IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_187fa713-2933-479c-817c-8d6638736cbe.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_187fa713-2933-479c-817c-8d6638736cbe.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\855e56fc-7f27-478d-8b5e-749c1dd8bb18 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\855e56fc-7f27-478d-8b5e-749c1dd8bb18.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2216 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91e90625-3af1-419d-b329-d47348c99b65} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" 204cee70110 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4092 -parentBuildID 20230927232528 -prefsHandle 4196 -prefMapHandle 4192 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe80c1c2-3d88-4182-86bc-9713acac0c0a} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" 204deae0510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5032 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4912 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {abcfe1b7-5ad9-4851-a943-b22c8fa72fb9} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" 204e772f910 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=40249-e88c401e1b1f2242d9e4
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.184.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.181.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.65.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.184.238
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
204D5C82000
heap
page read and write
204DEC80000
trusted library allocation
page read and write
204E6DED000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
204DC522000
heap
page read and write
204DFE73000
trusted library allocation
page read and write
204E7CDD000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E0091000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204DFCE7000
trusted library allocation
page read and write
204DBE80000
trusted library allocation
page read and write
204DFC5B000
trusted library allocation
page read and write
204DBE7E000
trusted library allocation
page read and write
204E77C3000
trusted library allocation
page read and write
204E6F9F000
trusted library allocation
page read and write
204E9C59000
trusted library allocation
page read and write
204E71F0000
trusted library allocation
page read and write
204E7852000
trusted library allocation
page read and write
204DD0C2000
trusted library allocation
page read and write
204DFAEC000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
8D4000
unkown
page readonly
204E27FB000
trusted library allocation
page read and write
204DEEAC000
trusted library allocation
page read and write
17C47A5C000
heap
page read and write
204D5C6F000
heap
page read and write
204E8766000
trusted library allocation
page read and write
204E7DDE000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E784C000
trusted library allocation
page read and write
204DEC77000
trusted library allocation
page read and write
204DEF7D000
trusted library allocation
page read and write
204E6FFC000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
6F65FFE000
unkown
page readonly
204E6F77000
trusted library allocation
page read and write
204E6C16000
trusted library allocation
page read and write
204E728A000
trusted library allocation
page read and write
204DAC66000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DEDD3000
trusted library allocation
page read and write
204DED7F000
trusted library allocation
page read and write
204D5C34000
heap
page read and write
204E702F000
trusted library allocation
page read and write
204E889B000
heap
page read and write
204DBE50000
trusted library allocation
page read and write
204E21D6000
trusted library allocation
page read and write
204E92A0000
trusted library allocation
page read and write
204E7C8F000
trusted library allocation
page read and write
204D0B6B000
heap
page read and write
204E01C5000
trusted library allocation
page read and write
204DF7F3000
trusted library allocation
page read and write
204E7DF3000
trusted library allocation
page read and write
204E6F37000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C4F000
heap
page read and write
204E70C0000
trusted library allocation
page read and write
204DFE5B000
trusted library allocation
page read and write
204E6F70000
trusted library allocation
page read and write
204E87FC000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E72B1000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
204E6DC2000
trusted library allocation
page read and write
26FCBD50000
unclassified section
page readonly
204DFE61000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DF6BF000
trusted library allocation
page read and write
204DEE7E000
trusted library allocation
page read and write
204D5C2E000
heap
page read and write
204DFE97000
trusted library allocation
page read and write
204DF7CC000
trusted library allocation
page read and write
204E78B6000
trusted library allocation
page read and write
204E16C5000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DFCB1000
trusted library allocation
page read and write
204DC4FD000
heap
page read and write
204E00B7000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DF6BF000
trusted library allocation
page read and write
204DF608000
trusted library allocation
page read and write
204D5C88000
heap
page read and write
204E6BB2000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E00BA000
trusted library allocation
page read and write
204E722D000
trusted library allocation
page read and write
17C47B77000
heap
page read and write
17C46E69000
trusted library allocation
page read and write
204EA8D3000
trusted library allocation
page read and write
26834A70000
unclassified section
page readonly
204DFEF9000
trusted library allocation
page read and write
204E6FD2000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204E7CAD000
trusted library allocation
page read and write
17C47A60000
heap
page read and write
204D5C78000
heap
page read and write
204E6FFE000
trusted library allocation
page read and write
204E6BC7000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C2B000
heap
page read and write
204E80C7000
trusted library allocation
page read and write
204DF636000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204DEE84000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204E00D2000
trusted library allocation
page read and write
204DFC5E000
trusted library allocation
page read and write
204E80B7000
trusted library allocation
page read and write
204E6FBB000
trusted library allocation
page read and write
204E78F3000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C24000
heap
page read and write
204DFEC9000
trusted library allocation
page read and write
204E01C5000
trusted library allocation
page read and write
204E6F70000
trusted library allocation
page read and write
204DFE8C000
trusted library allocation
page read and write
204E6DA9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E728C000
trusted library allocation
page read and write
1544000
heap
page read and write
204E7031000
trusted library allocation
page read and write
204E156F000
trusted library allocation
page read and write
204DEE84000
trusted library allocation
page read and write
204DC25C000
trusted library allocation
page read and write
204DBE08000
trusted library allocation
page read and write
204DBE8E000
trusted library allocation
page read and write
204DEE71000
trusted library allocation
page read and write
204E923E000
trusted library allocation
page read and write
204DD072000
trusted library allocation
page read and write
204E005B000
trusted library allocation
page read and write
204E278B000
trusted library allocation
page read and write
204EAE44000
trusted library allocation
page read and write
204E11B2000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204E8092000
trusted library allocation
page read and write
204DFC38000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
17C47AA1000
heap
page read and write
204E8149000
trusted library allocation
page read and write
204E7835000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204DACF9000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
17C47906000
trusted library allocation
page read and write
204E7881000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E7231000
trusted library allocation
page read and write
204E22CA000
trusted library allocation
page read and write
204E01CD000
trusted library allocation
page read and write
26FCBD30000
heap
page read and write
26834CD0000
unclassified section
page read and write
204E00CF000
trusted library allocation
page read and write
204E6F72000
trusted library allocation
page read and write
204E1145000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204D5C3D000
heap
page read and write
204E7CBE000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E00C1000
trusted library allocation
page read and write
204E6CDD000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
15C0000
trusted library allocation
page read and write
204E6FDA000
trusted library allocation
page read and write
204E7CDE000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E15FA000
trusted library allocation
page read and write
204DAC75000
trusted library allocation
page read and write
204EA88D000
trusted library allocation
page read and write
204DEE63000
trusted library allocation
page read and write
204DBEB5000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
204D5C28000
heap
page read and write
204E875C000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204E22EA000
trusted library allocation
page read and write
204E6FEF000
trusted library allocation
page read and write
204DEEB3000
trusted library allocation
page read and write
204DEE4E000
trusted library allocation
page read and write
17C47B79000
heap
page read and write
204E6DA9000
trusted library allocation
page read and write
204E27AD000
trusted library allocation
page read and write
204DF6FE000
trusted library allocation
page read and write
204DF7ED000
trusted library allocation
page read and write
BCA3BFF000
stack
page read and write
204E00F6000
trusted library allocation
page read and write
204E7CB9000
trusted library allocation
page read and write
204DBDB8000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C5D000
heap
page read and write
BCA33FF000
stack
page read and write
1F450D4D000
heap
page read and write
204DEC8E000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204DC2F4000
trusted library allocation
page read and write
204DED7F000
trusted library allocation
page read and write
204E77BD000
trusted library allocation
page read and write
204E71D6000
trusted library allocation
page read and write
204DACE4000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E71D6000
trusted library allocation
page read and write
204E005B000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204DED8F000
trusted library allocation
page read and write
204DFE86000
trusted library allocation
page read and write
204EAE75000
trusted library allocation
page read and write
26834E82000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204D5C1D000
heap
page read and write
204DEE78000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E87FC000
trusted library allocation
page read and write
204DBEEB000
trusted library allocation
page read and write
204DEE63000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204EAEEC000
trusted library allocation
page read and write
204DEC7A000
trusted library allocation
page read and write
204E6FE0000
trusted library allocation
page read and write
204E279B000
trusted library allocation
page read and write
204DEC78000
trusted library allocation
page read and write
1F4527DD000
heap
page read and write
204D5C3E000
heap
page read and write
204E2296000
trusted library allocation
page read and write
204E78A8000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204DD0F2000
trusted library allocation
page read and write
204E7E96000
trusted library allocation
page read and write
204E6F3D000
trusted library allocation
page read and write
204DA5C7000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C47000
heap
page read and write
204EADD6000
trusted library allocation
page read and write
204DFC3E000
trusted library allocation
page read and write
1653000
heap
page read and write
204DEF27000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204D5C32000
heap
page read and write
204E7C82000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
26834C9A000
heap
page read and write
204DF68B000
trusted library allocation
page read and write
204DEE7B000
trusted library allocation
page read and write
204E6D92000
trusted library allocation
page read and write
204E1633000
trusted library allocation
page read and write
204DEC5A000
trusted library allocation
page read and write
204E72BB000
trusted library allocation
page read and write
204E92A0000
trusted library allocation
page read and write
204DEF8D000
trusted library allocation
page read and write
204E6DCA000
trusted library allocation
page read and write
204E87FC000
trusted library allocation
page read and write
204E01BD000
trusted library allocation
page read and write
204DEECA000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DF6F0000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E70F6000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E8092000
trusted library allocation
page read and write
204E7CB4000
trusted library allocation
page read and write
204E20D5000
trusted library allocation
page read and write
204E93DE000
trusted library allocation
page read and write
204DFC96000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E9245000
trusted library allocation
page read and write
204E7DDA000
trusted library allocation
page read and write
204E6FC7000
trusted library allocation
page read and write
204E6B57000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C2E000
heap
page read and write
204E223E000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6B5F000
trusted library allocation
page read and write
204DFEFC000
trusted library allocation
page read and write
204DBE76000
trusted library allocation
page read and write
204DED6F000
trusted library allocation
page read and write
204DFC65000
trusted library allocation
page read and write
204DFEF6000
trusted library allocation
page read and write
204DFC55000
trusted library allocation
page read and write
204E77C9000
trusted library allocation
page read and write
17C46E48000
trusted library allocation
page read and write
204EA061000
trusted library allocation
page read and write
204E6F8E000
trusted library allocation
page read and write
1560000
heap
page read and write
204E6C32000
trusted library allocation
page read and write
1F451020000
heap
page read and write
204DFC5B000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204D5C77000
heap
page read and write
204E6E12000
trusted library allocation
page read and write
204E6C7C000
trusted library allocation
page read and write
204E00A7000
trusted library allocation
page read and write
204E11DB000
trusted library allocation
page read and write
204E7DCB000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DFCB6000
trusted library allocation
page read and write
204DC568000
heap
page read and write
204E7165000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DFEA7000
trusted library allocation
page read and write
204DD062000
trusted library allocation
page read and write
26FCBE79000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DFCD1000
trusted library allocation
page read and write
204E7ED2000
trusted library allocation
page read and write
204E15CE000
trusted library allocation
page read and write
204E6D9D000
trusted library allocation
page read and write
204DEFEE000
trusted library allocation
page read and write
13E358C000
stack
page read and write
204DC29D000
trusted library allocation
page read and write
204E6FE0000
trusted library allocation
page read and write
204DF696000
trusted library allocation
page read and write
204EAD6F000
trusted library allocation
page read and write
204E08ED000
trusted library allocation
page read and write
6F6617E000
unkown
page readonly
204DEE9A000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E6EF6000
trusted library allocation
page read and write
204E25B0000
trusted library allocation
page read and write
204EA897000
trusted library allocation
page read and write
204E11DD000
trusted library allocation
page read and write
17C47AA8000
heap
page read and write
204DFE5B000
trusted library allocation
page read and write
204DED5C000
trusted library allocation
page read and write
204E7C7E000
trusted library allocation
page read and write
204DF70C000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E70E7000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E0056000
trusted library allocation
page read and write
204E7DC7000
trusted library allocation
page read and write
204EAE0C000
trusted library allocation
page read and write
17C47A5C000
heap
page read and write
204E889C000
heap
page read and write
204E803D000
trusted library allocation
page read and write
204E785B000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DBBD5000
trusted library allocation
page read and write
BD6953E000
unkown
page readonly
204E25D1000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E156A000
trusted library allocation
page read and write
204D5C47000
heap
page read and write
26834E03000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E2249000
trusted library allocation
page read and write
204E6D8C000
trusted library allocation
page read and write
204DABF6000
trusted library allocation
page read and write
204E80AA000
trusted library allocation
page read and write
204EAE6B000
trusted library allocation
page read and write
204D5C35000
heap
page read and write
204E7EB2000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
17C47A6C000
heap
page read and write
1544000
heap
page read and write
204E0157000
trusted library allocation
page read and write
26834E6A000
trusted library allocation
page read and write
204E77DF000
trusted library allocation
page read and write
204DBD31000
trusted library allocation
page read and write
204DEC7A000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E8011000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204EA8D7000
trusted library allocation
page read and write
204E7C8E000
trusted library allocation
page read and write
204E2068000
trusted library allocation
page read and write
204D5C2E000
heap
page read and write
17C47AE1000
heap
page read and write
BD6963E000
unkown
page readonly
204E00EF000
trusted library allocation
page read and write
204E7C47000
trusted library allocation
page read and write
204DC298000
trusted library allocation
page read and write
204E6FE2000
trusted library allocation
page read and write
204E7DF1000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DF6BF000
trusted library allocation
page read and write
204E7CBE000
trusted library allocation
page read and write
204E15DB000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E00DE000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E6F57000
trusted library allocation
page read and write
204DEDA1000
trusted library allocation
page read and write
204E6FA3000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E0067000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
3B9BFFA000
stack
page read and write
204E01C5000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DC4E4000
heap
page read and write
204DFEBF000
trusted library allocation
page read and write
204E7EC3000
trusted library allocation
page read and write
204E7EFE000
trusted library allocation
page read and write
1544000
heap
page read and write
17C47438000
unkown
page execute read
204DD0DC000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204EA8E0000
trusted library allocation
page read and write
204E8042000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
204E93C4000
trusted library allocation
page read and write
26FCBEEB000
trusted library allocation
page read and write
204E7194000
trusted library allocation
page read and write
204E72C1000
trusted library allocation
page read and write
204DF7FC000
trusted library allocation
page read and write
204E7024000
trusted library allocation
page read and write
26834E0E000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DFC84000
trusted library allocation
page read and write
204E71BD000
trusted library allocation
page read and write
204DEDCA000
trusted library allocation
page read and write
204E20E9000
trusted library allocation
page read and write
204E877B000
trusted library allocation
page read and write
17C47AF0000
heap
page read and write
204D5C46000
heap
page read and write
204E0053000
trusted library allocation
page read and write
204E11D9000
trusted library allocation
page read and write
13E57FE000
unkown
page readonly
204E1681000
trusted library allocation
page read and write
204E8801000
trusted library allocation
page read and write
204E9C18000
trusted library allocation
page read and write
204DEF0F000
trusted library allocation
page read and write
204D5C49000
heap
page read and write
204DECA5000
trusted library allocation
page read and write
204E9237000
trusted library allocation
page read and write
1654000
heap
page read and write
204D5C32000
heap
page read and write
204E807B000
trusted library allocation
page read and write
204E7CBC000
trusted library allocation
page read and write
204E6CE5000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6DD3000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C7C000
heap
page read and write
204DEE8A000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
8C2000
unkown
page readonly
204E11D3000
trusted library allocation
page read and write
204DEE2F000
trusted library allocation
page read and write
204DBEEB000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204DD01D000
trusted library allocation
page read and write
204DFC55000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E6FD6000
trusted library allocation
page read and write
204DBBAA000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E0190000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204D5C78000
heap
page read and write
204EAEC4000
trusted library allocation
page read and write
17C46E10000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204DED3D000
