IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cf40411f-ba1f-4c9b-b9c4-fb318c168abe.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_cf40411f-ba1f-4c9b-b9c4-fb318c168abe.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\v6zchhhv.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AZRQDYL5OGRXEU0LI60O.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MZQL2Z21UWTMD50MN4IF.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 27267 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 27267 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2196 -parentBuildID 20230927232528 -prefsHandle 2108 -prefMapHandle 2056 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef464ed5-9094-4688-a292-80196e98cb86} 6488 "\\.\pipe\gecko-crash-server-pipe.6488" 204fae6e910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3868 -prefMapHandle 3888 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {12a61a49-e04c-49ed-bb6c-48c4ab798e72} 6488 "\\.\pipe\gecko-crash-server-pipe.6488" 20492a9ba10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3252 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3188 -prefMapHandle 3200 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {acbe668f-b23f-4d64-845f-e0072f837971} 6488 "\\.\pipe\gecko-crash-server-pipe.6488" 204fae6ed10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://exslt.org/dates-and-times
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.252.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.23
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.23.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
52.222.236.23
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
2048C3D6000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
20495BCC000
trusted library allocation
page read and write
20488350000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204962CA000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
2048AEB6000
heap
page read and write
20496767000
trusted library allocation
page read and write
2048A7F9000
trusted library allocation
page read and write
1D6AE1EE000
heap
page read and write
204FCBE1000
heap
page read and write
20492D5B000
trusted library allocation
page read and write
204FEEEF000
trusted library allocation
page read and write
20492E39000
trusted library allocation
page read and write
2048B143000
trusted library allocation
page read and write
204FF7DE000
trusted library allocation
page read and write
2048B9D1000
trusted library allocation
page read and write
2048A733000
trusted library allocation
page read and write
204966D8000
trusted library allocation
page read and write
204FED4D000
trusted library allocation
page read and write
2048C3AE000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
20492D81000
trusted library allocation
page read and write
2048A796000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
20495C77000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
204FCC3D000
heap
page read and write
204FCC3E000
heap
page read and write
204FCC32000
heap
page read and write
2048AEFE000
heap
page read and write
1DF08B40000
heap
page read and write
204966DC000
trusted library allocation
page read and write
1F79727F000
unclassified section
page read and write
16B4000
heap
page read and write
204FCBE3000
heap
page read and write
2048B952000
trusted library allocation
page read and write
2048C3B1000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
204FCBDF000
heap
page read and write
204946B6000
trusted library allocation
page read and write
2049597F000
trusted library allocation
page read and write
204FFCA8000
trusted library allocation
page read and write
2048C29B000
trusted library allocation
page read and write
2048D809000
trusted library allocation
page read and write
2049313D000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
2288FFF000
stack
page read and write
204FF500000
trusted library allocation
page read and write
1F797516000
trusted library allocation
page read and write
1D6AE15C000
heap
page read and write
2048B996000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
204FCC3E000
heap
page read and write
20496F00000
trusted library allocation
page read and write
20495982000
trusted library allocation
page read and write
204FF7ED000
trusted library allocation
page read and write
204930F7000
trusted library allocation
page read and write
20495A3D000
trusted library allocation
page read and write
2048C4BA000
trusted library allocation
page read and write
204FCC32000
heap
page read and write
204FCBD7000
heap
page read and write
204FCC07000
heap
page read and write
2048B1D2000
trusted library allocation
page read and write
2048C4E6000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2048CA9E000
trusted library allocation
page read and write
204FCBDD000
heap
page read and write
20497396000
trusted library allocation
page read and write
2E5DE8A0000
heap
page read and write
204FCC07000
heap
page read and write
20495F2D000
trusted library allocation
page read and write
20495E6B000
trusted library allocation
page read and write
20493151000
trusted library allocation
page read and write
1D6AE017000
trusted library allocation
page read and write
1D6AE1E9000
heap
page read and write
204FCC31000
heap
page read and write
1DF08F00000
trusted library allocation
page read and write
204FF41A000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
2048C3F0000
trusted library allocation
page read and write
1D6AD65C000
trusted library allocation
page read and write
204FEEEF000
trusted library allocation
page read and write
20496749000
trusted library allocation
page read and write
204930AC000
trusted library allocation
page read and write
204FCBEB000
heap
page read and write
204FF462000
trusted library allocation
page read and write
2E5DEC7B000
trusted library allocation
page read and write
20488378000
trusted library allocation
page read and write
2048A661000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20496D00000
trusted library allocation
page read and write
204FF4E3000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
2048A6D0000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20492BB2000
trusted library allocation
page read and write
204FEEDF000
trusted library allocation
page read and write
2048CA6A000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
2049751F000
trusted library allocation
page read and write
16B4000
heap
page read and write
1D6AD400000
trusted library allocation
page read and write
2048CADC000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
2048B2A4000
trusted library allocation
page read and write
1D6AE16C000
heap
page read and write
1D6AE267000
heap
page read and write
20496767000
trusted library allocation
page read and write
2048B911000
trusted library allocation
page read and write
204FEE6D000
trusted library allocation
page read and write
204963F3000
trusted library allocation
page read and write
204960B6000
trusted library allocation
page read and write
20492B86000
trusted library allocation
page read and write
2048D830000
trusted library allocation
page read and write
2048B3A9000
trusted library allocation
page read and write
2048A6A4000
trusted library allocation
page read and write
20496228000
trusted library allocation
page read and write
2048B69C000
trusted library allocation
page read and write
2048A6A9000
trusted library allocation
page read and write
20492D43000
trusted library allocation
page read and write
20496080000
trusted library allocation
page read and write
204FF4A0000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
204FCBE9000
heap
page read and write
20496230000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
20495BF7000
trusted library allocation
page read and write
20495ED2000
trusted library allocation
page read and write
20495945000
trusted library allocation
page read and write
2048D85D000
trusted library allocation
page read and write
2048ABC9000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
20496117000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20494332000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
204FF712000
trusted library allocation
page read and write
204FCBDD000
heap
page read and write
204FCBE5000
heap
page read and write
204FCC31000
heap
page read and write
20495E32000
trusted library allocation
page read and write
204930B0000
trusted library allocation
page read and write
2048D861000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
1D6AE1F1000
heap
page read and write
20492DDB000
trusted library allocation
page read and write
2049447C000
trusted library allocation
page read and write
20495FF7000
trusted library allocation
page read and write
20496125000
trusted library allocation
page read and write
1D6AE100000
heap
page read and write
2048CAA5000
trusted library allocation
page read and write
20494E85000
trusted library allocation
page read and write
204931C5000
trusted library allocation
page read and write
20495BD0000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
20495F29000
trusted library allocation
page read and write
204931DE000
trusted library allocation
page read and write
2048F001000
heap
page read and write
2048B998000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048CACD000
trusted library allocation
page read and write
204FF4A3000
trusted library allocation
page read and write
20492AEC000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
20492D83000
trusted library allocation
page read and write
20495F2D000
trusted library allocation
page read and write
2048C4C3000
trusted library allocation
page read and write
204962CA000
trusted library allocation
page read and write
204FF475000
trusted library allocation
page read and write
1DF08E60000
heap
page read and write
2048A66B000
trusted library allocation
page read and write
1D6AE169000
heap
page read and write
2048E553000
trusted library allocation
page read and write
2048A653000
trusted library allocation
page read and write
20496389000
trusted library allocation
page read and write
204959B8000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
204FCBE5000
heap
page read and write
2048ABA5000
trusted library allocation
page read and write
2048C3D6000
trusted library allocation
page read and write
2048E443000
trusted library allocation
page read and write
20496043000
trusted library allocation
page read and write
2048D9E7000
trusted library allocation
page read and write
20495CD9000
trusted library allocation
page read and write
20496789000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
20492D8D000
trusted library allocation
page read and write
2049599A000
trusted library allocation
page read and write
2048CA8B000
trusted library allocation
page read and write
1F797270000
unclassified section
page read and write
20496785000
trusted library allocation
page read and write
474000
unkown
page readonly
2049623B000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
20492D9C000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
20496785000
trusted library allocation
page read and write
1DF0A7BE000
heap
page read and write
2049677F000
trusted library allocation
page read and write
20494476000
trusted library allocation
page read and write
2048B277000
trusted library allocation
page read and write
204966EA000
trusted library allocation
page read and write
2048AE95000
heap
page read and write
2048B93E000
trusted library allocation
page read and write
20492D9C000
trusted library allocation
page read and write
204963CE000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204FCC04000
heap
page read and write
20494E89000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
2049449E000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
1DF08EF5000
heap
page read and write
204883CA000
trusted library allocation
page read and write
1D6AE267000
heap
page read and write
20495934000
trusted library allocation
page read and write
204FCC3D000
heap
page read and write
20496783000
trusted library allocation
page read and write
20494E85000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
204FCBE6000
heap
page read and write
2048CA57000
trusted library allocation
page read and write
204FF4DB000
trusted library allocation
page read and write
20492A32000
trusted library allocation
page read and write
2048C905000
trusted library allocation
page read and write
2049679B000
trusted library allocation
page read and write
2049632D000
trusted library allocation
page read and write
2049672B000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
2048A6AB000
trusted library allocation
page read and write
20495F44000
trusted library allocation
page read and write
2048AE91000
heap
page read and write
20496078000
trusted library allocation
page read and write
204963C6000
trusted library allocation
page read and write
2048CAC9000
trusted library allocation
page read and write
204FF7E6000
trusted library allocation
page read and write
20495EC9000
trusted library allocation
page read and write
204931FC000
trusted library allocation
page read and write
20496745000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048F001000
heap
page read and write
2E5DEE3F000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
2049446D000
trusted library allocation
page read and write
20492BD9000
trusted library allocation
page read and write
2048B3FC000
trusted library allocation
page read and write
12F11D8000
stack
page read and write
2048B998000
trusted library allocation
page read and write
20488334000
trusted library allocation
page read and write
20496739000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
20495F44000
trusted library allocation
page read and write
2048AB7E000
trusted library allocation
page read and write
204FF7BA000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
204881AA000
trusted library allocation
page read and write
204FFC9A000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048CAAE000
trusted library allocation
page read and write
2049616D000
trusted library allocation
page read and write
20496125000
trusted library allocation
page read and write
2048D88C000
trusted library allocation
page read and write
20496296000
trusted library allocation
page read and write
2049635D000
trusted library allocation
page read and write
2048A643000
trusted library allocation
page read and write
2048E57E000
trusted library allocation
page read and write
2049433C000
trusted library allocation
page read and write
204FCBD6000
heap
page read and write
2049616D000
trusted library allocation
page read and write
2048C324000
trusted library allocation
page read and write
2048C4AD000
trusted library allocation
page read and write
1D6AE1B9000
heap
page read and write
2048ABF0000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204963DB000
trusted library allocation
page read and write
204959DF000
trusted library allocation
page read and write
2048D869000
trusted library allocation
page read and write
1F797290000
heap
page read and write
204FCC42000
heap
page read and write
20494DD6000
trusted library allocation
page read and write
2048C4B1000
trusted library allocation
page read and write
2048B3D2000
trusted library allocation
page read and write
2048B39B000
trusted library allocation
page read and write
204FCBF5000
heap
page read and write
FA139FE000
stack
page read and write
2048E53C000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
20495AF9000
trusted library allocation
page read and write
1D6AE1B2000
heap
page read and write
204FF7F4000
trusted library allocation
page read and write
20495F72000
trusted library allocation
page read and write
2048D841000
trusted library allocation
page read and write
20494447000
trusted library allocation
page read and write
170F000
heap
page read and write
20496A22000
trusted library allocation
page read and write
2048A696000
trusted library allocation
page read and write
204963C0000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
20488369000
trusted library allocation
page read and write
204966D8000
trusted library allocation
page read and write
20492BDC000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
20494F01000
trusted library allocation
page read and write
2048ABE1000
trusted library allocation
page read and write
2048C433000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
204FEEAD000
trusted library allocation
page read and write
20494476000
trusted library allocation
page read and write
2049633E000
trusted library allocation
page read and write
20492B82000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
20488348000
trusted library allocation
page read and write
204931D5000
trusted library allocation
page read and write
20496023000
trusted library allocation
page read and write
2048C800000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
2E5DEA26000
heap
page read and write
20495EB1000
trusted library allocation
page read and write
20496333000
trusted library allocation
page read and write
1DF0A7BF000
heap
page read and write
2048ABC7000
trusted library allocation
page read and write
20496A0F000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204963FB000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
16FF000
heap
page read and write
204FCC18000
heap
page read and write
20496021000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
204931DE000
trusted library allocation
page read and write
2048F0BD000
heap
page read and write
204963A7000
trusted library allocation
page read and write
2048C453000
trusted library allocation
page read and write
2E5DE9F0000
heap
page read and write
204FCC0D000
heap
page read and write
20496064000
trusted library allocation
page read and write
204FEE46000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
204959CE000
trusted library allocation
page read and write
2E5DEA62000
unclassified section
page read and write
20495F1B000
trusted library allocation
page read and write
204FCC3A000
heap
page read and write
2E5DEC03000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
204FCBE3000
heap
page read and write
204FCBD8000
heap
page read and write
2048C3F0000
trusted library allocation
page read and write
204931D5000
trusted library allocation
page read and write
204FEDDF000
trusted library allocation
page read and write
20493023000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
16B4000
heap
page read and write
204FCBE1000
heap
page read and write
2048ABBE000
trusted library allocation
page read and write
20496080000
trusted library allocation
page read and write
204FF7D5000
trusted library allocation
page read and write
2049622D000
trusted library allocation
page read and write
20495CE4000
trusted library allocation
page read and write
2048B952000
trusted library allocation
page read and write
20495F2D000
trusted library allocation
page read and write
2048C48A000
trusted library allocation
page read and write
20495BE9000
trusted library allocation
page read and write
20492FD9000
trusted library allocation
page read and write
2048B1B0000
trusted library allocation
page read and write
46C000
unkown
page read and write
1D6AE1E3000
heap
page read and write
204FEDB3000
trusted library allocation
page read and write
204FCBEA000
heap
page read and write
20496A13000
trusted library allocation
page read and write
20488377000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
20492B76000
trusted library allocation
page read and write
2048A63B000
trusted library allocation
page read and write
20495F05000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048ABA7000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
20495EB8000
trusted library allocation
page read and write
20495ECC000
trusted library allocation
page read and write
2048CAC6000
trusted library allocation
page read and write
20496049000
trusted library allocation
page read and write
1D6AE160000
heap
page read and write
204FCBDF000
heap
page read and write
20495CCB000
trusted library allocation
page read and write
204FEEDF000
trusted library allocation
page read and write
20494E66000
trusted library allocation
page read and write
20492EE0000
trusted library allocation
page read and write
204963AD000
trusted library allocation
page read and write
20492DB7000
trusted library allocation
page read and write
2E5DE9FA000
heap
page read and write
2048C2CF000
trusted library allocation
page read and write
2048B947000
trusted library allocation
page read and write
2048CADC000
trusted library allocation
page read and write
20495F2F000
trusted library allocation
page read and write
20495B41000
trusted library allocation
page read and write
2048D8AB000
trusted library allocation
page read and write
2049678B000
trusted library allocation
page read and write
204FED9E000
trusted library allocation
page read and write
20496049000
trusted library allocation
page read and write
20495CDB000
trusted library allocation
page read and write
1690000
heap
page read and write
204FCBDF000
heap
page read and write
FA129D8000
stack
page read and write
2048A667000
trusted library allocation
page read and write
204FCBDB000
heap
page read and write
1D6AE160000
heap
page read and write
2048C3B6000
trusted library allocation
page read and write
2048CABE000
trusted library allocation
page read and write
1D6AE221000
heap
page read and write
20496026000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
1D6AE221000
heap
page read and write
2048A79D000
trusted library allocation
page read and write
20492BE1000
trusted library allocation
page read and write
20495F55000
trusted library allocation
page read and write
20495EFB000
trusted library allocation
page read and write
20495F20000
trusted library allocation
page read and write
204962B2000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
2048A66B000
trusted library allocation
page read and write
2048AEF5000
heap
page read and write
2048A66B000
trusted library allocation
page read and write
20488369000
trusted library allocation
page read and write
204FEE9A000
trusted library allocation
page read and write
2048CAC2000
trusted library allocation
page read and write
2048AEA8000
heap
page read and write
2049633E000
trusted library allocation
page read and write
20494E59000
trusted library allocation
page read and write
2048DAED000
trusted library allocation
page read and write
2048B60F000
trusted library allocation
page read and write
204FF766000
