
page read and write
149DAD67000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E24E4000
trusted library allocation
page read and write
9FD863E000
unkown
page readonly
149E6A83000
trusted library allocation
page read and write
149D8C1F000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DA7F7000
trusted library allocation
page read and write
149DAFEF000
trusted library allocation
page read and write
149E24B2000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE45000
heap
page read and write
149E34CA000
trusted library allocation
page read and write
149E3460000
trusted library allocation
page read and write
149DAED1000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149D878D000
heap
page read and write
149CFE3F000
heap
page read and write
149DA34D000
trusted library allocation
page read and write
149E687F000
trusted library allocation
page read and write
149DACDF000
trusted library allocation
page read and write
149CFE4F000
heap
page read and write
149D6070000
trusted library allocation
page read and write
149E1762000
trusted library allocation
page read and write
149D94B4000
trusted library allocation
page read and write
149DAAB3000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149E35D6000
trusted library allocation
page read and write
149D8AD5000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149DB896000
trusted library allocation
page read and write
149CFE24000
heap
page read and write
149E24DB000
trusted library allocation
page read and write
149E34C8000
trusted library allocation
page read and write
149E2ED8000
trusted library allocation
page read and write
149D856B000
trusted library allocation
page read and write
149D7259000
trusted library allocation
page read and write
149D9AA1000
trusted library allocation
page read and write
149CFE49000
heap
page read and write
149DAC21000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE47000
heap
page read and write
149D8A7E000
trusted library allocation
page read and write
149D87BB000
heap
page read and write
149CFE50000
heap
page read and write
149E16B4000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149D47C9000
trusted library allocation
page read and write
79569FF000
stack
page read and write
15C4000
heap
page read and write
149CFE47000
heap
page read and write
149D989E000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
2054CC80000
unclassified section
page read and write
149DB7A0000
trusted library allocation
page read and write
149DC3E8000
trusted library allocation
page read and write
149E6853000
trusted library allocation
page read and write
225F45E0000
heap
page read and write
149D8D90000
trusted library allocation
page read and write
149CFE3B000
heap
page read and write
149E3443000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D5D3B000
trusted library allocation
page read and write
149E5CC1000
trusted library allocation
page read and write
149E25C9000
trusted library allocation
page read and write
149E171F000
trusted library allocation
page read and write
149D986E000
trusted library allocation
page read and write
149DB2A0000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149D87B5000
heap
page read and write
225F45E9000
heap
page read and write
149DA7DA000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E2709000
trusted library allocation
page read and write
149E3459000
trusted library allocation
page read and write
149E17C4000
trusted library allocation
page read and write
149D91D5000
trusted library allocation
page read and write
149E6AF9000
trusted library allocation
page read and write
149CFE60000
heap
page read and write
149DAC5C000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149DB78E000
trusted library allocation
page read and write
149E34F5000
trusted library allocation
page read and write
225F39BE000
trusted library allocation
page read and write
149DA30B000
trusted library allocation
page read and write
149DB7A8000
trusted library allocation
page read and write
149DAF6D000
trusted library allocation
page read and write
149DAC4B000
trusted library allocation
page read and write
149D98FB000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149CFE6D000
heap
page read and write
149E6A16000
trusted library allocation
page read and write
225F4669000
heap
page read and write
149CFE9B000
heap
page read and write
149DA33C000
trusted library allocation
page read and write
149DAFD9000
trusted library allocation
page read and write
149CFE67000
heap
page read and write
149D8DE9000
trusted library allocation
page read and write
149DCDC9000
trusted library allocation
page read and write
149E27BC000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DA31A000
trusted library allocation
page read and write
149D602B000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149CFEBF000
heap
page read and write
149DAFAA000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149DAF9B000
trusted library allocation
page read and write
149DA7CA000
trusted library allocation
page read and write
9FDA6BE000
unkown
page readonly
149CFE2C000
heap
page read and write
149DAFE4000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE3F000
heap
page read and write
149D4D71000
trusted library allocation
page read and write
149D60EB000
trusted library allocation
page read and write
149E17DF000
trusted library allocation
page read and write
149E34C1000
trusted library allocation
page read and write
149E2FFA000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149D9883000
trusted library allocation
page read and write
149E278F000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149D8C9E000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149DB8BB000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D87B5000
heap
page read and write
149CFE50000
heap
page read and write
149E673D000
trusted library allocation
page read and write
149DB71C000
trusted library allocation
page read and write
149E67D2000
trusted library allocation
page read and write
149E168D000
trusted library allocation
page read and write
149DB798000
trusted library allocation
page read and write
149D9883000
trusted library allocation
page read and write
149DB0CD000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D8A66000
trusted library allocation
page read and write
149DACD5000
trusted library allocation
page read and write
149D5DE6000
trusted library allocation
page read and write
149D5D5C000
trusted library allocation
page read and write
149E34BD000
trusted library allocation
page read and write
149D8C8B000
trusted library allocation
page read and write
2054CF69000
trusted library allocation
page read and write
3DFDB771000
trusted library allocation
page execute read
149DAC5A000
trusted library allocation
page read and write
149E28BB000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
200B3DB1000
heap
page read and write
149D47B3000
trusted library allocation
page read and write
149DA7FC000
trusted library allocation
page read and write
2D2000
unkown
page readonly
149E2FC7000
trusted library allocation
page read and write
149E2FE8000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E2EAA000
trusted library allocation
page read and write
149DA9AD000
trusted library allocation
page read and write
D601FE000
stack
page read and write
149CFE45000
heap
page read and write
200B3D60000
heap
page read and write
149DAF65000
trusted library allocation
page read and write
225F3EB8000
unkown
page execute read
149E6A59000
trusted library allocation
page read and write
149E3443000
trusted library allocation
page read and write
149DACC6000
trusted library allocation
page read and write
149DA7A9000
trusted library allocation
page read and write
149DAD23000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE5B000
heap
page read and write
149DA711000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149E34BF000
trusted library allocation
page read and write
149D9193000
trusted library allocation
page read and write
149D94B4000
trusted library allocation
page read and write
225F45E6000
heap
page read and write
149D98D2000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E24C0000
trusted library allocation
page read and write
149DAC21000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE2E000
heap
page read and write
149CFE3F000
heap
page read and write
149CFEB9000
heap
page read and write
225F3800000
trusted library allocation
page read and write
225F4679000
heap
page read and write
149DA7B9000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DC378000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149E683E000
trusted library allocation
page read and write
149D98CB000
trusted library allocation
page read and write
225F3912000
trusted library allocation
page read and write
149DA799000
trusted library allocation
page read and write
149DC353000
trusted library allocation
page read and write
149D9192000
trusted library allocation
page read and write
149D605E000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
16B0000
trusted library allocation
page read and write
149DB84E000
trusted library allocation
page read and write
149CFE5C000
heap
page read and write
149CFEB6000
heap
page read and write
1D27EC62000
trusted library allocation
page read and write
149E5B73000
trusted library allocation
page read and write
149E2ED1000
trusted library allocation
page read and write
149E5BF3000
trusted library allocation
page read and write
149D5D33000
trusted library allocation
page read and write
149DADE7000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149DB71A000
trusted library allocation
page read and write
149E6A88000
trusted library allocation
page read and write
149E248C000
trusted library allocation
page read and write
225F3986000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
79541FE000
stack
page read and write
149DA7A5000
trusted library allocation
page read and write
149DB2BE000
trusted library allocation
page read and write
149E13C7000
trusted library allocation
page read and write
149DB836000
trusted library allocation
page read and write
149DB787000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE40000
heap
page read and write
149DAA40000
trusted library allocation
page read and write
149E28CC000
trusted library allocation
page read and write
149E2AA3000
trusted library allocation
page read and write
149DAD0E000
trusted library allocation
page read and write
149DB275000
trusted library allocation
page read and write
149E3429000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
9FD626E000
stack
page read and write
149D5D50000
trusted library allocation
page read and write
173B000
heap
page read and write
149CFE53000
heap
page read and write
149CFE2C000
heap
page read and write
149DCDB3000
trusted library allocation
page read and write
149D608F000
trusted library allocation
page read and write
149D8A66000
trusted library allocation
page read and write
149D91A2000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149CFE4C000
heap
page read and write
149E342D000
trusted library allocation
page read and write
149DA33C000
trusted library allocation
page read and write
149E2ABD000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149E68D4000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DB7DC000
trusted library allocation
page read and write
149DAF6D000
trusted library allocation
page read and write
149DA3AC000
trusted library allocation
page read and write
149E15B8000
trusted library allocation
page read and write
1D27EE04000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149CFEB9000
heap
page read and write
149E274B000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE47000
heap
page read and write
149D918C000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149E147B000
trusted library allocation
page read and write
149E59C7000
trusted library allocation
page read and write
149DA7E6000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
149E24DB000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149CFE9B000
heap
page read and write
149DB899000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149D6034000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149D6122000
trusted library allocation
page read and write
149DAAFC000
trusted library allocation
page read and write
149D878D000
heap
page read and write
149E13CC000
trusted library allocation
page read and write
149D8D8C000
trusted library allocation
page read and write
149E24E7000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149DA7D3000
trusted library allocation
page read and write
225F35C0000
heap
page read and write
149D87F2000
heap
page read and write
149CFE67000
heap
page read and write
149D4EAE000
trusted library allocation
page read and write
149E24E7000
trusted library allocation
page read and write
149E1539000
trusted library allocation
page read and write
149DACF6000
trusted library allocation
page read and write
149E276A000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149D8DF0000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
79559FF000
stack
page read and write
149D7212000
trusted library allocation
page read and write
149E6ABA000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E35F5000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149DACBB000
trusted library allocation
page read and write
149E245D000
trusted library allocation
page read and write
149E3459000
trusted library allocation
page read and write
149E2E5E000
trusted library allocation
page read and write
2054CFB3000
trusted library allocation
page read and write
149DB7B0000
trusted library allocation
page read and write
225F3910000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE96000
heap
page read and write
149CFE5B000
heap
page read and write
149DB268000
trusted library allocation
page read and write
149D986C000
trusted library allocation
page read and write
149DC370000
trusted library allocation
page read and write
149E2E23000
trusted library allocation
page read and write
149D8782000
heap
page read and write
149E24C0000
trusted library allocation
page read and write
149E71A8000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
1F0E000
stack
page read and write
149CFEB7000
heap
page read and write
149CFE52000
heap
page read and write
149E2469000
trusted library allocation
page read and write
149DB828000
trusted library allocation
page read and write
149DAD83000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E1781000
trusted library allocation
page read and write
149D87BB000
heap
page read and write
225F35CA000
heap
page read and write
149CFE68000
heap
page read and write
149CFE6D000
heap
page read and write
149E5D5C000
trusted library allocation
page read and write
149DABBB000
trusted library allocation
page read and write
149E5CD7000
trusted library allocation
page read and write
1730000
heap
page read and write
149DB8EE000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149E2FF4000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149CFE82000
heap
page read and write
149E2464000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE4C000
heap
page read and write
225F45B9000
heap
page read and write
149D919E000
trusted library allocation
page read and write
149D98FB000
trusted library allocation
page read and write
149E2EB5000
trusted library allocation
page read and write
149E5DFC000
trusted library allocation
page read and write
BFA7BFC000
stack
page read and write
149E2719000
trusted library allocation
page read and write
149E343C000
trusted library allocation
page read and write
149E34F3000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149D609E000
trusted library allocation
page read and write
149CFE3B000
heap
page read and write
225F3964000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149DB841000
trusted library allocation
page read and write
225F456C000
heap
page read and write
225F463B000
heap
page read and write
149DAD07000
trusted library allocation
page read and write
149E177C000
trusted library allocation
page read and write
149E34C3000
trusted library allocation
page read and write
2DC000
unkown
page write copy
149DAFC3000
trusted library allocation
page read and write
149E6ABF000
trusted library allocation
page read and write
149DA711000
trusted library allocation