trusted library allocation
page read and write
204DED9A000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E7279000
trusted library allocation
page read and write
204E2562000
trusted library allocation
page read and write
204E7CCF000
trusted library allocation
page read and write
204D5C91000
heap
page read and write
204DBDE6000
trusted library allocation
page read and write
204E7CCF000
trusted library allocation
page read and write
204E7C97000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204DECCE000
trusted library allocation
page read and write
204E889B000
heap
page read and write
204DF7C9000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204E7CE3000
trusted library allocation
page read and write
17C47917000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
17C46FD6000
heap
page read and write
204E015F000
trusted library allocation
page read and write
204DD0D2000
trusted library allocation
page read and write
204DBEBB000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204E0097000
trusted library allocation
page read and write
204DFC55000
trusted library allocation
page read and write
204E78BA000
trusted library allocation
page read and write
204E7794000
trusted library allocation
page read and write
17C46EE9000
trusted library allocation
page read and write
204E27FB000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E7CDD000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204EA8DC000
trusted library allocation
page read and write
204DD075000
trusted library allocation
page read and write
204E7188000
trusted library allocation
page read and write
204DBF29000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E6DDB000
trusted library allocation
page read and write
204DED7B000
trusted library allocation
page read and write
204E8033000
trusted library allocation
page read and write
204E6FFC000
trusted library allocation
page read and write
204D5C2C000
heap
page read and write
204D5C1E000
heap
page read and write
204DF6BF000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204DC568000
heap
page read and write
204E25B0000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DBD76000
trusted library allocation
page read and write
204DF6E0000
trusted library allocation
page read and write
26835107000
trusted library allocation
page read and write
204DEC7A000
trusted library allocation
page read and write
204E25BA000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E222D000
trusted library allocation
page read and write
204DED5A000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DBE6D000
trusted library allocation
page read and write
204E93A0000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E251C000
trusted library allocation
page read and write
204D5C34000
heap
page read and write
204E8063000
trusted library allocation
page read and write
204E6CF5000
trusted library allocation
page read and write
204E7DDA000
trusted library allocation
page read and write
204E01A1000
trusted library allocation
page read and write
204DEFD5000
trusted library allocation
page read and write
204E7757000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204D5C1E000
heap
page read and write
204E717A000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204D5C78000
heap
page read and write
204DFC50000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C5D000
heap
page read and write
204E254F000
trusted library allocation
page read and write
204E7CDE000
trusted library allocation
page read and write
204E6E06000
trusted library allocation
page read and write
204E80B7000
trusted library allocation
page read and write
1F450F00000
trusted library allocation
page read and write
204E08C3000
trusted library allocation
page read and write
204EA8A5000
trusted library allocation
page read and write
204E9246000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204E9245000
trusted library allocation
page read and write
204E784C000
trusted library allocation
page read and write
204DF7D4000
trusted library allocation
page read and write
204EA8FC000
trusted library allocation
page read and write
204EADFA000
trusted library allocation
page read and write
204EAE12000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
1E1E000
stack
page read and write
17C47B2A000
heap
page read and write
204E21DB000
trusted library allocation
page read and write
204E7DF3000
trusted library allocation
page read and write
204EAEF7000
trusted library allocation
page read and write
204DC241000
trusted library allocation
page read and write
204E7CB9000
trusted library allocation
page read and write
17C47AAA000
heap
page read and write
204EA8E3000
trusted library allocation
page read and write
17C47B2D000
heap
page read and write
204DC522000
heap
page read and write
204E6F88000
trusted library allocation
page read and write
204DBDA5000
trusted library allocation
page read and write
204E16A5000
trusted library allocation
page read and write
473E201E000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E6ECA000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204DEE78000
trusted library allocation
page read and write
1C53E300000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E279B000
trusted library allocation
page read and write
204E6FEF000
trusted library allocation
page read and write
204E25CC000
trusted library allocation
page read and write
204E71ED000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204E6F53000
trusted library allocation
page read and write
BD684B8000
stack
page read and write
204DEF4E000
trusted library allocation
page read and write
204E8803000
heap
page read and write
204D5C3F000
heap
page read and write
204DED74000
trusted library allocation
page read and write
204DBDB9000
trusted library allocation
page read and write
204DF681000
trusted library allocation
page read and write
204DED6C000
trusted library allocation
page read and write
204DEE71000
trusted library allocation
page read and write
204EAD24000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204EA000000
trusted library allocation
page read and write
204EA8B2000
trusted library allocation
page read and write
17C47AE0000
heap
page read and write
204E7227000
trusted library allocation
page read and write
26835103000
trusted library allocation
page read and write
204EA8B6000
trusted library allocation
page read and write
204E7861000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C6F000
heap
page read and write
204D5C20000
heap
page read and write
204E787B000
trusted library allocation
page read and write
204DA5C1000
trusted library allocation
page read and write
204E9BFC000
trusted library allocation
page read and write
204E87E5000
trusted library allocation
page read and write
204E78EF000
trusted library allocation
page read and write
204E6D92000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204E6FFA000
trusted library allocation
page read and write
204E783A000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204EADD2000
trusted library allocation
page read and write
204DEC41000
trusted library allocation
page read and write
204DF6BD000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204D5C7C000
heap
page read and write
204DFC62000
trusted library allocation
page read and write
204E6CAF000
trusted library allocation
page read and write
204E6EF8000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204EA004000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DF659000
trusted library allocation
page read and write
204DF6F4000
trusted library allocation
page read and write
204DFC60000
trusted library allocation
page read and write
204DFC57000
trusted library allocation
page read and write
204EAEC4000
trusted library allocation
page read and write
204E7872000
trusted library allocation
page read and write
204DFC36000
trusted library allocation
page read and write
204E2521000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E8803000
heap
page read and write
204DEDD0000
trusted library allocation
page read and write
17C47A69000
heap
page read and write
26834E00000
trusted library allocation
page read and write
204DEE48000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204E7CAD000
trusted library allocation
page read and write
204E15A5000
trusted library allocation
page read and write
204E7DD5000
trusted library allocation
page read and write
204DEDBE000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E7CD1000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C24000
heap
page read and write
204D5C78000
heap
page read and write
204E7CD1000
trusted library allocation
page read and write
204DED67000
trusted library allocation
page read and write
204EA85B000
trusted library allocation
page read and write
204E00C5000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEE7B000
trusted library allocation
page read and write
1F450D60000
heap
page read and write
204D5C2A000
heap
page read and write
204D5C71000
heap
page read and write
204E6EEB000
trusted library allocation
page read and write
204DEE56000
trusted library allocation
page read and write
204E0185000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E21CD000
trusted library allocation
page read and write
26FCBB90000
heap
page read and write
204E7CB8000
trusted library allocation
page read and write
204E9225000
trusted library allocation
page read and write
204EAE77000
trusted library allocation
page read and write
204DBBDA000
trusted library allocation
page read and write
204DED61000
trusted library allocation
page read and write
17C46B80000
heap
page read and write
204D5C24000
heap
page read and write
204D5C34000
heap
page read and write
204DBD68000
trusted library allocation
page read and write
204DD0FE000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DEDA3000
trusted library allocation
page read and write
204DFE8F000
trusted library allocation
page read and write
2BBF60D1000
trusted library allocation
page execute read
204E9C66000
trusted library allocation
page read and write
204E801F000
trusted library allocation
page read and write
26FCBE47000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204EA86C000
trusted library allocation
page read and write
204E7157000
trusted library allocation
page read and write
204DEF90000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204E15A1000
trusted library allocation
page read and write
204DFEE0000
trusted library allocation
page read and write
204E6D86000
trusted library allocation
page read and write
204DF7C8000
trusted library allocation
page read and write
204E00A1000
trusted library allocation
page read and write
204DBDE6000
trusted library allocation
page read and write
204DFAAD000
trusted library allocation
page read and write
165E000
heap
page read and write
1F450CF0000
heap
page read and write
204E25E4000
trusted library allocation
page read and write
204DF7C4000
trusted library allocation
page read and write
204DFEF9000
trusted library allocation
page read and write
204E6C86000
trusted library allocation
page read and write
204DBDE6000
trusted library allocation
page read and write
204E6C3C000
trusted library allocation
page read and write
17C47900000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
26FCBBD0000
heap
page read and write
204DEFC3000
trusted library allocation
page read and write
204E9393000
trusted library allocation
page read and write
204E01CE000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204E2062000
trusted library allocation
page read and write
204DD01D000
trusted library allocation
page read and write
204E20A4000
trusted library allocation
page read and write
204E7DD5000
trusted library allocation
page read and write
204EA2A8000
trusted library allocation
page read and write
204E21EA000
trusted library allocation
page read and write
204DFE6F000
trusted library allocation
page read and write
204DEE46000
trusted library allocation
page read and write
204DEE90000
trusted library allocation
page read and write
17C47A00000
heap
page read and write
204DFC9F000
trusted library allocation
page read and write
204EAEF8000
trusted library allocation
page read and write
204E0063000
trusted library allocation
page read and write
204E7DC7000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
204E7CBA000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E7CD7000
trusted library allocation
page read and write
204E7DF1000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
17C47B58000
heap
page read and write
17C47372000
unclassified section
page read and write
204E00A0000
trusted library allocation
page read and write
204E8789000
trusted library allocation
page read and write
204E6D9A000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E007F000
trusted library allocation
page read and write
17C47B00000
heap
page read and write
204D5C45000
heap
page read and write
204E93D6000
trusted library allocation
page read and write
204E784E000
trusted library allocation
page read and write
26FCBE66000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204E7876000
trusted library allocation
page read and write
204EAD7F000
trusted library allocation
page read and write
204E1664000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DED49000
trusted library allocation
page read and write
204DED57000
trusted library allocation
page read and write
17C47A64000
heap
page read and write
204E2166000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204D5C85000
heap
page read and write
204DFC7D000
trusted library allocation
page read and write
204D5CA2000
heap
page read and write
204E6FBB000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
204E88AA000
heap
page read and write
204D5C82000
heap
page read and write
204E0FF0000
trusted library allocation
page read and write
17C47A60000
heap
page read and write
164B000
heap
page read and write
204E3902000
trusted library allocation
page read and write
204DEE84000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E7DDE000
trusted library allocation
page read and write
204DEFBF000
trusted library allocation
page read and write
204DEE4B000
trusted library allocation
page read and write
204DED9C000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E78A8000
trusted library allocation
page read and write
204E22E7000
trusted library allocation
page read and write
26FCBE81000
trusted library allocation
page read and write
204E6CA6000
trusted library allocation
page read and write
204DBDA3000
trusted library allocation
page read and write
204DC522000
heap
page read and write
204DBEF6000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204E2797000
trusted library allocation
page read and write
204DEDBE000
trusted library allocation
page read and write
3B9CFFE000
stack
page read and write
204DEE6A000
trusted library allocation
page read and write
17C47AE9000
heap
page read and write
204DBDDB000
trusted library allocation
page read and write
17C47A5C000
heap
page read and write
204D5C7C000
heap
page read and write
204D5C45000
heap
page read and write
204DD0E2000
trusted library allocation
page read and write
204E6FD0000
trusted library allocation
page read and write
204E6C45000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204DC562000
heap
page read and write
204DEC78000
trusted library allocation
page read and write
204DACE4000
trusted library allocation
page read and write
204DFEF6000
trusted library allocation
page read and write
204E93CA000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
26FCBE96000
trusted library allocation
page read and write
204D5C11000
heap
page read and write
204E00A5000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEFD5000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204DACA0000
trusted library allocation
page read and write
204DABFB000
trusted library allocation
page read and write
204E6FFA000
trusted library allocation
page read and write
204E25AA000
trusted library allocation
page read and write
204E7C84000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204DC236000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E896A000
heap
page read and write
204D5C39000
heap
page read and write
204E93E3000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204D5C4F000
heap
page read and write
204E78FC000
trusted library allocation
page read and write
204E00A0000
trusted library allocation
page read and write
204E6C9F000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DBD09000
trusted library allocation
page read and write
204DEE4E000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204D5C4E000
heap
page read and write
204E6FDA000
trusted library allocation
page read and write
204E00DB000
trusted library allocation
page read and write
204DFC5E000
trusted library allocation
page read and write
204E7851000
trusted library allocation
page read and write
26834E15000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
26834E11000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204D5C6F000
heap
page read and write
204DBBC3000
trusted library allocation
page read and write
204DFE24000
trusted library allocation
page read and write
204E77A2000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204DFAC3000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204DFCC9000
trusted library allocation
page read and write
204E01CE000
trusted library allocation
page read and write
204D5C15000
heap
page read and write
204E248A000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
26834AD0000
remote allocation
page read and write
26835100000
trusted library allocation
page read and write
204DEFDD000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E276F000
trusted library allocation
page read and write
17C473F0000
heap
page read and write
204D5C6F000
heap
page read and write
204E2247000
trusted library allocation
page read and write
204E11BB000
trusted library allocation
page read and write
204E00C5000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
BD6B63E000
unkown
page readonly
204DC4E3000
heap
page read and write
204DED6C000
trusted library allocation
page read and write
204DFC5B000
trusted library allocation
page read and write
1651000
heap
page read and write
17C47AE6000
heap
page read and write
204D5C78000
heap
page read and write
204E7798000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DECA5000
trusted library allocation
page read and write
204DF647000
trusted library allocation
page read and write
204DC285000
trusted library allocation
page read and write
204DED3B000
trusted library allocation
page read and write
204E6CCD000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204D5C45000
heap
page read and write
204E11B9000
trusted library allocation
page read and write
204E8801000
heap
page read and write
204E6FB7000
trusted library allocation
page read and write
204DFECB000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204DEC9E000
trusted library allocation
page read and write
204E70B8000
trusted library allocation
page read and write
204DACAE000
trusted library allocation
page read and write
204E885F000
heap
page read and write
204E27FB000
trusted library allocation
page read and write
204DC263000
trusted library allocation
page read and write
204EAEFA000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
17C47B44000
heap
page read and write
204D5C24000
heap
page read and write
204E939F000
trusted library allocation
page read and write
800000
unkown
page readonly
26FCBE2E000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DBE86000
trusted library allocation
page read and write
204DBE16000
trusted library allocation
page read and write
204E6DA9000
trusted library allocation
page read and write
17C46E5C000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204DEE9C000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E7865000
trusted library allocation
page read and write
204E70F6000
trusted library allocation
page read and write
204DED8B000
trusted library allocation
page read and write
204DED7B000
trusted library allocation
page read and write
204DEE64000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DBDBB000
trusted library allocation
page read and write
204DF60D000
trusted library allocation
page read and write
204DEF70000
trusted library allocation
page read and write
204E6FDA000
trusted library allocation
page read and write
204DF7E0000
trusted library allocation
page read and write
204E807B000
trusted library allocation
page read and write
204E78A6000
trusted library allocation
page read and write
204E6FD6000
trusted library allocation
page read and write
204E8258000
trusted library allocation
page read and write
204E7DD5000
trusted library allocation
page read and write
17C47B22000
heap
page read and write
204E6FC4000
trusted library allocation
page read and write
17C46EF1000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204E6FE7000
trusted library allocation
page read and write
204DED95000
trusted library allocation
page read and write
204DEE48000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C32000
heap
page read and write
204DEFDD000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204E70E2000
trusted library allocation
page read and write
204DF65E000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204DFEA4000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
17C47A60000
heap
page read and write
204DBE5B000
trusted library allocation
page read and write
204D5C47000
heap
page read and write
204D5C46000
heap
page read and write
204DEF68000
trusted library allocation
page read and write
1628000
heap
page read and write
204E7794000
trusted library allocation
page read and write
204E0F57000
trusted library allocation
page read and write
204EAE6F000
trusted library allocation
page read and write
17C46E74000
trusted library allocation
page read and write
204E71F0000
trusted library allocation
page read and write
1F4527EB000
heap
page read and write
204E164A000
trusted library allocation
page read and write
204E00A7000
trusted library allocation
page read and write
204E7757000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204D5C5D000
heap
page read and write
204EA083000
trusted library allocation
page read and write
204DF6F4000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
BD695FE000
stack
page read and write
204DBEBB000
trusted library allocation
page read and write
26FCBF3D000
trusted library allocation
page read and write
204E787D000
trusted library allocation
page read and write
204E6CAD000
trusted library allocation