trusted library allocation
page read and write
204962B2000
trusted library allocation
page read and write
2048B3D9000
trusted library allocation
page read and write
2048A671000
trusted library allocation
page read and write
2048CAD2000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
2E5DEC60000
trusted library allocation
page read and write
2048A657000
trusted library allocation
page read and write
2048ABE2000
trusted library allocation
page read and write
278CD21000
trusted library allocation
page execute read
2048A653000
trusted library allocation
page read and write
2048AB1C000
trusted library allocation
page read and write
20496167000
trusted library allocation
page read and write
1F7975B5000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204FCBD0000
heap
page read and write
2048F001000
heap
page read and write
2048C359000
trusted library allocation
page read and write
2048B97E000
trusted library allocation
page read and write
20492E82000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
2049447C000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204FCBD2000
heap
page read and write
1D6AD2EA000
heap
page read and write
20496021000
trusted library allocation
page read and write
20492ECD000
trusted library allocation
page read and write
2048C3BD000
trusted library allocation
page read and write
20496A1B000
trusted library allocation
page read and write
20492FCF000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204FCC39000
heap
page read and write
20492EF5000
trusted library allocation
page read and write
20492E96000
trusted library allocation
page read and write
2048CA57000
trusted library allocation
page read and write
2048CAD5000
trusted library allocation
page read and write
2048E4E3000
trusted library allocation
page read and write
20492D93000
trusted library allocation
page read and write
2049676A000
trusted library allocation
page read and write
2049676A000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204963AD000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
2048A6FE000
trusted library allocation
page read and write
204963DB000
trusted library allocation
page read and write
20492B84000
trusted library allocation
page read and write
1D6AD2AF000
unclassified section
page read and write
20492B6D000
trusted library allocation
page read and write
204FF712000
trusted library allocation
page read and write
1D6AE14D000
heap
page read and write
2049595A000
trusted library allocation
page read and write
20495F20000
trusted library allocation
page read and write
204946AC000
trusted library allocation
page read and write
204FF417000
trusted library allocation
page read and write
2048C3F0000
trusted library allocation
page read and write
2048C32A000
trusted library allocation
page read and write
20492DDB000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
2048A67B000
trusted library allocation
page read and write
1D6AD610000
trusted library allocation
page read and write
204960D0000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
204960E0000
trusted library allocation
page read and write
2048B9BC000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
20493139000
trusted library allocation
page read and write
1D6AD5F4000
heap
page read and write
2048B9F4000
trusted library allocation
page read and write
2048C3E6000
trusted library allocation
page read and write
2048B3BD000
trusted library allocation
page read and write
204963CE000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
204FEE69000
trusted library allocation
page read and write
1DF08C61000
heap
page read and write
20496064000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
2048E583000
trusted library allocation
page read and write
204963CA000
trusted library allocation
page read and write
2048B9C1000
trusted library allocation
page read and write
4110000
heap
page read and write
204FF4FE000
trusted library allocation
page read and write
2049438D000
trusted library allocation
page read and write
204930EC000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
2048B98B000
trusted library allocation
page read and write
1D6AD661000
trusted library allocation
page read and write
1D6AD65F000
trusted library allocation
page read and write
204FEE86000
trusted library allocation
page read and write
16A0000
heap
page read and write
2049676B000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048A6ED000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
20496227000
trusted library allocation
page read and write
20495CED000
trusted library allocation
page read and write
204946FD000
trusted library allocation
page read and write
20492D7E000
trusted library allocation
page read and write
2048A6BC000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
2048B6BB000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
20494476000
trusted library allocation
page read and write
204967B0000
trusted library allocation
page read and write
2048B38B000
trusted library allocation
page read and write
204959A9000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
2049632F000
trusted library allocation
page read and write
2048D826000
trusted library allocation
page read and write
204962AA000
trusted library allocation
page read and write
2048CA5F000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
2048CA8F000
trusted library allocation
page read and write
204FCC05000
heap
page read and write
20495ECC000
trusted library allocation
page read and write
22867FF000
stack
page read and write
2048C325000
trusted library allocation
page read and write
204FF7E6000
trusted library allocation
page read and write
20492BCD000
trusted library allocation
page read and write
20495BD0000
trusted library allocation
page read and write
20492B80000
trusted library allocation
page read and write
2048B9D1000
trusted library allocation
page read and write
2048B6F5000
trusted library allocation
page read and write
204960BB000
trusted library allocation
page read and write
2048ABC9000
trusted library allocation
page read and write
1F797500000
trusted library allocation
page read and write
C22EAFE000
unkown
page readonly
20488382000
trusted library allocation
page read and write
1D6AE267000
heap
page read and write
204FCC02000
heap
page read and write
170F000
heap
page read and write
204963BC000
trusted library allocation
page read and write
2048B3F6000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
20496230000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
2049598C000
trusted library allocation
page read and write
2049318E000
trusted library allocation
page read and write
170F000
heap
page read and write
20492B88000
trusted library allocation
page read and write
2049447C000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204962CA000
trusted library allocation
page read and write
20496050000
trusted library allocation
page read and write
20495CD9000
trusted library allocation
page read and write
204959B6000
trusted library allocation
page read and write
2048D9DF000
trusted library allocation
page read and write
2048AB91000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
204963DB000
trusted library allocation
page read and write
1D6AD6AF000
trusted library allocation
page read and write
204FFCC7000
trusted library allocation
page read and write
2048D8C8000
trusted library allocation
page read and write
204FEE94000
trusted library allocation
page read and write
2048B14E000
trusted library allocation
page read and write
204FF7FC000
trusted library allocation
page read and write
204FCC40000
heap
page read and write
2048D7E4000
trusted library allocation
page read and write
2048B288000
trusted library allocation
page read and write
204FEE97000
trusted library allocation
page read and write
2049446D000
trusted library allocation
page read and write
2048C3F1000
trusted library allocation
page read and write
204FEE8B000
trusted library allocation
page read and write
1D6AD612000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
2E5DECA9000
trusted library allocation
page read and write
2048B2A4000
trusted library allocation
page read and write
2048CA7B000
trusted library allocation
page read and write
20492B95000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
2048C453000
trusted library allocation
page read and write
2048C3A5000
trusted library allocation
page read and write
204967F3000
trusted library allocation
page read and write
1D6AE1F2000
heap
page read and write
204FCBE1000
heap
page read and write
204FCBE1000
heap
page read and write
204FCC31000
heap
page read and write
2048A794000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
204959B8000
trusted library allocation
page read and write
204946FD000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
20495BE2000
trusted library allocation
page read and write
20496221000
trusted library allocation
page read and write
2E5DEC0D000
trusted library allocation
page read and write
204FCC40000
heap
page read and write
204967D6000
trusted library allocation
page read and write
2048A640000
trusted library allocation
page read and write
204FED90000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2049632F000
trusted library allocation
page read and write
2E5DE9B0000
heap
page read and write
20496765000
trusted library allocation
page read and write
20496A18000
trusted library allocation
page read and write
2048B38B000
trusted library allocation
page read and write
1D6AE22A000
heap
page read and write
2048CA86000
trusted library allocation
page read and write
20492A00000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
2048A653000
trusted library allocation
page read and write
1D6AD60A000
trusted library allocation
page read and write
20492BFB000
trusted library allocation
page read and write
2048A7EE000
trusted library allocation
page read and write
2048D826000
trusted library allocation
page read and write
2048B28C000
trusted library allocation
page read and write
2048AE91000
heap
page read and write
20496799000
trusted library allocation
page read and write
204930EE000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
204962A1000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204FCC07000
heap
page read and write
2048F006000
heap
page read and write
204FCC0C000
heap
page read and write
204FCC0D000
heap
page read and write
204931C5000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
204961CD000
trusted library allocation
page read and write
2048A6B5000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
2048AB3B000
trusted library allocation
page read and write
20495A53000
trusted library allocation
page read and write
1F797254000
heap
page read and write
2048B183000
trusted library allocation
page read and write
1D6AE169000
heap
page read and write
204930E2000
trusted library allocation
page read and write
2048D9F3000
trusted library allocation
page read and write
2048D982000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
2048B398000
trusted library allocation
page read and write
2048A675000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048A6F5000
trusted library allocation
page read and write
2048CADA000
trusted library allocation
page read and write
2048C3D5000
trusted library allocation
page read and write
204883F4000
trusted library allocation
page read and write
204963D1000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
204967F6000
trusted library allocation
page read and write
204FFCF2000
trusted library allocation
page read and write
204962DA000
trusted library allocation
page read and write
2049667B000
trusted library allocation
page read and write
204FF7D5000
trusted library allocation
page read and write
2048B98B000
trusted library allocation
page read and write
20492D91000
trusted library allocation
page read and write
2049449E000
trusted library allocation
page read and write
2048B366000
trusted library allocation
page read and write
204FEE97000
trusted library allocation
page read and write
204FF4D1000
trusted library allocation
page read and write
226A29F0000
heap
page read and write
204FCC31000
heap
page read and write
2048A640000
trusted library allocation
page read and write
20496014000
trusted library allocation
page read and write
204960E0000
trusted library allocation
page read and write
2048A6ED000
trusted library allocation
page read and write
20496751000
trusted library allocation
page read and write
2048A7D7000
trusted library allocation
page read and write
204962CD000
trusted library allocation
page read and write
20492ED8000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
20494334000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
20492DC3000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
2048C433000
trusted library allocation
page read and write
2048F05D000
heap
page read and write
2048B2CD000
trusted library allocation
page read and write
20494DBA000
trusted library allocation
page read and write
20492AE3000
trusted library allocation
page read and write
20496167000
trusted library allocation
page read and write
20495F7A000
trusted library allocation
page read and write
20492AF5000
trusted library allocation
page read and write
2048B6DB000
trusted library allocation
page read and write
2048E4D3000
trusted library allocation
page read and write
2048837B000
trusted library allocation
page read and write
2048B2CD000
trusted library allocation
page read and write
2048D852000
trusted library allocation
page read and write
2048ABE9000
trusted library allocation
page read and write
2048B2CD000
trusted library allocation
page read and write
20492D81000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048B3FC000
trusted library allocation
page read and write
2048E4E5000
trusted library allocation
page read and write
204960BB000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
20492E9E000
trusted library allocation
page read and write
20496764000
trusted library allocation
page read and write
2048B93E000
trusted library allocation
page read and write
1D6AE267000
heap
page read and write
204FCBD8000
heap
page read and write
204FF3FE000
trusted library allocation
page read and write
2049759F000
trusted library allocation
page read and write
20495F55000
trusted library allocation
page read and write
2048B207000
trusted library allocation
page read and write
20496745000
trusted library allocation
page read and write
2048C553000
trusted library allocation
page read and write
2E5DED30000
heap
page read and write
204967AD000
trusted library allocation
page read and write
1F797503000
trusted library allocation
page read and write
20496AEB000
trusted library allocation
page read and write
204FCC3D000
heap
page read and write
20492DDB000
trusted library allocation
page read and write
1D6AE1E0000
heap
page read and write
204960E7000
trusted library allocation
page read and write
20495CD1000
trusted library allocation
page read and write
204946B6000
trusted library allocation
page read and write
204FF7DE000
trusted library allocation
page read and write
2048B6C7000
trusted library allocation
page read and write
204FF766000
trusted library allocation
page read and write
2048ABAE000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204962B3000
trusted library allocation
page read and write
20495FF7000
trusted library allocation
page read and write
20494DBA000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
2048A642000
trusted library allocation
page read and write
204963AF000
trusted library allocation
page read and write
204967D1000
trusted library allocation
page read and write
204FCC09000
heap
page read and write
20495F0F000
trusted library allocation
page read and write
20496751000
trusted library allocation
page read and write
204FEEEF000
trusted library allocation
page read and write
2048CADA000
trusted library allocation
page read and write
2048C48A000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
20496113000
trusted library allocation
page read and write
2048ABE9000
trusted library allocation
page read and write
20496080000
trusted library allocation
page read and write
20494339000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
2048C3C3000
trusted library allocation
page read and write
2048B147000
trusted library allocation
page read and write
2048B38D000
trusted library allocation
page read and write
1F797186000
remote allocation
page execute read
204FF785000
trusted library allocation
page read and write
2048B677000
trusted library allocation
page read and write
20496149000
trusted library allocation
page read and write
2E5DEC72000
trusted library allocation
page read and write
2048B3ED000
trusted library allocation
page read and write
20492B71000
trusted library allocation
page read and write
2048B28D000
trusted library allocation
page read and write
20496117000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048B288000
trusted library allocation
page read and write
204931E3000
trusted library allocation
page read and write
1F797700000
trusted library allocation
page read and write
20495BF4000
trusted library allocation
page read and write
204FEE86000
trusted library allocation
page read and write
20495F44000
trusted library allocation
page read and write
20494EF9000
trusted library allocation
page read and write
1D6AE16C000
heap
page read and write
2048B25A000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
20496236000
trusted library allocation
page read and write
20496040000
trusted library allocation
page read and write
2048E47E000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
20496057000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
204967D6000
trusted library allocation
page read and write
2048D878000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204FCBD7000
heap
page read and write
204967DE000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
20496785000
trusted library allocation
page read and write
204967F3000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
204967F2000
trusted library allocation
page read and write
20495FEE000
trusted library allocation
page read and write
2048A6A4000
trusted library allocation
page read and write
1D6AE15C000
heap
page read and write
16B4000
heap
page read and write
2048A6EE000
trusted library allocation
page read and write
2048B1CD000
trusted library allocation
page read and write
204959CE000
trusted library allocation
page read and write
2048CAAE000
trusted library allocation
page read and write
2048A6ED000
trusted library allocation
page read and write
20492EDC000
trusted library allocation
page read and write
20495B34000
trusted library allocation
page read and write
2048B3C2000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
1F79758F000
trusted library allocation
page read and write
204966EA000
trusted library allocation
page read and write
204931A4000
trusted library allocation
page read and write
2E5DEE3D000
trusted library allocation
page read and write
2048C3C3000
trusted library allocation
page read and write
204FCC0D000
heap
page read and write
1D6AE15F000
heap
page read and write
2048AEE5000
heap
page read and write
1D6AD62F000
trusted library allocation
page read and write
204FCC0D000
heap
page read and write
1D6AE17D000
heap
page read and write
204967FD000
trusted library allocation
page read and write
2048ABA7000
trusted library allocation
page read and write
204963AF000
trusted library allocation
page read and write
204FCC10000
heap
page read and write
204FCC07000
heap
page read and write
2048F06C000
heap
page read and write
20496793000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048A783000
trusted library allocation
page read and write
204FFCB2000
trusted library allocation
page read and write
2049315D000
trusted library allocation
page read and write
20495F44000
trusted library allocation
page read and write
2048C2FE000
trusted library allocation
page read and write
2048B3FC000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
1F79755F000
trusted library allocation
page read and write
2049674B000
trusted library allocation
page read and write
20496150000
trusted library allocation
page read and write
204930D5000
trusted library allocation
page read and write
2048B277000
trusted library allocation
page read and write
2048B9A4000
trusted library allocation
page read and write
2048B23C000
trusted library allocation
page read and write
204FCBFC000
heap
page read and write
20496230000
trusted library allocation
page read and write
20494332000
trusted library allocation
page read and write
20495E75000
trusted library allocation
page read and write
20496226000
trusted library allocation
page read and write
204946FB000
trusted library allocation
page read and write
2048C3B1000
trusted library allocation
page read and write
204FEDBF000
trusted library allocation
page read and write
2048B959000
trusted library allocation
page read and write
1D6AE1F1000
heap
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204FF783000
trusted library allocation
page read and write
204931D5000
trusted library allocation
page read and write
20493198000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
20496727000
trusted library allocation
page read and write
20495A8C000
trusted library allocation
page read and write
2048D8C8000
trusted library allocation
page read and write
2048CA8F000
trusted library allocation
page read and write
2048AB62000
trusted library allocation
page read and write
2048ABC9000
trusted library allocation
page read and write
2048AB8D000
trusted library allocation
page read and write
20494316000
trusted library allocation
page read and write
20492EDC000
trusted library allocation
page read and write
1D6AD560000
trusted library allocation
page read and write
204962D3000
trusted library allocation
page read and write
20492E3D000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
2049315F000
trusted library allocation
page read and write
204881E6000
trusted library allocation
page read and write
204FEEAD000
trusted library allocation
page read and write
20492D8B000
trusted library allocation
page read and write
204931AD000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
2048E496000
trusted library allocation
page read and write
2048B3E7000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
20496793000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
204FEE69000
trusted library allocation
page read and write