page read and write
149E71BC000
heap
page read and write
1D27E7E0000
unclassified section
page read and write
149D8796000
heap
page read and write
149CFE33000
heap
page read and write
2054D540000
heap
page read and write
21EB46803000
trusted library allocation
page read and write
225F39C2000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149CFE20000
heap
page read and write
149E34A5000
trusted library allocation
page read and write
225F463B000
heap
page read and write
149CFE39000
heap
page read and write
149D8C55000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
225F378F000
unclassified section
page read and write
149CFE96000
heap
page read and write
149E68E0000
trusted library allocation
page read and write
149E34A3000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
1580000
heap
page read and write
149CFE47000
heap
page read and write
149DA7C1000
trusted library allocation
page read and write
149E2EAA000
trusted library allocation
page read and write
149DAC21000
trusted library allocation
page read and write
149DAFD5000
trusted library allocation
page read and write
149D87BB000
heap
page read and write
149CFE55000
heap
page read and write
149D989B000
trusted library allocation
page read and write
149E35DF000
trusted library allocation
page read and write
149D5D6A000
trusted library allocation
page read and write
149E13F4000
trusted library allocation
page read and write
149CFE70000
heap
page read and write
149DACFC000
trusted library allocation
page read and write
149DA9AB000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE53000
heap
page read and write
149CFE50000
heap
page read and write
149DAB98000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE35000
heap
page read and write
225F45E8000
heap
page read and write
149CFE6F000
heap
page read and write
149CFE82000
heap
page read and write
149E6AAE000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
2054CF7B000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE9B000
heap
page read and write
149D87A3000
heap
page read and write
149E27B8000
trusted library allocation
page read and write
149E34CA000
trusted library allocation
page read and write
149E156A000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE66000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE74000
heap
page read and write
149E27FD000
trusted library allocation
page read and write
149E34C1000
trusted library allocation
page read and write
149D8790000
heap
page read and write
149E28C9000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E2E6B000
trusted library allocation
page read and write
149DA0FE000
trusted library allocation
page read and write
149DB86F000
trusted library allocation
page read and write
149D87F1000
heap
page read and write
149DA0ED000
trusted library allocation
page read and write
149D60A6000
trusted library allocation
page read and write
149D8C9E000
trusted library allocation
page read and write
149E24A4000
trusted library allocation
page read and write
225F3790000
trusted library section
page readonly
149D8DED000
trusted library allocation
page read and write
149D8772000
heap
page read and write
149E17C9000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
225F3961000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149CFE40000
heap
page read and write
149CFEA7000
heap
page read and write
149DABC1000
trusted library allocation
page read and write
149E2EAA000
trusted library allocation
page read and write
1D27ECB6000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
225F36F0000
heap
page read and write
149D5D42000
trusted library allocation
page read and write
149E2461000
trusted library allocation
page read and write
149E68EC000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E3451000
trusted library allocation
page read and write
2AC000
unkown
page readonly
149E2FE4000
trusted library allocation
page read and write
1750000
heap
page read and write
149DAA46000
trusted library allocation
page read and write
149E34BD000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE4D000
heap
page read and write
149DB725000
trusted library allocation
page read and write
149DA7C1000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DAE70000
trusted library allocation
page read and write
225F3981000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149E24B0000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149E2EE0000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE55000
heap
page read and write
149DAFC5000
trusted library allocation
page read and write
149CFE39000
heap
page read and write
149E349F000
trusted library allocation
page read and write
149D8CCE000
trusted library allocation
page read and write
149DB77C000
trusted library allocation
page read and write
149E6762000
trusted library allocation
page read and write
149DA7C8000
trusted library allocation
page read and write
225F4623000
heap
page read and write
149DAA4A000
trusted library allocation
page read and write
149E24E7000
trusted library allocation
page read and write
149E28B4000
trusted library allocation
page read and write
149DA2B4000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149E6772000
trusted library allocation
page read and write
1745000
heap
page read and write
225F4658000
heap
page read and write
149CFE33000
heap
page read and write
149DACEC000
trusted library allocation
page read and write
149DACCA000
trusted library allocation
page read and write
149DA7AC000
trusted library allocation
page read and write
149DA708000
trusted library allocation
page read and write
149DACD5000
trusted library allocation
page read and write
149D9841000
trusted library allocation
page read and write
149CFE39000
heap
page read and write
149D87BD000
heap
page read and write
1D27E740000
heap
page read and write
149E6AF1000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E35DF000
trusted library allocation
page read and write
149E34A5000
trusted library allocation
page read and write
149E24E4000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
3F70000
heap
page read and write
149DAA6B000
trusted library allocation
page read and write
149DABCE000
trusted library allocation
page read and write
149DA7FC000
trusted library allocation
page read and write
C1E6E3E000
stack
page read and write
149CFE74000
heap
page read and write
3F71000
heap
page read and write
149D8782000
heap
page read and write
149E149F000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149CFE7B000
heap
page read and write
149E17EA000
trusted library allocation
page read and write
149E17E2000
trusted library allocation
page read and write
149D878D000
heap
page read and write
149DC3FD000
trusted library allocation
page read and write
149E5DCA000
trusted library allocation
page read and write
149E344A000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149D5DD3000
trusted library allocation
page read and write
149DA9C8000
trusted library allocation
page read and write
149DB798000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149D87F2000
heap
page read and write
149E34BF000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
79549FE000
stack
page read and write
149CFE82000
heap
page read and write
149D4EA3000
trusted library allocation
page read and write
149E35C6000
trusted library allocation
page read and write
149D8D79000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E24E7000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D4DFB000
trusted library allocation
page read and write
2054D11D000
trusted library allocation
page read and write
149DAD48000
trusted library allocation
page read and write
149CFE51000
heap
page read and write
149E2E39000
trusted library allocation
page read and write
149D72E2000
trusted library allocation
page read and write
149DAC18000
trusted library allocation
page read and write
149E28F0000
trusted library allocation
page read and write
149DACF8000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
1F536907000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
225F3975000
trusted library allocation
page read and write
149DC37E000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFEBF000
heap
page read and write
149E1747000
trusted library allocation
page read and write
211000
unkown
page execute read
149CFE7B000
heap
page read and write
1D27E9D6000
heap
page read and write
149D9868000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE6F000
heap
page read and write
149DAC51000
trusted library allocation
page read and write
149DA71A000
trusted library allocation
page read and write
3F71000
heap
page read and write
149D98A0000
trusted library allocation
page read and write
149DAD61000
trusted library allocation
page read and write
149E5BF9000
trusted library allocation
page read and write
2054D10C000
trusted library allocation
page read and write
149DA99F000
trusted library allocation
page read and write
149D5D6F000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D98F4000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE63000
heap
page read and write
149CFE47000
heap
page read and write
149D94BE000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149D6077000
trusted library allocation
page read and write
149D4D2F000
trusted library allocation
page read and write
149E2A1D000
trusted library allocation
page read and write
1D27EC5F000
trusted library allocation
page read and write
149E2A78000
trusted library allocation
page read and write
149E35DF000
trusted library allocation
page read and write
149D98D6000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149CFE47000
heap
page read and write
149CFEB6000
heap
page read and write
149E7126000
heap
page read and write
1750000
heap
page read and write
1D27EE07000
trusted library allocation
page read and write
149DB8EE000
trusted library allocation
page read and write
149D8A6C000
trusted library allocation
page read and write
149E359B000
trusted library allocation
page read and write
149D9198000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149D8A98000
trusted library allocation
page read and write
149DAD65000
trusted library allocation
page read and write
15C4000
heap
page read and write
149CFE53000
heap
page read and write
149CFE82000
heap
page read and write
149CFE50000
heap
page read and write
149DB828000
trusted library allocation
page read and write
149D8A5F000
trusted library allocation
page read and write
79539FA000
stack
page read and write
149E17F6000
trusted library allocation
page read and write
149E2ECE000
trusted library allocation
page read and write
9FD85FE000
unkown
page readonly
149DA2CC000
trusted library allocation
page read and write
149E2742000
trusted library allocation
page read and write
149E2EEA000
trusted library allocation
page read and write
149DA7DF000
trusted library allocation
page read and write
149DAF6D000
trusted library allocation
page read and write
149DC3C6000
trusted library allocation
page read and write
149E68A7000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149D8C5A000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149E5B7C000
trusted library allocation
page read and write
149D60DC000
trusted library allocation
page read and write
225F3E9F000
unkown
page execute read
149D8A13000
trusted library allocation
page read and write
149CFE66000
heap
page read and write
149CFE40000
heap
page read and write
1D27EC13000
trusted library allocation
page read and write
149D8A66000
trusted library allocation
page read and write
3DFDB742000
trusted library allocation
page execute read
149CFE36000
heap
page read and write
149CFEA7000
heap
page read and write
149DA7A5000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE50000
heap
page read and write
149CFE5E000
heap
page read and write
149E28D6000
trusted library allocation
page read and write
225F4677000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149E6AA3000
trusted library allocation
page read and write
2054CC82000
unclassified section
page read and write
149CFE41000
heap
page read and write
149D8A35000
trusted library allocation
page read and write
149D8DE3000
trusted library allocation
page read and write
149E5C6E000
trusted library allocation
page read and write
149D5D65000
trusted library allocation
page read and write
149E6A47000
trusted library allocation
page read and write
149D8A66000
trusted library allocation
page read and write
149E1783000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE82000
heap
page read and write
149CFE74000
heap
page read and write
149CFE65000
heap
page read and write
149E35A2000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149CFE5E000
heap
page read and write
149DACEB000
trusted library allocation
page read and write
149D9465000
trusted library allocation
page read and write
149D8D7B000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149DC3CC000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149CFE50000
heap
page read and write
1D27E720000
unclassified section
page readonly
149E26F4000
trusted library allocation
page read and write
149D853B000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
2054CF10000
trusted library allocation
page read and write
225F462A000
heap
page read and write
149D6062000
trusted library allocation
page read and write
149E151E000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149E358D000
trusted library allocation
page read and write
149D9853000
trusted library allocation
page read and write
149D4E75000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE2C000
heap
page read and write
149CFE40000
heap
page read and write
149D9AF5000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE45000
heap
page read and write
149E3422000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE53000
heap
page read and write
149CFE47000
heap
page read and write
149E249B000
trusted library allocation
page read and write
149E5913000
trusted library allocation
page read and write
225F4509000
heap
page read and write
149D8796000
heap
page read and write
149E17DE000
trusted library allocation
page read and write
149DAD23000
trusted library allocation
page read and write
149DA7D3000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E68A7000
trusted library allocation
page read and write
149E2491000
trusted library allocation
page read and write
149D8A78000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D9475000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D9AC6000
trusted library allocation
page read and write
149D8D79000
trusted library allocation
page read and write
149DCDC9000
trusted library allocation
page read and write
149DC3C0000
trusted library allocation
page read and write
149DAA88000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149D60F6000
trusted library allocation
page read and write
149DB79C000
trusted library allocation
page read and write
149D5F36000
trusted library allocation
page read and write
149E24DB000
trusted library allocation
page read and write
149E2781000
trusted library allocation
page read and write
149D8AC8000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149DC3EA000
trusted library allocation
page read and write
149D94A5000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFEA7000
heap
page read and write
149E17CC000
trusted library allocation
page read and write
149D8A15000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149DAD00000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149DB777000
trusted library allocation
page read and write
1D27E6A0000
unclassified section
page readonly
149CFE3A000
heap
page read and write
149E16C8000
trusted library allocation
page read and write
149DB7E2000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE74000
heap
page read and write
149CFE50000
heap
page read and write
149DB8B9000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DC3E0000
trusted library allocation
page read and write
149CFE68000
heap
page read and write
149DAD5F000
trusted library allocation
page read and write
149D7262000
trusted library allocation
page read and write
149E2E7C000
trusted library allocation
page read and write
149E6AA6000
trusted library allocation
page read and write
149E277B000
trusted library allocation
page read and write
149DA7FC000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE55000