page read and write
204E6D86000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
2BBF6141000
trusted library allocation
page execute read
204E7816000
trusted library allocation
page read and write
204DEF99000
trusted library allocation
page read and write
204E6E6D000
trusted library allocation
page read and write
204E116A000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204E20CB000
trusted library allocation
page read and write
204DBE8B000
trusted library allocation
page read and write
204E783A000
trusted library allocation
page read and write
26834A60000
unclassified section
page readonly
204E7869000
trusted library allocation
page read and write
204E6D99000
trusted library allocation
page read and write
204E21D6000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DEDBE000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204E891A000
heap
page read and write
204D5C3F000
heap
page read and write
204E72A5000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DD00B000
trusted library allocation
page read and write
204E8050000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DFECF000
trusted library allocation
page read and write
204DEE6D000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204E8092000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
26FCBDA6000
heap
page read and write
204E6EB5000
trusted library allocation
page read and write
204E224B000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E71FE000
trusted library allocation
page read and write
26834E62000
trusted library allocation
page read and write
204E1650000
trusted library allocation
page read and write
204DFEEF000
trusted library allocation
page read and write
204DED3B000
trusted library allocation
page read and write
204E8042000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
3B9DFFE000
stack
page read and write
17C47B77000
heap
page read and write
204E6BE3000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DED89000
trusted library allocation
page read and write
26FCBE6E000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E718F000
trusted library allocation
page read and write
204E11EC000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DED3B000
trusted library allocation
page read and write
204DBDA5000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204EAEEC000
trusted library allocation
page read and write
204DFC0A000
trusted library allocation
page read and write
204DD026000
trusted library allocation
page read and write
204EA027000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204D5C6F000
heap
page read and write
204D5C24000
heap
page read and write
17C47A8A000
heap
page read and write
204E01A1000
trusted library allocation
page read and write
204D5CC3000
heap
page read and write
204E25C6000
trusted library allocation
page read and write
204DFEDA000
trusted library allocation
page read and write
6F647D8000
stack
page read and write
204D5C78000
heap
page read and write
204D5C3F000
heap
page read and write
204E15E1000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E00A0000
trusted library allocation
page read and write
204E7762000
trusted library allocation
page read and write
1544000
heap
page read and write
204EA8B8000
trusted library allocation
page read and write
204DED3B000
trusted library allocation
page read and write
26834CE0000
heap
page read and write
204E00FE000
trusted library allocation
page read and write
204DF61F000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E15A7000
trusted library allocation
page read and write
204DFCA4000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E6D86000
trusted library allocation
page read and write
204DEF8D000
trusted library allocation
page read and write
204EADC2000
trusted library allocation
page read and write
204E11DF000
trusted library allocation
page read and write
204E72D5000
trusted library allocation
page read and write
204DBE62000
trusted library allocation
page read and write
204DF696000
trusted library allocation
page read and write
204E780B000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204E7782000
trusted library allocation
page read and write
204E70EE000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
204DEE4E000
trusted library allocation
page read and write
204D5C3B000
heap
page read and write
204D5C2F000
heap
page read and write
204D5C78000
heap
page read and write
204E1092000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E273B000
trusted library allocation
page read and write
204E78A4000
trusted library allocation
page read and write
204E22FC000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
204EA881000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
1F4527F0000
heap
page read and write
204D5C82000
heap
page read and write
204DECA5000
trusted library allocation
page read and write
204DD0C5000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204E245A000
trusted library allocation
page read and write
204DFC9D000
trusted library allocation
page read and write
204E7CFD000
trusted library allocation
page read and write
204DFE6B000
trusted library allocation
page read and write
204D5C21000
heap
page read and write
204E16B0000
trusted library allocation
page read and write
204DEFC5000
trusted library allocation
page read and write
204E72B3000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DFC53000
trusted library allocation
page read and write
204D5C37000
heap
page read and write
13E583E000
stack
page read and write
204E0139000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
17C47AF0000
heap
page read and write
204DEFD5000
trusted library allocation
page read and write
204E0087000
trusted library allocation
page read and write
13E354E000
unkown
page readonly
204DFEC9000
trusted library allocation
page read and write
204E7DCB000
trusted library allocation
page read and write
204E6C4B000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
26834CDF000
unclassified section
page read and write
204D5C4F000
heap
page read and write
204E019D000
trusted library allocation
page read and write
204DFE72000
trusted library allocation
page read and write
204D5C07000
heap
page read and write
204E8283000
trusted library allocation
page read and write
204D5C80000
heap
page read and write
204E223A000
trusted library allocation
page read and write
3B9C7FF000
stack
page read and write
204DAB23000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C86000
heap
page read and write
204DACF9000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204DBDAC000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E203C000
trusted library allocation
page read and write
204E010E000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E00C4000
trusted library allocation
page read and write
204EA8B6000
trusted library allocation
page read and write
204DFC18000
trusted library allocation
page read and write
204E24DF000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
1F451025000
heap
page read and write
1F450D61000
heap
page read and write
204E276C000
trusted library allocation
page read and write
204DEEB3000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204DEEAC000
trusted library allocation
page read and write
204E7CE6000
trusted library allocation
page read and write
204DBEBB000
trusted library allocation
page read and write
204E80BE000
trusted library allocation
page read and write
204E25F4000
trusted library allocation
page read and write
204DEF3D000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DC522000
heap
page read and write
204DED51000
trusted library allocation
page read and write
204E01A8000
trusted library allocation
page read and write
17C47A7F000
heap
page read and write
204D5C32000
heap
page read and write
204E7223000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E11C7000
trusted library allocation
page read and write
204EA400000
trusted library allocation
page read and write
204E002D000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DA5EF000
trusted library allocation
page read and write
204E8119000
trusted library allocation
page read and write
204E71F0000
trusted library allocation
page read and write
1C53E40A000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E80AA000
trusted library allocation
page read and write
204DFC90000
trusted library allocation
page read and write
17C47AF0000
heap
page read and write
204E0099000
trusted library allocation
page read and write
204DF6F0000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E8803000
heap
page read and write
17C47AE0000
heap
page read and write
204DBD68000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204D5C04000
heap
page read and write
204DEF3D000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204DFE44000
trusted library allocation
page read and write
204E6CD9000
trusted library allocation
page read and write
204DBD31000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
17C47411000
unkown
page execute read
204D5C5D000
heap
page read and write
17C46B19000
remote allocation
page execute read
1F450F07000
trusted library allocation
page read and write
204E0053000
trusted library allocation
page read and write
204DEE4E000
trusted library allocation
page read and write
204E7870000
trusted library allocation
page read and write
204DFE61000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E0500000
trusted library allocation
page read and write
17C47480000
heap
page read and write
204DEE64000
trusted library allocation
page read and write
204DC54B000
heap
page read and write
204E6D46000
trusted library allocation
page read and write
204E7876000
trusted library allocation
page read and write
204E7789000
trusted library allocation
page read and write
204DC4E1000
heap
page read and write
204DEC7A000
trusted library allocation
page read and write
204D5C54000
heap
page read and write
204D5C1E000
heap
page read and write
204EAE73000
trusted library allocation
page read and write
204DF7F2000
trusted library allocation
page read and write
204E2793000
trusted library allocation
page read and write
204E7CBE000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E7816000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E25B2000
trusted library allocation
page read and write
17C47B3B000
heap
page read and write
204DEF2E000
trusted library allocation
page read and write
204DEE4A000
trusted library allocation
page read and write
204E7C9A000
trusted library allocation
page read and write
204E7ED0000
trusted library allocation
page read and write
204DBEBE000
trusted library allocation
page read and write
204DBDDB000
trusted library allocation
page read and write
204E00CF000
trusted library allocation
page read and write
204E70B2000
trusted library allocation
page read and write
204E77B4000
trusted library allocation
page read and write
204E6B97000
trusted library allocation
page read and write
204E80AA000
trusted library allocation
page read and write
204E889C000
heap
page read and write
204D5C24000
heap
page read and write
204D5C77000
heap
page read and write
204DAB23000
trusted library allocation
page read and write
204EAE7B000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DAB76000
trusted library allocation
page read and write
17C46B60000
heap
page read and write
26FCBF1B000
trusted library allocation
page read and write
204E6CD4000
trusted library allocation
page read and write
204DBED5000
trusted library allocation
page read and write
17C47B77000
heap
page read and write
204DAC8D000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
6F6603E000
stack
page read and write
204DBD97000
trusted library allocation
page read and write
204E6C3B000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
26FCBE23000
trusted library allocation
page read and write
204E92A0000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E0099000
trusted library allocation
page read and write
204E6DF5000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E2794000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
17C46E5F000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
8D0000
unkown
page write copy
204D5C47000
heap
page read and write
204D5C24000
heap
page read and write
204DC256000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E8837000
heap
page read and write
204DC279000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DD072000
trusted library allocation
page read and write
204E018C000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204DFC9D000
trusted library allocation
page read and write
204D5C25000
heap
page read and write
204E017A000
trusted library allocation
page read and write
204E8263000
trusted library allocation
page read and write
204E0140000
trusted library allocation
page read and write
204E0063000
trusted library allocation
page read and write
204DEC41000
trusted library allocation
page read and write
1F450D40000
heap
page read and write
204DEE6D000
trusted library allocation
page read and write
204E0159000
trusted library allocation
page read and write
204DF670000
trusted library allocation
page read and write
3E80000
heap
page read and write
1544000
heap
page read and write
204DBDA5000
trusted library allocation
page read and write
204E6FC7000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6FFC000
trusted library allocation
page read and write
204E00BE000
trusted library allocation
page read and write
204E6F91000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204D5C4F000
heap
page read and write
204DC298000
trusted library allocation
page read and write
204E77FB000
trusted library allocation
page read and write
204E7DF1000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204E6EF9000
trusted library allocation
page read and write
204E6D99000
trusted library allocation
page read and write
204E7CD6000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204DBE80000
trusted library allocation
page read and write
17C47A69000
heap
page read and write
204DEC9E000
trusted library allocation
page read and write
204E273E000
trusted library allocation
page read and write
204DFC65000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
26FCB9C0000
unclassified section
page readonly
204DEFA1000
trusted library allocation
page read and write
204DED3D000
trusted library allocation
page read and write
204E7847000
trusted library allocation
page read and write
204DBEDC000
trusted library allocation
page read and write
17C47AE8000
heap
page read and write
204DBE83000
trusted library allocation
page read and write
204DD033000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E6CAF000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
204DEC80000
trusted library allocation
page read and write
204E7859000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
26FCBE72000
trusted library allocation
page read and write
204DFC33000
trusted library allocation
page read and write
204E150B000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C2A000
heap
page read and write
204E0052000
trusted library allocation
page read and write
204DFC36000
trusted library allocation
page read and write
204E8027000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204DECCE000
trusted library allocation
page read and write
204E6FBB000
trusted library allocation
page read and write
204E08EA000
trusted library allocation
page read and write
204E70EF000
trusted library allocation
page read and write
204E6FD2000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1E000
heap
page read and write
204E1517000
trusted library allocation
page read and write
17C46B20000
unclassified section
page readonly
204DECCE000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
26834E0C000
trusted library allocation
page read and write
204DFC41000
trusted library allocation
page read and write
26834EC4000
trusted library allocation
page read and write
204E7DC0000
trusted library allocation
page read and write
204DFC5E000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E6CCD000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204DEE1F000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204EADE1000
trusted library allocation
page read and write
204DF6F4000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
17C46E86000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
13EF000
stack
page read and write
204E7C8C000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
204DEE27000
trusted library allocation
page read and write
204E6BD8000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E159F000
trusted library allocation
page read and write
204D5C2E000
heap
page read and write
204E0097000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6FE0000
trusted library allocation
page read and write
204E70B2000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
204D5C1E000
heap
page read and write
17C46D00000
trusted library allocation
page read and write
204E9BD4000
trusted library allocation
page read and write
204E8121000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
204EAE71000
trusted library allocation
page read and write
204E78EC000
trusted library allocation
page read and write
204E2799000
trusted library allocation
page read and write
204E11B5000
trusted library allocation
page read and write
204E93D6000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DF6E0000
trusted library allocation
page read and write
204DEF85000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204E7276000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204E25BA000
trusted library allocation
page read and write
473E2024000
trusted library allocation
page read and write
204E72D3000
trusted library allocation
page read and write
204DEECF000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1D000
heap
page read and write
204E6CBA000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E25D1000
trusted library allocation
page read and write
204E6E66000
trusted library allocation
page read and write
204DF7F5000
trusted library allocation
page read and write
204D0B63000
heap
page read and write
204D5C32000
heap
page read and write
204DAC7D000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E7EF9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E727D000
trusted library allocation
page read and write
204DC289000
trusted library allocation
page read and write
204DF65E000
trusted library allocation
page read and write
204E6D0F000
trusted library allocation
page read and write
204E22CF000
trusted library allocation
page read and write
204E70C8000
trusted library allocation
page read and write
204E6FBB000
trusted library allocation
page read and write
204D5C1D000
heap
page read and write
204E25AC000
trusted library allocation
page read and write
204E807B000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
17C47A60000
heap
page read and write
204D5C24000
heap
page read and write
204D5CA2000
heap
page read and write
204E1674000
trusted library allocation
page read and write
204DFE73000
trusted library allocation
page read and write
204E159D000
trusted library allocation
page read and write
204E0187000
trusted library allocation
page read and write
17C46E03000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204E002D000
trusted library allocation
page read and write
204D5C52000
heap
page read and write
204D5C82000
heap
page read and write
204E00C1000
trusted library allocation
page read and write
204D5C04000
heap
page read and write
204DFCC9000
trusted library allocation
page read and write
204E7816000
trusted library allocation
page read and write
204E87F9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E0183000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
17C47AE3000
heap
page read and write
204DED95000
trusted library allocation
page read and write
1F4527E2000
heap
page read and write
204E00BA000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204DFE5B000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E6F43000
trusted library allocation
page read and write
204E0067000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204E7C85000
trusted library allocation
page read and write
204E2221000
trusted library allocation
page read and write
204DEFC2000
trusted library allocation
page read and write
204DF68C000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E002D000
trusted library allocation
page read and write
17C47AF0000
heap
page read and write
204E00B5000
trusted library allocation
page read and write
204E6DCA000
trusted library allocation
page read and write
204E7293000
trusted library allocation
page read and write
26FCBE5D000
trusted library allocation
page read and write
204DBD34000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E16F1000
trusted library allocation
page read and write
204EAE9D000
trusted library allocation
page read and write
204E78B9000
trusted library allocation
page read and write
204DBE62000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C5D000
heap
page read and write
204DF693000
trusted library allocation
page read and write
204E719D000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DD080000
trusted library allocation
page read and write
204E0047000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204E9CF9000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
204E889C000
heap
page read and write
204D5C32000
heap
page read and write
204DFC2F000
trusted library allocation
page read and write
204DEF5F000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E0153000
trusted library allocation
page read and write
204DFC0A000
trusted library allocation
page read and write
204E7CB6000
trusted library allocation
page read and write
17C46E0A000
trusted library allocation
page read and write
204EA8BC000
trusted library allocation
page read and write
204E6C57000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204DF670000
trusted library allocation
page read and write
204E6B77000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E6F96000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C4F000
heap
page read and write
204D5C4E000
heap
page read and write
204E24FA000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E77CC000
trusted library allocation
page read and write
204E78FC000
trusted library allocation
page read and write
204E8803000
heap
page read and write
204D5C82000
heap
page read and write
204DFF07000
trusted library allocation
page read and write
204DED8F000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEE94000
trusted library allocation