20492B80000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
20494300000
trusted library allocation
page read and write
20496059000
trusted library allocation
page read and write
204FF426000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
2048C3B4000
trusted library allocation
page read and write
20495EB1000
trusted library allocation
page read and write
2048A6B5000
trusted library allocation
page read and write
2049627A000
trusted library allocation
page read and write
2048B911000
trusted library allocation
page read and write
2048B204000
trusted library allocation
page read and write
2048D8BA000
trusted library allocation
page read and write
2048E454000
trusted library allocation
page read and write
2048A6D5000
trusted library allocation
page read and write
1D6AE258000
heap
page read and write
20495963000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
2048A7F9000
trusted library allocation
page read and write
204FCC10000
heap
page read and write
204FCBE9000
heap
page read and write
20492A16000
trusted library allocation
page read and write
20495E36000
trusted library allocation
page read and write
204FCBD5000
heap
page read and write
3A1000
unkown
page execute read
204FCC0D000
heap
page read and write
2049434F000
trusted library allocation
page read and write
2048CF00000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
2048B931000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
204FF7F4000
trusted library allocation
page read and write
2049627A000
trusted library allocation
page read and write
20494DC1000
trusted library allocation
page read and write
2048B63A000
trusted library allocation
page read and write
2048CAC9000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204FCBE3000
heap
page read and write
2048B39A000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2049447C000
trusted library allocation
page read and write
20494373000
trusted library allocation
page read and write
FA11F8B000
stack
page read and write
204967F4000
trusted library allocation
page read and write
20492E82000
trusted library allocation
page read and write
204946C3000
trusted library allocation
page read and write
204963FB000
trusted library allocation
page read and write
2048B696000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
20496A1B000
trusted library allocation
page read and write
20492A1E000
trusted library allocation
page read and write
2048ABC7000
trusted library allocation
page read and write
204930C1000
trusted library allocation
page read and write
2048F001000
heap
page read and write
204FCBDA000
heap
page read and write
20492AEC000
trusted library allocation
page read and write
2048CA52000
trusted library allocation
page read and write
2048B998000
trusted library allocation
page read and write
204FF7E6000
trusted library allocation
page read and write
20492E9B000
trusted library allocation
page read and write
20496149000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
20496333000
trusted library allocation
page read and write
2048A6C5000
trusted library allocation
page read and write
2049678C000
trusted library allocation
page read and write
204960B6000
trusted library allocation
page read and write
2048A675000
trusted library allocation
page read and write
2E5DEC23000
trusted library allocation
page read and write
204881EC000
trusted library allocation
page read and write
2048A7E9000
trusted library allocation
page read and write
204FF712000
trusted library allocation
page read and write
204931B8000
trusted library allocation
page read and write
20493121000
trusted library allocation
page read and write
204966DC000
trusted library allocation
page read and write
20492D7D000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
204962A1000
trusted library allocation
page read and write
2048E49A000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204FCC11000
heap
page read and write
2048C473000
trusted library allocation
page read and write
204966E1000
trusted library allocation
page read and write
2048B637000
trusted library allocation
page read and write
1D6AE269000
heap
page read and write
2048A7F1000
trusted library allocation
page read and write
2048B3AC000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20494F24000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
20495F53000
trusted library allocation
page read and write
2048B6E0000
trusted library allocation
page read and write
20495942000
trusted library allocation
page read and write
1D6AD100000
unclassified section
page readonly
204FEE9A000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
204967BF000
trusted library allocation
page read and write
20496480000
trusted library allocation
page read and write
204946B6000
trusted library allocation
page read and write
20496B02000
trusted library allocation
page read and write
2048B37F000
trusted library allocation
page read and write
2048C497000
trusted library allocation
page read and write
20495F65000
trusted library allocation
page read and write
2048C35B000
trusted library allocation
page read and write
2048B189000
trusted library allocation
page read and write
20496751000
trusted library allocation
page read and write
2048ABA0000
trusted library allocation
page read and write
2048835B000
trusted library allocation
page read and write
204FF7B6000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
204FF466000
trusted library allocation
page read and write
20495BC7000
trusted library allocation
page read and write
2048C4BA000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20495950000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
20496149000
trusted library allocation
page read and write
16B4000
heap
page read and write
1D6AE1E6000
heap
page read and write
2048AB10000
trusted library allocation
page read and write
2049315F000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
204963FB000
trusted library allocation
page read and write
2048A6A7000
trusted library allocation
page read and write
20492ECA000
trusted library allocation
page read and write
2048B65C000
trusted library allocation
page read and write
2048C3C6000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
20494EB4000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
2048A679000
trusted library allocation
page read and write
20492BE1000
trusted library allocation
page read and write
20488239000
trusted library allocation
page read and write
20492E70000
trusted library allocation
page read and write
20492BFB000
trusted library allocation
page read and write
2049599A000
trusted library allocation
page read and write
20493141000
trusted library allocation
page read and write
20496A1D000
trusted library allocation
page read and write
20496366000
trusted library allocation
page read and write
2048D830000
trusted library allocation
page read and write
20488363000
trusted library allocation
page read and write
2048AB15000
trusted library allocation
page read and write
20495F2F000
trusted library allocation
page read and write
2048B3ED000
trusted library allocation
page read and write
2048E4F9000
trusted library allocation
page read and write
20496688000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204FCBD2000
heap
page read and write
2048A6FC000
trusted library allocation
page read and write
15FE000
stack
page read and write
204FFC56000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
2048DAC6000
trusted library allocation
page read and write
20493154000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048B982000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
2048B3C9000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
2048B98B000
trusted library allocation
page read and write
1D6AE1AA000
heap
page read and write
2048AB89000
trusted library allocation
page read and write
2048A7DB000
trusted library allocation
page read and write
1DF0A7B6000
heap
page read and write
204963AD000
trusted library allocation
page read and write
1D6AD3F0000
trusted library allocation
page read and write
2049755C000
trusted library allocation
page read and write
2048B367000
trusted library allocation
page read and write
20492BD9000
trusted library allocation
page read and write
16FA000
heap
page read and write
204960E1000
trusted library allocation
page read and write
20496167000
trusted library allocation
page read and write
204931B5000
trusted library allocation
page read and write
2048A6B5000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204FCC42000
heap
page read and write
FA1533E000
unkown
page readonly
20495CE9000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20496749000
trusted library allocation
page read and write
20495CAC000
trusted library allocation
page read and write
16B4000
heap
page read and write
2048B94B000
trusted library allocation
page read and write
20492D9C000
trusted library allocation
page read and write
20496218000
trusted library allocation
page read and write
2049446D000
trusted library allocation
page read and write
204FED6E000
trusted library allocation
page read and write
20495CE9000
trusted library allocation
page read and write
2049312C000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
2049677B000
trusted library allocation
page read and write
1F797513000
trusted library allocation
page read and write
20496AE6000
trusted library allocation
page read and write
20495FF7000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
20492DC1000
trusted library allocation
page read and write
2049676A000
trusted library allocation
page read and write
1F79729A000
heap
page read and write
2048B6D9000
trusted library allocation
page read and write
1D6AE1F1000
heap
page read and write
1F7973C0000
unclassified section
page readonly
204FCBF3000
heap
page read and write
20497565000
trusted library allocation
page read and write
204FF4A9000
trusted library allocation
page read and write
2049627A000
trusted library allocation
page read and write
12F21FE000
stack
page read and write
1D6AE258000
heap
page read and write
20495F29000
trusted library allocation
page read and write
16B4000
heap
page read and write
20496296000
trusted library allocation
page read and write
20496396000
trusted library allocation
page read and write
2048C3DB000
trusted library allocation
page read and write
204FF3FB000
trusted library allocation
page read and write
2048C4AD000
trusted library allocation
page read and write
1D6AE160000
heap
page read and write
2048CADC000
trusted library allocation
page read and write
20496331000
trusted library allocation
page read and write
2049312D000
trusted library allocation
page read and write
1F7971B3000
heap
page read and write
204963FB000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
204973AD000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
2049637F000
trusted library allocation
page read and write
204FF7DE000
trusted library allocation
page read and write
2048C356000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048F802000
trusted library allocation
page read and write
20495CE9000
trusted library allocation
page read and write
20495FE6000
trusted library allocation
page read and write
20495C66000
trusted library allocation
page read and write
FA152BE000
unkown
page readonly
16F2000
heap
page read and write
2049679B000
trusted library allocation
page read and write
20495BF4000
trusted library allocation
page read and write
2048A7D7000
trusted library allocation
page read and write
FA1427E000
unkown
page readonly
1F797570000
trusted library allocation
page read and write
2048A7EE000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
2048BDFD000
trusted library allocation
page read and write
20492DC3000
trusted library allocation
page read and write
20496A22000
trusted library allocation
page read and write
204FCBD4000
heap
page read and write
204FCC0A000
heap
page read and write
2048B3F6000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
2048F071000
heap
page read and write
20496744000
trusted library allocation
page read and write
20495BE4000
trusted library allocation
page read and write
2048D830000
trusted library allocation
page read and write
2048B6C4000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048C4B6000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
204FCBF3000
heap
page read and write
204FCBD8000
heap
page read and write
204FCC3C000
heap
page read and write
2048B6C5000
trusted library allocation
page read and write
20496753000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
16F2000
heap
page read and write
1F797566000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048B38B000
trusted library allocation
page read and write
2048C3EA000
trusted library allocation
page read and write
20494DFC000
trusted library allocation
page read and write
204FF7FC000
trusted library allocation
page read and write
2E5DECCB000
trusted library allocation
page read and write
2048C2F9000
trusted library allocation
page read and write
2E5DEC79000
trusted library allocation
page read and write
2048F061000
heap
page read and write
204FEEE2000
trusted library allocation
page read and write
204FF7F4000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
2048A6EE000
trusted library allocation
page read and write
2049637F000
trusted library allocation
page read and write
204FF7B2000
trusted library allocation
page read and write
2048C907000
trusted library allocation
page read and write
204FFC9C000
trusted library allocation
page read and write
1D6AE18A000
heap
page read and write
204FCBDC000
heap
page read and write
204FCC31000
heap
page read and write
20492D93000
trusted library allocation
page read and write
20496390000
trusted library allocation
page read and write
20494464000
trusted library allocation
page read and write
2049674E000
trusted library allocation
page read and write
204963CE000
trusted library allocation
page read and write
20492BF6000
trusted library allocation
page read and write
204FCBF9000
heap
page read and write
20495CF0000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204967CA000
trusted library allocation
page read and write
204FFC79000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
20496A22000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
278CC4B000
trusted library allocation
page execute read
20492ECA000
trusted library allocation
page read and write
1D6AE101000
heap
page read and write
C22EB7E000
unkown
page readonly
20496AEA000
trusted library allocation
page read and write
1D6ADB40000
heap
page read and write
20495F8E000
trusted library allocation
page read and write
2048ABB8000
trusted library allocation
page read and write
2048AE8B000
heap
page read and write
2048C3A0000
trusted library allocation
page read and write
20496361000
trusted library allocation
page read and write
20488383000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
1D6AD5F6000
heap
page read and write
2048B3AC000
trusted library allocation
page read and write
20496230000
trusted library allocation
page read and write
2048C4AD000
trusted library allocation
page read and write
2048A683000
trusted library allocation
page read and write
204FF32F000
trusted library allocation
page read and write
2048ABA0000
trusted library allocation
page read and write
2048A6B2000
trusted library allocation
page read and write
204960E0000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
204FCBE1000
heap
page read and write
2048B915000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
204FFC80000
trusted library allocation
page read and write
20492D83000
trusted library allocation
page read and write
20495969000
trusted library allocation
page read and write
2048C4EA000
trusted library allocation
page read and write
20496744000
trusted library allocation
page read and write
2048C3F0000
trusted library allocation
page read and write
20495AF9000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
2048A683000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
2048B93E000
trusted library allocation
page read and write
2048B6C4000
trusted library allocation
page read and write
20496339000
trusted library allocation
page read and write
204963C6000
trusted library allocation
page read and write
2048C48A000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
20495CF1000
trusted library allocation
page read and write
1D6AD0FB000
remote allocation
page execute read
20496040000
trusted library allocation
page read and write
FA141FE000
unkown
page readonly
2048D852000
trusted library allocation
page read and write
20495E6B000
trusted library allocation
page read and write
2048C55F000
trusted library allocation
page read and write
2048837A000
trusted library allocation
page read and write
20495BFC000
trusted library allocation
page read and write
204FF7A0000
trusted library allocation
page read and write
2E5DEC0B000
trusted library allocation
page read and write
2048B6D9000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
FA1527E000
unkown
page readonly
2048B3A7000
trusted library allocation
page read and write
20492DB1000
trusted library allocation
page read and write
2048ABB8000
trusted library allocation
page read and write
20495E49000
trusted library allocation
page read and write
20494F04000
trusted library allocation
page read and write
204962CA000
trusted library allocation
page read and write
2048B3E7000
trusted library allocation
page read and write
204FF4A3000
trusted library allocation
page read and write
20492B47000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2048B19D000
trusted library allocation
page read and write
1F797511000
trusted library allocation
page read and write
20495CED000
trusted library allocation
page read and write
20494354000
trusted library allocation
page read and write
20495CED000
trusted library allocation
page read and write
2048D8DC000
trusted library allocation
page read and write
2048B9A4000
trusted library allocation
page read and write
20492F64000
trusted library allocation
page read and write
20496784000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
2048D878000
trusted library allocation
page read and write
1F7971E0000
heap
page read and write
20492FCB000
trusted library allocation
page read and write
2048D7D0000
trusted library allocation
page read and write
1DF08F0A000
trusted library allocation
page read and write
20496179000
trusted library allocation
page read and write
2049449E000
trusted library allocation
page read and write
2048AB75000
trusted library allocation
page read and write
1D6AE17D000
heap
page read and write
278CC4B000
trusted library allocation
page execute read
204960D0000
trusted library allocation
page read and write
20496AC8000
trusted library allocation
page read and write
20495F85000
trusted library allocation
page read and write
204930CD000
trusted library allocation
page read and write
1D6AE200000
heap
page read and write
20497540000
trusted library allocation
page read and write
204959DF000
trusted library allocation
page read and write
2048CAA2000
trusted library allocation
page read and write
2048B379000
trusted library allocation
page read and write
20492F7A000
trusted library allocation
page read and write
2048A67B000
trusted library allocation
page read and write
20496227000
trusted library allocation
page read and write
2048D823000
trusted library allocation
page read and write
1D6AD6BF000
trusted library allocation
page read and write
2048ABBE000
trusted library allocation
page read and write
2048C624000
trusted library allocation
page read and write
2048B949000
trusted library allocation
page read and write
204FF7ED000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204967F2000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
12F3B3E000
unkown
page readonly
204FCC31000
heap
page read and write
2048C3C6000
trusted library allocation
page read and write
2048AE76000
heap
page read and write
2049677B000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
204963AF000
trusted library allocation
page read and write
204FCBEA000
heap
page read and write
20494469000
trusted library allocation
page read and write
2048AB33000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
2049622D000
trusted library allocation
page read and write
2048A62B000
trusted library allocation
page read and write
20495F2F000
trusted library allocation
page read and write
20495F72000
trusted library allocation
page read and write
20496054000
trusted library allocation
page read and write
204FF4E1000
trusted library allocation
page read and write
2048AEFC000
heap
page read and write
204931C3000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
20495CC5000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
2048C3A8000
trusted library allocation
page read and write
204966F4000
trusted library allocation
page read and write
1715000
heap
page read and write
20494E61000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
263B5803000
trusted library allocation
page read and write
2048D836000
trusted library allocation
page read and write
2048B97F000
trusted library allocation
page read and write
204966EE000
trusted library allocation
page read and write
20488342000
trusted library allocation
page read and write
20495F65000
trusted library allocation
page read and write
2048ABCB000
trusted library allocation
page read and write
2049601D000
trusted library allocation
page read and write
20496296000
trusted library allocation
page read and write
20496A22000
trusted library allocation
page read and write
2048ABC9000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
1F797190000
unclassified section
page readonly
2048A7DB000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20492BA2000
trusted library allocation
page read and write
20493158000
trusted library allocation
page read and write
20495945000
trusted library allocation
page read and write
2048D81E000
trusted library allocation
page read and write
2048B189000
trusted library allocation
page read and write
204FF7B2000
trusted library allocation
page read and write
20496296000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
204FCBF9000
heap
page read and write
226A2B0A000
trusted library allocation
page read and write
2048B3BC000
trusted library allocation
page read and write
2048ABCD000
trusted library allocation
page read and write
2048CAD5000
trusted library allocation
page read and write
204FED6C000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