heap
page read and write
149E34F1000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E2897000
trusted library allocation
page read and write
149DB06A000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
225F4560000
heap
page read and write
149DACCC000
trusted library allocation
page read and write
149E242E000
trusted library allocation
page read and write
149E13A5000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E17F8000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE50000
heap
page read and write
149DAB4B000
trusted library allocation
page read and write
149DAC41000
trusted library allocation
page read and write
149D85F4000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149D8772000
heap
page read and write
149DAFAA000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149CFE45000
heap
page read and write
149E288B000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE96000
heap
page read and write
149CFE50000
heap
page read and write
149CFE66000
heap
page read and write
149E3450000
trusted library allocation
page read and write
149E6AEE000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DAC75000
trusted library allocation
page read and write
C1E65FE000
unkown
page readonly
149E179E000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149DC3E8000
trusted library allocation
page read and write
149CFE56000
heap
page read and write
149CFE5D000
heap
page read and write
149D8561000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149E276A000
trusted library allocation
page read and write
149E5D89000
trusted library allocation
page read and write
149D8AD2000
trusted library allocation
page read and write
225F456C000
heap
page read and write
149DACF8000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
225F4644000
heap
page read and write
149CFE50000
heap
page read and write
149E6A5F000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149DA0E5000
trusted library allocation
page read and write
225F4569000
heap
page read and write
149CFE50000
heap
page read and write
149DAB9E000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DB846000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE5A000
heap
page read and write
149D5D6A000
trusted library allocation
page read and write
3C24000
heap
page read and write
149CFE50000
heap
page read and write
149D9873000
trusted library allocation
page read and write
149D5DA7000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE60000
heap
page read and write
149CFE5B000
heap
page read and write
149CFE50000
heap
page read and write
149CFE5E000
heap
page read and write
149CFE52000
heap
page read and write
149CFE50000
heap
page read and write
149CFEB9000
heap
page read and write
149CFE40000
heap
page read and write
149E27C1000
trusted library allocation
page read and write
149D986E000
trusted library allocation
page read and write
149DAF6D000
trusted library allocation
page read and write
149DA7FC000
trusted library allocation
page read and write
D6137E000
stack
page read and write
149CFE45000
heap
page read and write
149DB887000
trusted library allocation
page read and write
149E34A3000
trusted library allocation
page read and write
149DB717000
trusted library allocation
page read and write
149D8C82000
trusted library allocation
page read and write
149E6A55000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149E2FF0000
trusted library allocation
page read and write
149DB8EC000
trusted library allocation
page read and write
225F396F000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E24E4000
trusted library allocation
page read and write
149E2A86000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149DCDD2000
trusted library allocation
page read and write
149DA77A000
trusted library allocation
page read and write
149CFE48000
heap
page read and write
149CFE72000
heap
page read and write
149E7101000
heap
page read and write
149DAF42000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149D942D000
trusted library allocation
page read and write
149E249F000
trusted library allocation
page read and write
149D9AB7000
trusted library allocation
page read and write
149E6AEE000
trusted library allocation
page read and write
149DA99F000
trusted library allocation
page read and write
1758000
heap
page read and write
15C4000
heap
page read and write
2054CC93000
heap
page read and write
149DAC1E000
trusted library allocation
page read and write
149E717E000
heap
page read and write
149CFE9B000
heap
page read and write
105A97C24000
trusted library allocation
page read and write
149E2773000
trusted library allocation
page read and write
149D5DCC000
trusted library allocation
page read and write
149E35E5000
trusted library allocation
page read and write
149DACB2000
trusted library allocation
page read and write
149DA9B5000
trusted library allocation
page read and write
149D6079000
trusted library allocation
page read and write
149D98F0000
trusted library allocation
page read and write
149E24D0000
trusted library allocation
page read and write
149DAD5D000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149D98DD000
trusted library allocation
page read and write
149E2FFA000
trusted library allocation
page read and write
149E3495000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149E5E04000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149DA725000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
1D27EA13000
heap
page read and write
149D5FE7000
trusted library allocation
page read and write
149DACD4000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149D9281000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E2EE7000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149D8AFB000
trusted library allocation
page read and write
225F3782000
unclassified section
page read and write
149CFE82000
heap
page read and write
149DA7C8000
trusted library allocation
page read and write
149D91A4000
trusted library allocation
page read and write
149DAFC3000
trusted library allocation
page read and write
149D855B000
trusted library allocation
page read and write
149DC3C9000
trusted library allocation
page read and write
149DA424000
trusted library allocation
page read and write
149E34EB000
trusted library allocation
page read and write
149E34F1000
trusted library allocation
page read and write
149E24DF000
trusted library allocation
page read and write
149DAD6A000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E342D000
trusted library allocation
page read and write
225F4658000
heap
page read and write
2054D546000
heap
page read and write
149DAC1C000
trusted library allocation
page read and write
149D6091000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D7262000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DA0FA000
trusted library allocation
page read and write
225F45E8000
heap
page read and write
149DB887000
trusted library allocation
page read and write
149E595C000
trusted library allocation
page read and write
225F45FD000
heap
page read and write
149E6A52000
trusted library allocation
page read and write
149DAAEF000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DAD26000
trusted library allocation
page read and write
149E35BF000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
225F3AF4000
heap
page read and write
149E14FA000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149DA0E6000
trusted library allocation
page read and write
149D989E000
trusted library allocation
page read and write
149E1564000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE33000
heap
page read and write
149CFE5B000
heap
page read and write
149DAC2A000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149D8CA5000
trusted library allocation
page read and write
1710000
heap
page read and write
15C4000
heap
page read and write
149E13C7000
trusted library allocation
page read and write
149E6AC4000
trusted library allocation
page read and write
149E6AA3000
trusted library allocation
page read and write
149E25FA000
trusted library allocation
page read and write
149DB781000
trusted library allocation
page read and write
149DAAA2000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149CFE39000
heap
page read and write
225F3978000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149DAC85000
trusted library allocation
page read and write
149DC3EA000
trusted library allocation
page read and write
149DAB44000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149D87B5000
heap
page read and write
149CFE53000
heap
page read and write
149DB8E6000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
1738000
heap
page read and write
149E5BF1000
trusted library allocation
page read and write
149D8D79000
trusted library allocation
page read and write
149D8A58000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
1D27EC30000
trusted library allocation
page read and write
149E27E9000
trusted library allocation
page read and write
149E5D66000
trusted library allocation
page read and write
149DAC6E000
trusted library allocation
page read and write
149E714D000
heap
page read and write
149E153B000
trusted library allocation
page read and write
225F463B000
heap
page read and write
149E34EB000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149E16C5000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149D8A5F000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D8A98000
trusted library allocation
page read and write
149D5F9E000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149E24B0000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149E24B5000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149DA9AB000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149DAF9B000
trusted library allocation
page read and write
149D4EB7000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E2469000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149E34FB000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DA7DA000
trusted library allocation
page read and write
149E6A36000
trusted library allocation
page read and write
149E3468000
trusted library allocation
page read and write
149E24A4000
trusted library allocation
page read and write
225F4669000
heap
page read and write
149CFE5B000
heap
page read and write
225F45AA000
heap
page read and write
149CFE74000
heap
page read and write
149D94BE000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE5E000
heap
page read and write
149D91F3000
trusted library allocation
page read and write
149D9AB9000
trusted library allocation
page read and write
149D9899000
trusted library allocation
page read and write
149DABC0000
trusted library allocation
page read and write
225F3AF0000
heap
page read and write
1D27EC45000
trusted library allocation
page read and write
149E34CA000
trusted library allocation
page read and write
149DAD80000
trusted library allocation
page read and write
149E273E000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE45000
heap
page read and write
149E2E71000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
1F53690A000
trusted library allocation
page read and write
149E28A8000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE52000
heap
page read and write
149D479E000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149E3440000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149E6AEE000
trusted library allocation
page read and write
225F4677000
heap
page read and write
149E24D6000
trusted library allocation
page read and write
1750000
heap
page read and write
D62B7E000
unkown
page readonly
149D8DB4000
trusted library allocation
page read and write
149E6741000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149E2E2D000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
1D27E690000
unclassified section
page readonly
149DB0E9000
trusted library allocation
page read and write
149DCDC7000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149D8796000
heap
page read and write
149DCDE8000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149E24B5000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D5D3F000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E713F000
heap
page read and write
149E5C68000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149E25FD000
trusted library allocation
page read and write
149E6A6F000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DA795000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE69000
heap
page read and write
149CFE52000
heap
page read and write
225F459C000
heap
page read and write
149CFE3F000
heap
page read and write
149DA3BC000
trusted library allocation
page read and write
149E6A44000
trusted library allocation
page read and write
149DAF9B000
trusted library allocation
page read and write
149DCDE8000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149E2EAA000
trusted library allocation
page read and write
149D8DF0000
trusted library allocation
page read and write
149D989E000
trusted library allocation
page read and write
149DB766000
trusted library allocation
page read and write
149DACB9000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149DA7CE000
trusted library allocation
page read and write
1F5381FB000
heap
page read and write
149D947D000
trusted library allocation
page read and write
149DACAD000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE5E000
heap
page read and write
149D8585000
trusted library allocation
page read and write
149E7199000
heap
page read and write
200B3F0A000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149D85CF000
trusted library allocation
page read and write
149DAF55000
trusted library allocation
page read and write
149CFE70000
heap
page read and write
149CFE7B000
heap
page read and write
149D4D71000
trusted library allocation
page read and write
149D8C8E000
trusted library allocation
page read and write
149DC378000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DA7F7000
trusted library allocation
page read and write
149E5997000
trusted library allocation
page read and write
149D8782000
heap
page read and write
149CFE5A000
heap
page read and write
149D8D79000
trusted library allocation
page read and write
149D98DD000
trusted library allocation
page read and write
200B3E00000
trusted library allocation
page read and write
149D8A58000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
225F458D000
heap
page read and write
149D5FCE000
trusted library allocation
page read and write
149E3436000
trusted library allocation
page read and write
149D8A6A000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149E35C2000
trusted library allocation
page read and write
149D987A000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D98C2000
trusted library allocation
page read and write
2054D0F0000
heap
page read and write
149DAC48000
trusted library allocation
page read and write
149E35AB000
trusted library allocation
page read and write
149E6712000
trusted library allocation
page read and write
149E3680000
trusted library allocation
page read and write
149E35D3000
trusted library allocation
page read and write
149DA725000
trusted library allocation
page read and write
149E13C1000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
2054CE00000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DCDC9000
trusted library allocation
page read and write
149CFE4E000
heap
page read and write
149DADE7000
trusted library allocation
page read and write
149E6B00000
trusted library allocation
page read and write
2054CB00000
unclassified section
page readonly
149CFE50000
heap
page read and write
149D9482000
trusted library allocation
page read and write
149DA3BC000
trusted library allocation
page read and write
149E2ADD000
trusted library allocation
page read and write
149CFE61000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE50000
heap
page read and write
149CFE20000
heap
page read and write
149E34FB000
trusted library allocation
page read and write
149D47C2000
trusted library allocation
page read and write
149D5DF6000
trusted library allocation
page read and write
149E2AC9000
trusted library allocation
page read and write
149DA7F7000
trusted library allocation
page read and write
149D8AD5000
trusted library allocation
page read and write
9FD96BE000
unkown
page readonly
149E249B000
trusted library allocation