page read and write
17C47AE8000
heap
page read and write
204E001A000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204DBD2C000
trusted library allocation
page read and write
204DBD78000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
204DBB64000
trusted library allocation
page read and write
204DFC2E000
trusted library allocation
page read and write
204E2535000
trusted library allocation
page read and write
204E7C47000
trusted library allocation
page read and write
204E72AC000
trusted library allocation
page read and write
204E6FE6000
trusted library allocation
page read and write
204E70B8000
trusted library allocation
page read and write
204DBB91000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204D5C20000
heap
page read and write
204DBD16000
trusted library allocation
page read and write
17C47B44000
heap
page read and write
204E0053000
trusted library allocation
page read and write
204E15A7000
trusted library allocation
page read and write
204DFE44000
trusted library allocation
page read and write
204E7259000
trusted library allocation
page read and write
204DFE7A000
trusted library allocation
page read and write
204DBD78000
trusted library allocation
page read and write
2683520C000
trusted library allocation
page read and write
15B0000
heap
page read and write
204D5C6F000
heap
page read and write
204D5C24000
heap
page read and write
17C47A8A000
heap
page read and write
204D5C1E000
heap
page read and write
204E6C65000
trusted library allocation
page read and write
204DFC59000
trusted library allocation
page read and write
204E00A0000
trusted library allocation
page read and write
204EA600000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204E001C000
trusted library allocation
page read and write
204E78BF000
trusted library allocation
page read and write
17C47B2A000
heap
page read and write
204E2412000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204E6FC3000
trusted library allocation
page read and write
204E786B000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DFC33000
trusted library allocation
page read and write
204D5C52000
heap
page read and write
204E9CB4000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1E000
heap
page read and write
204DEDC4000
trusted library allocation
page read and write
1C53E1C0000
heap
page read and write
204E017A000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204E70C3000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204D5C1E000
heap
page read and write
204D5C1D000
heap
page read and write
204E6C5E000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204E6E5A000
trusted library allocation
page read and write
204E6BC2000
trusted library allocation
page read and write
204E70E4000
trusted library allocation
page read and write
204DFC55000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DEE6A000
trusted library allocation
page read and write
204E6CE3000
trusted library allocation
page read and write
204E0F54000
trusted library allocation
page read and write
204DEFFD000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204D5C85000
heap
page read and write
204E00C4000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204E166F000
trusted library allocation
page read and write
1656000
heap
page read and write
204D5C6F000
heap
page read and write
204E6FFA000
trusted library allocation
page read and write
204D5C8C000
heap
page read and write
204E00EF000
trusted library allocation
page read and write
204E82E1000
trusted library allocation
page read and write
204DC245000
trusted library allocation
page read and write
204DED7F000
trusted library allocation
page read and write
204E7CE2000
trusted library allocation
page read and write
204EA202000
trusted library allocation
page read and write
204DBBAA000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E00A7000
trusted library allocation
page read and write
204DED8F000
trusted library allocation
page read and write
204E2767000
trusted library allocation
page read and write
204DBE5B000
trusted library allocation
page read and write
204EAD62000
trusted library allocation
page read and write
204DEE78000
trusted library allocation
page read and write
204E880D000
heap
page read and write
3B9D7FE000
stack
page read and write
204DBE33000
trusted library allocation
page read and write
204E780B000
trusted library allocation
page read and write
204DFC7D000
trusted library allocation
page read and write
BD6A63E000
unkown
page readonly
204E6D35000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
26834E72000
trusted library allocation
page read and write
204E11C0000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DF6B5000
trusted library allocation
page read and write
204E25F4000
trusted library allocation
page read and write
204E7C69000
trusted library allocation
page read and write
204DA5CE000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204D5C71000
heap
page read and write
204DF62E000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204DED9C000
trusted library allocation
page read and write
204E0F4F000
trusted library allocation
page read and write
204DFEEF000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204DFE72000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E218E000
trusted library allocation
page read and write
204DEC48000
trusted library allocation
page read and write
204E6B97000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1E000
heap
page read and write
204D5C82000
heap
page read and write
204E6FBC000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204D5C24000
heap
page read and write
1663000
heap
page read and write
204DEDD6000
trusted library allocation
page read and write
BD67BFE000
stack
page read and write
204E7CEF000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DFC24000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204DC263000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C87000
heap
page read and write
204E6CC8000
trusted library allocation
page read and write
204E6CDF000
trusted library allocation
page read and write
204E70EA000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DEE48000
trusted library allocation
page read and write
204E6D41000
trusted library allocation
page read and write
204E2799000
trusted library allocation
page read and write
204E0028000
trusted library allocation
page read and write
204E8037000
trusted library allocation
page read and write
204E16BD000
trusted library allocation
page read and write
204E70F8000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E6BDD000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DEFFD000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
204E6D95000
trusted library allocation
page read and write
204E6FE6000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6BD4000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E93D6000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204E00D2000
trusted library allocation
page read and write
204DFCC5000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
26834D00000
trusted library allocation
page read and write
204E87CA000
trusted library allocation
page read and write
204E6CA1000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
1544000
heap
page read and write
204E6FAA000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
26FCBD2F000
unclassified section
page read and write
204E25BA000
trusted library allocation
page read and write
204E7832000
trusted library allocation
page read and write
204E70E4000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E6F9C000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204E01CD000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E6C00000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
1F452910000
heap
page read and write
DCE000
stack
page read and write
204E7832000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DEDD6000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C24000
heap
page read and write
204E2799000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
26834C90000
heap
page read and write
204E2157000
trusted library allocation
page read and write
204E785C000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
8C2000
unkown
page readonly
204E6FEF000
trusted library allocation
page read and write
17C47A01000
heap
page read and write
17C46E6F000
trusted library allocation
page read and write
204DED9A000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204E16FE000
trusted library allocation
page read and write
204DF6FE000
trusted library allocation
page read and write
17C4737F000
unclassified section
page read and write
204E9237000
trusted library allocation
page read and write
204E27B4000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
26834FF4000
heap
page read and write
204DFE77000
trusted library allocation
page read and write
204DBE33000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E004C000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C47000
heap
page read and write
204E7859000
trusted library allocation
page read and write
17C46AB0000
unclassified section
page readonly
204D5C8D000
heap
page read and write
204D5C1E000
heap
page read and write
204D5CA2000
heap
page read and write
17C47B44000
heap
page read and write
204D5C4F000
heap
page read and write
204DEE71000
trusted library allocation
page read and write
6F6607E000
unkown
page readonly
204DF670000
trusted library allocation
page read and write
204EA87A000
trusted library allocation
page read and write
204DEE8A000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
BD684BB000
stack
page read and write
204DEE9A000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E15A3000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
26834E49000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C4F000
heap
page read and write
204EAEEC000
trusted library allocation
page read and write
204E159D000
trusted library allocation
page read and write
204E72CA000
trusted library allocation
page read and write
204DEE27000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
204E779F000
trusted library allocation
page read and write
204DC4FE000
heap
page read and write
204DFC31000
trusted library allocation
page read and write
204E787D000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204E9CFC000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204D5C4F000
heap
page read and write
204D5C3F000
heap
page read and write
204E7DDE000
trusted library allocation
page read and write
BD6853E000
unkown
page readonly
165E000
heap
page read and write
204E811D000
trusted library allocation
page read and write
204DBD7F000
trusted library allocation
page read and write
204E206B000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204DFE6F000
trusted library allocation
page read and write
204DFF02000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DEFD5000
trusted library allocation
page read and write
204DEE7C000
trusted library allocation
page read and write
204DBE7B000
trusted library allocation
page read and write
204E6FE0000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204E01B6000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
BD6AE3E000
stack
page read and write
204DBE86000
trusted library allocation
page read and write
204E7858000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6BA7000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1E000
heap
page read and write
204EAE7B000
trusted library allocation
page read and write
204E923C000
trusted library allocation
page read and write
204E6CBE000
trusted library allocation
page read and write
204E0077000
trusted library allocation
page read and write
204DFC2D000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DC568000
heap
page read and write
204E70BD000
trusted library allocation
page read and write
BCA2BFF000
stack
page read and write
204E004B000
trusted library allocation
page read and write
204E0053000
trusted library allocation
page read and write
204E87AB000
trusted library allocation
page read and write
204E008B000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204EA8A5000
trusted library allocation
page read and write
204E6C5E000
trusted library allocation
page read and write
204E6DA9000
trusted library allocation
page read and write
204DED4D000
trusted library allocation
page read and write
204DFC59000
trusted library allocation
page read and write
26834C80000
heap
page readonly
204E2592000
trusted library allocation
page read and write
204E25E4000
trusted library allocation
page read and write
204D5C30000
heap
page read and write
204D5C24000
heap
page read and write
204E0046000
trusted library allocation
page read and write
204EAD3C000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204DBE52000
trusted library allocation
page read and write
17C47AF0000
heap
page read and write
204E6DA1000
trusted library allocation
page read and write
1F4527E3000
heap
page read and write
204E783E000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
17C47A69000
heap
page read and write
204E0187000
trusted library allocation
page read and write
204DEF57000
trusted library allocation
page read and write
204DF6E6000
trusted library allocation
page read and write
204E001C000
trusted library allocation
page read and write
204EA888000
trusted library allocation
page read and write
204DFC63000
trusted library allocation
page read and write
1F450E00000
trusted library allocation
page read and write
17C47B2A000
heap
page read and write
204DC4FE000
heap
page read and write
204E7021000
trusted library allocation
page read and write
204DEDDC000
trusted library allocation
page read and write
204E25AE000
trusted library allocation
page read and write
204DBD13000
trusted library allocation
page read and write
204E786A000
trusted library allocation
page read and write
204DEDBC000
trusted library allocation
page read and write
204E019F000
trusted library allocation
page read and write
204E7229000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6D92000
trusted library allocation
page read and write
204EADF5000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E6C96000
trusted library allocation
page read and write
204D5C74000
heap
page read and write
204D5C78000
heap
page read and write
204E00F6000
trusted library allocation
page read and write
204DFE5B000
trusted library allocation
page read and write
204E7EC3000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204DBBD5000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
17C46E76000
trusted library allocation
page read and write
204E7CB4000
trusted library allocation
page read and write
204E15A9000
trusted library allocation
page read and write
204E70F8000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C77000
heap
page read and write
204D5C24000
heap
page read and write
204E6D8C000
trusted library allocation
page read and write
204E11D2000
trusted library allocation
page read and write
6F660BD000
stack
page read and write
204E71DB000
trusted library allocation
page read and write
204DC28F000
trusted library allocation
page read and write
3E81000
heap
page read and write
204E0FA5000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204E78D7000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
204E6DA1000
trusted library allocation
page read and write
204DF7DD000
trusted library allocation
page read and write
204EAE6B000
trusted library allocation
page read and write
204E25C6000
trusted library allocation
page read and write
204DEF19000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C32000
heap
page read and write
204DEE2F000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
8D4000
unkown
page readonly
204DC27F000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204D5C48000
heap
page read and write
204DBB64000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E70EA000
trusted library allocation
page read and write
204DBBAA000
trusted library allocation
page read and write
204E87ED000
trusted library allocation
page read and write
204E6FD2000
trusted library allocation
page read and write
204E7765000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E0F43000
trusted library allocation
page read and write
204E1589000
trusted library allocation
page read and write
204E890E000
heap
page read and write
204E00C4000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204DA590000
trusted library allocation
page read and write
204E6BF5000
trusted library allocation
page read and write
204E9BB1000
trusted library allocation
page read and write
204D5C52000
heap
page read and write
204E21E8000
trusted library allocation
page read and write
89C000
unkown
page readonly
1C53E0D0000
heap
page read and write
204E21F2000
trusted library allocation
page read and write
204E6F2E000
trusted library allocation
page read and write
204E0F99000
trusted library allocation
page read and write
204E93AC000
trusted library allocation
page read and write
204E6FF0000
trusted library allocation
page read and write
204DD0FE000
trusted library allocation
page read and write
204DEE78000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C32000
heap
page read and write
13E587E000
unkown
page readonly
204DEDAE000
trusted library allocation
page read and write
204E6F3D000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DD0A5000
trusted library allocation
page read and write
204EADF5000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204D5C1E000
heap
page read and write
204D5C2A000
heap
page read and write
204D5C1D000
heap
page read and write
204E785B000
trusted library allocation
page read and write
204E7C8C000
trusted library allocation
page read and write
204DC562000
heap
page read and write
204D5C2A000
heap
page read and write
204E9BD9000
trusted library allocation
page read and write
17C47AE8000
heap
page read and write
204DBD34000
trusted library allocation
page read and write
204E0FC4000
trusted library allocation
page read and write
204D5C58000
heap
page read and write
204D5C32000
heap
page read and write
204D5C78000
heap
page read and write
204D5C87000
heap
page read and write
204E7782000
trusted library allocation
page read and write
204E7233000
trusted library allocation
page read and write
204E25F8000
trusted library allocation
page read and write
204DEF1C000
trusted library allocation
page read and write
204E6C96000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
204DF6EE000
trusted library allocation
page read and write
204E6FD6000
trusted library allocation
page read and write
17C47417000
unkown
page execute read
204E273E000
trusted library allocation
page read and write
204E20FA000
trusted library allocation
page read and write
204E7CD6000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
204E784E000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
204DFEF6000
trusted library allocation
page read and write
204E222B000
trusted library allocation
page read and write
204E11FE000
trusted library allocation
page read and write
204E7779000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E0063000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DC54B000
heap
page read and write
204E78A8000
trusted library allocation
page read and write
204E6FEF000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6F77000
trusted library allocation
page read and write
204E889C000
heap
page read and write
204E80A6000
trusted library allocation
page read and write
204D5C2E000
heap
page read and write
26834EB1000
trusted library allocation
page read and write
204DEA00000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204D5C77000
heap
page read and write
1544000
heap
page read and write
204E00D6000
trusted library allocation
page read and write
204DEC8E000
trusted library allocation
page read and write
204DACE4000
trusted library allocation
page read and write
204E0164000
trusted library allocation
page read and write
204E7CB6000
trusted library allocation
page read and write
204DBE86000
trusted library allocation
page read and write
204E78EC000
trusted library allocation
page read and write
204DF65E000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204D5C78000
heap
page read and write
204DBE0F000
trusted library allocation
page read and write
204E70F6000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DEE7E000
trusted library allocation
page read and write
204DF6E6000
trusted library allocation
page read and write
204DAC1E000
trusted library allocation
page read and write
204D5C34000
heap
page read and write
204D5C24000
heap
page read and write
204E6FCB000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
204DFACF000
trusted library allocation
page read and write
204DBD78000
trusted library allocation
page read and write
204E70BD000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E00BA000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204E774B000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
26FCBC00000
trusted library allocation
page read and write
26FCBE00000
trusted library allocation
page read and write
204DEC4F000
trusted library allocation
page read and write
204E805C000
trusted library allocation
page read and write
17C47B77000
heap
page read and write
204DFE5B000
trusted library allocation
page read and write
204DEECF000
trusted library allocation
page read and write
204E20E5000
trusted library allocation
page read and write
204DFC31000
trusted library allocation
page read and write
204E6DEB000
trusted library allocation
page read and write
204E163D000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C1D000
heap
page read and write
204D5C82000
heap
page read and write
204E889B000
heap
page read and write
17C46C90000
heap
page read and write
204E1139000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C36000
heap
page read and write
204D5C4A000
heap
page read and write
204DEF76000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E00DE000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204DBDB9000
trusted library allocation
page read and write
204DFC53000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204D5C6F000
heap
page read and write
204E7881000
trusted library allocation
page read and write
204E10DC000
trusted library allocation
page read and write
204E6FFC000
trusted library allocation
page read and write
204E7797000
trusted library allocation
page read and write
204DEFAD000
trusted library allocation
page read and write
204DF65E000
trusted library allocation
page read and write