2048C3BA000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048B93E000
trusted library allocation
page read and write
20495B43000
trusted library allocation
page read and write
2049622D000
trusted library allocation
page read and write
2E5DEC5D000
trusted library allocation
page read and write
2049674E000
trusted library allocation
page read and write
204966BD000
trusted library allocation
page read and write
204FF41E000
trusted library allocation
page read and write
2048C4A8000
trusted library allocation
page read and write
2048C3D6000
trusted library allocation
page read and write
20496751000
trusted library allocation
page read and write
20496AD0000
trusted library allocation
page read and write
2049616D000
trusted library allocation
page read and write
2048E484000
trusted library allocation
page read and write
2048A6ED000
trusted library allocation
page read and write
20495E42000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
204FCBE1000
heap
page read and write
2048A6CA000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2048C55F000
trusted library allocation
page read and write
12F29FE000
unkown
page readonly
2048AB57000
trusted library allocation
page read and write
2048B3A2000
trusted library allocation
page read and write
2048C2D3000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
2048B25F000
trusted library allocation
page read and write
2048B6F8000
trusted library allocation
page read and write
2049591C000
trusted library allocation
page read and write
204FCC00000
heap
page read and write
2E5DECC8000
trusted library allocation
page read and write
2048ABBE000
trusted library allocation
page read and write
2048D852000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
204FCBF3000
heap
page read and write
1D6AE1EE000
heap
page read and write
2049445B000
trusted library allocation
page read and write
2048ABCD000
trusted library allocation
page read and write
2048B3AE000
trusted library allocation
page read and write
2048C3CF000
trusted library allocation
page read and write
2048A6DC000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
20496054000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
2048C397000
trusted library allocation
page read and write
2048B9BC000
trusted library allocation
page read and write
204963BE000
trusted library allocation
page read and write
20496A1D000
trusted library allocation
page read and write
2048B9BC000
trusted library allocation
page read and write
204946C3000
trusted library allocation
page read and write
2049623B000
trusted library allocation
page read and write
20497378000
trusted library allocation
page read and write
2048A67B000
trusted library allocation
page read and write
2048A7DB000
trusted library allocation
page read and write
2048B936000
trusted library allocation
page read and write
20496772000
trusted library allocation
page read and write
20492DC3000
trusted library allocation
page read and write
1D6AD2A2000
unclassified section
page read and write
204967FD000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
204931DE000
trusted library allocation
page read and write
2048C3CF000
trusted library allocation
page read and write
1D6AD500000
trusted library section
page readonly
20496773000
trusted library allocation
page read and write
20495CF0000
trusted library allocation
page read and write
1F7975F2000
trusted library allocation
page read and write
204FCC02000
heap
page read and write
20496AE8000
trusted library allocation
page read and write
204FED81000
trusted library allocation
page read and write
204FF47E000
trusted library allocation
page read and write
2048CA5F000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048A63E000
trusted library allocation
page read and write
20496050000
trusted library allocation
page read and write
20495B37000
trusted library allocation
page read and write
20492FA0000
trusted library allocation
page read and write
2048A65C000
trusted library allocation
page read and write
2048A6B2000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
2049622D000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
2048B6CC000
trusted library allocation
page read and write
2048B364000
trusted library allocation
page read and write
20496040000
trusted library allocation
page read and write
2048C3E6000
trusted library allocation
page read and write
20495CE6000
trusted library allocation
page read and write
20492BFB000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
204FF76B000
trusted library allocation
page read and write
2049622B000
trusted library allocation
page read and write
2048B6DC000
trusted library allocation
page read and write
2049634A000
trusted library allocation
page read and write
2048A7D0000
trusted library allocation
page read and write
2048ABC9000
trusted library allocation
page read and write
20492FD1000
trusted library allocation
page read and write
2E5DE800000
unclassified section
page readonly
12F2A3E000
unkown
page readonly
2048A6ED000
trusted library allocation
page read and write
2048C3FE000
trusted library allocation
page read and write
20492B41000
trusted library allocation
page read and write
20492ADF000
trusted library allocation
page read and write
204962AB000
trusted library allocation
page read and write
2048B911000
trusted library allocation
page read and write
20495CA9000
trusted library allocation
page read and write
2048AB1F000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2048C4E4000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
1DF08C62000
heap
page read and write
2049673F000
trusted library allocation
page read and write
226A27D0000
heap
page read and write
2048AE8B000
heap
page read and write
2048B3A2000
trusted library allocation
page read and write
1D6AD681000
trusted library allocation
page read and write
2048AEF5000
heap
page read and write
204FCC00000
heap
page read and write
2048B6C2000
trusted library allocation
page read and write
1D6AD678000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204FF7D8000
trusted library allocation
page read and write
20495BC4000
trusted library allocation
page read and write
20495A34000
trusted library allocation
page read and write
2048AE91000
heap
page read and write
2049597C000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
2048B21F000
trusted library allocation
page read and write
2049446B000
trusted library allocation
page read and write
20492EFD000
trusted library allocation
page read and write
22897FE000
stack
page read and write
204967E1000
trusted library allocation
page read and write
2048A629000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
20492B95000
trusted library allocation
page read and write
2048E4EE000
trusted library allocation
page read and write
20495F20000
trusted library allocation
page read and write
2048ABCD000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
2048ABCE000
trusted library allocation
page read and write
204946B9000
trusted library allocation
page read and write
2048C48A000
trusted library allocation
page read and write
204FCBFB000
heap
page read and write
2048D861000
trusted library allocation
page read and write
20495942000
trusted library allocation
page read and write
20496759000
trusted library allocation
page read and write
20492DB7000
trusted library allocation
page read and write
FA1633E000
unkown
page readonly
1D6AD6E9000
trusted library allocation
page read and write
2048E858000
trusted library allocation
page read and write
2E5DEE15000
trusted library allocation
page read and write
20495E5B000
trusted library allocation
page read and write
1F797707000
trusted library allocation
page read and write
20492BBC000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048E4F1000
trusted library allocation
page read and write
204FF7D5000
trusted library allocation
page read and write
20495A73000
trusted library allocation
page read and write
20495CDB000
trusted library allocation
page read and write
2048C5B5000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
20492DCC000
trusted library allocation
page read and write
204967B2000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048B1AE000
trusted library allocation
page read and write
204931B2000
trusted library allocation
page read and write
1FDF000
stack
page read and write
20488237000
trusted library allocation
page read and write
204962B1000
trusted library allocation
page read and write
2049676A000
trusted library allocation
page read and write
20492B76000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048A678000
trusted library allocation
page read and write
204FF7F4000
trusted library allocation
page read and write
2048B2CD000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
20492DC1000
trusted library allocation
page read and write
1D6AE222000
heap
page read and write
2048B6E8000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
20492DB1000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
2048B27B000
trusted library allocation
page read and write
204FEDC4000
trusted library allocation
page read and write
204FED50000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
204966BD000
trusted library allocation
page read and write
20494E66000
trusted library allocation
page read and write
204960F7000
trusted library allocation
page read and write
2048A653000
trusted library allocation
page read and write
2048D990000
trusted library allocation
page read and write
1D6AD623000
trusted library allocation
page read and write
20492FFD000
trusted library allocation
page read and write
20495C7F000
trusted library allocation
page read and write
204930C1000
trusted library allocation
page read and write
20497577000
trusted library allocation
page read and write
1D6AE22D000
heap
page read and write
2048AEE5000
heap
page read and write
204963DB000
trusted library allocation
page read and write
204963C1000
trusted library allocation
page read and write
204966EE000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
1D6AE22A000
heap
page read and write
204962DA000
trusted library allocation
page read and write
2048A7D7000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
170F000
heap
page read and write
2048B33C000
trusted library allocation
page read and write
204966DE000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
20496A22000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
2048B396000
trusted library allocation
page read and write
2048B3CC000
trusted library allocation
page read and write
2048C4A8000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
2048A7E2000
trusted library allocation
page read and write
20495ED2000
trusted library allocation
page read and write
2E5DE873000
remote allocation
page execute read
20496296000
trusted library allocation
page read and write
3A1000
unkown
page execute read
2048ABA7000
trusted library allocation
page read and write
20496080000
trusted library allocation
page read and write
2E5DEA6F000
unclassified section
page read and write
2049603A000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
204962D9000
trusted library allocation
page read and write
1D6AE1E1000
heap
page read and write
20495CC5000
trusted library allocation
page read and write
2048B19D000
trusted library allocation
page read and write
2049602D000
trusted library allocation
page read and write
204963D1000
trusted library allocation
page read and write
2049674B000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
2048B273000
trusted library allocation
page read and write
20496049000
trusted library allocation
page read and write
2048AE76000
heap
page read and write
20496748000
trusted library allocation
page read and write
2048D852000
trusted library allocation
page read and write
20496787000
trusted library allocation
page read and write
2048B949000
trusted library allocation
page read and write
20494DFC000
trusted library allocation
page read and write
2048B1CD000
trusted library allocation
page read and write
20496049000
trusted library allocation
page read and write
20495FF7000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
204930DE000
trusted library allocation
page read and write
2E5DEE12000
trusted library allocation
page read and write
204FF7AD000
trusted library allocation
page read and write
20492E9E000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204963C8000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048C4A8000
trusted library allocation
page read and write
2048B6E0000
trusted library allocation
page read and write
2048D88C000
trusted library allocation
page read and write
1F797576000
trusted library allocation
page read and write
1D6AE003000
trusted library allocation
page read and write
2048AEF6000
heap
page read and write
1D6AD6BA000
trusted library allocation
page read and write
2048B979000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048AE96000
heap
page read and write
2048A6A4000
trusted library allocation
page read and write
20495BCA000
trusted library allocation
page read and write
1F7975F6000
trusted library allocation
page read and write
20496038000
trusted library allocation
page read and write
20495CE4000
trusted library allocation
page read and write
1D6AE258000
heap
page read and write
2048B29E000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
192BD131E000
trusted library allocation
page read and write
2048CAB9000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
20494E59000
trusted library allocation
page read and write
2048A6D6000
trusted library allocation
page read and write
20495F1A000
trusted library allocation
page read and write
2048B911000
trusted library allocation
page read and write
20495985000
trusted library allocation
page read and write
20488383000
trusted library allocation
page read and write
20495C3F000
trusted library allocation
page read and write
204960D0000
trusted library allocation
page read and write
20496785000
trusted library allocation
page read and write
204967A8000
trusted library allocation
page read and write
204FCC04000
heap
page read and write
1D6AD66F000
trusted library allocation
page read and write
2048CA0C000
trusted library allocation
page read and write
1714000
heap
page read and write
204FF7A0000
trusted library allocation
page read and write
170F000
heap
page read and write
2048B6BB000
trusted library allocation
page read and write
2048E49C000
trusted library allocation
page read and write
20496793000
trusted library allocation
page read and write
2048C367000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
20495F8E000
trusted library allocation
page read and write
2048B936000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
20496023000
trusted library allocation
page read and write
204967EA000
trusted library allocation
page read and write
204FF7A0000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048B3E7000
trusted library allocation
page read and write
204FCBDD000
heap
page read and write
1F797250000
heap
page read and write
20494476000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
204FF47D000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
2048C359000
trusted library allocation
page read and write
1D6AE16C000
heap
page read and write
2048E436000
trusted library allocation
page read and write
204FF7D5000
trusted library allocation
page read and write
20492E72000
trusted library allocation
page read and write
2048A7D4000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
204FF7BA000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
1700000
heap
page read and write
20495C42000
trusted library allocation
page read and write
2049597F000
trusted library allocation
page read and write
2048C2CB000
trusted library allocation
page read and write
2048ABB8000
trusted library allocation
page read and write
20495924000
trusted library allocation
page read and write
204FCC42000
heap
page read and write
2048B3AA000
trusted library allocation
page read and write
20495CC5000
trusted library allocation
page read and write
204FCBFB000
heap
page read and write
2048B6CC000
trusted library allocation
page read and write
2048B28B000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
20496A15000
trusted library allocation
page read and write
2048B943000
trusted library allocation
page read and write
2049625C000
trusted library allocation
page read and write
204973E1000
trusted library allocation
page read and write
2049759F000
trusted library allocation
page read and write
2049447C000
trusted library allocation
page read and write
2048A689000
trusted library allocation
page read and write
2048C3DB000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
2048A61D000
trusted library allocation
page read and write
1D6AD090000
unclassified section
page readonly
2048ABAE000
trusted library allocation
page read and write
1D6AE23B000
heap
page read and write
2048C4B1000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
20496208000
trusted library allocation
page read and write
2048DABD000
trusted library allocation
page read and write
1D6AE1EE000
heap
page read and write
2048A659000
trusted library allocation
page read and write
2048B255000
trusted library allocation
page read and write
2048A6CA000
trusted library allocation
page read and write
204FCC03000
heap
page read and write
2048CA83000
trusted library allocation
page read and write
2048AE76000
heap
page read and write
20495CAC000
trusted library allocation
page read and write
2048B97E000
trusted library allocation
page read and write
20495FA2000
trusted library allocation
page read and write
204FCC32000
heap
page read and write
1D6AE000000
trusted library allocation
page read and write
20492EA4000
trusted library allocation
page read and write
170F000
heap
page read and write
204FCBDA000
heap
page read and write
2048B2CD000
trusted library allocation
page read and write
2048C3B2000
trusted library allocation
page read and write
2048A6F5000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
1F79755D000
trusted library allocation
page read and write
2048A6DA000
trusted library allocation
page read and write
2048E4EB000
trusted library allocation
page read and write
20496A20000
trusted library allocation
page read and write
12F2ABE000
unkown
page readonly
20495EC9000
trusted library allocation
page read and write
204FEEB5000
trusted library allocation
page read and write
20496795000
trusted library allocation
page read and write
204FF4BC000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
20492B84000
trusted library allocation
page read and write
2049622D000
trusted library allocation
page read and write
20494476000
trusted library allocation
page read and write
204FF4DB000
trusted library allocation
page read and write
204FCC34000
heap
page read and write
20495A73000
trusted library allocation
page read and write
204960DD000
trusted library allocation
page read and write
2049623B000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
20496BA8000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
20495CA9000
trusted library allocation
page read and write
204FCBFB000
heap
page read and write
1D6AE1EE000
heap
page read and write
20495F55000
trusted library allocation
page read and write
2049676A000
trusted library allocation
page read and write
20494F04000
trusted library allocation
page read and write
2E5DE990000
heap
page read and write
204963CA000
trusted library allocation
page read and write
20496113000
trusted library allocation
page read and write
2048A6B5000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048F08D000
heap
page read and write
2048A659000
trusted library allocation
page read and write
204FF7B2000
trusted library allocation
page read and write
20496009000
trusted library allocation
page read and write
2048B6F1000
trusted library allocation
page read and write
20495F44000
trusted library allocation
page read and write
2048AB89000
trusted library allocation
page read and write
204FF4D1000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
20496208000
trusted library allocation
page read and write
2048C3C6000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
226A2860000
heap
page read and write
20493133000
trusted library allocation
page read and write
20495963000
trusted library allocation
page read and write
2048C4B1000
trusted library allocation
page read and write
20495CDF000
trusted library allocation
page read and write
2048B9A4000
trusted library allocation
page read and write
1F797100000
unclassified section
page readonly
20496743000
trusted library allocation
page read and write
2048D891000
trusted library allocation
page read and write
204FCBF9000
heap
page read and write
204931C3000
trusted library allocation
page read and write
226A2867000
heap
page read and write
2049623B000
trusted library allocation
page read and write
20495C4D000
trusted library allocation
page read and write
2048B280000
trusted library allocation
page read and write
278CD21000
trusted library allocation
page execute read
204FEDC7000
trusted library allocation
page read and write
204FF7BA000
trusted library allocation
page read and write
2048F001000
heap
page read and write
204FF7DE000
trusted library allocation
page read and write
2048C4B4000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
2048835B000
trusted library allocation
page read and write
204931E4000
trusted library allocation
page read and write
2049311C000
trusted library allocation
page read and write
2048B3E3000
trusted library allocation
page read and write
2E5DEE32000
trusted library allocation
page read and write
204960F7000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
204962A1000
trusted library allocation
page read and write
2048C4EB000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048B6E8000
trusted library allocation
page read and write
2048ABA5000
trusted library allocation
page read and write
20492DB7000
trusted library allocation
page read and write
2048C488000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2049622D000
trusted library allocation
page read and write
2048CAAE000
trusted library allocation
page read and write
2048AEE9000
heap
page read and write
2048CAE6000
trusted library allocation
page read and write
2049447C000
trusted library allocation
page read and write
204959FA000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
2048C3E6000
trusted library allocation
page read and write
204FEE97000