page read and write
149DC365000
trusted library allocation
page read and write
149DB85F000
trusted library allocation
page read and write
149DB86F000
trusted library allocation
page read and write
149D942A000
trusted library allocation
page read and write
149DB7BE000
trusted library allocation
page read and write
149E2786000
trusted library allocation
page read and write
149CFE6C000
heap
page read and write
149CFE68000
heap
page read and write
149DA0ED000
trusted library allocation
page read and write
149DB84E000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFEBF000
heap
page read and write
225F395F000
trusted library allocation
page read and write
149D8D47000
trusted library allocation
page read and write
149DAFD9000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE64000
heap
page read and write
149DACF8000
trusted library allocation
page read and write
149D7233000
trusted library allocation
page read and write
149E2AEA000
trusted library allocation
page read and write
2054CB60000
remote allocation
page read and write
149DB275000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE82000
heap
page read and write
225F454D000
heap
page read and write
149CFEB9000
heap
page read and write
149CFE71000
heap
page read and write
149E3450000
trusted library allocation
page read and write
149E6A36000
trusted library allocation
page read and write
149E25EF000
trusted library allocation
page read and write
149E5B5F000
trusted library allocation
page read and write
1F538390000
heap
page read and write
149E35D4000
trusted library allocation
page read and write
149D72D8000
trusted library allocation
page read and write
225F39CE000
trusted library allocation
page read and write
149D4D2F000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149E2FFE000
trusted library allocation
page read and write
149E6A79000
trusted library allocation
page read and write
149DCDBC000
trusted library allocation
page read and write
2054D118000
trusted library allocation
page read and write
149D8A23000
trusted library allocation
page read and write
149E6ABF000
trusted library allocation
page read and write
149E271D000
trusted library allocation
page read and write
149E14F6000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E27B2000
trusted library allocation
page read and write
C1E42ED000
stack
page read and write
149E25C7000
trusted library allocation
page read and write
149E2469000
trusted library allocation
page read and write
149E27AA000
trusted library allocation
page read and write
2054D548000
heap
page read and write
149DB824000
trusted library allocation
page read and write
149E595C000
trusted library allocation
page read and write
149DAF65000
trusted library allocation
page read and write
79539FF000
stack
page read and write
149CFE74000
heap
page read and write
149E5BF7000
trusted library allocation
page read and write
149D94A8000
trusted library allocation
page read and write
149D8A35000
trusted library allocation
page read and write
1D27ECF0000
trusted library allocation
page read and write
149E1480000
trusted library allocation
page read and write
225F39C4000
trusted library allocation
page read and write
149D4E26000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149E343E000
trusted library allocation
page read and write
149D8DD3000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E2491000
trusted library allocation
page read and write
1F5381FA000
heap
page read and write
149DAF40000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE4F000
heap
page read and write
149E59D6000
trusted library allocation
page read and write
149DACDF000
trusted library allocation
page read and write
149CFE63000
heap
page read and write
149DAC7D000
trusted library allocation
page read and write
149E27AD000
trusted library allocation
page read and write
149E14A8000
trusted library allocation
page read and write
149DA9AB000
trusted library allocation
page read and write
149D91DE000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149E27B8000
trusted library allocation
page read and write
149D47DF000
trusted library allocation
page read and write
149DAF42000
trusted library allocation
page read and write
149D8D3B000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE71000
heap
page read and write
2054CF5B000
trusted library allocation
page read and write
149E34A5000
trusted library allocation
page read and write
149DB824000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E6A59000
trusted library allocation
page read and write
149E674B000
trusted library allocation
page read and write
149DAFB0000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
3DFDB76D000
trusted library allocation
page execute read
149CFE35000
heap
page read and write
149CFE7B000
heap
page read and write
149CFE5D000
heap
page read and write
149CFE4C000
heap
page read and write
149DACD4000
trusted library allocation
page read and write
149D9825000
trusted library allocation
page read and write
149D98D8000
trusted library allocation
page read and write
149E34C3000
trusted library allocation
page read and write
149D9464000
trusted library allocation
page read and write
225F45F2000
heap
page read and write
149E59B6000
trusted library allocation
page read and write
149CFE49000
heap
page read and write
149CFE82000
heap
page read and write
149D87B5000
heap
page read and write
149D8A95000
trusted library allocation
page read and write
149D986C000
trusted library allocation
page read and write
149D8C9E000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E27D5000
trusted library allocation
page read and write
9FD632B000
stack
page read and write
149CFE40000
heap
page read and write
149D8A72000
trusted library allocation
page read and write
149DB779000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE45000
heap
page read and write
149DB7A8000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
2054D13D000
trusted library allocation
page read and write
149E6850000
trusted library allocation
page read and write
149D854F000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149DACF8000
trusted library allocation
page read and write
149E7171000
heap
page read and write
149CFE5E000
heap
page read and write
149CFE35000
heap
page read and write
149E7102000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D5D50000
trusted library allocation
page read and write
149DB27F000
trusted library allocation
page read and write
149E13FA000
trusted library allocation
page read and write
149DB857000
trusted library allocation
page read and write
149DB781000
trusted library allocation
page read and write
149E2E6B000
trusted library allocation
page read and write
149E163C000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
2054CB7C000
remote allocation
page execute read
149CFE52000
heap
page read and write
149CFE45000
heap
page read and write
149CFE47000
heap
page read and write
149E5CF9000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149DAD06000
trusted library allocation
page read and write
149E2FF0000
trusted library allocation
page read and write
149E28EE000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149DA7AC000
trusted library allocation
page read and write
149E6AE2000
trusted library allocation
page read and write
149D5F16000
trusted library allocation
page read and write
149E2E64000
trusted library allocation
page read and write
149D98A7000
trusted library allocation
page read and write
149D6125000
trusted library allocation
page read and write
149D8790000
heap
page read and write
149D98A8000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149DAA74000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149DA7B7000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE96000
heap
page read and write
149E2744000
trusted library allocation
page read and write
149E5B9D000
trusted library allocation
page read and write
149E6AF9000
trusted library allocation
page read and write
149DC3C6000
trusted library allocation
page read and write
1D27EC77000
trusted library allocation
page read and write
149E24DB000
trusted library allocation
page read and write
9FD6328000
stack
page read and write
149DB7E2000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
225F45E1000
heap
page read and write
149CFE20000
heap
page read and write
149CFE39000
heap
page read and write
2054CD90000
unclassified section
page readonly
149CFE52000
heap
page read and write
149E5B40000
trusted library allocation
page read and write
149D87F1000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE35000
heap
page read and write
149E276A000
trusted library allocation
page read and write
149E67E5000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149DC3E0000
trusted library allocation
page read and write
149D60F8000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149DC3FD000
trusted library allocation
page read and write
149E15B0000
trusted library allocation
page read and write
149DACCC000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149DAB36000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149CFE6F000
heap
page read and write
149DC3D8000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE50000
heap
page read and write
149E13B3000
trusted library allocation
page read and write
149E24E4000
trusted library allocation
page read and write
149E34FB000
trusted library allocation
page read and write
1D27EC1B000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE82000
heap
page read and write
149E24A0000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
2054D100000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149E34C3000
trusted library allocation
page read and write
149D60C1000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149D72F7000
trusted library allocation
page read and write
1D27E71A000
remote allocation
page execute read
149CFE2E000
heap
page read and write
149CFEBE000
heap
page read and write
149E5BF5000
trusted library allocation
page read and write
149E6A78000
trusted library allocation
page read and write
149D986C000
trusted library allocation
page read and write
149CFE69000
heap
page read and write
149E34F7000
trusted library allocation
page read and write
149D8A72000
trusted library allocation
page read and write
149E34F7000
trusted library allocation
page read and write
149DA71A000
trusted library allocation
page read and write
149CFE2F000
heap
page read and write
149E17ED000
trusted library allocation
page read and write
149E249F000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E245D000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149DB8CE000
trusted library allocation
page read and write
149DA785000
trusted library allocation
page read and write
149E34EB000
trusted library allocation
page read and write
149E245F000
trusted library allocation
page read and write
149E34F1000
trusted library allocation
page read and write
2054CBAA000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149E59B6000
trusted library allocation
page read and write
149D98BE000
trusted library allocation
page read and write
149CFE57000
heap
page read and write
149CFE5D000
heap
page read and write
149DB2A5000
trusted library allocation
page read and write
149E2781000
trusted library allocation
page read and write
149D876E000
heap
page read and write
149CFE64000
heap
page read and write
1D27EF00000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E15EE000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149CFE4C000
heap
page read and write
2054CF79000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE45000
heap
page read and write
149DB7FB000
trusted library allocation
page read and write
149E13B8000
trusted library allocation
page read and write
9FD6DD8000
stack
page read and write
149CFE7B000
heap
page read and write
149D8D84000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149DAC92000
trusted library allocation
page read and write
149DB2A0000
trusted library allocation
page read and write
149D85F5000
trusted library allocation
page read and write
149D60DC000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149CFE35000
heap
page read and write
149E2491000
trusted library allocation
page read and write
149DA0C3000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE72000
heap
page read and write
149CFE64000
heap
page read and write
149CFE2C000
heap
page read and write
149E3422000
trusted library allocation
page read and write
149DC3BD000
trusted library allocation
page read and write
149D5F8A000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE40000
heap
page read and write
149DAC16000
trusted library allocation
page read and write
3DFDB701000
trusted library allocation
page execute read
D61B7E000
unkown
page readonly
149DB2D4000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149E17E5000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E68C6000
trusted library allocation
page read and write
149D8A5F000
trusted library allocation
page read and write
149E2ED9000
trusted library allocation
page read and write
149E2A34000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149D5DAA000
trusted library allocation
page read and write
149E245D000
trusted library allocation
page read and write
225F4560000
heap
page read and write
149E34F1000
trusted library allocation
page read and write
225F440E000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE39000
heap
page read and write
149E2404000
trusted library allocation
page read and write
149D8D58000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
2E4000
unkown
page readonly
149D8D5C000
trusted library allocation
page read and write
149DACCD000
trusted library allocation
page read and write
225F3600000
heap
page read and write
149E2FDA000
trusted library allocation
page read and write
15C4000
heap
page read and write
149E13CC000
trusted library allocation
page read and write
225F4560000
heap
page read and write
149E7D27000
trusted library allocation
page read and write
149DA35B000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DC3F0000
trusted library allocation
page read and write
149E2787000
trusted library allocation
page read and write
149E34C3000
trusted library allocation
page read and write
149D7262000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E5C35000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149D6070000
trusted library allocation
page read and write
149E27F9000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE9B000
heap
page read and write
149CFE74000
heap
page read and write
149CFE40000
heap
page read and write
149DAC1C000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE82000
heap
page read and write
149D98C4000
trusted library allocation
page read and write
9FD967E000
stack
page read and write
149E3459000
trusted library allocation
page read and write
149CFE36000
heap
page read and write
149E6786000
trusted library allocation
page read and write
149DAFAA000
trusted library allocation
page read and write
149DAC53000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D5DD3000
trusted library allocation
page read and write
225F45E0000
heap
page read and write
149D941B000
trusted library allocation
page read and write
149D8A78000
trusted library allocation
page read and write
149D8791000
heap
page read and write
149D878D000
heap
page read and write
149E28C8000
trusted library allocation
page read and write
149E2433000
trusted library allocation
page read and write
149DAF40000
trusted library allocation
page read and write
149E1471000
trusted library allocation
page read and write
149E34C8000
trusted library allocation
page read and write
149E346D000
trusted library allocation
page read and write
225F45A8000
heap
page read and write
149DAFAA000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE41000
heap
page read and write
149CFE50000
heap
page read and write
149E245B000
trusted library allocation
page read and write
149D851B000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
225F455C000
heap
page read and write
149DACC6000
trusted library allocation
page read and write
149E349F000
trusted library allocation
page read and write
149D9432000
trusted library allocation
page read and write
149E59CE000
trusted library allocation
page read and write
149DC37E000
trusted library allocation