204E6C86000
trusted library allocation
page read and write
17C47B59000
heap
page read and write
204E7272000
trusted library allocation
page read and write
204E2767000
trusted library allocation
page read and write
204E6E2E000
trusted library allocation
page read and write
204E2559000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204DFEC9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
8CC000
unkown
page read and write
204E00C4000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E87A8000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E20E0000
trusted library allocation
page read and write
204E78AB000
trusted library allocation
page read and write
204DFEE6000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204E0F5A000
trusted library allocation
page read and write
204E6CB8000
trusted library allocation
page read and write
204E7C43000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E2474000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C32000
heap
page read and write
204E0FC0000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
17C474B2000
heap
page read and write
204DFE61000
trusted library allocation
page read and write
204E6F94000
trusted library allocation
page read and write
204E71F4000
trusted library allocation
page read and write
165E000
heap
page read and write
26FCBE10000
trusted library allocation
page read and write
17C46FD0000
heap
page read and write
204D5C71000
heap
page read and write
204E0F7E000
trusted library allocation
page read and write
204E7CD7000
trusted library allocation
page read and write
1F4527E4000
heap
page read and write
204E6F48000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E7809000
trusted library allocation
page read and write
204E6CDF000
trusted library allocation
page read and write
204E22C0000
trusted library allocation
page read and write
204E7C8F000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DF7DD000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204E7282000
trusted library allocation
page read and write
204E7837000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204D5C2F000
heap
page read and write
26FCBF0C000
trusted library allocation
page read and write
204E6B6B000
trusted library allocation
page read and write
204DFE14000
trusted library allocation
page read and write
204E77F8000
trusted library allocation
page read and write
204DC568000
heap
page read and write
204D5C93000
heap
page read and write
204D5C6F000
heap
page read and write
204DFC62000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204E80E7000
trusted library allocation
page read and write
204DBE86000
trusted library allocation
page read and write
204DFC9A000
trusted library allocation
page read and write
204DFC40000
trusted library allocation
page read and write
204E722B000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204D5C15000
heap
page read and write
204DFE5B000
trusted library allocation
page read and write
204DD00B000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204DFE44000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E6CDD000
trusted library allocation
page read and write
204E6F34000
trusted library allocation
page read and write
204E6DCD000
trusted library allocation
page read and write
204DBD8E000
trusted library allocation
page read and write
204DFC62000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204D5C8B000
heap
page read and write
204D5C58000
heap
page read and write
204D5C1D000
heap
page read and write
204D5C3F000
heap
page read and write
204DEDC4000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DBEBA000
trusted library allocation
page read and write
1653000
heap
page read and write
204D5C4A000
heap
page read and write
204E00C5000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C32000
heap
page read and write
204D5C87000
heap
page read and write
204DEE78000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E25D1000
trusted library allocation
page read and write
204EA8D3000
trusted library allocation
page read and write
204E81C7000
trusted library allocation
page read and write
26FCBF32000
trusted library allocation
page read and write
204E7816000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DEFED000
trusted library allocation
page read and write
204DEE78000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E01B6000
trusted library allocation
page read and write
204E78C3000
trusted library allocation
page read and write
204DFC95000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E1140000
trusted library allocation
page read and write
204DC568000
heap
page read and write
204DBF22000
trusted library allocation
page read and write
17C46EC7000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204E8803000
heap
page read and write
204EADB2000
trusted library allocation
page read and write
204E78BF000
trusted library allocation
page read and write
204E0077000
trusted library allocation
page read and write
204E7CA5000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E01B5000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DFEC1000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C2A000
heap
page read and write
1640000
heap
page read and write
204E6DA1000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E7D93000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
17C47420000
trusted library allocation
page read and write
13DB000
stack
page read and write
204E24C5000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
17C47AE9000
heap
page read and write
204E7CAF000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C1E000
heap
page read and write
2390000
heap
page read and write
204E00BE000
trusted library allocation
page read and write
204DEE71000
trusted library allocation
page read and write
204DED8C000
trusted library allocation
page read and write
204E77D5000
trusted library allocation
page read and write
204DFC5E000
trusted library allocation
page read and write
204E22B2000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204DFC27000
trusted library allocation
page read and write
204DEE7C000
trusted library allocation
page read and write
17C47400000
trusted library allocation
page read and write
204E7845000
trusted library allocation
page read and write
204E71ED000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
17C47AFD000
heap
page read and write
204D5C35000
heap
page read and write
204E6CB8000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E1695000
trusted library allocation
page read and write
17C47A7D000
heap
page read and write
204E00D9000
trusted library allocation
page read and write
204DEE7C000
trusted library allocation
page read and write
204DA59E000
trusted library allocation
page read and write
204E7CDD000
trusted library allocation
page read and write
3B9EFFF000
stack
page read and write
204E6BC5000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E78E3000
trusted library allocation
page read and write
204E6F31000
trusted library allocation
page read and write
204DF711000
trusted library allocation
page read and write
204E15A9000
trusted library allocation
page read and write
204DFC19000
trusted library allocation
page read and write
204E938B000
trusted library allocation
page read and write
204E6C3B000
trusted library allocation
page read and write
204E6D41000
trusted library allocation
page read and write
204E21A8000
trusted library allocation
page read and write
204DEE63000
trusted library allocation
page read and write
204E6DDB000
trusted library allocation
page read and write
204DED3D000
trusted library allocation
page read and write
204E7859000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E7851000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204D5C24000
heap
page read and write
204DFAE2000
trusted library allocation
page read and write
204DFE8C000
trusted library allocation
page read and write
204E7DD1000
trusted library allocation
page read and write
204E1157000
trusted library allocation
page read and write
26FCBA70000
heap
page read and write
204D5C77000
heap
page read and write
204DD0C5000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
1C53E400000
trusted library allocation
page read and write
204E6F48000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204D5C1E000
heap
page read and write
204D5C45000
heap
page read and write
204E779F000
trusted library allocation
page read and write
BD66BD8000
stack
page read and write
204D5C24000
heap
page read and write
17C46E81000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
204E783E000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C8B000
heap
page read and write
204E00D2000
trusted library allocation
page read and write
204DEF90000
trusted library allocation
page read and write
204E8017000
trusted library allocation
page read and write
204DEEB3000
trusted library allocation
page read and write
17C47AFD000
heap
page read and write
204D5C1E000
heap
page read and write
204E6CDB000
trusted library allocation
page read and write
204DFEE1000
trusted library allocation
page read and write
204DFEEC000
trusted library allocation
page read and write
204E01C5000
trusted library allocation
page read and write
1544000
heap
page read and write
204E6F8C000
trusted library allocation
page read and write
204EA8D6000
trusted library allocation
page read and write
204E6DD3000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E6CF5000
trusted library allocation
page read and write
204E7852000
trusted library allocation
page read and write
204E78FC000
trusted library allocation
page read and write
26834E70000
trusted library allocation
page read and write
204DA5BF000
trusted library allocation
page read and write
204E7C6B000
trusted library allocation
page read and write
204DA59B000
trusted library allocation
page read and write
204E77B4000
trusted library allocation
page read and write
204E8063000
trusted library allocation
page read and write
204E8013000
trusted library allocation
page read and write
204E8761000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C5D000
heap
page read and write
204D5C32000
heap
page read and write
204DFCB1000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
17C47A60000
heap
page read and write
1540000
heap
page read and write
204DEDB4000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
204D5C35000
heap
page read and write
204D5C1E000
heap
page read and write
17C47A60000
heap
page read and write
204D5C1E000
heap
page read and write
204E0153000
trusted library allocation
page read and write
204E801F000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204D5C5D000
heap
page read and write
204E20DC000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204E6ECC000
trusted library allocation
page read and write
204DBE5E000
trusted library allocation
page read and write
204E01A8000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E889C000
heap
page read and write
204DFE6C000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
17C46EC2000
trusted library allocation
page read and write
6F657FE000
stack
page read and write
204DD0C2000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204DEF1C000
trusted library allocation
page read and write
204E7CB9000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E9220000
trusted library allocation
page read and write
204DF6BF000
trusted library allocation
page read and write
204DC4FE000
heap
page read and write
204D5C45000
heap
page read and write
204DACB7000
trusted library allocation
page read and write
204DED95000
trusted library allocation
page read and write
204E21DB000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204D5C1E000
heap
page read and write
204E0168000
trusted library allocation
page read and write
204E2526000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204D5C1E000
heap
page read and write
204E205D000
trusted library allocation
page read and write
204DBD22000
trusted library allocation
page read and write
204E25AC000
trusted library allocation
page read and write
204E01C5000
trusted library allocation
page read and write
204D5C2D000
heap
page read and write
204DF6F4000
trusted library allocation
page read and write
204DEE9A000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E167A000
trusted library allocation
page read and write
204DBD7F000
trusted library allocation
page read and write
1C53E530000
heap
page read and write
204D5C1E000
heap
page read and write
26834F00000
unclassified section
page readonly
204D5C2C000
heap
page read and write
204DEE7E000
trusted library allocation
page read and write
17C47AF0000
heap
page read and write
204D5C7C000
heap
page read and write
204D5C8C000
heap
page read and write
204DAB71000
trusted library allocation
page read and write
204E6B57000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E0193000
trusted library allocation
page read and write
204DEDA8000
trusted library allocation
page read and write
26FCB9B0000
unclassified section
page readonly
1648000
heap
page read and write
204D5C24000
heap
page read and write
204D5C82000
heap
page read and write
204DFEE6000
trusted library allocation
page read and write
204DEC4B000
trusted library allocation
page read and write
204E6FC3000
trusted library allocation
page read and write
204DACB5000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204DFC48000
trusted library allocation
page read and write
204E0173000
trusted library allocation
page read and write
204DF7CB000
trusted library allocation
page read and write
204E15C1000
trusted library allocation
page read and write
204E01BD000
trusted library allocation
page read and write
204E6DFB000
trusted library allocation
page read and write
1F450F0A000
trusted library allocation
page read and write
204E2241000
trusted library allocation
page read and write
204DFEE4000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204D5C24000
heap
page read and write
204D5C82000
heap
page read and write
204D5C87000
heap
page read and write
204D5C24000
heap
page read and write
204D5C24000
heap
page read and write
204E877F000
trusted library allocation
page read and write
204DFC37000
trusted library allocation
page read and write
204E6E66000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204E7833000
trusted library allocation
page read and write
26834E30000
trusted library allocation
page read and write
204E78FC000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204DAC26000
trusted library allocation
page read and write
204DEECA000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204DFC3A000
trusted library allocation
page read and write
204E8076000
trusted library allocation
page read and write
204D5C84000
heap
page read and write
204E7285000
trusted library allocation
page read and write
26FCBE7B000
trusted library allocation
page read and write
204DBBE0000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204DBBFD000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204D5C24000
heap
page read and write
204D5C45000
heap
page read and write
204D5C87000
heap
page read and write
204E787D000
trusted library allocation
page read and write
204EAEF7000
trusted library allocation
page read and write
204E8037000
trusted library allocation
page read and write
204E87AB000
trusted library allocation
page read and write
204E6EF8000
trusted library allocation
page read and write
204DFE07000
trusted library allocation
page read and write
204DBDDB000
trusted library allocation
page read and write
204DD0F2000
trusted library allocation
page read and write
204DD0C6000
trusted library allocation
page read and write
204E7870000
trusted library allocation
page read and write
26FCBE03000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C3A000
heap
page read and write
204DF6A7000
trusted library allocation
page read and write
204E2794000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204D5C52000
heap
page read and write
204E7CBE000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204DFE41000
trusted library allocation
page read and write
204E8803000
heap
page read and write
204D5C1E000
heap
page read and write
204E00A0000
trusted library allocation
page read and write
204D5C4E000
heap
page read and write
204E8127000
trusted library allocation
page read and write
204DFECF000
trusted library allocation
page read and write
204DEE6A000
trusted library allocation
page read and write
204DFC2D000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204DED49000
trusted library allocation
page read and write
204E168D000
trusted library allocation
page read and write
17C47B21000
heap
page read and write
204DFC33000
trusted library allocation
page read and write
204DFEF9000
trusted library allocation
page read and write
204DFEB1000
trusted library allocation
page read and write
204DF6FB000
trusted library allocation
page read and write
204E9A00000
trusted library allocation
page read and write
204E783A000
trusted library allocation
page read and write
204D5C29000
heap
page read and write
204DF7E0000
trusted library allocation
page read and write
204DEF76000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204DBEF6000
trusted library allocation
page read and write
204DC237000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204E77FE000
trusted library allocation
page read and write
204E0056000
trusted library allocation
page read and write
1F4527E7000
heap
page read and write
204E25AE000
trusted library allocation
page read and write
204E24B2000
trusted library allocation
page read and write
204D5C4E000
heap
page read and write
204DC4FE000
heap
page read and write
204D5C4F000
heap
page read and write
204E7855000
trusted library allocation
page read and write
204DED9A000
trusted library allocation
page read and write
204E78D8000
trusted library allocation
page read and write
204DBE4E000
trusted library allocation
page read and write
204DC290000
trusted library allocation
page read and write
17C47A8D000
heap
page read and write
204E7739000
trusted library allocation
page read and write
204DF7F5000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204E71F4000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204E6D99000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204DFC90000
trusted library allocation
page read and write
204DAB2F000
trusted library allocation
page read and write
204E00C5000
trusted library allocation
page read and write
204DEFB7000
trusted library allocation
page read and write
204DF6FE000
trusted library allocation
page read and write
204E25C5000
trusted library allocation
page read and write
204DBE69000
trusted library allocation
page read and write
2BBF608B000
trusted library allocation
page execute read
17C47AF2000
heap
page read and write
204D5C36000
heap
page read and write
204D5C24000
heap
page read and write
204DEE71000
trusted library allocation
page read and write
204E722F000
trusted library allocation
page read and write
17C47370000
unclassified section
page read and write
17C46E65000
trusted library allocation
page read and write
204EA8DB000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6BE7000
trusted library allocation
page read and write
204DAB2F000
trusted library allocation
page read and write
204E00BE000
trusted library allocation
page read and write
204E6FDA000
trusted library allocation
page read and write
204DEE20000
trusted library allocation
page read and write
204E6D35000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
204E9CCA000
trusted library allocation
page read and write
204DF68C000
trusted library allocation
page read and write
204D5C34000
heap
page read and write
204E00CF000
trusted library allocation
page read and write
204E0033000
trusted library allocation
page read and write
204E78B4000
trusted library allocation
page read and write
204E6FC7000
trusted library allocation
page read and write
204E728E000
trusted library allocation
page read and write
204DC284000
trusted library allocation
page read and write
204DBBDA000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204DEC55000
trusted library allocation
page read and write
204DEFD8000
trusted library allocation
page read and write
204E278B000
trusted library allocation
page read and write
204E6E30000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204DED3D000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204EA8BC000
trusted library allocation
page read and write
204E0015000
trusted library allocation
page read and write
1644000
heap
page read and write
204E15A3000
trusted library allocation
page read and write
204E6CE5000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E0F48000
trusted library allocation
page read and write
204DEFD8000
trusted library allocation
page read and write
204E92E5000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204EAE80000
trusted library allocation
page read and write
204E9393000
trusted library allocation
page read and write
204E7CA8000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204D5C24000
heap
page read and write
204D5C4F000
heap
page read and write
204E93AC000
trusted library allocation
page read and write
204E6FC3000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E6FB0000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C7C000
heap
page read and write
204DEE29000
trusted library allocation
page read and write
1F450D3A000
heap
page read and write
204E7C83000
trusted library allocation
page read and write
204E7198000
trusted library allocation
page read and write
204DEE9B000
trusted library allocation
page read and write
204E9D01000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204E6EAF000
trusted library allocation
page read and write
17C46B40000
heap
page read and write
204E71ED000
trusted library allocation
page read and write
204EA8DB000
trusted library allocation
page read and write
204DBEC7000
trusted library allocation
page read and write
204E9389000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E7814000
trusted library allocation
page read and write
204E6DD1000
trusted library allocation
page read and write
204DFC5B000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204DBBC3000
trusted library allocation
page read and write
204DEEB3000
trusted library allocation
page read and write
204E6BF1000
trusted library allocation
page read and write
204DFE61000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DECCE000
trusted library allocation
page read and write
204E22D6000
trusted library allocation
page read and write
