IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_7a006e65-81c7-44e6-bca9-904f9547e6f3.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_7a006e65-81c7-44e6-bca9-904f9547e6f3.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C94QBWI5PPYC4QEB1D1D.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z07K3J0Q26EHY2CW379H.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\c4ec3330-c283-4504-88ff-1de7fbd43850 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\c4ec3330-c283-4504-88ff-1de7fbd43850.tmp
JSON data
modified
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8742fd4-1926-4b7d-b5cd-227d1ca53650} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 235cde6f710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2792 -parentBuildID 20230927232528 -prefsHandle 1392 -prefMapHandle 3364 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7db5ca4-9b73-4566-854b-98eaaea695b3} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 235dfecbf10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5460 -prefMapHandle 5440 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {322df133-639f-4d6c-a4ae-c75d38c0f85a} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 235e7749910 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
52.222.236.120
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.186.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
142.250.186.142
youtube.com
United States
52.222.236.120
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
235DE4B2000
trusted library allocation
page read and write
235DF395000
trusted library allocation
page read and write
235E5DF4000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235DF05C000
trusted library allocation
page read and write
235DED82000
trusted library allocation
page read and write
235DFDDD000
trusted library allocation
page read and write
235DF02F000
trusted library allocation
page read and write
235DDA64000
trusted library allocation
page read and write
235E03A9000
trusted library allocation
page read and write
235E64F8000
trusted library allocation
page read and write
235E1A57000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
1F9DF6E0000
heap
page read and write
235DF4DA000
trusted library allocation
page read and write
235DAC91000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235DDAB7000
trusted library allocation
page read and write
235D4C2E000
heap
page read and write
235E02D1000
trusted library allocation
page read and write
235E162B000
trusted library allocation
page read and write
1F9DF77D000
heap
page read and write
235DE3FD000
trusted library allocation
page read and write
235E93CE000
heap
page read and write
235E02B0000
trusted library allocation
page read and write
235DEB89000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
1F9DF530000
heap
page read and write
235D4C4E000
heap
page read and write
235DAE6E000
trusted library allocation
page read and write
235D4C2A000
heap
page read and write
235E79E8000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D4C1A000
heap
page read and write
235E5CFB000
trusted library allocation
page read and write
235DD263000
trusted library allocation
page read and write
235E0227000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DF50D000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
1F9DF76B000
heap
page read and write
235DF688000
trusted library allocation
page read and write
235E7A68000
trusted library allocation
page read and write
235DADBE000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235E033B000
trusted library allocation
page read and write
2035E3E7000
trusted library allocation
page read and write
235DF4BA000
trusted library allocation
page read and write
34C4000
heap
page read and write
235D4C37000
heap
page read and write
221A6A8F000
trusted library allocation
page read and write
235E6095000
trusted library allocation
page read and write
235E11F4000
trusted library allocation
page read and write
235D4C6E000
heap
page read and write
235E0267000
trusted library allocation
page read and write
235DE4C9000
trusted library allocation
page read and write
235DF476000
trusted library allocation
page read and write
235DB28F000
trusted library allocation
page read and write
235E0590000
trusted library allocation
page read and write
235E84A3000
trusted library allocation
page read and write
235E18A2000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235E1154000
trusted library allocation
page read and write
235DADE8000
trusted library allocation
page read and write
235DF4F9000
trusted library allocation
page read and write
235DDE3D000
trusted library allocation
page read and write
1A695830000
heap
page read and write
235E5CDB000
trusted library allocation
page read and write
235E5C58000
trusted library allocation
page read and write
235E026B000
trusted library allocation
page read and write
235DD9A5000
trusted library allocation
page read and write
235DEC2B000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E8F2B000
trusted library allocation
page read and write
235DE39D000
trusted library allocation
page read and write
235DF073000
trusted library allocation
page read and write
27DEFFB1000
trusted library allocation
page execute read
235E5C88000
trusted library allocation
page read and write
235E14A0000
trusted library allocation
page read and write
235E02A1000
trusted library allocation
page read and write
235DE3DD000
trusted library allocation
page read and write
235E02AE000
trusted library allocation
page read and write
235E07F0000
trusted library allocation
page read and write
235E7A90000
trusted library allocation
page read and write
787DEBE000
unkown
page readonly
235DDAAA000
trusted library allocation
page read and write
235E0360000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