trusted library allocation
page read and write
2048CA0C000
trusted library allocation
page read and write
20496751000
trusted library allocation
page read and write
2048A7CF000
trusted library allocation
page read and write
20496331000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
20492AFB000
trusted library allocation
page read and write
2048C2D5000
trusted library allocation
page read and write
161B000
stack
page read and write
1F79757B000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
2048CA7D000
trusted library allocation
page read and write
20493136000
trusted library allocation
page read and write
25B0000
heap
page read and write
2049313D000
trusted library allocation
page read and write
2E5DE9E0000
heap
page read and write
2049677E000
trusted library allocation
page read and write
2048B953000
trusted library allocation
page read and write
204967B3000
trusted library allocation
page read and write
20495EFA000
trusted library allocation
page read and write
2048A69C000
trusted library allocation
page read and write
1D6AE160000
heap
page read and write
2048D000000
trusted library allocation
page read and write
204FF4FE000
trusted library allocation
page read and write
2048A6B6000
trusted library allocation
page read and write
2048CACD000
trusted library allocation
page read and write
2048A6A7000
trusted library allocation
page read and write
2048B3F6000
trusted library allocation
page read and write
20496296000
trusted library allocation
page read and write
2048B3F6000
trusted library allocation
page read and write
204966DC000
trusted library allocation
page read and write
20495EF3000
trusted library allocation
page read and write
20495939000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2049449E000
trusted library allocation
page read and write
204883EF000
trusted library allocation
page read and write
2048B1AE000
trusted library allocation
page read and write
2049633E000
trusted library allocation
page read and write
2049598C000
trusted library allocation
page read and write
2048C4EA000
trusted library allocation
page read and write
20496361000
trusted library allocation
page read and write
2049611A000
trusted library allocation
page read and write
20496749000
trusted library allocation
page read and write
20495EF3000
trusted library allocation
page read and write
20496339000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
2048832C000
trusted library allocation
page read and write
20493127000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
204FEDA1000
trusted library allocation
page read and write
2048A6BC000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
2048B1A9000
trusted library allocation
page read and write
20496394000
trusted library allocation
page read and write
20495F55000
trusted library allocation
page read and write
2048B947000
trusted library allocation
page read and write
204FF785000
trusted library allocation
page read and write
20492DC3000
trusted library allocation
page read and write
2E5DEC69000
trusted library allocation
page read and write
241E000
stack
page read and write
2048B3A7000
trusted library allocation
page read and write
1D6ADB60000
heap
page read and write
20494468000
trusted library allocation
page read and write
2048B6E0000
trusted library allocation
page read and write
2048B6E8000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
204960B6000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
20495EFE000
trusted library allocation
page read and write
20495EFE000
trusted library allocation
page read and write
2049668E000
trusted library allocation
page read and write
204966DA000
trusted library allocation
page read and write
1D6AD675000
trusted library allocation
page read and write
20492E70000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204FF7B6000
trusted library allocation
page read and write
204FCBED000
heap
page read and write
204967AD000
trusted library allocation
page read and write
20493156000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
2048B3B0000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
2048C3E6000
trusted library allocation
page read and write
204962C1000
trusted library allocation
page read and write
2048B662000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
204960D6000
trusted library allocation
page read and write
204FCC48000
heap
page read and write
204962B3000
trusted library allocation
page read and write
20492FD7000
trusted library allocation
page read and write
2E5DEC66000
trusted library allocation
page read and write
2048E896000
trusted library allocation
page read and write
20492DCC000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
20492D93000
trusted library allocation
page read and write
2049623B000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
2048C3E6000
trusted library allocation
page read and write
20493123000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
20492ABE000
trusted library allocation
page read and write
2048D98E000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2048CA52000
trusted library allocation
page read and write
192BD1324000
trusted library allocation
page read and write
20496727000
trusted library allocation
page read and write
20492E90000
trusted library allocation
page read and write
204962CA000
trusted library allocation
page read and write
2048B3AE000
trusted library allocation
page read and write
204931E3000
trusted library allocation
page read and write
2048B93E000
trusted library allocation
page read and write
1D6AE1E0000
heap
page read and write
204FF48C000
trusted library allocation
page read and write
204966FA000
trusted library allocation
page read and write
20492FD3000
trusted library allocation
page read and write
2049679A000
trusted library allocation
page read and write
204931A4000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
20492E86000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
1D6AD6F3000
trusted library allocation
page read and write
20492B84000
trusted library allocation
page read and write
2048B38A000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
FA14A7E000
stack
page read and write
204930D5000
trusted library allocation
page read and write
204881F9000
trusted library allocation
page read and write
2048A683000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
1F797703000
trusted library allocation
page read and write
16F0000
heap
page read and write
204FCC31000
heap
page read and write
204FCC33000
heap
page read and write
20497362000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
20494476000
trusted library allocation
page read and write
2048C3AC000
trusted library allocation
page read and write
2048E45B000
trusted library allocation
page read and write
204FCBF7000
heap
page read and write
204FCC31000
heap
page read and write
204962DD000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2049595A000
trusted library allocation
page read and write
204960DD000
trusted library allocation
page read and write
22877FE000
stack
page read and write
1F797569000
trusted library allocation
page read and write
1D6AD2A0000
unclassified section
page read and write
204FCC0A000
heap
page read and write
204FCBE9000
heap
page read and write
2048D9A1000
trusted library allocation
page read and write
2048ABC7000
trusted library allocation
page read and write
2048CADA000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048B68E000
trusted library allocation
page read and write
204FFC5F000
trusted library allocation
page read and write
2048C3F8000
trusted library allocation
page read and write
2048B952000
trusted library allocation
page read and write
2048AEA8000
heap
page read and write
2048CAC2000
trusted library allocation
page read and write
2048C3F0000
trusted library allocation
page read and write
20495ECE000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
2048CAE6000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
2048D861000
trusted library allocation
page read and write
2048A7F9000
trusted library allocation
page read and write
1D6AD2B0000
trusted library allocation
page read and write
2048CAE6000
trusted library allocation
page read and write
1D6AE164000
heap
page read and write
204966DC000
trusted library allocation
page read and write
2048B6BF000
trusted library allocation
page read and write
20493063000
trusted library allocation
page read and write
20496AD4000
trusted library allocation
page read and write
204963F9000
trusted library allocation
page read and write
20495FA2000
trusted library allocation
page read and write
1D6AE1E8000
heap
page read and write
204FF482000
trusted library allocation
page read and write
204962CA000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048C32A000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
204FED88000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
204FCC11000
heap
page read and write
2048D852000
trusted library allocation
page read and write
20492A19000
trusted library allocation
page read and write
2048C336000
trusted library allocation
page read and write
204FCC00000
heap
page read and write
2048B6F5000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
20495CAC000
trusted library allocation
page read and write
2049674E000
trusted library allocation
page read and write
1D6AD2E0000
heap
page read and write
2048B98D000
trusted library allocation
page read and write
204946F9000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20495F0D000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2048A6CE000
trusted library allocation
page read and write
226A2A00000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
20492BD9000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
2286FFF000
stack
page read and write
1D6AE1E6000
heap
page read and write
204FCBD2000
heap
page read and write
12F2A7D000
stack
page read and write
20492BBF000
trusted library allocation
page read and write
20495E75000
trusted library allocation
page read and write
2048B949000
trusted library allocation
page read and write
20496793000
trusted library allocation
page read and write
204FED98000
trusted library allocation
page read and write
204FF4E4000
trusted library allocation
page read and write
2048B257000
trusted library allocation
page read and write
20496337000
trusted library allocation
page read and write
204FCC40000
heap
page read and write
204963DB000
trusted library allocation
page read and write
204FCC3B000
heap
page read and write
204FCBD7000
heap
page read and write
2049597C000
trusted library allocation
page read and write
1D6AD080000
unclassified section
page readonly
204FCBD0000
heap
page read and write
204967F6000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
204962BE000
trusted library allocation
page read and write
2048F011000
heap
page read and write
20493139000
trusted library allocation
page read and write
12F07EE000
stack
page read and write
20495F7A000
trusted library allocation
page read and write
20495E75000
trusted library allocation
page read and write
2048ABE2000
trusted library allocation
page read and write
2048C3F1000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
20496767000
trusted library allocation
page read and write
2048B6CC000
trusted library allocation
page read and write
20492AFB000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2048B945000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
204FCC10000
heap
page read and write
204FF712000
trusted library allocation
page read and write
2048A643000
trusted library allocation
page read and write
C22FB7E000
unkown
page readonly
20496230000
trusted library allocation
page read and write
2048B6D9000
trusted library allocation
page read and write
2049673F000
trusted library allocation
page read and write
C22EB3E000
stack
page read and write
2048B979000
trusted library allocation
page read and write
20495F50000
trusted library allocation
page read and write
2048AB29000
trusted library allocation
page read and write
2048C46B000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
204FCBE0000
heap
page read and write
20493195000
trusted library allocation
page read and write
20496179000
trusted library allocation
page read and write
204931C7000
trusted library allocation
page read and write
204962D6000
trusted library allocation
page read and write
204FF7E6000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
2048C4AB000
trusted library allocation
page read and write
20495E5B000
trusted library allocation
page read and write
226A27C0000
heap
page read and write
204967AD000
trusted library allocation
page read and write
2048CA6A000
trusted library allocation
page read and write
2048A7D3000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
204967F4000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
2049445B000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2048D838000
trusted library allocation
page read and write
2048ABDE000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
20488342000
trusted library allocation
page read and write
20492BA2000
trusted library allocation
page read and write
204FED7A000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048CA8D000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
20496339000
trusted library allocation
page read and write
20495FE6000
trusted library allocation
page read and write
20495CD9000
trusted library allocation
page read and write
16F8000
heap
page read and write
204FEE46000
trusted library allocation
page read and write
204FEECD000
trusted library allocation
page read and write
2048A6D7000
trusted library allocation
page read and write
204FCC00000
heap
page read and write
2048AEFB000
heap
page read and write
204967F6000
trusted library allocation
page read and write
2E5DECEA000
trusted library allocation
page read and write
204FCC10000
heap
page read and write
2048A6F5000
trusted library allocation
page read and write
20496217000
trusted library allocation
page read and write
2048AEF5000
heap
page read and write
204931A4000
trusted library allocation
page read and write
2049622B000
trusted library allocation
page read and write
204967BF000
trusted library allocation
page read and write
20496223000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
1F797260000
heap
page readonly
204FCC0D000
heap
page read and write
2048CA99000
trusted library allocation
page read and write
1F797578000
trusted library allocation
page read and write
20492F4B000
trusted library allocation
page read and write
2048C902000
trusted library allocation
page read and write
2048B6CD000
trusted library allocation
page read and write
20492DDB000
trusted library allocation
page read and write
2048CA0A000
trusted library allocation
page read and write
43C000
unkown
page readonly
204931E0000
trusted library allocation
page read and write
2048D869000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
1D6AE1E8000
heap
page read and write
2048AEE5000
heap
page read and write
2048B3BC000
trusted library allocation
page read and write
204FEE94000
trusted library allocation
page read and write
20492BE1000
trusted library allocation
page read and write
20496049000
trusted library allocation
page read and write
2048C3B6000
trusted library allocation
page read and write
20496218000
trusted library allocation
page read and write
2048ABE1000
trusted library allocation
page read and write
1F797110000
unclassified section
page readonly
20495F2D000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
1DF0A7BC000
heap
page read and write
2048A6B2000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204FCBE5000
heap
page read and write
204962AF000
trusted library allocation
page read and write
20496A25000
trusted library allocation
page read and write
20496371000
trusted library allocation
page read and write
1D6AD668000
trusted library allocation
page read and write
20495F1A000
trusted library allocation
page read and write
2048B3A7000
trusted library allocation
page read and write
2048AEEB000
heap
page read and write
2048D9EF000
trusted library allocation
page read and write
2048B94D000
trusted library allocation
page read and write
278CCB1000
trusted library allocation
page execute read
2048A653000
trusted library allocation
page read and write
2049597F000
trusted library allocation
page read and write
2048B954000
trusted library allocation
page read and write
2048B671000
trusted library allocation
page read and write
2048A6B5000
trusted library allocation
page read and write
204967B2000
trusted library allocation
page read and write
2048ABA5000
trusted library allocation
page read and write
2048C4EA000
trusted library allocation
page read and write
2048C3D1000
trusted library allocation
page read and write
16B0000
heap
page read and write
20496167000
trusted library allocation
page read and write
2048C321000
trusted library allocation
page read and write
2048D7EF000
trusted library allocation
page read and write
2048A69C000
trusted library allocation
page read and write
2048A7F5000
trusted library allocation
page read and write
1D6AD540000
heap
page read and write
20495F63000
trusted library allocation
page read and write
2048A628000
trusted library allocation
page read and write
2048A7DB000
trusted library allocation
page read and write
2048CA8F000
trusted library allocation
page read and write
20492E86000
trusted library allocation
page read and write
1D6AE244000
heap
page read and write
FA11ECD000
stack
page read and write
204967B0000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
2048AEE9000
heap
page read and write
20492DB1000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
20496057000
trusted library allocation
page read and write
2048AEA8000
heap
page read and write
2E5DEE1F000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
2048A6CE000
trusted library allocation
page read and write
204FCBFA000
heap
page read and write
2049676E000
trusted library allocation
page read and write
2048A6C7000
trusted library allocation
page read and write
20496339000
trusted library allocation
page read and write
2048A6CC000
trusted library allocation
page read and write
204FCC02000
heap
page read and write
2048AEE9000
heap
page read and write
2048B28D000
trusted library allocation
page read and write
2048A6D2000
trusted library allocation
page read and write
2048E8E1000
trusted library allocation
page read and write
2048B68B000
trusted library allocation
page read and write
2048A7A5000
trusted library allocation
page read and write
2048C399000
trusted library allocation
page read and write
2E5DE9E3000
heap
page read and write
2048D973000
trusted library allocation
page read and write
2048B28E000
trusted library allocation
page read and write
20496038000
trusted library allocation
page read and write
204931A1000
trusted library allocation
page read and write
2048B38B000
trusted library allocation
page read and write
204946B4000
trusted library allocation
page read and write
20488331000
trusted library allocation
page read and write
2048B6BB000
trusted library allocation
page read and write
204960B8000
trusted library allocation
page read and write
2048A7EE000
trusted library allocation
page read and write
1D6ADB30000
heap
page read and write
2048B952000
trusted library allocation
page read and write
2049314E000
trusted library allocation
page read and write
204FF783000
trusted library allocation
page read and write
2049674C000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
204FCC01000
heap
page read and write
204962DF000
trusted library allocation
page read and write
2048A63A000
trusted library allocation
page read and write
2E5DECBA000
trusted library allocation
page read and write
2048B959000
trusted library allocation
page read and write
204FFC50000
trusted library allocation
page read and write
204962B9000
trusted library allocation
page read and write
2048B665000
trusted library allocation
page read and write
204930AC000
trusted library allocation
page read and write
2048C3F1000
trusted library allocation
page read and write
1D6AE163000
heap
page read and write
1D6AE160000
heap
page read and write
2048B949000
trusted library allocation
page read and write
204883D2000
trusted library allocation
page read and write
204960D6000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
2048CADC000
trusted library allocation
page read and write
20495F53000
trusted library allocation
page read and write
20496749000
trusted library allocation
page read and write
204FF7B6000
trusted library allocation
page read and write
20496ACC000
trusted library allocation
page read and write
2048D8DC000
trusted library allocation
page read and write
20495CDB000
trusted library allocation
page read and write
20496023000
trusted library allocation
page read and write
162F000
stack
page read and write
20493141000
trusted library allocation
page read and write
20495A53000
trusted library allocation
page read and write
2048A6CF000
trusted library allocation
page read and write
2048A7CF000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
2048E43C000
trusted library allocation
page read and write
2048B6E0000
trusted library allocation
page read and write
2049616D000
trusted library allocation
page read and write
204962A1000
trusted library allocation
page read and write
20496038000
trusted library allocation
page read and write
2048832D000
trusted library allocation
page read and write
20495F55000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
204967BF000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
204FCC32000
heap
page read and write
FA11FCE000
stack
page read and write
20496A1B000
trusted library allocation
page read and write
2048A636000
trusted library allocation
page read and write
20495F2F000
trusted library allocation
page read and write
204FEE86000
trusted library allocation
page read and write
20495BC4000
trusted library allocation
page read and write
2048B3ED000
trusted library allocation
page read and write
2048D82E000
trusted library allocation
page read and write
3D90000
heap
page read and write
20495BFC000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048AEA8000
heap
page read and write
204962AF000
trusted library allocation
page read and write
2E5DEC5B000
trusted library allocation
page read and write
20495969000
trusted library allocation
page read and write
2048A643000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