204DBB88000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C24000
heap
page read and write
1F450D52000
heap
page read and write
204E01CE000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
6F6717E000
unkown
page readonly
204DBD1F000
trusted library allocation
page read and write
204DFC36000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204DC243000
trusted library allocation
page read and write
204E70EB000
trusted library allocation
page read and write
204E7CBE000
trusted library allocation
page read and write
13E68FE000
unkown
page readonly
204D5C54000
heap
page read and write
204E227F000
trusted library allocation
page read and write
8CC000
unkown
page write copy
204E0FD0000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204E6B77000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204DC28B000
trusted library allocation
page read and write
204E1628000
trusted library allocation
page read and write
204DC2CB000
trusted library allocation
page read and write
204DEFD7000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DED88000
trusted library allocation
page read and write
1F450D30000
heap
page read and write
204E24A8000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
13E35CE000
unkown
page readonly
204E00DE000
trusted library allocation
page read and write
204DFCC5000
trusted library allocation
page read and write
BD69E3E000
stack
page read and write
204DFE93000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6D41000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C25000
heap
page read and write
204DEDC4000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E214E000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DFECF000
trusted library allocation
page read and write
204E7DD2000
trusted library allocation
page read and write
204DBDB9000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
17C47B77000
heap
page read and write
204DEC9E000
trusted library allocation
page read and write
3B9BFFF000
stack
page read and write
204EAE77000
trusted library allocation
page read and write
204E6E5B000
trusted library allocation
page read and write
204DFEF8000
trusted library allocation
page read and write
204E87B9000
trusted library allocation
page read and write
204DF659000
trusted library allocation
page read and write
204DFCF7000
trusted library allocation
page read and write
204E6D9D000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E6D9F000
trusted library allocation
page read and write
204E78FC000
trusted library allocation
page read and write
204E6F31000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E88AA000
heap
page read and write
204D5C46000
heap
page read and write
204E1067000
trusted library allocation
page read and write
D19000
stack
page read and write
17C46B8A000
heap
page read and write
17C47A5F000
heap
page read and write
204E6DCA000
trusted library allocation
page read and write
204DEDBE000
trusted library allocation
page read and write
204E93D6000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C46000
heap
page read and write
204EADB3000
trusted library allocation
page read and write
204D5C2C000
heap
page read and write
204D5C4A000
heap
page read and write
204D5C4F000
heap
page read and write
204D5C7C000
heap
page read and write
26834AE1000
remote allocation
page execute read
204E7CD4000
trusted library allocation
page read and write
204DBE33000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204E780B000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C28000
heap
page read and write
204E2078000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DFE97000
trusted library allocation
page read and write
204E24E5000
trusted library allocation
page read and write
204D5C4E000
heap
page read and write
1620000
heap
page read and write
204E00A0000
trusted library allocation
page read and write
204E8079000
trusted library allocation
page read and write
17C47AE8000
heap
page read and write
204DF7ED000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
204DFE61000
trusted library allocation
page read and write
204DFE5B000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
26FCBF03000
trusted library allocation
page read and write
204DC245000
trusted library allocation
page read and write
204DFADB000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204D5C32000
heap
page read and write
204D5C32000
heap
page read and write
204DBBD5000
trusted library allocation
page read and write
204DFE61000
trusted library allocation
page read and write
2BBF6088000
trusted library allocation
page execute read
204D5C2A000
heap
page read and write
204D5C24000
heap
page read and write
1F450C00000
heap
page read and write
204E005D000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E6D96000
trusted library allocation
page read and write
204E0164000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DBE84000
trusted library allocation
page read and write
204DEDBE000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204D5C24000
heap
page read and write
204E009D000
trusted library allocation
page read and write
204E0056000
trusted library allocation
page read and write
204E11A7000
trusted library allocation
page read and write
204D5C1F000
heap
page read and write
204D5C32000
heap
page read and write
204D5C32000
heap
page read and write
17C47AFD000
heap
page read and write
204DED47000
trusted library allocation
page read and write
204EA8D6000
trusted library allocation
page read and write
204DBDDC000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204E6E5A000
trusted library allocation
page read and write
26834C40000
heap
page read and write
3E81000
heap
page read and write
BD695BE000
unkown
page readonly
204D5C1E000
heap
page read and write
204D5C86000
heap
page read and write
204E7DC7000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DEE71000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204D5C1E000
heap
page read and write
204DFC40000
trusted library allocation
page read and write
204DD062000
trusted library allocation
page read and write
204E0058000
trusted library allocation
page read and write
204DC2F4000
trusted library allocation
page read and write
204D5C15000
heap
page read and write
204D5C32000
heap
page read and write
204E00D6000
trusted library allocation
page read and write
204E7881000
trusted library allocation
page read and write
204D5C3D000
heap
page read and write
204E6F3D000
trusted library allocation
page read and write
204E7CE5000
trusted library allocation
page read and write
204E6D99000
trusted library allocation
page read and write
204E8017000
trusted library allocation
page read and write
17C46FD4000
heap
page read and write
204D5C70000
heap
page read and write
6F6697E000
stack
page read and write
204DED80000
trusted library allocation
page read and write
204E08FC000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C5D000
heap
page read and write
204D5C5D000
heap
page read and write
204E80C7000
trusted library allocation
page read and write
204DFEEF000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204E701C000
trusted library allocation
page read and write
204DEF8E000
trusted library allocation
page read and write
204EA8AC000
trusted library allocation
page read and write
26834B63000
heap
page read and write
204E8050000
trusted library allocation
page read and write
204E2043000
trusted library allocation
page read and write
204DFE83000
trusted library allocation
page read and write
204DEFFE000
trusted library allocation
page read and write
204DC298000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E25E9000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
17C47B77000
heap
page read and write
204E725C000
trusted library allocation
page read and write
204DF6EA000
trusted library allocation
page read and write
204DFEB1000
trusted library allocation
page read and write
204D5C8C000
heap
page read and write
204E0170000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E9390000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
17C47B21000
heap
page read and write
204DED7B000
trusted library allocation
page read and write
26834B60000
heap
page read and write
204E7870000
trusted library allocation
page read and write
204E6DCA000
trusted library allocation
page read and write
204EADC4000
trusted library allocation
page read and write
204DF7FE000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DD033000
trusted library allocation
page read and write
204E215B000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6FDA000
trusted library allocation
page read and write
204E6D9D000
trusted library allocation
page read and write
204E0053000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204DFE07000
trusted library allocation
page read and write
204E805C000
trusted library allocation
page read and write
204E778F000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E8123000
trusted library allocation
page read and write
204E279D000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEE7B000
trusted library allocation
page read and write
147421303000
trusted library allocation
page read and write
204DFE97000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204D5C52000
heap
page read and write
204D5C24000
heap
page read and write
204E77BD000
trusted library allocation
page read and write
1544000
heap
page read and write
204E782F000
trusted library allocation
page read and write
204E0197000
trusted library allocation
page read and write
204DBBFD000
trusted library allocation
page read and write
204E00BE000
trusted library allocation
page read and write
204EA860000
trusted library allocation
page read and write
164A000
heap
page read and write
204E786B000
trusted library allocation
page read and write
26834B30000
heap
page read and write
204E80E7000
trusted library allocation
page read and write
204DEF27000
trusted library allocation
page read and write
204E7C86000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DFC33000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204E7212000
trusted library allocation
page read and write
204DBBFD000
trusted library allocation
page read and write
204E226C000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204E00A7000
trusted library allocation
page read and write
204E7EB9000
trusted library allocation
page read and write
17C47AE3000
heap
page read and write
204DEE78000
trusted library allocation
page read and write
204E20CF000
trusted library allocation
page read and write
204E82AD000
trusted library allocation
page read and write
204EA03B000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E6FFC000
trusted library allocation
page read and write
204E7EFC000
trusted library allocation
page read and write
204D5C15000
heap
page read and write
204D5C24000
heap
page read and write
204DEE48000
trusted library allocation
page read and write
204E6D26000
trusted library allocation
page read and write
1544000
heap
page read and write
204DBBDA000
trusted library allocation
page read and write
204E72FD000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DC28D000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E71F4000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C24000
heap
page read and write
204DBDBB000
trusted library allocation
page read and write
204E725C000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204D5C15000
heap
page read and write
204E93C8000
trusted library allocation
page read and write
204E6FC3000
trusted library allocation
page read and write
204E7EF6000
trusted library allocation
page read and write
204E0151000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204E2556000
trusted library allocation
page read and write
204E7C92000
trusted library allocation
page read and write
204DBEF6000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C3F000
heap
page read and write
204E6FBD000
trusted library allocation
page read and write
204E7015000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEF0F000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204DFEF9000
trusted library allocation
page read and write
204E70FB000
trusted library allocation
page read and write
204DEF38000
trusted library allocation
page read and write
204DED7F000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E25B2000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C46000
heap
page read and write
204EAE88000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C5D000
heap
page read and write
204E00DF000
trusted library allocation
page read and write
204DEF32000
trusted library allocation
page read and write
204DFCD1000
trusted library allocation
page read and write
204DEDD8000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204E6D9F000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DEFED000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
164E000
heap
page read and write
204D5C70000
heap
page read and write
204D5C7C000
heap
page read and write
204E00A7000
trusted library allocation
page read and write
204DFC5B000
trusted library allocation
page read and write
204E786B000
trusted library allocation
page read and write
D80000
heap
page read and write
204DFEC9000
trusted library allocation
page read and write
204E7C94000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204E7CB9000
trusted library allocation
page read and write
1649000
heap
page read and write
17C47AE6000
heap
page read and write
204E6EF6000
trusted library allocation
page read and write
204DD062000
trusted library allocation
page read and write
204E20CD000
trusted library allocation
page read and write
204E6DD1000
trusted library allocation
page read and write
26FCBE68000
trusted library allocation
page read and write
204DFC36000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E00EF000
trusted library allocation
page read and write
204E889C000
heap
page read and write
204D5C3F000
heap
page read and write
204DED9A000
trusted library allocation
page read and write
204DEFFD000
trusted library allocation
page read and write
204DF6F4000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E6BBA000
trusted library allocation
page read and write
204E92F4000
trusted library allocation
page read and write
204DF670000
trusted library allocation
page read and write
204DC2F5000
trusted library allocation
page read and write
204DFEE6000
trusted library allocation
page read and write
204DEE7B000
trusted library allocation
page read and write
204E7876000
trusted library allocation
page read and write
204EAE9D000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204D5CA2000
heap
page read and write
204DFC5E000
trusted library allocation
page read and write
26FCBE0B000
trusted library allocation
page read and write
204E92F9000
trusted library allocation
page read and write
204D5C4B000
heap
page read and write
204DD028000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DEC78000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E8775000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E7EA3000
trusted library allocation
page read and write
17C46E78000
trusted library allocation
page read and write
204E7CD6000
trusted library allocation
page read and write
801000
unkown
page execute read
204DA581000
trusted library allocation
page read and write
204DFF05000
trusted library allocation
page read and write
17C47B58000
heap
page read and write
204E78EC000
trusted library allocation
page read and write
1C53E249000
heap
page read and write
204E16C9000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DA5DF000
trusted library allocation
page read and write
BCA2BFC000
stack
page read and write
204DFC90000
trusted library allocation
page read and write
204DC2F5000
trusted library allocation
page read and write
204E005D000
trusted library allocation
page read and write
204DBB88000
trusted library allocation
page read and write
204E772A000
trusted library allocation
page read and write
26834AF0000
unclassified section
page readonly
204D5C7C000
heap
page read and write
26834FF0000
heap
page read and write
204DEC8E000
trusted library allocation
page read and write
204DC245000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C78000
heap
page read and write
204DAC13000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204DFC2A000
trusted library allocation
page read and write
204DABFE000
trusted library allocation
page read and write
204DEE39000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204E20C5000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E6CDB000
trusted library allocation
page read and write
204E0FFD000
trusted library allocation
page read and write
6F660FE000
unkown
page readonly
204DBDDB000
trusted library allocation
page read and write
204DFC62000
trusted library allocation
page read and write
204DF670000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DFC9F000
trusted library allocation
page read and write
204D5C30000
heap
page read and write
204E2559000
trusted library allocation
page read and write
204D5C49000
heap
page read and write
204DC4E3000
heap
page read and write
204DEE4E000
trusted library allocation
page read and write
204DBD7C000
trusted library allocation
page read and write
204E10CD000
trusted library allocation
page read and write
204DAB2F000
trusted library allocation
page read and write
204E8B80000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
1F4527D0000
heap
page read and write
204E77A6000
trusted library allocation
page read and write
204E9D04000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204D5C4F000
heap
page read and write
204DEE1B000
trusted library allocation
page read and write
204E7858000
trusted library allocation
page read and write
204DEC88000
trusted library allocation
page read and write
89C000
unkown
page readonly
204E88AB000
heap
page read and write
204E786D000
trusted library allocation
page read and write
204E6FF2000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E01C5000
trusted library allocation
page read and write
204DBEF6000
trusted library allocation
page read and write
204E7835000
trusted library allocation
page read and write
204E7EFE000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204E88AA000
heap
page read and write
204D5C4F000
heap
page read and write
13FD000
stack
page read and write
204D5C4C000
heap
page read and write
204DA5F8000
trusted library allocation
page read and write
204E7CEA000
trusted library allocation
page read and write
204E00DB000
trusted library allocation
page read and write
204DC54C000
heap
page read and write
204DEF3D000
trusted library allocation
page read and write
17C47490000
heap
page read and write
204E24E5000
trusted library allocation
page read and write
17C46E12000
trusted library allocation
page read and write
1544000
heap
page read and write
204E70F2000
trusted library allocation
page read and write
17C47A09000
heap
page read and write
204DFEC1000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DEFD5000
trusted library allocation
page read and write
204E15A5000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DEE71000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204E1589000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204DC513000
heap
page read and write
204DFE8F000
trusted library allocation
page read and write
204E8804000
trusted library allocation
page read and write
204E7C84000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DAC17000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DC522000
heap
page read and write
204DFE0A000
trusted library allocation
page read and write
204D5C92000
heap
page read and write
204D5CC3000
heap
page read and write
204DEC8A000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DEE9A000
trusted library allocation
page read and write
204DEDBB000
trusted library allocation
page read and write
204E6BED000
trusted library allocation
page read and write
204E0FCF000
trusted library allocation
page read and write
204E6D92000
trusted library allocation
page read and write
204EAE21000
trusted library allocation
page read and write
204DF6B8000
trusted library allocation
page read and write
204DEFED000
trusted library allocation
page read and write
204E00BA000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204D5C78000
heap
page read and write
204D5C8B000
heap
page read and write
204E70F2000
trusted library allocation
page read and write
204DEDA1000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204EA8B5000
trusted library allocation
page read and write
204E8035000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E013B000
trusted library allocation
page read and write
204DAC96000
trusted library allocation
page read and write
3E81000
heap
page read and write
204D5C45000
heap
page read and write
204E00C1000
trusted library allocation
page read and write
204DEFED000
trusted library allocation
page read and write
204E80B7000
trusted library allocation
page read and write
204DFC65000
trusted library allocation
page read and write
26FCBF16000
trusted library allocation
page read and write
204E7DCB000
trusted library allocation
page read and write
204E7CD1000
trusted library allocation
page read and write
2BBF6084000
trusted library allocation
page execute read
204E88AB000
heap
page read and write
204E787D000
trusted library allocation
page read and write
17C47AE0000
heap
page read and write
204DEEF3000
trusted library allocation
page read and write
204E159F000
trusted library allocation
page read and write
204E11FB000
trusted library allocation
page read and write
204E77CC000
trusted library allocation
page read and write
204E71B4000
trusted library allocation
page read and write
204DEE56000
trusted library allocation
page read and write
204DBEEB000
trusted library allocation
page read and write
204D5C25000
heap
page read and write
204E78B3000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204DBDB9000
trusted library allocation
page read and write
204EAE1B000
trusted library allocation
page read and write
204DEFDD000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E87B4000
trusted library allocation
page read and write
204E245C000
trusted library allocation
page read and write
BD68D3E000
stack
page read and write
204E00BA000
trusted library allocation
page read and write
204E93C8000
trusted library allocation
page read and write
204DBD78000
trusted library allocation
page read and write
26FCBE0D000
trusted library allocation
page read and write
204E7C95000
trusted library allocation
page read and write