2035E50F000
trusted library allocation
page read and write
235D4C25000
heap
page read and write
235E0255000
trusted library allocation
page read and write
235D4C2D000
heap
page read and write
235E0340000
trusted library allocation
page read and write
8DC000
unkown
page readonly
235D4C40000
heap
page read and write
235DDA3D000
trusted library allocation
page read and write
235DAD42000
trusted library allocation
page read and write
235E83C8000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235D4C20000
heap
page read and write
235E5ADB000
trusted library allocation
page read and write
235E00DE000
trusted library allocation
page read and write
235E072C000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DF0FA000
trusted library allocation
page read and write
E9659D8000
stack
page read and write
235DF4FD000
trusted library allocation
page read and write
235DF59D000
trusted library allocation
page read and write
235D4C93000
heap
page read and write
235DEC49000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E19A3000
trusted library allocation
page read and write
235E11E8000
trusted library allocation
page read and write
235DD11E000
trusted library allocation
page read and write
235E036F000
trusted library allocation
page read and write
235E5C1F000
trusted library allocation
page read and write
235E04B8000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235DF59D000
trusted library allocation
page read and write
235E07F5000
trusted library allocation
page read and write
235DF59F000
trusted library allocation
page read and write
2035E474000
heap
page read and write
235DE3D6000
trusted library allocation
page read and write
235E05CF000
trusted library allocation
page read and write
235DF769000
trusted library allocation
page read and write
235E607C000
trusted library allocation
page read and write
235E606A000
trusted library allocation
page read and write
235DF55C000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DEB48000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235E5BC3000
trusted library allocation
page read and write
235DD5C0000
heap
page read and write
235E0273000
trusted library allocation
page read and write
235D4C28000
heap
page read and write
235E935E000
heap
page read and write
235D4C3E000
heap
page read and write
235DB2A3000
trusted library allocation
page read and write
235E5CEE000
trusted library allocation
page read and write
DE8000
heap
page read and write
235DF59F000
trusted library allocation
page read and write
1B40000
heap
page read and write
235DF69E000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235E14C3000
trusted library allocation
page read and write
235DDE3B000
trusted library allocation
page read and write
235E0294000
trusted library allocation
page read and write
235E607A000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C45000
heap
page read and write
235E5CFE000
trusted library allocation
page read and write
235D4C8E000
heap
page read and write
235E1639000
trusted library allocation
page read and write
235DF7B5000
trusted library allocation
page read and write
235D4C2B000
heap
page read and write
2035E37B000
trusted library allocation
page read and write
235E04A7000
trusted library allocation
page read and write
235DDA83000
trusted library allocation
page read and write
235E1497000
trusted library allocation
page read and write
235DF456000
trusted library allocation
page read and write
235E149C000
trusted library allocation
page read and write
235E5D59000
trusted library allocation
page read and write
1F9DEFF3000
trusted library allocation
page read and write
1F9DF6E0000
heap
page read and write
235E5C40000
trusted library allocation
page read and write
235DF4DE000
trusted library allocation
page read and write
235DEC68000
trusted library allocation
page read and write
235E79F1000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E059E000
trusted library allocation
page read and write
235D9FED000
trusted library allocation
page read and write
235E0591000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235D9C82000
trusted library allocation
page read and write
235D4C1C000
heap
page read and write
235DF4B8000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
DF2000
heap
page read and write
235DF659000
trusted library allocation
page read and write
235E0340000
trusted library allocation
page read and write
235DD261000
trusted library allocation
page read and write
235E05BB000
trusted library allocation
page read and write
235DD594000
heap
page read and write
235DF361000
trusted library allocation
page read and write
235E5ACB000
trusted library allocation
page read and write
27DEFFA1000
trusted library allocation
page execute read
235D4C29000
heap
page read and write
235D9D00000
trusted library allocation
page read and write
235E77EC000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DD9CE000
trusted library allocation
page read and write
235DDEC6000
trusted library allocation
page read and write
235E7AD0000
trusted library allocation
page read and write
235DD5A2000
heap
page read and write
235DF4F0000
trusted library allocation
page read and write
235DD1EF000
trusted library allocation
page read and write
235E5B30000
trusted library allocation
page read and write
235DE3FD000
trusted library allocation
page read and write
235D9C17000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235D4C28000
heap
page read and write
235DD5BC000
heap
page read and write
235E0765000
trusted library allocation
page read and write
787CDFE000
unkown
page readonly
235D4C39000
heap
page read and write
1F9DF76B000
heap
page read and write
235D4C20000
heap
page read and write
235E9A67000
trusted library allocation
page read and write
235DDAC4000
trusted library allocation
page read and write