page read and write
149DA702000
trusted library allocation
page read and write
149D98A7000
trusted library allocation
page read and write
149E6AA3000
trusted library allocation
page read and write
149D60EB000
trusted library allocation
page read and write
2054CFB9000
trusted library allocation
page read and write
149D8C5E000
trusted library allocation
page read and write
149D982E000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E14FA000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149DB841000
trusted library allocation
page read and write
149D987E000
trusted library allocation
page read and write
149E27B6000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149CFE74000
heap
page read and write
149D876E000
heap
page read and write
149DA705000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E249F000
trusted library allocation
page read and write
149E28AF000
trusted library allocation
page read and write
149CFE5C000
heap
page read and write
149DA799000
trusted library allocation
page read and write
149DACD4000
trusted library allocation
page read and write
149DA7BE000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE50000
heap
page read and write
149CFE45000
heap
page read and write
149CFE53000
heap
page read and write
149E715C000
heap
page read and write
149DC376000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149D4F00000
trusted library allocation
page read and write
149D9440000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
225F4677000
heap
page read and write
149E35DC000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149E34CA000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149DAD67000
trusted library allocation
page read and write
149CFE24000
heap
page read and write
157E000
stack
page read and write
149CFE55000
heap
page read and write
149E35DB000
trusted library allocation
page read and write
149E28F0000
trusted library allocation
page read and write
149E3468000
trusted library allocation
page read and write
225F4560000
heap
page read and write
1F536750000
heap
page read and write
149E343C000
trusted library allocation
page read and write
149E3583000
trusted library allocation
page read and write
149E34F1000
trusted library allocation
page read and write
225F4621000
heap
page read and write
149E175D000
trusted library allocation
page read and write
149E277B000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
225F3520000
unclassified section
page readonly
149DC3CC000
trusted library allocation
page read and write
149E6A18000
trusted library allocation
page read and write
149E34C1000
trusted library allocation
page read and write
149D989B000
trusted library allocation
page read and write
149DB289000
trusted library allocation
page read and write
149E5976000
trusted library allocation
page read and write
1740000
heap
page read and write
225F457F000
heap
page read and write
149E35BF000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149D948A000
trusted library allocation
page read and write
149DB8BE000
trusted library allocation
page read and write
149E24B0000
trusted library allocation
page read and write
149D98DD000
trusted library allocation
page read and write
15C4000
heap
page read and write
149CFE45000
heap
page read and write
149DB3E9000
trusted library allocation
page read and write
149D8C3C000
trusted library allocation
page read and write
149DAD67000
trusted library allocation
page read and write
149DB760000
trusted library allocation
page read and write
149DA9B5000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE74000
heap
page read and write
149D8A6C000
trusted library allocation
page read and write
149DAC70000
trusted library allocation
page read and write
149E13BF000
trusted library allocation
page read and write
149E6AA3000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E683E000
trusted library allocation
page read and write
149E2773000
trusted library allocation
page read and write
149D8ACE000
trusted library allocation
page read and write
1F536800000
trusted library allocation
page read and write
149DAC6E000
trusted library allocation
page read and write
149D98FB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D8C82000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149E151C000
trusted library allocation
page read and write
149DAD4C000
trusted library allocation
page read and write
149D8D60000
trusted library allocation
page read and write
149CFE4E000
heap
page read and write
149E3585000
trusted library allocation
page read and write
149E27B8000
trusted library allocation
page read and write
149E27EC000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
1F5381F0000
heap
page read and write
149DAC1E000
trusted library allocation
page read and write
149D5D50000
trusted library allocation
page read and write
13BF000
stack
page read and write
2054CD70000
heap
page read and write
149CFE39000
heap
page read and write
149CFE53000
heap
page read and write
149CFE5A000
heap
page read and write
149E2E5F000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DB7D6000
trusted library allocation
page read and write
149D8C70000
trusted library allocation
page read and write
149E1620000
trusted library allocation
page read and write
149E28EE000
trusted library allocation
page read and write
149D8D79000
trusted library allocation
page read and write
149E6A88000
trusted library allocation
page read and write
149CFE4C000
heap
page read and write
149CFE6E000
heap
page read and write
149CFEB6000
heap
page read and write
149E25FB000
trusted library allocation
page read and write
149CFE49000
heap
page read and write
149E1462000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE40000
heap
page read and write
149E5DB1000
trusted library allocation
page read and write
149D8DBA000
trusted library allocation
page read and write
149D8A72000
trusted library allocation
page read and write
1750000
heap
page read and write
149E3495000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149DB783000
trusted library allocation
page read and write
149D91F5000
trusted library allocation
page read and write
149DB09C000
trusted library allocation
page read and write
225F3F5F000
heap
page read and write
149CFEBF000
heap
page read and write
225F4669000
heap
page read and write
149E6892000
trusted library allocation
page read and write
149E24E4000
trusted library allocation
page read and write
149E16DD000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149D7234000
trusted library allocation
page read and write
2054CC20000
heap
page read and write
149CFE55000
heap
page read and write
149E27B2000
trusted library allocation
page read and write
149DAB8F000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149CFE50000
heap
page read and write
149D98D6000
trusted library allocation
page read and write
149D851E000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE3F000
heap
page read and write
149E3443000
trusted library allocation
page read and write
149E28AA000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D9824000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE3A000
heap
page read and write
149CFE9B000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE5B000
heap
page read and write
149E3414000
trusted library allocation
page read and write
149D94E2000
trusted library allocation
page read and write
149DC2BA000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149DCDC9000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE52000
heap
page read and write
149CFE45000
heap
page read and write
149D87A1000
heap
page read and write
149E3462000
trusted library allocation
page read and write
149E2EEA000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149E34F3000
trusted library allocation
page read and write
149D5F86000
trusted library allocation
page read and write
149E3432000
trusted library allocation
page read and write
149CFE6C000
heap
page read and write
149E6A59000
trusted library allocation
page read and write
149DAD73000
trusted library allocation
page read and write
149D47EF000
trusted library allocation
page read and write
225F4658000
heap
page read and write
149DB779000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DB7BE000
trusted library allocation
page read and write
149E2EB7000
trusted library allocation
page read and write
149E5D61000
trusted library allocation
page read and write
13CF000
stack
page read and write
149DAD99000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
2054D115000
trusted library allocation
page read and write
149E2773000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DAC21000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E34C8000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149CFEB6000
heap
page read and write
149D98FB000
trusted library allocation
page read and write
149D9435000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149D9480000
trusted library allocation
page read and write
149E6850000
trusted library allocation
page read and write
149CFE6F000
heap
page read and write
149D87F2000
heap
page read and write
200B3F07000
trusted library allocation
page read and write
149E15BF000
trusted library allocation
page read and write
149E3435000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149D8CCE000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149DAD64000
trusted library allocation
page read and write
149E24B5000
trusted library allocation
page read and write
225F4677000
heap
page read and write
149DABC6000
trusted library allocation
page read and write
149DAFEF000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149DB81F000
trusted library allocation
page read and write
149DC376000
trusted library allocation
page read and write
149DB77C000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE74000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE42000
heap
page read and write
149E3456000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
225F3E92000
unkown
page execute read
149E683E000
trusted library allocation
page read and write
149D8D5C000
trusted library allocation
page read and write
149DAFC5000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149E5DF9000
trusted library allocation
page read and write
225F3AF6000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE74000
heap
page read and write
149DCDBC000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE5E000
heap
page read and write
149D919E000
trusted library allocation
page read and write
200B3C50000
heap
page read and write
149E5B4D000
trusted library allocation
page read and write
149DACA7000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149CFE3B000
heap
page read and write
149D9ABE000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E129D000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DCD8B000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
1F536710000
heap
page read and write
13EF000
stack
page read and write
210000
unkown
page readonly
149D8796000
heap
page read and write
149CFE50000
heap
page read and write
149DACC5000
trusted library allocation
page read and write
149D8CA5000
trusted library allocation
page read and write
149DA7A9000
trusted library allocation
page read and write
149DC3CC000
trusted library allocation
page read and write
149DAFD5000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DA75F000
trusted library allocation
page read and write
149E6AE2000
trusted library allocation
page read and write
C1E426B000
stack
page read and write
149CFE52000
heap
page read and write
149E2EB3000
trusted library allocation
page read and write
149D72DC000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149E67E7000
trusted library allocation
page read and write
225F3AE0000
trusted library allocation
page read and write
149E24D6000
trusted library allocation
page read and write
149D87BD000
heap
page read and write
149E2EE7000
trusted library allocation
page read and write
1D27ECC4000
trusted library allocation
page read and write
1F53678D000
heap
page read and write
149CFE50000
heap
page read and write
149E3435000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E342F000
trusted library allocation
page read and write
149DAAF3000
trusted library allocation
page read and write
149E2438000
trusted library allocation
page read and write
149D9868000
trusted library allocation
page read and write
149DB725000
trusted library allocation
page read and write
149DB752000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149CFE50000
heap
page read and write
149CFE53000
heap
page read and write
149DA0FA000
trusted library allocation
page read and write
149E7D6A000
trusted library allocation
page read and write
149D87A6000
heap
page read and write
149D8C61000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149D4E66000
trusted library allocation
page read and write
149D8759000
heap
page read and write
149CFE55000
heap
page read and write
149DAAB5000
trusted library allocation
page read and write
1F53820B000
heap
page read and write
149DAD9B000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE3E000
heap
page read and write
149E6A69000
trusted library allocation
page read and write
149D47CE000
trusted library allocation
page read and write
149E2EDB000
trusted library allocation
page read and write
149E6A16000
trusted library allocation
page read and write
149D60EB000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149E6AE9000
trusted library allocation
page read and write
149DB2AD000
trusted library allocation
page read and write
149DB2CE000
trusted library allocation
page read and write
225F3760000
heap
page readonly
149E28E1000
trusted library allocation
page read and write
149D8C69000
trusted library allocation
page read and write
149D606D000
trusted library allocation
page read and write
15C0000
heap
page read and write
149D4EC3000
trusted library allocation
page read and write
149E249B000
trusted library allocation
page read and write
C1E42AE000
unkown
page readonly
149E128E000
trusted library allocation
page read and write
149E2465000
trusted library allocation
page read and write
1D27EC00000
trusted library allocation
page read and write
149DAA77000
trusted library allocation
page read and write
3DFDB771000
trusted library allocation
page execute read
149E1757000
trusted library allocation
page read and write
149DAD80000
trusted library allocation
page read and write
149E7D61000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E17D6000
trusted library allocation
page read and write
149D859D000
trusted library allocation
page read and write
149E34ED000
trusted library allocation
page read and write
149D8A5F000
trusted library allocation
page read and write
1D27E920000
unclassified section
page readonly
3DFDB79E000
trusted library allocation
page execute read
149DACC3000
trusted library allocation
page read and write
2054CF12000
trusted library allocation
page read and write
1F538201000
heap
page read and write
149CFE33000
heap
page read and write
149CFE64000
heap
page read and write
225F3917000
trusted library allocation
page read and write
149E35C2000
trusted library allocation
page read and write
149E13B8000
trusted library allocation
page read and write
149D8782000
heap
page read and write
149DAC83000
trusted library allocation
page read and write
149DB27F000
trusted library allocation
page read and write
D5F1D8000
stack
page read and write
149D9435000
trusted library allocation
page read and write
149DACDF000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DC3FD000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D87A1000
heap
page read and write
149E13BF000
trusted library allocation
page read and write
149DAA4A000
trusted library allocation
page read and write
149DABCA000
trusted library allocation
page read and write
149E35BC000
trusted library allocation
page read and write
149DB25C000
trusted library allocation
page read and write
149DB8F6000
trusted library allocation
page read and write
149DA7B7000
trusted library allocation
page read and write
149E59C7000
trusted library allocation
page read and write
D60ABD000
stack
page read and write
149CFE2E000
heap
page read and write
149D8C9E000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E25C9000
trusted library allocation
page read and write