1F4527EB000
heap
page read and write
204E7CBE000
trusted library allocation
page read and write
204E6B6F000
trusted library allocation
page read and write
204E245A000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204DED81000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204D5C32000
heap
page read and write
204D5C6F000
heap
page read and write
1F4527E1000
heap
page read and write
1C53E240000
heap
page read and write
204E8013000
trusted library allocation
page read and write
204E6F72000
trusted library allocation
page read and write
17C47B44000
heap
page read and write
204DC530000
heap
page read and write
204E7DC0000
trusted library allocation
page read and write
204E011B000
trusted library allocation
page read and write
17C47B58000
heap
page read and write
204D5C78000
heap
page read and write
204D5C24000
heap
page read and write
204E87B7000
trusted library allocation
page read and write
204E71BD000
trusted library allocation
page read and write
204E6D9D000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204DF68A000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204D5C32000
heap
page read and write
204DBEBA000
trusted library allocation
page read and write
204E783D000
trusted library allocation
page read and write
204E8011000
trusted library allocation
page read and write
204DEE7C000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DC568000
heap
page read and write
204E6DCA000
trusted library allocation
page read and write
204E225A000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C49000
heap
page read and write
204E01AE000
trusted library allocation
page read and write
204E78FC000
trusted library allocation
page read and write
204DC514000
heap
page read and write
204E77A9000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
17C47A9C000
heap
page read and write
204DED88000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204D5C8C000
heap
page read and write
204D5C4F000
heap
page read and write
204E1200000
trusted library allocation
page read and write
204E15A1000
trusted library allocation
page read and write
204DEFA1000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E2411000
trusted library allocation
page read and write
204E25FB000
trusted library allocation
page read and write
204E8856000
heap
page read and write
204E6CD4000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
204E6FC9000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DC568000
heap
page read and write
204D5C91000
heap
page read and write
204DED37000
trusted library allocation
page read and write
204DAC26000
trusted library allocation
page read and write
204DEFC3000
trusted library allocation
page read and write
204DC236000
trusted library allocation
page read and write
204E6FC7000
trusted library allocation
page read and write
204E72A9000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
17C47A7D000
heap
page read and write
204D5C78000
heap
page read and write
204E00D9000
trusted library allocation
page read and write
204D5C83000
heap
page read and write
204E6CC3000
trusted library allocation
page read and write
204E10B0000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
17C473C0000
trusted library allocation
page read and write
17C47A6C000
heap
page read and write
204D5C32000
heap
page read and write
204DFEDA000
trusted library allocation
page read and write
204DBE52000
trusted library allocation
page read and write
204E80E7000
trusted library allocation
page read and write
204E78E9000
trusted library allocation
page read and write
204E01CE000
trusted library allocation
page read and write
204E6DD3000
trusted library allocation
page read and write
204E21D6000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E8112000
trusted library allocation
page read and write
26FCBEC8000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
26834E5F000
trusted library allocation
page read and write
204DEF52000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
26834CD2000
unclassified section
page read and write
204D5C1E000
heap
page read and write
204D5C24000
heap
page read and write
204E7ECA000
trusted library allocation
page read and write
204E24A7000
trusted library allocation
page read and write
204DC243000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204D5C1E000
heap
page read and write
204DFCC5000
trusted library allocation
page read and write
204D5C04000
heap
page read and write
204E7288000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
26834E66000
trusted library allocation
page read and write
204DF7DD000
trusted library allocation
page read and write
204DAC1B000
trusted library allocation
page read and write
204E6F37000
trusted library allocation
page read and write
204E6FE6000
trusted library allocation
page read and write
204E00D9000
trusted library allocation
page read and write
204E7743000
trusted library allocation
page read and write
204E7CBE000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204D5C1E000
heap
page read and write
204EAE68000
trusted library allocation
page read and write
204E811F000
trusted library allocation
page read and write
204E00A5000
trusted library allocation
page read and write
204DFC40000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204E008B000
trusted library allocation
page read and write
204DFC48000
trusted library allocation
page read and write
204DEC6C000
trusted library allocation
page read and write
204E004C000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E7854000
trusted library allocation
page read and write
17C47A60000
heap
page read and write
204D5C45000
heap
page read and write
204D5C45000
heap
page read and write
204E71C7000
trusted library allocation
page read and write
204E00DF000
trusted library allocation
page read and write
204E24E9000
trusted library allocation
page read and write
17C47B58000
heap
page read and write
204D5C52000
heap
page read and write
204D5C5D000
heap
page read and write
204DC52C000
heap
page read and write
204E25AA000
trusted library allocation
page read and write
6F6817E000
unkown
page readonly
26FCBA3E000
remote allocation
page execute read
204E00A7000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204E7865000
trusted library allocation
page read and write
204E9E00000
trusted library allocation
page read and write
204E70EF000
trusted library allocation
page read and write
204E785D000
trusted library allocation
page read and write
204DFCE7000
trusted library allocation
page read and write
26FCBB9A000
heap
page read and write
204DF693000
trusted library allocation
page read and write
204E788F000
trusted library allocation
page read and write
204E20B7000
trusted library allocation
page read and write
204E7CBC000
trusted library allocation
page read and write
204DA5EF000
trusted library allocation
page read and write
17C46CE0000
heap
page readonly
204E15D3000
trusted library allocation
page read and write
204DBD7F000
trusted library allocation
page read and write
204DFEDA000
trusted library allocation
page read and write
204DFE7A000
trusted library allocation
page read and write
204DF65E000
trusted library allocation
page read and write
1F450D10000
heap
page read and write
204D5C45000
heap
page read and write
204E8079000
trusted library allocation
page read and write
801000
unkown
page execute read
17C46EAF000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E6C41000
trusted library allocation
page read and write
204E7CD4000
trusted library allocation
page read and write
1C53E407000
trusted library allocation
page read and write
204E6DDB000
trusted library allocation
page read and write
204DED6C000
trusted library allocation
page read and write
204E01A1000
trusted library allocation
page read and write
204DFC1F000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E0185000
trusted library allocation
page read and write
26834FF6000
heap
page read and write
204D5C24000
heap
page read and write
204D5C2E000
heap
page read and write
204D5C36000
heap
page read and write
204EA8BC000
trusted library allocation
page read and write
204E8779000
trusted library allocation
page read and write
204DFCC8000
trusted library allocation
page read and write
204D5C34000
heap
page read and write
26834B10000
heap
page read and write
204E70FB000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
26834EDB000
trusted library allocation
page read and write
204E24AA000
trusted library allocation
page read and write
204DAB71000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204DFAFA000
trusted library allocation
page read and write
204E6DEB000
trusted library allocation
page read and write
204EAD0B000
trusted library allocation
page read and write
26834E5D000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204D5C82000
heap
page read and write
204D5C46000
heap
page read and write
204DEF5F000
trusted library allocation
page read and write
204E25A7000
trusted library allocation
page read and write
BD683FE000
unkown
page readonly
204DD061000
trusted library allocation
page read and write
204DEEF3000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E783D000
trusted library allocation
page read and write
204E716E000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DC254000
trusted library allocation
page read and write
204E80A6000
trusted library allocation
page read and write
204DC2CF000
trusted library allocation
page read and write
204DEC1F000
trusted library allocation
page read and write
204DD080000
trusted library allocation
page read and write
204E70EE000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C86000
heap
page read and write
204DBE74000
trusted library allocation
page read and write
204EA8B2000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204E7DD5000
trusted library allocation
page read and write
204D5C85000
heap
page read and write
204E7837000
trusted library allocation
page read and write
204EA860000
trusted library allocation
page read and write
204E7C4F000
trusted library allocation
page read and write
204E7DFC000
trusted library allocation
page read and write
204E7C9A000
trusted library allocation
page read and write
204E252A000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E9240000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E0159000
trusted library allocation
page read and write
204E6C4B000
trusted library allocation
page read and write
204E6B5F000
trusted library allocation
page read and write
204E923A000
trusted library allocation
page read and write
204E6FBD000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C5D000
heap
page read and write
204E70F8000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E8853000
heap
page read and write
204E86BA000
trusted library allocation
page read and write
204E780B000
trusted library allocation
page read and write
17C46AA0000
unclassified section
page readonly
204E00C1000
trusted library allocation
page read and write
204E22DF000
trusted library allocation
page read and write
204E7187000
trusted library allocation
page read and write
221E000
stack
page read and write
204DFC55000
trusted library allocation
page read and write
204E2757000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204DFC24000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
204D5C46000
heap
page read and write
204DBE8E000
trusted library allocation
page read and write
204E77A9000
trusted library allocation
page read and write
204E782F000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204EADC4000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204DFEFC000
trusted library allocation
page read and write
204E6FFA000
trusted library allocation
page read and write
17C46E00000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E877D000
trusted library allocation
page read and write
204DD07A000
trusted library allocation
page read and write
204E6D19000
trusted library allocation
page read and write
204DECCE000
trusted library allocation
page read and write
204E6E1C000
trusted library allocation
page read and write
204E77C9000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204DFECB000
trusted library allocation
page read and write
204E7DCB000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
3B9E7FE000
stack
page read and write
204E803D000
trusted library allocation
page read and write
204E6F73000
trusted library allocation
page read and write
204E7C89000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
204DEC4B000
trusted library allocation
page read and write
204DFECF000
trusted library allocation
page read and write
26FCBF11000
trusted library allocation
page read and write
204DEC8A000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
204DEE1B000
trusted library allocation
page read and write
204E00A0000
trusted library allocation
page read and write
26FCBEBA000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C3F000
heap
page read and write
204E00C1000
trusted library allocation
page read and write
204E8027000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204DC29D000
trusted library allocation
page read and write
204E0023000
trusted library allocation
page read and write
204DEC80000
trusted library allocation
page read and write
204E9C89000
trusted library allocation
page read and write
204DEF99000
trusted library allocation
page read and write
204DBE84000
trusted library allocation
page read and write
204DD039000
trusted library allocation
page read and write
204D5C8B000
heap
page read and write
204E00EF000
trusted library allocation
page read and write
204E78E7000
trusted library allocation
page read and write
204E2565000
trusted library allocation
page read and write
204E15EB000
trusted library allocation
page read and write
204D5C70000
heap
page read and write
204DBB8F000
trusted library allocation
page read and write
204E8296000
trusted library allocation
page read and write
204E7CAD000
trusted library allocation
page read and write
204E6D89000
trusted library allocation
page read and write
204D5C3E000
heap
page read and write
204E6F57000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E7C8B000
trusted library allocation
page read and write
204E01B5000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E0196000
trusted library allocation
page read and write
204D5C29000
heap
page read and write
204D5C24000
heap
page read and write
204DFC12000
trusted library allocation
page read and write
26FCBA63000
heap
page read and write
204E811B000
trusted library allocation
page read and write
204DBDDB000
trusted library allocation
page read and write
204E785B000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204DEE8A000
trusted library allocation
page read and write
17C47AB9000
heap
page read and write
204E2757000
trusted library allocation
page read and write
204E7762000
trusted library allocation
page read and write
204DF670000
trusted library allocation
page read and write
204DEDAC000
trusted library allocation
page read and write
204D5C36000
heap
page read and write
204D5C4A000
heap
page read and write
204D5C3F000
heap
page read and write
204E00A7000
trusted library allocation
page read and write
204DD0C0000
trusted library allocation
page read and write
204E6FC3000
trusted library allocation
page read and write
204E1184000
trusted library allocation
page read and write
204E6DCD000
trusted library allocation
page read and write
204E15FE000
trusted library allocation
page read and write
204E6D95000
trusted library allocation
page read and write
204E2243000
trusted library allocation
page read and write
204E25E9000
trusted library allocation
page read and write
204E002D000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204DFC33000
trusted library allocation
page read and write
204E279B000
trusted library allocation
page read and write
204DF6F7000
trusted library allocation
page read and write
204DEE8A000
trusted library allocation
page read and write
204E6C57000
trusted library allocation
page read and write
204E803D000
trusted library allocation
page read and write
204E15CE000
trusted library allocation
page read and write
204E7EA3000
trusted library allocation
page read and write
204E8824000
trusted library allocation
page read and write
204E9C5C000
trusted library allocation
page read and write
204DD0D1000
trusted library allocation
page read and write
204DFEBF000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E0097000
trusted library allocation
page read and write
204D5C2C000
heap
page read and write
204D5C32000
heap
page read and write
204DEDD8000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204D5C82000
heap
page read and write
204E11DF000
trusted library allocation
page read and write
204D5C9D000
heap
page read and write
204D5C48000
heap
page read and write
204DC515000
heap
page read and write
204E21DB000
trusted library allocation
page read and write
13E78FE000
unkown
page readonly
204DFC2C000
trusted library allocation
page read and write
204DEE78000
trusted library allocation
page read and write
204E783A000
trusted library allocation
page read and write
204E2038000
trusted library allocation
page read and write
204E6F17000
trusted library allocation
page read and write
204E87B5000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
204E1699000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204DBD0D000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204E6D41000
trusted library allocation
page read and write
204E0168000
trusted library allocation
page read and write
26FCBE5B000
trusted library allocation
page read and write
17C47A6C000
heap
page read and write
204DFCD1000
trusted library allocation
page read and write
204E6FE2000
trusted library allocation
page read and write
204E01A1000
trusted library allocation
page read and write
204DED5E000
trusted library allocation
page read and write
204E6FF0000
trusted library allocation
page read and write
204EAD13000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E8718000
trusted library allocation
page read and write
204DFE83000
trusted library allocation
page read and write
204D5C43000
heap
page read and write
204DEDD8000
trusted library allocation
page read and write
204DD062000
trusted library allocation
page read and write
204DA598000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
165E000
heap
page read and write
204D5C82000
heap
page read and write
204E00B5000
trusted library allocation
page read and write
17C47B58000
heap
page read and write
204E77F8000
trusted library allocation
page read and write
204EAE71000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6EA9000
trusted library allocation
page read and write
204E25C6000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204DFE0A000
trusted library allocation
page read and write
204DBD1F000
trusted library allocation
page read and write
204E25A7000
trusted library allocation
page read and write
6F6613E000
stack
page read and write
204E71FA000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E87B1000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E7CAA000
trusted library allocation
page read and write
204E78E7000
trusted library allocation
page read and write
204E0148000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C32000
heap
page read and write
204D5C2A000
heap
page read and write
204DEC78000
trusted library allocation
page read and write
204E78EF000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204E0170000
trusted library allocation
page read and write
204DBDBB000
trusted library allocation
page read and write
204DBB95000
trusted library allocation
page read and write
204DED9E000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
17C47A63000
heap
page read and write
204E0FC4000
trusted library allocation
page read and write
204E1685000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E6FD6000
trusted library allocation
page read and write
204E6FC3000
trusted library allocation
page read and write
2BBF6121000
trusted library allocation
page execute read
204E2058000
trusted library allocation
page read and write
204E6FE2000
trusted library allocation
page read and write
204E9C00000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
17C47B77000
heap
page read and write
164C000
heap
page read and write
26FCC000000
heap
page read and write
204E6BCF000
trusted library allocation
page read and write
204DBE7B000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204E16F8000
trusted library allocation
page read and write
204E7859000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E7C64000
trusted library allocation
page read and write
204E00DE000
trusted library allocation
page read and write
17C46EBC000
trusted library allocation
page read and write
204DEF52000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204DBD68000
trusted library allocation
page read and write
26FCBECA000
trusted library allocation
page read and write
204E6DE1000
trusted library allocation
page read and write
204E00F6000
trusted library allocation
page read and write
204E9220000
trusted library allocation
page read and write
204E778B000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204DED8F000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
26835200000
trusted library allocation
page read and write
204E218E000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204D5C24000
heap
page read and write
204E6FE2000
trusted library allocation
page read and write
204DF681000
trusted library allocation
page read and write
204DF6C3000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E15FA000
trusted library allocation
page read and write
204DC29D000
trusted library allocation
page read and write
204DF6E0000
trusted library allocation
page read and write
204E00C5000
trusted library allocation
page read and write
204E00A0000
trusted library allocation
page read and write
204E77A6000
trusted library allocation
page read and write
204E9CB1000
trusted library allocation
page read and write
204DC2C8000
trusted library allocation
page read and write
204DF7C3000
trusted library allocation
page read and write
26FCBEAE000
trusted library allocation
page read and write
204E9C85000
trusted library allocation
page read and write
204E228F000
trusted library allocation
page read and write
204E93E6000
trusted library allocation
page read and write
26FCBA60000
heap
page read and write
13E350B000
stack
page read and write
204D5C87000
heap
page read and write
204D5C78000
heap
page read and write
204E7CD4000
trusted library allocation
page read and write