20492DDB000
trusted library allocation
page read and write
2048A6B6000
trusted library allocation
page read and write
204FCBF9000
heap
page read and write
20493123000
trusted library allocation
page read and write
2049313B000
trusted library allocation
page read and write
204FCC00000
heap
page read and write
204FCBD0000
heap
page read and write
163D000
stack
page read and write
2049627C000
trusted library allocation
page read and write
2048AEEB000
heap
page read and write
204FF7B6000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048C3F6000
trusted library allocation
page read and write
2E5DEC00000
trusted library allocation
page read and write
20493192000
trusted library allocation
page read and write
2048D80B000
trusted library allocation
page read and write
204931AD000
trusted library allocation
page read and write
2048C41B000
trusted library allocation
page read and write
2048A6A7000
trusted library allocation
page read and write
2048B998000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204883DC000
trusted library allocation
page read and write
2048A7F5000
trusted library allocation
page read and write
20496767000
trusted library allocation
page read and write
2049602D000
trusted library allocation
page read and write
2049631F000
trusted library allocation
page read and write
2048D86E000
trusted library allocation
page read and write
204FCC10000
heap
page read and write
2049621D000
trusted library allocation
page read and write
20495F55000
trusted library allocation
page read and write
2048CAA2000
trusted library allocation
page read and write
2048A7C6000
trusted library allocation
page read and write
1BDE000
stack
page read and write
204FCBF3000
heap
page read and write
204FCBDA000
heap
page read and write
20496765000
trusted library allocation
page read and write
2048B6C1000
trusted library allocation
page read and write
204963C1000
trusted library allocation
page read and write
2048B6DE000
trusted library allocation
page read and write
2048F0A9000
heap
page read and write
204FCBF8000
heap
page read and write
3DC4000
heap
page read and write
20496795000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
204FEE61000
trusted library allocation
page read and write
20492B71000
trusted library allocation
page read and write
2048A7F5000
trusted library allocation
page read and write
204FF413000
trusted library allocation
page read and write
20495F63000
trusted library allocation
page read and write
D1B4BFF000
stack
page read and write
2048ABF0000
trusted library allocation
page read and write
2048E4FE000
trusted library allocation
page read and write
2049319C000
trusted library allocation
page read and write
2048D896000
trusted library allocation
page read and write
204946B4000
trusted library allocation
page read and write
2048AB7E000
trusted library allocation
page read and write
20492D1B000
trusted library allocation
page read and write
2048CA56000
trusted library allocation
page read and write
20492ADB000
trusted library allocation
page read and write
20496011000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
2048CAE6000
trusted library allocation
page read and write
20496747000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
20495950000
trusted library allocation
page read and write
20495E49000
trusted library allocation
page read and write
20496785000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
204FCC00000
heap
page read and write
20496179000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204FCBE3000
heap
page read and write
16D0000
heap
page read and write
204FFCA8000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
2048E6FC000
trusted library allocation
page read and write
2048CACD000
trusted library allocation
page read and write
2049627C000
trusted library allocation
page read and write
2048D9AB000
trusted library allocation
page read and write
204962B2000
trusted library allocation
page read and write
2048B65E000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
204931BF000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
20496749000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
2049631A000
trusted library allocation
page read and write
2048DA78000
trusted library allocation
page read and write
204963AD000
trusted library allocation
page read and write
1D6AE244000
heap
page read and write
204963F3000
trusted library allocation
page read and write
20495FA5000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
204FCC31000
heap
page read and write
2048B15A000
trusted library allocation
page read and write
204963CA000
trusted library allocation
page read and write
2048C3D2000
trusted library allocation
page read and write
2048ABAE000
trusted library allocation
page read and write
20492DC1000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204967D6000
trusted library allocation
page read and write
20492DB7000
trusted library allocation
page read and write
20495B3F000
trusted library allocation
page read and write
2048A6C5000
trusted library allocation
page read and write
2049621D000
trusted library allocation
page read and write
2048C3E6000
trusted library allocation
page read and write
2E5DEE1A000
trusted library allocation
page read and write
204FF4DB000
trusted library allocation
page read and write
20496050000
trusted library allocation
page read and write
2048A6C5000
trusted library allocation
page read and write
2048A689000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
20495F2F000
trusted library allocation
page read and write
2048A7E9000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048B98B000
trusted library allocation
page read and write
204959FA000
trusted library allocation
page read and write
1D6AE1E8000
heap
page read and write
204FCC0D000
heap
page read and write
204962CA000
trusted library allocation
page read and write
1D6AE23B000
heap
page read and write
204FEEE0000
trusted library allocation
page read and write
2048B3A7000
trusted library allocation
page read and write
2049674B000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
2048B98B000
trusted library allocation
page read and write
1D6AD6C7000
trusted library allocation
page read and write
204FF4B0000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
2048D86E000
trusted library allocation
page read and write
204931A6000
trusted library allocation
page read and write
20495CE4000
trusted library allocation
page read and write
204931A6000
trusted library allocation
page read and write
204FF7B6000
trusted library allocation
page read and write
20495F1B000
trusted library allocation
page read and write
2E5DE860000
remote allocation
page read and write
22867FA000
stack
page read and write
46C000
unkown
page write copy
20495ED0000
trusted library allocation
page read and write
2048C3A5000
trusted library allocation
page read and write
2E5DED34000
heap
page read and write
2048E8AD000
trusted library allocation
page read and write
204FCC0D000
heap
page read and write
1D6AD603000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204FCBD7000
heap
page read and write
2048A6ED000
trusted library allocation
page read and write
204930FD000
trusted library allocation
page read and write
2048A796000
trusted library allocation
page read and write
20494E18000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
2048D80B000
trusted library allocation
page read and write
204FEDA4000
trusted library allocation
page read and write
204967CC000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
204FF76B000
trusted library allocation
page read and write
20488374000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
20496225000
trusted library allocation
page read and write
2049446D000
trusted library allocation
page read and write
1D6AE1EE000
heap
page read and write
20496386000
trusted library allocation
page read and write
1F797530000
trusted library allocation
page read and write
204FF7D8000
trusted library allocation
page read and write
2048CAC6000
trusted library allocation
page read and write
20495BD2000
trusted library allocation
page read and write
20496382000
trusted library allocation
page read and write
2048C3B6000
trusted library allocation
page read and write
20495FA2000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204967CA000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204961FE000
trusted library allocation
page read and write
2048C4B4000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
1D6AD6BC000
trusted library allocation
page read and write
278CC4B000
trusted library allocation
page execute read
2048B998000
trusted library allocation
page read and write
474000
unkown
page readonly
204962A1000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204962A1000
trusted library allocation
page read and write
2048E5DA000
trusted library allocation
page read and write
1DF08C3A000
heap
page read and write
204FCC01000
heap
page read and write
2048D809000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
2048B3AE000
trusted library allocation
page read and write
204FCC42000
heap
page read and write
1D6AE1FD000
heap
page read and write
204FCC33000
heap
page read and write
204FF7FC000
trusted library allocation
page read and write
20496057000
trusted library allocation
page read and write
2E5DEF00000
heap
page read and write
2048A7F5000
trusted library allocation
page read and write
1D6AD550000
unkown
page execute read
2048D861000
trusted library allocation
page read and write
2048CAD5000
trusted library allocation
page read and write
20496329000
trusted library allocation
page read and write
2048B936000
trusted library allocation
page read and write
20497533000
trusted library allocation
page read and write
2048ABC2000
trusted library allocation
page read and write
2048C4C2000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
2048C5B5000
trusted library allocation
page read and write
1D6AE259000
heap
page read and write
2E5DEE00000
trusted library allocation
page read and write
20495982000
trusted library allocation
page read and write
20492BFB000
trusted library allocation
page read and write
2048B3FC000
trusted library allocation
page read and write
2048C413000
trusted library allocation
page read and write
2048F047000
heap
page read and write
204FCC0D000
heap
page read and write
20496753000
trusted library allocation
page read and write
2048B369000
trusted library allocation
page read and write
20495F3F000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
20494EB4000
trusted library allocation
page read and write
2048D861000
trusted library allocation
page read and write
1F797546000
trusted library allocation
page read and write
2048C39A000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
D1B5BFE000
stack
page read and write
204931AD000
trusted library allocation
page read and write
2049632F000
trusted library allocation
page read and write
2048C3F8000
trusted library allocation
page read and write
2048A6F5000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
2049673F000
trusted library allocation
page read and write
20495924000
trusted library allocation
page read and write
2049315D000
trusted library allocation
page read and write
204FCC3C000
heap
page read and write
2048A7EE000
trusted library allocation
page read and write
20492DC1000
trusted library allocation
page read and write
204FF7BA000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048B3E7000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
2048E42D000
trusted library allocation
page read and write
2048C2D1000
trusted library allocation
page read and write
2048E5D5000
trusted library allocation
page read and write
20495F7A000
trusted library allocation
page read and write
20496A61000
trusted library allocation
page read and write
20492BB2000
trusted library allocation
page read and write
204FCC42000
heap
page read and write
2048B911000
trusted library allocation
page read and write
2048C332000
trusted library allocation
page read and write
2049309B000
trusted library allocation
page read and write
2048D8C5000
trusted library allocation
page read and write
2049319C000
trusted library allocation
page read and write
2048D869000
trusted library allocation
page read and write
2048E4F7000
trusted library allocation
page read and write
2E5DEC12000
trusted library allocation
page read and write
2048A67B000
trusted library allocation
page read and write
2048C3D6000
trusted library allocation
page read and write
1D6AE1FD000
heap
page read and write
2048A6AB000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048B9C3000
trusted library allocation
page read and write
2048DAB7000
trusted library allocation
page read and write
16B4000
heap
page read and write
204963C6000
trusted library allocation
page read and write
20492D28000
trusted library allocation
page read and write
204967F3000
trusted library allocation
page read and write
20495FA5000
trusted library allocation
page read and write
2048B1CE000
trusted library allocation
page read and write
2048B160000
trusted library allocation
page read and write
204963F3000
trusted library allocation
page read and write
20496377000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
2048B19D000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048A7FB000
trusted library allocation
page read and write
2049676E000
trusted library allocation
page read and write
20495BE4000
trusted library allocation
page read and write
2048B3ED000
trusted library allocation
page read and write
20492FD5000
trusted library allocation
page read and write
2049319C000
trusted library allocation
page read and write
20495CA8000
trusted library allocation
page read and write
20496370000
trusted library allocation
page read and write
20492EE0000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
2048DAE5000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204FCBD8000
heap
page read and write
2048CA65000
trusted library allocation
page read and write
2E5DEC81000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
1F7975B2000
trusted library allocation
page read and write
2049601D000
trusted library allocation
page read and write
2049603A000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
204960DD000
trusted library allocation
page read and write
2048B33C000
trusted library allocation
page read and write
2048A661000
trusted library allocation
page read and write
2048B6F8000
trusted library allocation
page read and write
20493154000
trusted library allocation
page read and write
2048AB57000
trusted library allocation
page read and write
20493093000
trusted library allocation
page read and write
1F7973A0000
heap
page read and write
2E5DE7F0000
unclassified section
page readonly
2048C2FE000
trusted library allocation
page read and write
204FF4E3000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204FCC40000
heap
page read and write
2048B28A000
trusted library allocation
page read and write
2048A6D5000
trusted library allocation
page read and write
20496078000
trusted library allocation
page read and write
2048B14E000
trusted library allocation
page read and write
204960BB000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048B936000
trusted library allocation
page read and write
204931B0000
trusted library allocation
page read and write
2048B2CD000
trusted library allocation
page read and write
2048C3F8000
trusted library allocation
page read and write
204FF76B000
trusted library allocation
page read and write
2048CADE000
trusted library allocation
page read and write
20496738000
trusted library allocation
page read and write
204962CA000
trusted library allocation
page read and write
1D6AE015000
trusted library allocation
page read and write
20496078000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048F0E1000
heap
page read and write
204FF493000
trusted library allocation
page read and write
20493021000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
20492DC1000
trusted library allocation
page read and write
20494E89000
trusted library allocation
page read and write
2048A6D9000
trusted library allocation
page read and write
204881F9000
trusted library allocation
page read and write
2048B97F000
trusted library allocation
page read and write
204FFCE2000
trusted library allocation
page read and write
20496767000
trusted library allocation
page read and write
2048CA7D000
trusted library allocation
page read and write
2048CAD5000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
204960D6000
trusted library allocation
page read and write
20495FF7000
trusted library allocation
page read and write
204967AD000
trusted library allocation
page read and write
16D8000
heap
page read and write
2049623B000
trusted library allocation
page read and write
20496799000
trusted library allocation
page read and write
20495BC7000
trusted library allocation
page read and write
C22D1D8000
stack
page read and write
2048C330000
trusted library allocation
page read and write
2048A656000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
2048C3F8000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204FEE61000
trusted library allocation
page read and write
2048AE8B000
heap
page read and write
2048AB72000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
20494ECA000
trusted library allocation
page read and write
2048A65C000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
204967F4000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
1D6AE18A000
heap
page read and write
20495F8E000
trusted library allocation
page read and write
2048ABDE000
trusted library allocation
page read and write
C22EA7E000
unkown
page readonly
1D6AE160000
heap
page read and write
2048B18F000
trusted library allocation
page read and write
1701000
heap
page read and write
204967D6000
trusted library allocation
page read and write
20492D93000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20492F58000
trusted library allocation
page read and write
20495ED0000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048B1D2000
trusted library allocation
page read and write
20492BB2000
trusted library allocation
page read and write
204967BF000
trusted library allocation
page read and write
2048AEFE000
heap
page read and write
2048ABE1000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048A6F5000
trusted library allocation
page read and write
1F7971C0000
heap
page read and write
2E5DEC47000
trusted library allocation
page read and write
C22EA3B000
stack
page read and write
2048ABAE000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
20492F72000
trusted library allocation
page read and write
2048B39B000
trusted library allocation
page read and write
204FCBDB000
heap
page read and write
2048B6C4000
trusted library allocation
page read and write
20496059000
trusted library allocation
page read and write
2048C4BA000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
20495934000
trusted library allocation
page read and write
20496014000
trusted library allocation
page read and write
20492ADB000
trusted library allocation
page read and write
20492E72000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
2048CADE000
trusted library allocation
page read and write
204959B8000
trusted library allocation
page read and write
2049446B000
trusted library allocation
page read and write
2E5DEC6E000
trusted library allocation
page read and write
2049621D000
trusted library allocation
page read and write
204FCC32000
heap
page read and write
20488378000
trusted library allocation
page read and write
20496223000
trusted library allocation
page read and write
2048A683000
trusted library allocation
page read and write
204FF783000
trusted library allocation
page read and write
2048B199000
trusted library allocation
page read and write
2048A659000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
204FF323000
trusted library allocation
page read and write
2049311A000
trusted library allocation
page read and write
2048B936000
trusted library allocation
page read and write
204FF371000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
2049632D000
trusted library allocation
page read and write
2048E546000
trusted library allocation
page read and write
2048B3D7000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
20494EB1000
trusted library allocation
page read and write
16B4000
heap
page read and write
204FCBD1000
heap
page read and write
2048B2A4000
trusted library allocation
page read and write
20496154000
trusted library allocation
page read and write
1D6AD686000
trusted library allocation
page read and write
20492B1D000
trusted library allocation
page read and write
1D6AD600000
trusted library allocation
page read and write
204930CD000
trusted library allocation
page read and write
20495985000
trusted library allocation
page read and write
2048B19F000
trusted library allocation
page read and write
204FEE4D000
trusted library allocation
page read and write
20496A1B000
trusted library allocation
page read and write
204FFC6B000
trusted library allocation
page read and write
2048B93E000
trusted library allocation
page read and write
204FCBDB000
heap
page read and write
20496125000
trusted library allocation
page read and write
2048DA6E000
trusted library allocation
page read and write
20496043000
trusted library allocation
page read and write
2048C2CD000
trusted library allocation
page read and write
204FF7D8000
trusted library allocation
page read and write
204FF4AB000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
2048A7F1000
trusted library allocation
page read and write
204931A1000
trusted library allocation
page read and write
1D6AE1E8000
heap
page read and write
2048A6FC000
trusted library allocation
page read and write
2048C4EA000
trusted library allocation
page read and write
20495985000
trusted library allocation
page read and write
204FF76B000
trusted library allocation
page read and write
204FF79E000
trusted library allocation
page read and write
204FF7ED000
trusted library allocation
page read and write
2048CA63000
trusted library allocation
page read and write
204FFCAC000
trusted library allocation
page read and write
2E5DE880000
unclassified section
page readonly
20496043000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
2049314E000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
20496749000
trusted library allocation
page read and write
2048B6FE000
trusted library allocation
page read and write