149D879C000
heap
page read and write
149DAA40000
trusted library allocation
page read and write
149DA9A3000
trusted library allocation
page read and write
149DB766000
trusted library allocation
page read and write
149E2893000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149E25DD000
trusted library allocation
page read and write
149DA7AE000
trusted library allocation
page read and write
149DB8BB000
trusted library allocation
page read and write
149DA333000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DA716000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DA707000
trusted library allocation
page read and write
149E67B1000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E677C000
trusted library allocation
page read and write
149DA7C8000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149DACD4000
trusted library allocation
page read and write
149E346D000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149D9196000
trusted library allocation
page read and write
225F39E9000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149DC36B000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
1D27E7F0000
heap
page read and write
149CFEB7000
heap
page read and write
149CFE5E000
heap
page read and write
149CFE50000
heap
page read and write
149D878D000
heap
page read and write
149D87F2000
heap
page read and write
149CFE3F000
heap
page read and write
149DB75D000
trusted library allocation
page read and write
149D721F000
trusted library allocation
page read and write
149DB7DC000
trusted library allocation
page read and write
225F3530000
unclassified section
page readonly
149E34F3000
trusted library allocation
page read and write
149DAC3D000
trusted library allocation
page read and write
149E17A1000
trusted library allocation
page read and write
149E6AA3000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
2054CF03000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE5B000
heap
page read and write
149E68C0000
trusted library allocation
page read and write
149DAAB5000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
2054CFEB000
trusted library allocation
page read and write
149D87BB000
heap
page read and write
149CFE50000
heap
page read and write
149DAD23000
trusted library allocation
page read and write
149DAC8B000
trusted library allocation
page read and write
149D5D6F000
trusted library allocation
page read and write
149D8AA8000
trusted library allocation
page read and write
1D27E7EF000
unclassified section
page read and write
225F4658000
heap
page read and write
149CFE46000
heap
page read and write
149D4798000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
1F536770000
heap
page read and write
149DCDC7000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DAC12000
trusted library allocation
page read and write
149E1789000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE7B000
heap
page read and write
149DC3C6000
trusted library allocation
page read and write
149E2A42000
trusted library allocation
page read and write
149D9899000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E25C3000
trusted library allocation
page read and write
149DAD16000
trusted library allocation
page read and write
149E1516000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149CFE72000
heap
page read and write
149D8790000
heap
page read and write
149CFE20000
heap
page read and write
149CFE39000
heap
page read and write
2054CC70000
heap
page readonly
225F45E9000
heap
page read and write
149E5BAA000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE47000
heap
page read and write
149CFE64000
heap
page read and write
149E14FA000
trusted library allocation
page read and write
149E67D5000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149DADE7000
trusted library allocation
page read and write
149CFE63000
heap
page read and write
149D8CA5000
trusted library allocation
page read and write
149DC398000
trusted library allocation
page read and write
149E17F8000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DA326000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149DA9A7000
trusted library allocation
page read and write
149D8DE9000
trusted library allocation
page read and write
149D9EFC000
trusted library allocation
page read and write
9FD8E3E000
stack
page read and write
149CFE3F000
heap
page read and write
149E27BF000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
DB9000
stack
page read and write
C1E863E000
unkown
page readonly
149CFE49000
heap
page read and write
149E15E6000
trusted library allocation
page read and write
149E6800000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149DB760000
trusted library allocation
page read and write
149E28D9000
trusted library allocation
page read and write
149DAF55000
trusted library allocation
page read and write
149E67D8000
trusted library allocation
page read and write
149E27B8000
trusted library allocation
page read and write
149D878D000
heap
page read and write
149DB777000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149E24BB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DAA56000
trusted library allocation
page read and write
149E25CC000
trusted library allocation
page read and write
9FD963E000
unkown
page readonly
149D8796000
heap
page read and write
149DB857000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149DAFCF000
trusted library allocation
page read and write
225F3F40000
heap
page read and write
149D7210000
trusted library allocation
page read and write
C1E4DD8000
stack
page read and write
149D8C8E000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149CFE9B000
heap
page read and write
149D8A8E000
trusted library allocation
page read and write
149D6077000
trusted library allocation
page read and write
149D91B8000
trusted library allocation
page read and write
149DAC5A000
trusted library allocation
page read and write
149DA7BE000
trusted library allocation
page read and write
149DA9A7000
trusted library allocation
page read and write
149D98EE000
trusted library allocation
page read and write
149E34A5000
trusted library allocation
page read and write
149DB7AC000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149CFE9B000
heap
page read and write
149E1564000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E35DB000
trusted library allocation
page read and write
149E27DA000
trusted library allocation
page read and write
149DB7DC000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149CFE41000
heap
page read and write
149E5BFD000
trusted library allocation
page read and write
149DA786000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149DAC4C000
trusted library allocation
page read and write
149E2E26000
trusted library allocation
page read and write
149DA7AC000
trusted library allocation
page read and write
149DB760000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DB869000
trusted library allocation
page read and write
2054CF47000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DC3D9000
trusted library allocation
page read and write
149DADBD000
trusted library allocation
page read and write
225F3903000
trusted library allocation
page read and write
149D98D2000
trusted library allocation
page read and write
149E2A85000
trusted library allocation
page read and write
1750000
heap
page read and write
1D27EC70000
trusted library allocation
page read and write
149D4E82000
trusted library allocation
page read and write
149E246E000
trusted library allocation
page read and write
149E6AE2000
trusted library allocation
page read and write
149E3459000
trusted library allocation
page read and write
149E24DF000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE47000
heap
page read and write
225F4569000
heap
page read and write
149E2EBC000
trusted library allocation
page read and write
149D985A000
trusted library allocation
page read and write
149D8A7E000
trusted library allocation
page read and write
149D8AA8000
trusted library allocation
page read and write
149D878D000
heap
page read and write
149DABC3000
trusted library allocation
page read and write
15C4000
heap
page read and write
149E1633000
trusted library allocation
page read and write
149DAFC5000
trusted library allocation
page read and write
1F536600000
heap
page read and write
149E6781000
trusted library allocation
page read and write
149D47EF000
trusted library allocation
page read and write
149DA77F000
trusted library allocation
page read and write
149E24DF000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149E277B000
trusted library allocation
page read and write
149D72C9000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE52000
heap
page read and write
149DAAED000
trusted library allocation
page read and write
149E687F000
trusted library allocation
page read and write
149DB781000
trusted library allocation
page read and write
149DABE3000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E34EB000
trusted library allocation
page read and write
149D603A000
trusted library allocation
page read and write
149D87BE000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE52000
heap
page read and write
149CFE82000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE5B000
heap
page read and write
149E2EF2000
trusted library allocation
page read and write
149E2ECE000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149E17A1000
trusted library allocation
page read and write
149E673F000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149D879E000
heap
page read and write
149D60F6000
trusted library allocation
page read and write
149D5D3F000
trusted library allocation
page read and write
1F536A40000
heap
page read and write
149E27B6000
trusted library allocation
page read and write
149DAD97000
trusted library allocation
page read and write
149D606D000
trusted library allocation
page read and write
149DAD54000
trusted library allocation
page read and write
149E34C1000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149DA7B7000
trusted library allocation
page read and write
149E35E6000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE82000
heap
page read and write
149D982F000
trusted library allocation
page read and write
2054CF83000
trusted library allocation
page read and write
149DA7FA000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149E6AA6000
trusted library allocation
page read and write
149E272C000
trusted library allocation
page read and write
149E16CF000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149D4790000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149E2FFE000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149E2469000
trusted library allocation
page read and write
149E27C4000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFEA7000
heap
page read and write
149DC374000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE3F000
heap
page read and write
149D8A92000
trusted library allocation
page read and write
149CFE26000
heap
page read and write
149CFE3E000
heap
page read and write
149E6AAE000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DB8EC000
trusted library allocation
page read and write
200B3DA0000
heap
page read and write
2054CF00000
trusted library allocation
page read and write
149D94A4000
trusted library allocation
page read and write
1D27EB00000
trusted library allocation
page read and write
149D5D30000
trusted library allocation
page read and write
149D98A7000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DAC16000
trusted library allocation
page read and write
149E25FA000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE72000
heap
page read and write
149D9461000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149DACBB000
trusted library allocation
page read and write
149CFE29000
heap
page read and write
149CFE7B000
heap
page read and write
149D8A8A000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
149E17F3000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149E35C6000
trusted library allocation
page read and write
149DAF65000
trusted library allocation
page read and write
149E5BA6000
trusted library allocation
page read and write
149E34A3000
trusted library allocation
page read and write
149E7171000
heap
page read and write
149DAE42000
trusted library allocation
page read and write
15C4000
heap
page read and write
149D914E000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE2E000
heap
page read and write
149DB0FB000
trusted library allocation
page read and write
149D8759000
heap
page read and write
149DA764000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149DAD29000
trusted library allocation
page read and write
149DB8F6000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE40000
heap
page read and write
C1E432E000
unkown
page readonly
149D8A78000
trusted library allocation
page read and write
149D989B000
trusted library allocation
page read and write
149E2FBD000
trusted library allocation
page read and write
149E25CC000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149E1635000
trusted library allocation
page read and write
149E173A000
trusted library allocation
page read and write
149CFE5D000
heap
page read and write
149E5D85000
trusted library allocation
page read and write
149D8CCE000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE82000
heap
page read and write
149DAD67000
trusted library allocation
page read and write
149E2781000
trusted library allocation
page read and write
149E34BA000
trusted library allocation
page read and write
9FDAEBE000
stack
page read and write
149E5974000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
1D27E700000
remote allocation
page read and write
1D27ECDB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE5B000
heap
page read and write
149D5FDB000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149CFEB6000
heap
page read and write
149CFE55000
heap
page read and write
149CFE2C000
heap
page read and write
149CFE50000
heap
page read and write
149E6A6F000
trusted library allocation
page read and write
149E1769000
trusted library allocation
page read and write
149E1770000
trusted library allocation
page read and write
3DFDB768000
trusted library allocation
page execute read
149CFE55000
heap
page read and write
149DAC7D000
trusted library allocation
page read and write
149E16D2000
trusted library allocation
page read and write
149D98D6000
trusted library allocation
page read and write
149CFE3F000
heap
page read and write
149CFE5A000
heap
page read and write
149DA9A7000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149DAF42000
trusted library allocation
page read and write
149E34ED000
trusted library allocation
page read and write
149DB8EE000
trusted library allocation
page read and write
149E2E56000
trusted library allocation
page read and write
149DAF65000
trusted library allocation
page read and write
225F3E95000
unkown
page execute read
149CFE53000
heap
page read and write
149DAC18000
trusted library allocation
page read and write
149E24A4000
trusted library allocation
page read and write
149E344A000
trusted library allocation
page read and write
149E25E3000
trusted library allocation
page read and write
149D8DC1000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE74000
heap
page read and write
149E155C000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149D875A000
heap
page read and write
149CFE50000
heap
page read and write
149CFE60000
heap
page read and write
149CFE45000
heap
page read and write
149E24A4000
trusted library allocation
page read and write
149D87A3000
heap
page read and write
149CFE5B000
heap
page read and write
149D919E000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E346D000
trusted library allocation
page read and write
149E34ED000
trusted library allocation
page read and write
149E34F5000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149D5F98000
trusted library allocation
page read and write
2054CF65000
trusted library allocation
page read and write
149D8A8A000
trusted library allocation
page read and write
149E3495000
trusted library allocation
page read and write
149E25F4000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFEB9000
heap
page read and write
149E5C94000
trusted library allocation
page read and write
149E5CFC000
trusted library allocation
page read and write