235E5C8B000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E934F000
heap
page read and write
235E1A33000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF75A000
trusted library allocation
page read and write
235DEEEC000
trusted library allocation
page read and write
235DF4F9000
trusted library allocation
page read and write
2035E514000
trusted library allocation
page read and write
235E07BD000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235DAE7C000
trusted library allocation
page read and write
235E1444000
trusted library allocation
page read and write
235D4C84000
heap
page read and write
235E773D000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DDA6B000
trusted library allocation
page read and write
235DD32F000
trusted library allocation
page read and write
235E8F8A000
trusted library allocation
page read and write
235E7A8A000
trusted library allocation
page read and write
235DFDF1000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C3E000
heap
page read and write
235DAB68000
trusted library allocation
page read and write
235E608E000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF683000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E5AF8000
trusted library allocation
page read and write
1F9DEDA0000
heap
page readonly
235DF7E4000
trusted library allocation
page read and write
235DAD17000
trusted library allocation
page read and write
235DF19A000
trusted library allocation
page read and write
235E03C1000
trusted library allocation
page read and write
235DD365000
trusted library allocation
page read and write
235DF4E4000
trusted library allocation
page read and write
235D9CFC000
trusted library allocation
page read and write
1F9DFD6C000
heap
page read and write
235DEBFA000
trusted library allocation
page read and write
235E7ADA000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235DF2B4000
trusted library allocation
page read and write
235DF5F1000
trusted library allocation
page read and write
235DDE71000
trusted library allocation
page read and write
235E036E000
trusted library allocation
page read and write
235DDAA3000
trusted library allocation
page read and write
235E03DB000
trusted library allocation
page read and write
235E036E000
trusted library allocation
page read and write
235DF032000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235E036E000
trusted library allocation
page read and write
235E1EB3000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
235DF59D000
trusted library allocation
page read and write
235D4C2D000
heap
page read and write
235DEB48000
trusted library allocation
page read and write
1F9DF6EC000
heap
page read and write
235E5C73000
trusted library allocation
page read and write
235DD593000
heap
page read and write
235DEE93000
trusted library allocation
page read and write
235DF3AC000
trusted library allocation
page read and write
235D4C04000
heap
page read and write
235E5AF2000
trusted library allocation
page read and write
235DAD9F000
trusted library allocation
page read and write
DE9000
heap
page read and write
235E1161000
trusted library allocation
page read and write
235E60A5000
trusted library allocation
page read and write
235DDA97000
trusted library allocation
page read and write
787ABFE000
stack
page read and write
235E04F0000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235DD127000
trusted library allocation
page read and write
235DF0FE000
trusted library allocation
page read and write
235E1134000
trusted library allocation
page read and write
235DEED1000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235DE3FC000
trusted library allocation
page read and write
235DECCC000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
221A67E0000
heap
page read and write
235DEB8E000
trusted library allocation
page read and write
235DF776000
trusted library allocation
page read and write
235E6112000
trusted library allocation
page read and write
235E5AEA000
trusted library allocation
page read and write
81D000
stack
page read and write
235DD5D0000
heap
page read and write
235DF062000
trusted library allocation
page read and write
2035E020000
heap
page read and write
235DF4AA000
trusted library allocation
page read and write
235DD28D000
trusted library allocation
page read and write
235E5ADF000
trusted library allocation
page read and write
235DE6CB000
trusted library allocation
page read and write
235DF02A000
trusted library allocation
page read and write
235DF2C4000
trusted library allocation
page read and write
235E6171000
trusted library allocation
page read and write
235E0315000
trusted library allocation
page read and write
235D4C83000
heap
page read and write
235D4C61000
heap
page read and write
235DFDD0000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235D4C2E000
heap
page read and write
235DAD13000
trusted library allocation
page read and write
235E6037000
trusted library allocation
page read and write
235E79F8000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E07B9000
trusted library allocation
page read and write
DDF000
heap
page read and write
235D4C31000
heap
page read and write
235DD95A000
trusted library allocation
page read and write
235E77B9000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235DEFA9000
trusted library allocation
page read and write
1F9DF040000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235DD10E000
trusted library allocation
page read and write
235DD1FD000
trusted library allocation
page read and write
2035E06A000
heap
page read and write
235DF453000
trusted library allocation
page read and write
235E11D5000
trusted library allocation
page read and write
235DD38B000
trusted library allocation
page read and write
235DF1EC000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235DDAAE000
trusted library allocation
page read and write