2048AEEB000
heap
page read and write
204FEE4D000
trusted library allocation
page read and write
2048D89B000
trusted library allocation
page read and write
2049599A000
trusted library allocation
page read and write
2048A6F6000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
2048AE95000
heap
page read and write
20494468000
trusted library allocation
page read and write
204FCBE7000
heap
page read and write
2048B2A4000
trusted library allocation
page read and write
2048ABDE000
trusted library allocation
page read and write
20496A1B000
trusted library allocation
page read and write
1D6AE258000
heap
page read and write
20496154000
trusted library allocation
page read and write
2048C4B4000
trusted library allocation
page read and write
43C000
unkown
page readonly
1D6AE1FD000
heap
page read and write
2048ABB8000
trusted library allocation
page read and write
20493143000
trusted library allocation
page read and write
20496A47000
trusted library allocation
page read and write
20492AF5000
trusted library allocation
page read and write
2E5DED36000
heap
page read and write
20495CE6000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
204FF7B2000
trusted library allocation
page read and write
2048C356000
trusted library allocation
page read and write
20492B76000
trusted library allocation
page read and write
20492F8E000
trusted library allocation
page read and write
20492DB1000
trusted library allocation
page read and write
204FF7DE000
trusted library allocation
page read and write
20492BDC000
trusted library allocation
page read and write
20495FEE000
trusted library allocation
page read and write
204FF7BA000
trusted library allocation
page read and write
204883C3000
trusted library allocation
page read and write
2048C3B1000
trusted library allocation
page read and write
204FEEAD000
trusted library allocation
page read and write
2048C2CB000
trusted library allocation
page read and write
204FF785000
trusted library allocation
page read and write
204966EC000
trusted library allocation
page read and write
2048CADE000
trusted library allocation
page read and write
20492AF5000
trusted library allocation
page read and write
2048B35F000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
20488125000
trusted library allocation
page read and write
204967BF000
trusted library allocation
page read and write
204967FD000
trusted library allocation
page read and write
1D6AE1E0000
heap
page read and write
20492D9C000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
201E000
stack
page read and write
2048E549000
trusted library allocation
page read and write
204FCC3F000
heap
page read and write
204FCC32000
heap
page read and write
204FCC01000
heap
page read and write
204FCBE1000
heap
page read and write
204FCC36000
heap
page read and write
20495BF7000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2E5DEA60000
unclassified section
page read and write
1D6AE1F1000
heap
page read and write
2048AEAE000
heap
page read and write
204FF79E000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
20495F2D000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
20492EFD000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
12F2B3E000
unkown
page readonly
204FCBE5000
heap
page read and write
20496751000
trusted library allocation
page read and write
1F7975DB000
trusted library allocation
page read and write
2048B3B0000
trusted library allocation
page read and write
204966F0000
trusted library allocation
page read and write
204FF3F6000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
204FCBE3000
heap
page read and write
2048A6CA000
trusted library allocation
page read and write
2048CA7D000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2048D8AB000
trusted library allocation
page read and write
20492D85000
trusted library allocation
page read and write
C22F37E000
stack
page read and write
2048A659000
trusted library allocation
page read and write
2048B947000
trusted library allocation
page read and write
16EF000
heap
page read and write
20492BD1000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
204FF7D8000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
2048CAA5000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
2048B947000
trusted library allocation
page read and write
204FF4FE000
trusted library allocation
page read and write
1D6AD666000
trusted library allocation
page read and write
204FEE8B000
trusted library allocation
page read and write
204962AA000
trusted library allocation
page read and write
20495BE2000
trusted library allocation
page read and write
2048CAAB000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
204967F6000
trusted library allocation
page read and write
204930B0000
trusted library allocation
page read and write
20497577000
trusted library allocation
page read and write
20494EFC000
trusted library allocation
page read and write
2E5DEE0C000
trusted library allocation
page read and write
2048A689000
trusted library allocation
page read and write
204881EC000
trusted library allocation
page read and write
20492ED8000
trusted library allocation
page read and write
204931D7000
trusted library allocation
page read and write
2E5DEC64000
trusted library allocation
page read and write
1D6AE267000
heap
page read and write
2048833F000
trusted library allocation
page read and write
2048A653000
trusted library allocation
page read and write
204962AA000
trusted library allocation
page read and write
20493158000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204960D0000
trusted library allocation
page read and write
2048ABC7000
trusted library allocation
page read and write
2048B947000
trusted library allocation
page read and write
4111000
heap
page read and write
2048B183000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
2048CA5F000
trusted library allocation
page read and write
204FEE8B000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
204963CA000
trusted library allocation
page read and write
1D6AE1E9000
heap
page read and write
204FCBD8000
heap
page read and write
20492A3C000
trusted library allocation
page read and write
2048B6E8000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
20496233000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
20496799000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048AB0E000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
204962C6000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
2049632D000
trusted library allocation
page read and write
2048CADA000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048A7C6000
trusted library allocation
page read and write
2048B915000
trusted library allocation
page read and write
204FCC3C000
heap
page read and write
2048B2A4000
trusted library allocation
page read and write
20496331000
trusted library allocation
page read and write
226A2800000
heap
page read and write
2E5DEA70000
heap
page read and write
20494F01000
trusted library allocation
page read and write
20494EB1000
trusted library allocation
page read and write
2048DA53000
trusted library allocation
page read and write
204966CE000
trusted library allocation
page read and write
2048B618000
trusted library allocation
page read and write
20492BA2000
trusted library allocation
page read and write
2048C3AA000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
2048ABA5000
trusted library allocation
page read and write
2048B000000
trusted library allocation
page read and write
2048A6D0000
trusted library allocation
page read and write
3A0000
unkown
page readonly
2048AE91000
heap
page read and write
204FCC33000
heap
page read and write
FA152FE000
stack
page read and write
2048CA77000
trusted library allocation
page read and write
20488233000
trusted library allocation
page read and write
1D6AE1B9000
heap
page read and write
1F797400000
trusted library allocation
page read and write
20495982000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
204FEDF9000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
20493099000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
204FF7FC000
trusted library allocation
page read and write
204963AF000
trusted library allocation
page read and write
2048B996000
trusted library allocation
page read and write
20495BD2000
trusted library allocation
page read and write
2049675C000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2048C3BA000
trusted library allocation
page read and write
20495F5A000
trusted library allocation
page read and write
20492E43000
trusted library allocation
page read and write
2048C3D6000
trusted library allocation
page read and write
20495915000
trusted library allocation
page read and write
20496A47000
trusted library allocation
page read and write
204FF4D1000
trusted library allocation
page read and write
2048E4DF000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048C3A9000
trusted library allocation
page read and write
204FCC00000
heap
page read and write
204FF7AD000
trusted library allocation
page read and write
204FF785000
trusted library allocation
page read and write
204967AA000
trusted library allocation
page read and write
204FEDCC000
trusted library allocation
page read and write
20492D83000
trusted library allocation
page read and write
2048ABBE000
trusted library allocation
page read and write
20496717000
trusted library allocation
page read and write
20495F72000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
2048B3D1000
trusted library allocation
page read and write
2048D8C5000
trusted library allocation
page read and write
20492D8D000
trusted library allocation
page read and write
20496AD9000
trusted library allocation
page read and write
204FCC0C000
heap
page read and write
20496064000
trusted library allocation
page read and write
20495CDF000
trusted library allocation
page read and write
2048A6D2000
trusted library allocation
page read and write
20494E5C000
trusted library allocation
page read and write
2048D7FE000
trusted library allocation
page read and write
20495ECE000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
1D6AD120000
heap
page read and write
2048B9AC000
trusted library allocation
page read and write
204931FC000
trusted library allocation
page read and write
2048B163000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2049676A000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
204FEEE2000
trusted library allocation
page read and write
20496793000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
204FF7ED000
trusted library allocation
page read and write
1F7975A2000
trusted library allocation
page read and write
204931E4000
trusted library allocation
page read and write
204FF783000
trusted library allocation
page read and write
20495E47000
trusted library allocation
page read and write
204FCC09000
heap
page read and write
204967E1000
trusted library allocation
page read and write
2048D86E000
trusted library allocation
page read and write
2048ABF0000
trusted library allocation
page read and write
20493121000
trusted library allocation
page read and write
2048D830000
trusted library allocation
page read and write
20492AE3000
trusted library allocation
page read and write
20496348000
trusted library allocation
page read and write
2048DA98000
trusted library allocation
page read and write
20492DB7000
trusted library allocation
page read and write
2049623B000
trusted library allocation
page read and write
20492D93000
trusted library allocation
page read and write
20494E18000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
2049315A000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
20495CF1000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
2048E450000
trusted library allocation
page read and write
204FCC3C000
heap
page read and write
20492ADF000
trusted library allocation
page read and write
204FCC33000
heap
page read and write
20492B95000
trusted library allocation
page read and write
204FF7FC000
trusted library allocation
page read and write
2048E4AD000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2048E4F3000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048A643000
trusted library allocation
page read and write
2048A6FE000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
2049678E000
trusted library allocation
page read and write
204966F4000
trusted library allocation
page read and write
1D6AD648000
trusted library allocation
page read and write
20494EFC000
trusted library allocation
page read and write
20492EF5000
trusted library allocation
page read and write
2048A6B2000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
204FF7AD000
trusted library allocation
page read and write
20496777000
trusted library allocation
page read and write
2048A6F6000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
2048CA84000
trusted library allocation
page read and write
20496A13000
trusted library allocation
page read and write
204946B4000
trusted library allocation
page read and write
20492DF8000
trusted library allocation
page read and write
20495E47000
trusted library allocation
page read and write
20495EFA000
trusted library allocation
page read and write
2048D967000
trusted library allocation
page read and write
204FCBDF000
heap
page read and write
2048D896000
trusted library allocation
page read and write
2049315F000
trusted library allocation
page read and write
204FF426000
trusted library allocation
page read and write
2048B3D6000
trusted library allocation
page read and write
20496289000
trusted library allocation
page read and write
2048C4AB000
trusted library allocation
page read and write
2048B3FC000
trusted library allocation
page read and write
204FF488000
trusted library allocation
page read and write
2049626E000
trusted library allocation
page read and write
2048CF00000
trusted library allocation
page read and write
20492D85000
trusted library allocation
page read and write
204FCC05000
heap
page read and write
204946B0000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
204967F4000
trusted library allocation
page read and write
20495C78000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
204FCBF3000
heap
page read and write
2048E6E5000
trusted library allocation
page read and write
204FF79E000
trusted library allocation
page read and write
204FF7D5000
trusted library allocation
page read and write
2048B3E0000
trusted library allocation
page read and write
2048CA05000
trusted library allocation
page read and write
2049597C000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
2048ABA7000
trusted library allocation
page read and write
20495CDF000
trusted library allocation
page read and write
2048B33E000
trusted library allocation
page read and write
20492B86000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
2048B2CD000
trusted library allocation
page read and write
1DF08C4E000
heap
page read and write
20495CDF000
trusted library allocation
page read and write
1D6AD280000
heap
page readonly
20495AD0000
trusted library allocation
page read and write
2048DA80000
trusted library allocation
page read and write
2049315D000
trusted library allocation
page read and write
204FCC0D000
heap
page read and write
204FCBE1000
heap
page read and write
2048A671000
trusted library allocation
page read and write
2048C2F9000
trusted library allocation
page read and write
FA15B3E000
stack
page read and write
20494380000
trusted library allocation
page read and write
204FCBD7000
heap
page read and write
2049313B000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
204931E3000
trusted library allocation
page read and write
204FF7A0000
trusted library allocation
page read and write
204963AF000
trusted library allocation
page read and write
1D6AE1FD000
heap
page read and write
20496AD0000
trusted library allocation
page read and write
20496A20000
trusted library allocation
page read and write
2048B26A000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
2048A7F1000
trusted library allocation
page read and write
2048AE96000
heap
page read and write
20488383000
trusted library allocation
page read and write
20492BBF000
trusted library allocation
page read and write
204FF79E000
trusted library allocation
page read and write
2048B38B000
trusted library allocation
page read and write
2049312A000
trusted library allocation
page read and write
1D6AD69F000
trusted library allocation
page read and write
2048B3CC000
trusted library allocation
page read and write
1D6AE23B000
heap
page read and write
20496785000
trusted library allocation
page read and write
20488352000
trusted library allocation
page read and write
2048ABBE000
trusted library allocation
page read and write
20488324000
trusted library allocation
page read and write
20495F50000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
2048B2CD000
trusted library allocation
page read and write
2048E441000
trusted library allocation
page read and write
1D6AD210000
heap
page read and write
2049622A000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
204931BC000
trusted library allocation
page read and write
204967F4000
trusted library allocation
page read and write
2048CABE000
trusted library allocation
page read and write
2E5DEB00000
trusted library allocation
page read and write
204963C6000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
1D6AE1F1000
heap
page read and write
1DF08EF0000
heap
page read and write
20495BE9000
trusted library allocation
page read and write
1D6AE1A1000
heap
page read and write
204FCC03000
heap
page read and write
1F79780C000
trusted library allocation
page read and write
2048CA86000
trusted library allocation
page read and write
20494F24000
trusted library allocation
page read and write
2048B18F000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
2048B937000
trusted library allocation
page read and write
20492E96000
trusted library allocation
page read and write
204FFCC0000
trusted library allocation
page read and write
16B4000
heap
page read and write
20495915000
trusted library allocation
page read and write
204FFCE1000
trusted library allocation
page read and write
2049311A000
trusted library allocation
page read and write
2048ABE1000
trusted library allocation
page read and write
2048A79D000
trusted library allocation
page read and write
2048B1F7000
trusted library allocation
page read and write
160E000
stack
page read and write
204FCBD9000
heap
page read and write
204FCC47000
heap
page read and write
2048C3D2000
trusted library allocation
page read and write
20492AB6000
trusted library allocation
page read and write
2048B18F000
trusted library allocation
page read and write
20496343000
trusted library allocation
page read and write
204963D1000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
204FCBD1000
heap
page read and write
204FCBD0000
heap
page read and write
2048B3A7000
trusted library allocation
page read and write
20493156000
trusted library allocation
page read and write
2048CA65000
trusted library allocation
page read and write
204FF475000
trusted library allocation
page read and write
204FCC08000
heap
page read and write
20495FF7000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
20492E90000
trusted library allocation
page read and write
20495CEB000
trusted library allocation
page read and write
2049603E000
trusted library allocation
page read and write
20496773000
trusted library allocation
page read and write
204FCC0A000
heap
page read and write
2049621D000
trusted library allocation
page read and write
2048B6E0000
trusted library allocation
page read and write
2E5DEC2E000
trusted library allocation
page read and write
20492BD3000
trusted library allocation
page read and write
20495F1A000
trusted library allocation
page read and write
204963F3000
trusted library allocation
page read and write
1D6AE244000
heap
page read and write
204FCC11000
heap
page read and write
2049637B000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
204FCBE1000
heap
page read and write
2048C3F8000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
20492BD1000
trusted library allocation
page read and write
20496691000
trusted library allocation
page read and write
FA11F88000
stack
page read and write
20495F50000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
20496767000
trusted library allocation
page read and write
204FCC32000
heap
page read and write
2049446B000
trusted library allocation
page read and write
462000
unkown
page readonly
2049622D000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
2048A692000
trusted library allocation
page read and write
204962AF000
trusted library allocation
page read and write
1D6AD69D000
trusted library allocation
page read and write
2048D9EB000
trusted library allocation
page read and write
2048A6D0000
trusted library allocation
page read and write
2049623B000
trusted library allocation
page read and write
2048B2A4000
trusted library allocation
page read and write
204963C6000
trusted library allocation
page read and write
20492B86000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20495CE6000
trusted library allocation
page read and write
20495969000
trusted library allocation
page read and write
2048CA6A000
trusted library allocation
page read and write
2049633F000
trusted library allocation
page read and write
204961CD000
trusted library allocation
page read and write
20496179000
trusted library allocation
page read and write
20495F20000
trusted library allocation
page read and write
2048B2A4000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
20496745000
trusted library allocation
page read and write
2049598C000
trusted library allocation
page read and write
204883FB000
trusted library allocation
page read and write
204967F6000
trusted library allocation
page read and write
204FEECD000
trusted library allocation
page read and write
1D6AE169000
heap
page read and write
204FCC39000
heap
page read and write
1D6AE22A000
heap
page read and write
2048AB69000
trusted library allocation
page read and write
204966EC000
trusted library allocation
page read and write
204FCC01000
heap
page read and write
1D6AE258000
heap
page read and write
204961CD000
trusted library allocation
page read and write
2048C391000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
2048B193000
trusted library allocation
page read and write
2048B23B000
trusted library allocation
page read and write
20493177000
trusted library allocation
page read and write
226A2B00000
trusted library allocation
page read and write