204D5C08000
heap
page read and write
204E6EEB000
trusted library allocation
page read and write
204DF70B000
trusted library allocation
page read and write
204D5C39000
heap
page read and write
204E786B000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204E7832000
trusted library allocation
page read and write
204DEF38000
trusted library allocation
page read and write
1544000
heap
page read and write
204DBEF8000
trusted library allocation
page read and write
26FCBA40000
unclassified section
page readonly
204E0097000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204D5C46000
heap
page read and write
204E71FE000
trusted library allocation
page read and write
204E7C8C000
trusted library allocation
page read and write
204DF6E0000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E6FE2000
trusted library allocation
page read and write
204E71FE000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E2509000
trusted library allocation
page read and write
204E7CBE000
trusted library allocation
page read and write
204DEE78000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
17C47B58000
heap
page read and write
204DA5A9000
trusted library allocation
page read and write
204E70E7000
trusted library allocation
page read and write
204E7CAD000
trusted library allocation
page read and write
204E017A000
trusted library allocation
page read and write
204E6FC7000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E6F34000
trusted library allocation
page read and write
204E00EF000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E805C000
trusted library allocation
page read and write
BD661FD000
stack
page read and write
204DF7F3000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
17C4790C000
trusted library allocation
page read and write
204DBE16000
trusted library allocation
page read and write
204DFE4A000
trusted library allocation
page read and write
204E7E8B000
trusted library allocation
page read and write
204E7CAD000
trusted library allocation
page read and write
204DBD91000
trusted library allocation
page read and write
17C47B3B000
heap
page read and write
26FCBD10000
heap
page readonly
204EAE73000
trusted library allocation
page read and write
204E08F3000
trusted library allocation
page read and write
204E87FC000
trusted library allocation
page read and write
204DEE2F000
trusted library allocation
page read and write
204E78F1000
trusted library allocation
page read and write
204E6CE3000
trusted library allocation
page read and write
150E000
stack
page read and write
204D5C6F000
heap
page read and write
204DF6BD000
trusted library allocation
page read and write
204DF659000
trusted library allocation
page read and write
204E72AF000
trusted library allocation
page read and write
204D5C87000
heap
page read and write
204D5C5D000
heap
page read and write
204E25FB000
trusted library allocation
page read and write
204E7272000
trusted library allocation
page read and write
204E7CA9000
trusted library allocation
page read and write
204E6F57000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204E6B6F000
trusted library allocation
page read and write
204E2407000
trusted library allocation
page read and write
204DEC3C000
trusted library allocation
page read and write
204D5C1D000
heap
page read and write
204DFEE6000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
204E6FCB000
trusted library allocation
page read and write
204E7CDD000
trusted library allocation
page read and write
204E7CE3000
trusted library allocation
page read and write
204EAE80000
trusted library allocation
page read and write
204E21CD000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E7DC7000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E0083000
trusted library allocation
page read and write
204DC2F4000
trusted library allocation
page read and write
204E6CA6000
trusted library allocation
page read and write
204E00FE000
trusted library allocation
page read and write
204D5C28000
heap
page read and write
204E6C45000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E24DF000
trusted library allocation
page read and write
204E6FDA000
trusted library allocation
page read and write
204DF6A1000
trusted library allocation
page read and write
204E6C9F000
trusted library allocation
page read and write
204D5C4A000
heap
page read and write
204E6FDB000
trusted library allocation
page read and write
204DED78000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E6D95000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204DBE5E000
trusted library allocation
page read and write
204DEDDC000
trusted library allocation
page read and write
204E08ED000
trusted library allocation
page read and write
204D5C3F000
heap
page read and write
204E00B5000
trusted library allocation
page read and write
204E70EA000
trusted library allocation
page read and write
204EAE2F000
trusted library allocation
page read and write
204DFCD1000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E86FC000
trusted library allocation
page read and write
13BE000
stack
page read and write
204D5C2A000
heap
page read and write
204DD072000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
165E000
heap
page read and write
204DED95000
trusted library allocation
page read and write
204DC288000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E0FC9000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204E6CAD000
trusted library allocation
page read and write
204E255B000
trusted library allocation
page read and write
204E00CF000
trusted library allocation
page read and write
204D5C2C000
heap
page read and write
204D5C78000
heap
page read and write
204E6DA1000
trusted library allocation
page read and write
204DFC62000
trusted library allocation
page read and write
BD6843E000
unkown
page readonly
204D5C4F000
heap
page read and write
204DED47000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204DBBEE000
trusted library allocation
page read and write
204E7CCF000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204D5C3D000
heap
page read and write
204E6DFE000
trusted library allocation
page read and write
204DBB64000
trusted library allocation
page read and write
204E00D2000
trusted library allocation
page read and write
204EAE4C000
trusted library allocation
page read and write
26FCBF1F000
trusted library allocation
page read and write
204E801D000
trusted library allocation
page read and write
26835000000
heap
page read and write
204DF6E0000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204E2492000
trusted library allocation
page read and write
204DBD9A000
trusted library allocation
page read and write
204E6DD1000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204EADE1000
trusted library allocation
page read and write
204E7765000
trusted library allocation
page read and write
204E6D89000
trusted library allocation
page read and write
204DEC7A000
trusted library allocation
page read and write
1544000
heap
page read and write
204DEF52000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204DED5C000
trusted library allocation
page read and write
13E4FFE000
stack
page read and write
204D5C24000
heap
page read and write
204DED6C000
trusted library allocation
page read and write
204DEDFC000
trusted library allocation
page read and write
204D5CA2000
heap
page read and write
26FCBDA4000
heap
page read and write
26FCBD22000
unclassified section
page read and write
204D5C32000
heap
page read and write
204E8107000
trusted library allocation
page read and write
204E01CE000
trusted library allocation
page read and write
204D5C20000
heap
page read and write
204D5C1E000
heap
page read and write
204D5C6F000
heap
page read and write
204E783D000
trusted library allocation
page read and write
204E0099000
trusted library allocation
page read and write
26FCBE63000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204E008C000
trusted library allocation
page read and write
204E7852000
trusted library allocation
page read and write
17C47B3B000
heap
page read and write
204DEE6A000
trusted library allocation
page read and write
204E70C0000
trusted library allocation
page read and write
204DC4E3000
heap
page read and write
204D5C1E000
heap
page read and write
204E002C000
trusted library allocation
page read and write
204E6D9F000
trusted library allocation
page read and write
204E00A7000
trusted library allocation
page read and write
15B4000
heap
page read and write
204DFF0A000
trusted library allocation
page read and write
204E9BAE000
trusted library allocation
page read and write
204E7DB8000
trusted library allocation
page read and write
17C46E23000
trusted library allocation
page read and write
204DFC43000
trusted library allocation
page read and write
204E884F000
heap
page read and write
204EAE6F000
trusted library allocation
page read and write
204E72B6000
trusted library allocation
page read and write
204DEDBE000
trusted library allocation
page read and write
204D5C52000
heap
page read and write
DD0000
heap
page read and write
204DFC24000
trusted library allocation
page read and write
204E0183000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
BD6957E000
stack
page read and write
204E78A6000
trusted library allocation
page read and write
204E8783000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204E15C1000
trusted library allocation
page read and write
204E1197000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
26FCBF00000
trusted library allocation
page read and write
204DEF4E000
trusted library allocation
page read and write
204D5C6F000
heap
page read and write
204E6DD1000
trusted library allocation
page read and write
204E9BB6000
trusted library allocation
page read and write
204DBEBE000
trusted library allocation
page read and write
204E7DC5000
trusted library allocation
page read and write
204E6DCA000
trusted library allocation
page read and write
204E0F99000
trusted library allocation
page read and write
204E6CD9000
trusted library allocation
page read and write
204E88AA000
heap
page read and write
204E22EF000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204E7C9D000
trusted library allocation
page read and write
204DD0D2000
trusted library allocation
page read and write
204DBB8F000
trusted library allocation
page read and write
204DEFFD000
trusted library allocation
page read and write
204E702D000
trusted library allocation
page read and write
204D5C82000
heap
page read and write
204E6D9F000
trusted library allocation
page read and write
204E019F000
trusted library allocation
page read and write
204D5C48000
heap
page read and write
204E6FB0000
trusted library allocation
page read and write
204E0056000
trusted library allocation
page read and write
13E60FE000
stack
page read and write
204D5C2F000
heap
page read and write
204E7CCF000
trusted library allocation
page read and write
204DD063000
trusted library allocation
page read and write
204DFC65000
trusted library allocation
page read and write
204DEE71000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204DEE4E000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204D5C82000
heap
page read and write
204E7CE9000
trusted library allocation
page read and write
204E70D6000
trusted library allocation
page read and write
204E716A000
trusted library allocation
page read and write
204DF6FE000
trusted library allocation
page read and write
204E8042000
trusted library allocation
page read and write
204E71DB000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
204E8759000
trusted library allocation
page read and write
204DED7B000
trusted library allocation
page read and write
204E71C7000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C2A000
heap
page read and write
204D5C70000
heap
page read and write
26FCBE12000
trusted library allocation
page read and write
17C46E9F000
trusted library allocation
page read and write
204E87C3000
trusted library allocation
page read and write
204E6FFC000
trusted library allocation
page read and write
204E6D95000
trusted library allocation
page read and write
800000
unkown
page readonly
204E0073000
trusted library allocation
page read and write
204E014F000
trusted library allocation
page read and write
204E009D000
trusted library allocation
page read and write
204E8785000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204DEFCB000
trusted library allocation
page read and write
204DD0DB000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204DBE62000
trusted library allocation
page read and write
204D5CA2000
heap
page read and write
204DF647000
trusted library allocation
page read and write
204DFC16000
trusted library allocation
page read and write
204E6FBB000
trusted library allocation
page read and write
204D5C77000
heap
page read and write
204E93DF000
trusted library allocation
page read and write
204E2097000
trusted library allocation
page read and write
204DFC9A000
trusted library allocation
page read and write
204D5C45000
heap
page read and write
26834E8F000
trusted library allocation
page read and write
204E2162000
trusted library allocation
page read and write
204E00A7000
trusted library allocation
page read and write
204E1691000
trusted library allocation
page read and write
204E78E9000
trusted library allocation
page read and write
204E7789000
trusted library allocation
page read and write
204DBDE6000
trusted library allocation
page read and write
204DD01D000
trusted library allocation
page read and write
204E93D1000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E6CA1000
trusted library allocation
page read and write
204DBB95000
trusted library allocation
page read and write
204E6F4C000
trusted library allocation
page read and write
17C46E2F000
trusted library allocation
page read and write
204DC512000
heap
page read and write
204E11E8000
trusted library allocation
page read and write
204D5C2F000
heap
page read and write
204DEFBF000
trusted library allocation
page read and write
204D5C35000
heap
page read and write
204DBEC7000
trusted library allocation
page read and write
204E9C61000
trusted library allocation
page read and write
204D5C4F000
heap
page read and write
204DFC50000
trusted library allocation
page read and write
204E6CBC000
trusted library allocation
page read and write
204E88AA000
heap
page read and write
204E7845000
trusted library allocation
page read and write
204DECA5000
trusted library allocation
page read and write
204DF6E0000
trusted library allocation
page read and write
204E0056000
trusted library allocation
page read and write
13E3FD8000
stack
page read and write
204DEF3A000
trusted library allocation
page read and write
17C47380000
trusted library section
page readonly
204D5C6F000
heap
page read and write
204DEE84000
trusted library allocation
page read and write
204E8781000
trusted library allocation
page read and write
204DEDA1000
trusted library allocation
page read and write
204D5C1E000
heap
page read and write
204E254F000
trusted library allocation
page read and write
204DED7F000
trusted library allocation
page read and write
1C53E1E0000
heap
page read and write
204E71B4000
trusted library allocation
page read and write
204E224D000
trusted library allocation
page read and write
204D5C47000
heap
page read and write
204E6DFB000
trusted library allocation
page read and write
13CE000
stack
page read and write
204E6C65000
trusted library allocation
page read and write
204E00D6000
trusted library allocation
page read and write
204E00C5000
trusted library allocation
page read and write
204E80A0000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E25D1000
trusted library allocation
page read and write
26FCBEA7000
trusted library allocation
page read and write
204DFC36000
trusted library allocation
page read and write
204E784E000
trusted library allocation
page read and write
204D5C7C000
heap
page read and write
204DFEE0000
trusted library allocation
page read and write
204EAE56000
trusted library allocation
page read and write
204DEE56000
trusted library allocation
page read and write
204DFC53000
trusted library allocation
page read and write
204E25CC000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C71000
heap
page read and write
204E78B6000
trusted library allocation
page read and write
204E00B5000
trusted library allocation
page read and write
1F4527DB000
heap
page read and write
204DAC96000
trusted library allocation
page read and write
204D5C22000
heap
page read and write
204E8027000
trusted library allocation
page read and write
26FCBDA0000
heap
page read and write
204D5C2C000
heap
page read and write
204D5C7C000
heap
page read and write
204E7C95000
trusted library allocation
page read and write
204E93CD000
trusted library allocation
page read and write
204E0053000
trusted library allocation
page read and write
204EA06A000
trusted library allocation
page read and write
204EA88C000
trusted library allocation
page read and write
204DAB23000
trusted library allocation
page read and write
204E166B000
trusted library allocation
page read and write
204DFC1F000
trusted library allocation
page read and write
17C47B6A000
heap
page read and write
26FCBE98000
trusted library allocation
page read and write
204E6CC8000
trusted library allocation
page read and write
204E6FFE000
trusted library allocation
page read and write
204E7CB4000
trusted library allocation
page read and write
204EAEC4000
trusted library allocation
page read and write
204DFE4C000
trusted library allocation
page read and write
204E00CF000
trusted library allocation
page read and write
204E0097000
trusted library allocation
page read and write
204E0046000
trusted library allocation
page read and write
204DF636000
trusted library allocation
page read and write
204E801F000
trusted library allocation
page read and write
204E8037000
trusted library allocation
page read and write
204E019F000
trusted library allocation
page read and write
204DFEE0000
trusted library allocation
page read and write
204DEDC4000
trusted library allocation
page read and write
204E7ED2000
trusted library allocation
page read and write
204D5C5D000
heap
page read and write
204E6FFA000
trusted library allocation
page read and write
204E7CD4000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
26FCBD20000
unclassified section
page read and write
204D5C1E000
heap
page read and write
204DEC9E000
trusted library allocation
page read and write
204DF68C000
trusted library allocation
page read and write
26FCBB60000
heap
page read and write
204DED50000
trusted library allocation
page read and write
204D5C22000
heap
page read and write
204E6F88000
trusted library allocation
page read and write
204D5C71000
heap
page read and write
204E6DD3000
trusted library allocation
page read and write
204DFEDA000
trusted library allocation
page read and write
1664000
heap
page read and write
204DFE7A000
trusted library allocation
page read and write
204E00C1000
trusted library allocation
page read and write
204E8777000
trusted library allocation
page read and write
204E21A8000
trusted library allocation
page read and write
204DFC40000
trusted library allocation
page read and write
204DACF9000
trusted library allocation
page read and write
204DF7ED000
trusted library allocation
page read and write
26834E77000
trusted library allocation
page read and write
204DEC9E000
trusted library allocation
page read and write
204E6F4C000
trusted library allocation
page read and write
26FCBF19000
trusted library allocation
page read and write
204D5C32000
heap
page read and write
204E004C000
trusted library allocation
page read and write
204DED64000
trusted library allocation
page read and write
204E7DF1000
trusted library allocation
page read and write
204E88AB000
heap
page read and write
204E6C7C000
trusted library allocation
page read and write
204E15DD000
trusted library allocation
page read and write
204E93E4000
trusted library allocation
page read and write
204D5C2A000
heap
page read and write
204D5C5D000
heap
page read and write
204DEE71000
trusted library allocation
page read and write
204DBDBB000
trusted library allocation
page read and write
204E6DF2000
trusted library allocation
page read and write
204E27E2000
trusted library allocation
page read and write
204DAC82000
trusted library allocation
page read and write
204DEE2F000
trusted library allocation
page read and write
204E7809000
trusted library allocation
page read and write
204E6FB0000
trusted library allocation
page read and write
204DEDBC000
trusted library allocation
page read and write
204E9D24000
trusted library allocation
page read and write
204DAD00000
trusted library allocation
page read and write
204DA5B3000
trusted library allocation
page read and write
13E70FE000
stack
page read and write
17C47A4D000
heap
page read and write
204E019F000
trusted library allocation
page read and write
204E6FEA000
trusted library allocation
page read and write
204E20EE000
trusted library allocation
page read and write
204D5C78000
heap
page read and write
204E6D3D000
trusted library allocation
page read and write
26834E13000
trusted library allocation
page read and write
204E80C7000
trusted library allocation
page read and write
17C46E14000
trusted library allocation
page read and write
204E889C000
heap
page read and write
26FCBA20000
remote allocation
page read and write
26834EF6000
trusted library allocation
page read and write
204E6C41000
trusted library allocation
page read and write
204E6B6B000
trusted library allocation
page read and write
204E86C1000
trusted library allocation
page read and write
17C47A69000
heap
page read and write
204E2053000
trusted library allocation
page read and write
1F4527EF000
heap
page read and write
204DFE83000
trusted library allocation
page read and write
204DEF99000
trusted library allocation
page read and write
6F6797E000
stack
page read and write
204EAE60000
trusted library allocation
page read and write
204E27E2000
trusted library allocation
page read and write
204D5C24000
heap
page read and write
204D5C5D000
heap
page read and write
204D5C6F000
heap
page read and write
204DF6E6000
trusted library allocation
page read and write
26834E24000
trusted library allocation
page read and write
204EAEFA000
trusted library allocation
page read and write
204E0023000
trusted library allocation
page read and write
204DF7ED000
trusted library allocation
page read and write
204DBDBB000
trusted library allocation
page read and write
204E00C4000
trusted library allocation
page read and write
There are 3940 hidden memdumps, click here to show them.