235E0327000
trusted library allocation
page read and write
235E117B000
trusted library allocation
page read and write
235DF506000
trusted library allocation
page read and write
235DE3EA000
trusted library allocation
page read and write
235DF4C5000
trusted library allocation
page read and write
235DF4C5000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235D4C3E000
heap
page read and write
235DF47A000
trusted library allocation
page read and write
235DF63E000
trusted library allocation
page read and write
9398DD8000
stack
page read and write
235D4C37000
heap
page read and write
235E0351000
trusted library allocation
page read and write
235DEF19000
trusted library allocation
page read and write
235DAE64000
trusted library allocation
page read and write
235E14EB000
trusted library allocation
page read and write
235DF43A000
trusted library allocation
page read and write
235DED52000
trusted library allocation
page read and write
235E163D000
trusted library allocation
page read and write
235DE3E3000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DEC51000
trusted library allocation
page read and write
235DABFA000
trusted library allocation
page read and write
221A6D00000
trusted library allocation
page read and write
235D9CBD000
trusted library allocation
page read and write
235DDA47000
trusted library allocation
page read and write
235DAF38000
trusted library allocation
page read and write
2035E300000
trusted library allocation
page read and write
235DE4D3000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
195A55A0000
heap
page read and write
235D9C1D000
trusted library allocation
page read and write
235DF081000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235D4C93000
heap
page read and write
235E5B54000
trusted library allocation
page read and write
235DE4E2000
trusted library allocation
page read and write
235DD955000
trusted library allocation
page read and write
235DFFC5000
trusted library allocation
page read and write
235DE2AF000
trusted library allocation
page read and write
235DECAC000
trusted library allocation
page read and write
1F9DFD58000
heap
page read and write
235DACF4000
trusted library allocation
page read and write
235E1499000
trusted library allocation
page read and write
235E16C9000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235D4C29000
heap
page read and write
235DF482000
trusted library allocation
page read and write
235DF38D000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5B93000
trusted library allocation
page read and write
235DE3E5000
trusted library allocation
page read and write
235E9AAC000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235D4C25000
heap
page read and write
235DAB93000
trusted library allocation
page read and write
235E0361000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235DD591000
heap
page read and write
235E8486000
trusted library allocation
page read and write
235E6488000
trusted library allocation
page read and write
235E036E000
trusted library allocation
page read and write
235DDE54000
trusted library allocation
page read and write
235E7AD0000
trusted library allocation
page read and write
235DF09F000
trusted library allocation
page read and write
235DD977000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E5D77000
trusted library allocation
page read and write
235E0334000
trusted library allocation
page read and write
235DD286000
trusted library allocation
page read and write
235DF54A000
trusted library allocation
page read and write
235D9C1E000
trusted library allocation
page read and write
235DEB81000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235E8F2B000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235DE6D3000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E7AD8000
trusted library allocation
page read and write
DE2000
heap
page read and write
235E6170000
trusted library allocation
page read and write
235DEB79000
trusted library allocation
page read and write
1F9DFD58000
heap
page read and write
235DF0FE000
trusted library allocation
page read and write
235DAD8C000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
1F9DFD00000
heap
page read and write
1F9DF72A000
heap
page read and write
235DAE3D000
trusted library allocation
page read and write
1F9DF763000
heap
page read and write
235D4C1D000
heap
page read and write
235DE44B000
trusted library allocation
page read and write
235E03E5000
trusted library allocation
page read and write
235E0338000
trusted library allocation
page read and write
235E0544000
trusted library allocation
page read and write
1F9DF76B000
heap
page read and write
235DF4EA000
trusted library allocation
page read and write
235DD59C000
heap
page read and write
235E5C44000
trusted library allocation
page read and write
1F9DFD21000
heap
page read and write
235DE4D3000
trusted library allocation
page read and write
2035E398000
trusted library allocation
page read and write
235E7A90000
trusted library allocation
page read and write
DEA000
heap
page read and write
235E5C2F000
trusted library allocation
page read and write
235E7A0C000
trusted library allocation
page read and write
235E05EB000
trusted library allocation
page read and write
235E5CF4000
trusted library allocation
page read and write
235DE4C3000
trusted library allocation
page read and write
235DB278000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DF4E1000
trusted library allocation
page read and write
235DD966000
trusted library allocation
page read and write
235E034F000
trusted library allocation
page read and write
235DE3FB000
trusted library allocation
page read and write
235E1E23000
trusted library allocation
page read and write
235DAEF0000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
1F9DF768000
heap
page read and write
235E5C26000