20495EBA000
trusted library allocation
page read and write
204FCC3E000
heap
page read and write
1F797800000
trusted library allocation
page read and write
1F797600000
heap
page read and write
2287FFE000
stack
page read and write
2049446D000
trusted library allocation
page read and write
2048B398000
trusted library allocation
page read and write
2048A7E9000
trusted library allocation
page read and write
2048B6CC000
trusted library allocation
page read and write
204FF7F4000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
20495E47000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
20494E5C000
trusted library allocation
page read and write
20492D83000
trusted library allocation
page read and write
2048B949000
trusted library allocation
page read and write
2048A696000
trusted library allocation
page read and write
2048C2C9000
trusted library allocation
page read and write
20496AD9000
trusted library allocation
page read and write
204931E2000
trusted library allocation
page read and write
204FEEEF000
trusted library allocation
page read and write
1F797170000
remote allocation
page read and write
204FCBE9000
heap
page read and write
2048B33E000
trusted library allocation
page read and write
20495FA5000
trusted library allocation
page read and write
2048B2CD000
trusted library allocation
page read and write
2048AB69000
trusted library allocation
page read and write
20495EFE000
trusted library allocation
page read and write
2048B9F4000
trusted library allocation
page read and write
2048A6DA000
trusted library allocation
page read and write
2048D8AB000
trusted library allocation
page read and write
20493130000
trusted library allocation
page read and write
2048D975000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
20495CED000
trusted library allocation
page read and write
20496059000
trusted library allocation
page read and write
2048A6A5000
trusted library allocation
page read and write
1F797200000
heap
page read and write
2048836E000
trusted library allocation
page read and write
2049622D000
trusted library allocation
page read and write
2048B9C3000
trusted library allocation
page read and write
470000
unkown
page write copy
2048C488000
trusted library allocation
page read and write
1F7975C4000
trusted library allocation
page read and write
20496150000
trusted library allocation
page read and write
2048CA9C000
trusted library allocation
page read and write
2048ABA7000
trusted library allocation
page read and write
2049318E000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
2048C600000
trusted library allocation
page read and write
1D6AE15C000
heap
page read and write
20495E51000
trusted library allocation
page read and write
1F797272000
unclassified section
page read and write
20496799000
trusted library allocation
page read and write
204960E0000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048B39D000
trusted library allocation
page read and write
2048C4AB000
trusted library allocation
page read and write
2048C3DB000
trusted library allocation
page read and write
2048A7A5000
trusted library allocation
page read and write
2049754A000
trusted library allocation
page read and write
20492BDC000
trusted library allocation
page read and write
20496054000
trusted library allocation
page read and write
C22E1FE000
stack
page read and write
20493136000
trusted library allocation
page read and write
20494ECA000
trusted library allocation
page read and write
204FCC07000
heap
page read and write
2048B979000
trusted library allocation
page read and write
20496011000
trusted library allocation
page read and write
20496239000
trusted library allocation
page read and write
2048C3F8000
trusted library allocation
page read and write
2048CADE000
trusted library allocation
page read and write
20492DDB000
trusted library allocation
page read and write
2048C488000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
204FF766000
trusted library allocation
page read and write
462000
unkown
page readonly
1F7971B0000
heap
page read and write
204960D6000
trusted library allocation
page read and write
204963FD000
trusted library allocation
page read and write
204963CE000
trusted library allocation
page read and write
20494386000
trusted library allocation
page read and write
20496333000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
20496230000
trusted library allocation
page read and write
20495F20000
trusted library allocation
page read and write
2048B6D9000
trusted library allocation
page read and write
1717000
heap
page read and write
2048CAE6000
trusted library allocation
page read and write
2048B627000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
204FCBE1000
heap
page read and write
1DF08C70000
heap
page read and write
204963A3000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
204FCC42000
heap
page read and write
20495EBA000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
204961CD000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
20496393000
trusted library allocation
page read and write
20496746000
trusted library allocation
page read and write
2048B936000
trusted library allocation
page read and write
2048E465000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204FCBE3000
heap
page read and write
2048A6B5000
trusted library allocation
page read and write
D1B53FD000
stack
page read and write
204966DE000
trusted library allocation
page read and write
2048C4B4000
trusted library allocation
page read and write
2048E4E8000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
20496154000
trusted library allocation
page read and write
20496221000
trusted library allocation
page read and write
20495E36000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
20493159000
trusted library allocation
page read and write
2048C3DB000
trusted library allocation
page read and write
1D6AE109000
heap
page read and write
20495A47000
trusted library allocation
page read and write
2048A671000
trusted library allocation
page read and write
2048B3AC000
trusted library allocation
page read and write
204FCC42000
heap
page read and write
2048C90A000
trusted library allocation
page read and write
204FFC7C000
trusted library allocation
page read and write
2048B2A4000
trusted library allocation
page read and write
20492BCD000
trusted library allocation
page read and write
204931FC000
trusted library allocation
page read and write
20495F85000
trusted library allocation
page read and write
1DF08C52000
heap
page read and write
2048D8A2000
trusted library allocation
page read and write
2048AB64000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
204FCC02000
heap
page read and write
204967CA000
trusted library allocation
page read and write
204963CE000
trusted library allocation
page read and write
C22E9FE000
unkown
page readonly
204962CA000
trusted library allocation
page read and write
2048DAFC000
trusted library allocation
page read and write
12F2AFE000
stack
page read and write
2048C3DB000
trusted library allocation
page read and write
20494EF9000
trusted library allocation
page read and write
2048AB6F000
trusted library allocation
page read and write
20496381000
trusted library allocation
page read and write
2048CA6D000
trusted library allocation
page read and write
204962A8000
trusted library allocation
page read and write
16B4000
heap
page read and write
204FCBD1000
heap
page read and write
204967CC000
trusted library allocation
page read and write
204967BC000
trusted library allocation
page read and write
20495F85000
trusted library allocation
page read and write
204931A1000
trusted library allocation
page read and write
20495F0E000
trusted library allocation
page read and write
1D6AE1EE000
heap
page read and write
204FCBD9000
heap
page read and write
2048DAD6000
trusted library allocation
page read and write
1DF08C90000
heap
page read and write
2048B3B0000
trusted library allocation
page read and write
4111000
heap
page read and write
2048F011000
heap
page read and write
204966EA000
trusted library allocation
page read and write
278CC4B000
trusted library allocation
page execute read
204FCC31000
heap
page read and write
2049621D000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
2049633E000
trusted library allocation
page read and write
204967A8000
trusted library allocation
page read and write
2048ABC7000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
2048B36B000
trusted library allocation
page read and write
204967A3000
trusted library allocation
page read and write
20492DC3000
trusted library allocation
page read and write
204962D2000
trusted library allocation
page read and write
204963CA000
trusted library allocation
page read and write
204FCBD8000
heap
page read and write
204966FA000
trusted library allocation
page read and write
2048A6FC000
trusted library allocation
page read and write
20495E32000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
2048A685000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
1F797524000
trusted library allocation
page read and write
204962AB000
trusted library allocation
page read and write
204FCBDA000
heap
page read and write
2048832A000
trusted library allocation
page read and write
1D6AD230000
heap
page read and write
2048A661000
trusted library allocation
page read and write
1D6AE258000
heap
page read and write
2048D86E000
trusted library allocation
page read and write
20496216000
trusted library allocation
page read and write
204FCBD0000
heap
page read and write
204FCBE3000
heap
page read and write
2048D82A000
trusted library allocation
page read and write
204963FB000
trusted library allocation
page read and write
2048B2A4000
trusted library allocation
page read and write
2048B189000
trusted library allocation
page read and write
204FCBE0000
heap
page read and write
204966EE000
trusted library allocation
page read and write
20492B6D000
trusted library allocation
page read and write
16B4000
heap
page read and write
2048B947000
trusted library allocation
page read and write
20495963000
trusted library allocation
page read and write
2048B3E7000
trusted library allocation
page read and write
2048A630000
trusted library allocation
page read and write
2048D891000
trusted library allocation
page read and write
2048ABAE000
trusted library allocation
page read and write
226A2B07000
trusted library allocation
page read and write
20496339000
trusted library allocation
page read and write
20494464000
trusted library allocation
page read and write
2048C3B1000
trusted library allocation
page read and write
2048B195000
trusted library allocation
page read and write
20493099000
trusted library allocation
page read and write
20492BBA000
trusted library allocation
page read and write
2049312A000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
204FCBD2000
heap
page read and write
204963D1000
trusted library allocation
page read and write
20496230000
trusted library allocation
page read and write
2048DA90000
trusted library allocation
page read and write
2049446D000
trusted library allocation
page read and write
204FCC02000
heap
page read and write
1D6AE17F000
heap
page read and write
204931E7000
trusted library allocation
page read and write
2048A66B000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20495A43000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
20496366000
trusted library allocation
page read and write
2049677E000
trusted library allocation
page read and write
204960E7000
trusted library allocation
page read and write
C22EABC000
stack
page read and write
204962C6000
trusted library allocation
page read and write
204967E1000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
2048D896000
trusted library allocation
page read and write
1DF0A7A0000
heap
page read and write
204FCBD2000
heap
page read and write
204FEDEF000
trusted library allocation
page read and write
2048A6D7000
trusted library allocation
page read and write
2048A62F000
trusted library allocation
page read and write
2048A6BB000
trusted library allocation
page read and write
2049449E000
trusted library allocation
page read and write
20492B82000
trusted library allocation
page read and write
204FF7E6000
trusted library allocation
page read and write
2048B3B4000
trusted library allocation
page read and write
204FCC11000
heap
page read and write
20496799000
trusted library allocation
page read and write
204966E1000
trusted library allocation
page read and write
2048B3F6000
trusted library allocation
page read and write
20492FCD000
trusted library allocation
page read and write
20492D81000
trusted library allocation
page read and write
2048ABA5000
trusted library allocation
page read and write
20492DB1000
trusted library allocation
page read and write
566A0C40000
trusted library allocation
page read and write
2048B6EA000
trusted library allocation
page read and write
2048ABB6000
trusted library allocation
page read and write
2049677B000
trusted library allocation
page read and write
1D6AD5F0000
heap
page read and write
204FF7AD000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
20495A90000
trusted library allocation
page read and write
204FCBD1000
heap
page read and write
2E5DEC10000
trusted library allocation
page read and write
2048B98D000
trusted library allocation
page read and write
20492D8D000
trusted library allocation
page read and write
204962A1000
trusted library allocation
page read and write
2048B29E000
trusted library allocation
page read and write
204967B3000
trusted library allocation
page read and write
20494E61000
trusted library allocation
page read and write
20496383000
trusted library allocation
page read and write
204963D1000
trusted library allocation
page read and write
20495EB8000
trusted library allocation
page read and write
1D6AE1E3000
heap
page read and write
2048B952000
trusted library allocation
page read and write
1D6AE267000
heap
page read and write
20495939000
trusted library allocation
page read and write
2048A7D3000
trusted library allocation
page read and write
2048A671000
trusted library allocation
page read and write
20496334000
trusted library allocation
page read and write
2049632B000
trusted library allocation
page read and write
1DF08C30000
heap
page read and write
204960DD000
trusted library allocation
page read and write
2048B9BF000
trusted library allocation
page read and write
204FF376000
trusted library allocation
page read and write
204FCBE5000
heap
page read and write
20496064000
trusted library allocation
page read and write
20494000000
trusted library allocation
page read and write
1D6AE244000
heap
page read and write
2048AEA8000
heap
page read and write
20496080000
trusted library allocation
page read and write
3DC0000
heap
page read and write
1D6AE1A8000
heap
page read and write
1239000
stack
page read and write
2E5DEE08000
trusted library allocation
page read and write
20496230000
trusted library allocation
page read and write
20495C49000
trusted library allocation
page read and write
20492B80000
trusted library allocation
page read and write
2048B3ED000
trusted library allocation
page read and write
2048ABE6000
trusted library allocation
page read and write
2048B1D2000
trusted library allocation
page read and write
2048CADE000
trusted library allocation
page read and write
20496371000
trusted library allocation
page read and write
204967CA000
trusted library allocation
page read and write
12F333E000
stack
page read and write
2048A640000
trusted library allocation
page read and write
204963AD000
trusted library allocation
page read and write
1D6AE160000
heap
page read and write
204FCC11000
heap
page read and write
3A0000
unkown
page readonly
2048A7B6000
trusted library allocation
page read and write
204FCBE3000
heap
page read and write
204FCBDD000
heap
page read and write
20492AFB000
trusted library allocation
page read and write
1DF08D00000
trusted library allocation
page read and write
20495A41000
trusted library allocation
page read and write
204962C6000
trusted library allocation
page read and write
204962A8000
trusted library allocation
page read and write
204966DC000
trusted library allocation
page read and write
1F797582000
trusted library allocation
page read and write
204962BB000
trusted library allocation
page read and write
20495E5B000
trusted library allocation
page read and write
20496236000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
16FD000
heap
page read and write
1F797256000
heap
page read and write
20496009000
trusted library allocation
page read and write
204967D6000
trusted library allocation
page read and write
20496150000
trusted library allocation
page read and write
204FCBE9000
heap
page read and write
20495E6B000
trusted library allocation
page read and write
2E5DEA50000
heap
page readonly
204FCC0D000
heap
page read and write
204FCC02000
heap
page read and write
2048B35F000
trusted library allocation
page read and write
FA11F0E000
unkown
page readonly
1F797572000
trusted library allocation
page read and write
204962D3000
trusted library allocation
page read and write
204FCBE1000
heap
page read and write
204967D3000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
20496793000
trusted library allocation
page read and write
1D6AE01F000
trusted library allocation
page read and write
2048B949000
trusted library allocation
page read and write
2048B259000
trusted library allocation
page read and write
2048B945000
trusted library allocation
page read and write
2048E4A2000
trusted library allocation
page read and write
2048D8C8000
trusted library allocation
page read and write
2E5DEA90000
unclassified section
page readonly
2048B9F4000
trusted library allocation
page read and write
2049676B000
trusted library allocation
page read and write
2048A6A5000
trusted library allocation
page read and write
2049308F000
trusted library allocation
page read and write
2048CAA0000
trusted library allocation
page read and write
204FCC47000
heap
page read and write
204931BA000
trusted library allocation
page read and write
20496233000
trusted library allocation
page read and write
204FCBD9000
heap
page read and write
1F797549000
trusted library allocation
page read and write
2049759F000
trusted library allocation
page read and write
2048C35B000
trusted library allocation
page read and write
204883CA000
trusted library allocation
page read and write
22887FF000
stack
page read and write
1702000
heap
page read and write
20495F63000
trusted library allocation
page read and write
20492DCA000
trusted library allocation
page read and write
204962AA000
trusted library allocation
page read and write
204FF7ED000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
204931FC000
trusted library allocation
page read and write
204962DE000
trusted library allocation
page read and write
20496223000
trusted library allocation
page read and write
20492B52000
trusted library allocation
page read and write
204963BF000
trusted library allocation
page read and write
2048C4B1000
trusted library allocation
page read and write
20496337000
trusted library allocation
page read and write
2049679E000
trusted library allocation
page read and write
20492AEA000
trusted library allocation
page read and write
2048B14C000
trusted library allocation
page read and write
204FCC22000
heap
page read and write
204963A7000
trusted library allocation
page read and write
2048D872000
trusted library allocation
page read and write
2E5DEC97000
trusted library allocation
page read and write
204FED98000
trusted library allocation
page read and write
1D6AE1F1000
heap
page read and write
204962AA000
trusted library allocation
page read and write
2049449E000
trusted library allocation
page read and write
1D6AE169000
heap
page read and write
2048AEA8000
heap
page read and write
204FCC31000
heap
page read and write
204FCBE1000
heap
page read and write
20496AC4000
trusted library allocation
page read and write
D1B4BFC000
stack
page read and write
2048A6D2000
trusted library allocation
page read and write
1DF08F07000
trusted library allocation
page read and write
2048A6B9000
trusted library allocation
page read and write
2048B1C9000
trusted library allocation
page read and write
20495FA5000
trusted library allocation
page read and write
2048A640000
trusted library allocation
page read and write
16F7000
heap
page read and write
1F797562000
trusted library allocation
page read and write
20488374000
trusted library allocation
page read and write
204FCBD2000
heap
page read and write
2048CA77000
trusted library allocation
page read and write
2048ABF1000
trusted library allocation
page read and write
204FCC18000
heap
page read and write
204960B8000
trusted library allocation
page read and write
2048C2C7000
trusted library allocation
page read and write
204963F9000
trusted library allocation
page read and write
2048B943000
trusted library allocation
page read and write
20496691000
trusted library allocation
page read and write
2048B6FE000
trusted library allocation
page read and write
4111000
heap
page read and write
2048B39B000
trusted library allocation
page read and write
204FCBDC000
heap
page read and write
204FF766000
trusted library allocation
page read and write
2048C473000
trusted library allocation
page read and write
2048E5EE000
trusted library allocation
page read and write
2048A7E9000
trusted library allocation
page read and write
2048CAC9000
trusted library allocation
page read and write
2048B93E000
trusted library allocation
page read and write
2048B947000
trusted library allocation
page read and write
2048A678000
trusted library allocation
page read and write
2048ABB8000
trusted library allocation
page read and write
2048B94D000
trusted library allocation
page read and write
2049301B000
trusted library allocation
page read and write
20494470000
trusted library allocation
page read and write
2048CA52000
trusted library allocation
page read and write
2048B9A4000
trusted library allocation
page read and write
204967CE000
trusted library allocation
page read and write
204FCC39000
heap
page read and write
204FCC36000
heap
page read and write
204960BB000
trusted library allocation
page read and write
204FCC31000
heap
page read and write
2048B95A000
trusted library allocation
page read and write
16B4000
heap
page read and write
20492B82000
trusted library allocation
page read and write
204FF7D8000
trusted library allocation
page read and write
There are 3644 hidden memdumps, click here to show them.