149E3443000
trusted library allocation
page read and write
149E68C0000
trusted library allocation
page read and write
149E17EA000
trusted library allocation
page read and write
1F53675A000
heap
page read and write
149CFE33000
heap
page read and write
149E2ECE000
trusted library allocation
page read and write
2054D0F6000
heap
page read and write
149DAFB0000
trusted library allocation
page read and write
149DCDED000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D4EB3000
trusted library allocation
page read and write
1D27E7E2000
unclassified section
page read and write
149E5C6A000
trusted library allocation
page read and write
149E34A3000
trusted library allocation
page read and write
225F4500000
heap
page read and write
149D60BE000
trusted library allocation
page read and write
149CFEBE000
heap
page read and write
13DB000
stack
page read and write
149DC2B9000
trusted library allocation
page read and write
149CFEB7000
heap
page read and write
149CFE5C000
heap
page read and write
149CFE50000
heap
page read and write
149CFEA7000
heap
page read and write
149DA36E000
trusted library allocation
page read and write
1D27EC0C000
trusted library allocation
page read and write
149DACF8000
trusted library allocation
page read and write
149DA7C1000
trusted library allocation
page read and write
149DA2C0000
trusted library allocation
page read and write
149DA9C0000
trusted library allocation
page read and write
149D8788000
heap
page read and write
149E34EF000
trusted library allocation
page read and write
225F4621000
heap
page read and write
149D98B4000
trusted library allocation
page read and write
1D27E7D0000
heap
page readonly
149DACCF000
trusted library allocation
page read and write
149D919E000
trusted library allocation
page read and write
149DA753000
trusted library allocation
page read and write
149E359E000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149E276F000
trusted library allocation
page read and write
149E2713000
trusted library allocation
page read and write
225F45FD000
heap
page read and write
149DC3E8000
trusted library allocation
page read and write
149E249F000
trusted library allocation
page read and write
149D9492000
trusted library allocation
page read and write
149DB779000
trusted library allocation
page read and write
149DB3F0000
trusted library allocation
page read and write
9FD63EE000
stack
page read and write
2DC000
unkown
page read and write
149D4EA3000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149DACD8000
trusted library allocation
page read and write
149E2EB5000
trusted library allocation
page read and write
149D4EB3000
trusted library allocation
page read and write
149E179A000
trusted library allocation
page read and write
149CFE56000
heap
page read and write
149E13BF000
trusted library allocation
page read and write
149DB3FA000
trusted library allocation
page read and write
C1E7E3E000
stack
page read and write
149DABC5000
trusted library allocation
page read and write
149DCDD2000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE55000
heap
page read and write
149E2E57000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DC29C000
trusted library allocation
page read and write
149CFE68000
heap
page read and write
149D6094000
trusted library allocation
page read and write
149CFE4E000
heap
page read and write
3C20000
heap
page read and write
149E17DD000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149DB7C4000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149CFE3F000
heap
page read and write
149D4E26000
trusted library allocation
page read and write
149E2455000
trusted library allocation
page read and write
149DAD06000
trusted library allocation
page read and write
149CFE6D000
heap
page read and write
149DAAA2000
trusted library allocation
page read and write
149D8A35000
trusted library allocation
page read and write
149DAD99000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D9117000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149D8D6D000
trusted library allocation
page read and write
149D4E13000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149CFE3E000
heap
page read and write
149E2E68000
trusted library allocation
page read and write
1F536A45000
heap
page read and write
149D8544000
trusted library allocation
page read and write
149DA9AF000
trusted library allocation
page read and write
149E28E7000
trusted library allocation
page read and write
15C4000
heap
page read and write
149E0E3C000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149DCDB3000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149D98D6000
trusted library allocation
page read and write
149DB78E000
trusted library allocation
page read and write
149D986C000
trusted library allocation
page read and write
149DACBB000
trusted library allocation
page read and write
149E2FC2000
trusted library allocation
page read and write
149DB89C000
trusted library allocation
page read and write
149D4EEE000
trusted library allocation
page read and write
149D8D4D000
trusted library allocation
page read and write
149D91AC000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149DAD83000
trusted library allocation
page read and write
149DC3D6000
trusted library allocation
page read and write
149E6A79000
trusted library allocation
page read and write
149D85C8000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE63000
heap
page read and write
149E3459000
trusted library allocation
page read and write
149E2E20000
trusted library allocation
page read and write
149DA328000
trusted library allocation
page read and write
149E28EE000
trusted library allocation
page read and write
149DADBB000
trusted library allocation
page read and write
149E7D04000
trusted library allocation
page read and write
149D87BB000
heap
page read and write
149D4E1E000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E35D8000
trusted library allocation
page read and write
149E270B000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D91F5000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFEB6000
heap
page read and write
149E6A44000
trusted library allocation
page read and write
149E34EF000
trusted library allocation
page read and write
149E13D0000
trusted library allocation
page read and write
149DAD6D000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149CFE82000
heap
page read and write
149DA0E1000
trusted library allocation
page read and write
149DC2F8000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFE35000
heap
page read and write
3DFDB790000
trusted library allocation
page execute read
149DA75F000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149DAFB8000
trusted library allocation
page read and write
149D8C9E000
trusted library allocation
page read and write
149E1562000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149DAD37000
trusted library allocation
page read and write
149DAFCF000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DC353000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149CFE5D000
heap
page read and write
149D8C8E000
trusted library allocation
page read and write
1D27E810000
heap
page read and write
149CFE9B000
heap
page read and write
225F45E8000
heap
page read and write
149CFEB9000
heap
page read and write
149DA729000
trusted library allocation
page read and write
149E28C0000
trusted library allocation
page read and write
149E5CC3000
trusted library allocation
page read and write
210000
unkown
page readonly
149CFE40000
heap
page read and write
149CFE7B000
heap
page read and write
149E7D3B000
trusted library allocation
page read and write
149D9196000
trusted library allocation
page read and write
149E3468000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149DC3EA000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149CFE35000
heap
page read and write
149E5CF9000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DAA46000
trusted library allocation
page read and write
149D98EE000
trusted library allocation
page read and write
149DB7C4000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149CFE46000
heap
page read and write
149DAD43000
trusted library allocation
page read and write
149DB289000
trusted library allocation
page read and write
105A97C1E000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
149DB846000
trusted library allocation
page read and write
149E358F000
trusted library allocation
page read and write
149D8A15000
trusted library allocation
page read and write
149D8D5C000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE52000
heap
page read and write
225F3F30000
heap
page read and write
149E35D8000
trusted library allocation
page read and write
149D5F85000
trusted library allocation
page read and write
149D98DD000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149D8C9E000
trusted library allocation
page read and write
149E25EB000
trusted library allocation
page read and write
2054CBE0000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE7B000
heap
page read and write
149CFE55000
heap
page read and write
149DAFB8000
trusted library allocation
page read and write
149E13C1000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE82000
heap
page read and write
1420000
heap
page read and write
149CFE7B000
heap
page read and write
149D989F000
trusted library allocation
page read and write
149DAFCF000
trusted library allocation
page read and write
149E34FB000
trusted library allocation
page read and write
13FE000
stack
page read and write
149D98EE000
trusted library allocation
page read and write
149E1522000
trusted library allocation
page read and write
149E17EF000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DADBD000
trusted library allocation
page read and write
149CFE2E000
heap
page read and write
149CFE5A000
heap
page read and write
149E35D4000
trusted library allocation
page read and write
149D87B5000
heap
page read and write
149DB783000
trusted library allocation
page read and write
149CFE46000
heap
page read and write
149CFE82000
heap
page read and write
149DABAD000
trusted library allocation
page read and write
225F37E0000
trusted library allocation
page read and write
149D8CCE000
trusted library allocation
page read and write
149D85A9000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149E17B3000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149D8C77000
trusted library allocation
page read and write
149E28AF000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149D9ACC000
trusted library allocation
page read and write
149E6AC4000
trusted library allocation
page read and write
149E28EE000
trusted library allocation
page read and write
149DA2DC000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149CFE45000
heap
page read and write
149CFEA7000
heap
page read and write
149CFE74000
heap
page read and write
149D9418000
trusted library allocation
page read and write
149E6A24000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149D8DF0000
trusted library allocation
page read and write
1D27EC24000
trusted library allocation
page read and write
149CFE71000
heap
page read and write
149E34C1000
trusted library allocation
page read and write
149DB8E6000
trusted library allocation
page read and write
149DA2D8000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
225F3710000
heap
page read and write
149DAE90000
trusted library allocation
page read and write
149E5D59000
trusted library allocation
page read and write
149E2E29000
trusted library allocation
page read and write
149E35E2000
trusted library allocation
page read and write
149D605E000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149DAD30000
trusted library allocation
page read and write
149E1476000
trusted library allocation
page read and write
149E2744000
trusted library allocation
page read and write
149E1489000
trusted library allocation
page read and write
149DAC8D000
trusted library allocation
page read and write
149CFE48000
heap
page read and write
149DACF8000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE3F000
heap
page read and write
149CFE72000
heap
page read and write
149CFE2C000
heap
page read and write
149D8790000
heap
page read and write
149D87A1000
heap
page read and write
149D87BD000
heap
page read and write
149D9195000
trusted library allocation
page read and write
149E3459000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
225F39F3000
trusted library allocation
page read and write
149D87BD000
heap
page read and write
149D9428000
trusted library allocation
page read and write
149E593D000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE52000
heap
page read and write
149CFE6D000
heap
page read and write
149DCDE4000
trusted library allocation
page read and write
225F462A000
heap
page read and write
149E1715000
trusted library allocation
page read and write
149D94B6000
trusted library allocation
page read and write
149E1560000
trusted library allocation
page read and write
149D98D3000
trusted library allocation
page read and write
149E17AA000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149CFE9B000
heap
page read and write
149E24E7000
trusted library allocation
page read and write
149E6AEE000
trusted library allocation
page read and write
1D27E780000
heap
page read and write
149CFEB9000
heap
page read and write
149D8C8A000
trusted library allocation
page read and write
149E6AC4000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149E5B84000
trusted library allocation
page read and write
149CFE3E000
heap
page read and write
149D9825000
trusted library allocation
page read and write
1D27EC0E000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E35D8000
trusted library allocation
page read and write
149E6A18000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149DAFB8000
trusted library allocation
page read and write
149CFE35000
heap
page read and write
149CFE82000
heap
page read and write
149CFE3E000
heap
page read and write
149CFE47000
heap
page read and write
149D4781000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE64000
heap
page read and write
149CFE9B000
heap
page read and write
149CFE82000
heap
page read and write
149CFE52000
heap
page read and write
225F4659000
heap
page read and write
149CFE45000
heap
page read and write
149D98CB000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE65000
heap
page read and write
149CFEB7000
heap
page read and write
1F536783000
heap
page read and write
149CFE47000
heap
page read and write
149E24DB000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149DAFAD000
trusted library allocation
page read and write
9FDB6BE000
unkown
page readonly
149DA7FC000
trusted library allocation
page read and write
149DAC5C000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
149E1781000
trusted library allocation
page read and write
149D727B000
trusted library allocation
page read and write
149DAAFA000
trusted library allocation
page read and write
149DB725000
trusted library allocation
page read and write
149CFE5B000
heap
page read and write
149E71E1000
heap
page read and write
149E2AC1000
trusted library allocation
page read and write
149D9872000
trusted library allocation
page read and write
149E35A6000
trusted library allocation
page read and write
149D60BE000
trusted library allocation
page read and write
149D8A58000
trusted library allocation
page read and write
149DAC4C000
trusted library allocation
page read and write
149D5DF2000
trusted library allocation
page read and write
149D91D5000
trusted library allocation
page read and write
2054D132000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149CFE7B000
heap
page read and write
149CFEB7000
heap
page read and write
149D87B5000
heap
page read and write
149CFE3A000
heap
page read and write
149DCDE4000
trusted library allocation
page read and write
149D98E4000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E2FCF000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149E24E7000
trusted library allocation
page read and write
149DAC2A000
trusted library allocation
page read and write
149CFE24000
heap
page read and write
149E3443000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE2E000
heap
page read and write
149CFE82000
heap
page read and write
149DAD64000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFEBF000
heap
page read and write
149CFE3F000
heap
page read and write
149D9888000
trusted library allocation
page read and write
149D989B000
trusted library allocation
page read and write
149D5D71000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149E244C000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E6AAE000
trusted library allocation
page read and write
1D27ECB1000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149E25E8000
trusted library allocation
page read and write
149CFE51000
heap
page read and write
149CFE52000
heap
page read and write
149DAC7D000
trusted library allocation
page read and write
149CFE52000
heap
page read and write
149D8759000
heap
page read and write
149CFE41000
heap
page read and write
1743000
heap
page read and write
149DA755000
trusted library allocation
page read and write
225F4560000
heap
page read and write
149CFE51000
heap
page read and write
149CFE45000
heap
page read and write
149CFE50000
heap
page read and write
149E1489000
trusted library allocation
page read and write
2054CF6E000
trusted library allocation
page read and write
149DAC1C000
trusted library allocation
page read and write
149D8DE6000
trusted library allocation
page read and write
149E6A36000
trusted library allocation
page read and write
149E346D000
trusted library allocation
page read and write
1D27EC03000
trusted library allocation
page read and write
149D8D84000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE7B000
heap
page read and write
149CFE3F000
heap
page read and write
149CFEBF000
heap
page read and write
149DAFC3000
trusted library allocation
page read and write
149E2E68000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149E59CE000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149CFE5B000
heap
page read and write
149E273B000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149CFE74000
heap
page read and write
149E17AA000
trusted library allocation
page read and write
149D4DF6000
trusted library allocation
page read and write
149DAF51000
trusted library allocation
page read and write
149D8558000
trusted library allocation
page read and write
149E5D18000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149CFEB9000
heap
page read and write
149E12DE000
trusted library allocation
page read and write
225F456C000
heap
page read and write
149DB7B0000
trusted library allocation
page read and write
149E6AF1000
trusted library allocation
page read and write
149E2FE8000
trusted library allocation
page read and write
149D5F95000
trusted library allocation
page read and write
149CFEB6000
heap
page read and write
149E27B6000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D8CA5000
trusted library allocation
page read and write
149CFE82000
heap
page read and write
15C4000
heap
page read and write
149DA737000
trusted library allocation
page read and write
225F395C000
trusted library allocation
page read and write
149E17F3000
trusted library allocation
page read and write
149E273B000
trusted library allocation
page read and write
149D9492000
trusted library allocation
page read and write
149DA35B000
trusted library allocation
page read and write
D60A3E000
stack
page read and write
149CFE74000
heap
page read and write
149E6AFD000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D6019000
trusted library allocation
page read and write
149DACC4000
trusted library allocation
page read and write
149E28F0000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE52000
heap
page read and write
149CFE47000
heap
page read and write
149DACFC000
trusted library allocation
page read and write
15C4000
heap
page read and write
149E6AC4000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149DAC5A000
trusted library allocation
page read and write
225F45E0000
heap
page read and write
149CFE69000
heap
page read and write
149E34C3000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE45000
heap
page read and write
149CFE40000
heap
page read and write
149E2478000
trusted library allocation
page read and write
149DB7D6000
trusted library allocation
page read and write
149CFE41000
heap
page read and write
2054CF5D000
trusted library allocation
page read and write
149E246F000
trusted library allocation
page read and write
149E5B93000
trusted library allocation
page read and write
149E5997000
trusted library allocation
page read and write
149E35E6000
trusted library allocation
page read and write
149D5DD3000
trusted library allocation
page read and write
149D98CB000
trusted library allocation
page read and write
149E718D000
heap
page read and write
1F5366F0000
heap
page read and write
149D9824000
trusted library allocation
page read and write
149D8DE3000
trusted library allocation
page read and write
149E67B4000
trusted library allocation
page read and write
149CFE68000
heap
page read and write
149D8C9E000
trusted library allocation
page read and write
149DAD2F000
trusted library allocation
page read and write
149CFE21000
heap
page read and write
149DA7D3000
trusted library allocation
page read and write
153E000
stack
page read and write
149CFE9B000
heap
page read and write
149E2E83000
trusted library allocation
page read and write
149CFE5E000
heap
page read and write
149D601E000
trusted library allocation
page read and write
149DAAEF000
trusted library allocation
page read and write
149E17FC000
trusted library allocation
page read and write
149E6A5F000
trusted library allocation
page read and write
149DC3FD000
trusted library allocation
page read and write
149D8CCE000
trusted library allocation
page read and write
149E1530000
trusted library allocation
page read and write
149E1577000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149DB836000
trusted library allocation
page read and write
149E34ED000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFE50000
heap
page read and write
149DADE7000
trusted library allocation
page read and write
225F4400000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE3E000
heap
page read and write
149DAC18000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
149DB752000
trusted library allocation
page read and write
149E178E000
trusted library allocation
page read and write
149DA77A000
trusted library allocation
page read and write
149E1736000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
149DA39A000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149D8A9A000
trusted library allocation
page read and write
149E7101000
heap
page read and write
149E1560000
trusted library allocation
page read and write
149DA7BE000
trusted library allocation
page read and write
149E2E55000
trusted library allocation
page read and write
149D98FC000
trusted library allocation
page read and write
149D7233000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149E6892000
trusted library allocation
page read and write
149E2491000
trusted library allocation
page read and write
149DA9A5000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
200B3D40000
heap
page read and write
149D98BB000
trusted library allocation
page read and write
149DACF0000
trusted library allocation
page read and write
149D5FC4000
trusted library allocation
page read and write
9FD63AE000
unkown
page readonly
1D27EC7B000
trusted library allocation
page read and write
149E68C6000
trusted library allocation
page read and write
149CFEA7000
heap
page read and write
149CFE35000
heap
page read and write
149D91EC000
trusted library allocation
page read and write
149DA9B1000
trusted library allocation
page read and write
149DC3E8000
trusted library allocation
page read and write
149DB876000
trusted library allocation
page read and write
149DC266000
trusted library allocation
page read and write
149CFE96000
heap
page read and write
149E6853000
trusted library allocation
page read and write
1D27EC5D000
trusted library allocation
page read and write
149E6ABF000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149CFE4C000
heap
page read and write
149CFE20000
heap
page read and write
149E2742000
trusted library allocation
page read and write
149D5DAA000
trusted library allocation
page read and write
149CFE2C000
heap
page read and write
149DB81F000
trusted library allocation
page read and write
149E3450000
trusted library allocation
page read and write
1F5381FE000
heap
page read and write
149E67BC000
trusted library allocation
page read and write
149E25F2000
trusted library allocation
page read and write
149CFE9B000
heap
page read and write
149CFEBE000
heap
page read and write
149D989B000
trusted library allocation
page read and write
149E6A9D000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
149E25DD000
trusted library allocation
page read and write
149CFE33000
heap
page read and write
149CFE3F000
heap
page read and write
1D27EC82000
trusted library allocation
page read and write
149E35BC000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E2EB3000
trusted library allocation
page read and write
149E24E7000
trusted library allocation
page read and write
1D27E9D4000
heap
page read and write
149D602B000
trusted library allocation
page read and write
149D4E18000
trusted library allocation
page read and write
1D27ED00000
heap
page read and write
149E14F6000
trusted library allocation
page read and write
225F4560000
heap
page read and write
149E24DF000
trusted library allocation
page read and write
149E678A000
trusted library allocation
page read and write
149DAAF7000
trusted library allocation
page read and write
149DB2DB000
trusted library allocation
page read and write
149E6ABA000
trusted library allocation
page read and write
149E28BA000
trusted library allocation
page read and write
149DC24C000
trusted library allocation
page read and write
149D9868000
trusted library allocation
page read and write
149DACAC000
trusted library allocation
page read and write
1D27E81A000
heap
page read and write
D60AFE000
unkown
page readonly
149CFE50000
heap
page read and write
149D6070000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFEA7000
heap
page read and write
149D72CF000
trusted library allocation
page read and write
225F4658000
heap
page read and write
149E2ED1000
trusted library allocation
page read and write
149D91F5000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149DAD2B000
trusted library allocation
page read and write
149CFE47000
heap
page read and write
149DB8E6000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
149E1711000
trusted library allocation
page read and write
149D87BD000
heap
page read and write
149DCD8B000
trusted library allocation
page read and write
149E67BA000
trusted library allocation
page read and write
149CFE6C000
heap
page read and write
149DB8B9000
trusted library allocation
page read and write
149E6AC4000
trusted library allocation
page read and write
149E1483000
trusted library allocation
page read and write
149E2744000
trusted library allocation
page read and write
149D98BB000
trusted library allocation
page read and write
149CFE6E000
heap
page read and write
149CFE50000
heap
page read and write
149DC34F000
trusted library allocation
page read and write
149DAFBB000
trusted library allocation
page read and write
149D9AF3000
trusted library allocation
page read and write
149CFE40000
heap
page read and write
149DABD8000
trusted library allocation
page read and write
149DB8CE000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149CFE9B000
heap
page read and write
149E28AE000
trusted library allocation
page read and write
149CFE3B000
heap
page read and write
149E3495000
trusted library allocation
page read and write
149E25EB000
trusted library allocation
page read and write
149CFEB9000
heap
page read and write
149CFE47000
heap
page read and write
149D5F0D000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
9FD7DFE000
stack
page read and write
149DAF40000
trusted library allocation
page read and write
149D605B000
trusted library allocation
page read and write
149E12F1000
trusted library allocation
page read and write
2AC000
unkown
page readonly
149E67FE000
trusted library allocation
page read and write
149DB79C000
trusted library allocation
page read and write
149DABF7000
trusted library allocation
page read and write
149DACCD000
trusted library allocation
page read and write
225F45F1000
heap
page read and write
149D6034000
trusted library allocation
page read and write
149D92A7000
trusted library allocation
page read and write
149D9417000
trusted library allocation
page read and write
149DADBB000
trusted library allocation
page read and write
149CFE20000
heap
page read and write
149E2452000
trusted library allocation
page read and write
225F45FD000
heap
page read and write
149E3435000
trusted library allocation
page read and write
149D94B2000
trusted library allocation
page read and write
149CFE45000
heap
page read and write
149DC370000
trusted library allocation
page read and write
149D6016000
trusted library allocation
page read and write
149E2EE4000
trusted library allocation
page read and write
149D98EE000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
2054CB80000
unclassified section
page readonly
149E157C000
trusted library allocation
page read and write
149DC3D6000
trusted library allocation
page read and write
149CFE5A000
heap
page read and write
225F4644000
heap
page read and write
149DC25B000
trusted library allocation
page read and write
2054D113000
trusted library allocation
page read and write
149DACFC000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149E2456000
trusted library allocation
page read and write
149E6A59000
trusted library allocation
page read and write
149E2E64000
trusted library allocation
page read and write
149CFE55000
heap
page read and write
149CFE2C000
heap
page read and write
149E5B55000
trusted library allocation
page read and write
149D98EE000
trusted library allocation
page read and write
149CFEBF000
heap
page read and write
149DAAF3000
trusted library allocation
page read and write
149CFE64000
heap
page read and write
149E2E71000
trusted library allocation
page read and write
149DAC8D000
trusted library allocation
page read and write
149DAD67000
trusted library allocation
page read and write
149D9899000
trusted library allocation
page read and write
149CFE3A000
heap
page read and write
149CFE53000
heap
page read and write
149CFE53000
heap
page read and write
149CFE73000
heap
page read and write
149E17D1000
trusted library allocation
page read and write
149CFE50000
heap
page read and write
1718000
heap
page read and write
149DAFB8000
trusted library allocation
page read and write
149DB7A8000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149CFE2E000
heap
page read and write
149E6843000
trusted library allocation
page read and write
149E2FF4000
trusted library allocation
page read and write
225F4669000
heap
page read and write
225F4569000
heap
page read and write
149E59ED000
trusted library allocation
page read and write
149DABD3000
trusted library allocation
page read and write
230E000
stack
page read and write
149CFE49000
heap
page read and write
149E346D000
trusted library allocation
page read and write
149D87A1000
heap
page read and write
149E0E32000
trusted library allocation
page read and write
2054CC8F000
unclassified section
page read and write
149CFE35000
heap
page read and write
149CFEB9000
heap
page read and write
149DAD61000
trusted library allocation
page read and write
149E143E000
trusted library allocation
page read and write
149DADE7000
trusted library allocation
page read and write
149E2AE0000
trusted library allocation
page read and write
149E6843000
trusted library allocation
page read and write
149CFE7B000
heap
page read and write
149E17A1000
trusted library allocation
page read and write
149E5CBA000
trusted library allocation
page read and write
149E6853000
trusted library allocation
page read and write
149DAC3E000
trusted library allocation
page read and write
149CFE74000
heap
page read and write
149DACC4000
trusted library allocation
page read and write
1F53678D000
heap
page read and write
79551FE000
stack
page read and write
149E67EA000
trusted library allocation
page read and write
149CFE53000
heap
page read and write
149CFE4C000
heap
page read and write
149CFEB6000
heap
page read and write
149CFE74000
heap
page read and write
There are 4049 hidden memdumps, click here to show them.