trusted library allocation
page read and write
235E0342000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235E1499000
trusted library allocation
page read and write
235E90ED000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E1905000
trusted library allocation
page read and write
235DF5F6000
trusted library allocation
page read and write
DFE000
heap
page read and write
235E035D000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235DE417000
trusted library allocation
page read and write
235DB271000
trusted library allocation
page read and write
235DAE31000
trusted library allocation
page read and write
221A6A03000
trusted library allocation
page read and write
235DF4FB000
trusted library allocation
page read and write
235D4C6E000
heap
page read and write
235D4C82000
heap
page read and write
235DEC7A000
trusted library allocation
page read and write
235E0340000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235E03C1000
trusted library allocation
page read and write
235DF4C3000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
235E03C5000
trusted library allocation
page read and write
235E907E000
trusted library allocation
page read and write
235E07C6000
trusted library allocation
page read and write
235D4C66000
heap
page read and write
1F9DF763000
heap
page read and write
235DF4F9000
trusted library allocation
page read and write
235E16E1000
trusted library allocation
page read and write
235E5AF8000
trusted library allocation
page read and write
235DF6D3000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DAF2C000
trusted library allocation
page read and write
1F9DEF5C000
trusted library allocation
page read and write
235DF4E4000
trusted library allocation
page read and write
235DADD4000
trusted library allocation
page read and write
235D4C3D000
heap
page read and write
1F9DEFC4000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DABD3000
trusted library allocation
page read and write
235E647A000
trusted library allocation
page read and write
1F9DEF68000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235DD33C000
trusted library allocation
page read and write
19BF000
stack
page read and write
235E5B40000
trusted library allocation
page read and write
235E06D8000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E5AD2000
trusted library allocation
page read and write
1F9DEDD0000
trusted library allocation
page read and write
235E02D0000
trusted library allocation
page read and write
235E5C6F000
trusted library allocation
page read and write
235E5C44000
trusted library allocation
page read and write
235DDA95000
trusted library allocation
page read and write
235DEB81000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DE3DD000
trusted library allocation
page read and write
235D9CFC000
trusted library allocation
page read and write
235DF62A000
trusted library allocation
page read and write
235DF69E000
trusted library allocation
page read and write
235DE3ED000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
E964FAE000
stack
page read and write
235DD593000
heap
page read and write
235E60ED000
trusted library allocation
page read and write
DEC000
heap
page read and write
235D4C39000
heap
page read and write
235D4C44000
heap
page read and write
235E023C000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DF60D000
trusted library allocation
page read and write
235DAE49000
trusted library allocation
page read and write
235DD1FD000
trusted library allocation
page read and write
235E5D4E000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
1F9DEF62000
trusted library allocation
page read and write
235DF752000
trusted library allocation
page read and write
235DE376000
trusted library allocation
page read and write
235DFDEC000
trusted library allocation
page read and write
235E1641000
trusted library allocation
page read and write
235DD93B000
trusted library allocation
page read and write
235E03D8000
trusted library allocation
page read and write
221A67D2000
unclassified section
page read and write
235DD99E000
trusted library allocation
page read and write
235E8F00000
trusted library allocation
page read and write
235D4C87000
heap
page read and write
235D9B2F000
trusted library allocation
page read and write
235DF167000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C1F000
heap
page read and write
235DF4EA000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E059E000
trusted library allocation
page read and write
235E1639000
trusted library allocation
page read and write
1F9DF860000
heap
page read and write
235E9321000
heap
page read and write
235DF10F000
trusted library allocation
page read and write
1F9DF071000
unkown
page execute read
235D4C2B000
heap
page read and write
235DDE83000
trusted library allocation
page read and write
235E7ADA000
trusted library allocation
page read and write
235DDE6E000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235E04BC000
trusted library allocation
page read and write
235E5C71000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235E16DF000
trusted library allocation
page read and write
235DF4E8000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E1630000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DADF7000
trusted library allocation
page read and write
235DDA83000
trusted library allocation
page read and write
235E1681000
trusted library allocation
page read and write
E9671FE000
unkown
page readonly
235DD596000
heap
page read and write
235DD8CB000
trusted library allocation
page read and write
235E02C9000
trusted library allocation
page read and write
235E9356000
heap
page read and write
235D4C2B000
heap
page read and write
235E037F000
trusted library allocation
page read and write
235DD3A9000
trusted library allocation
page read and write
235E034B000
trusted library allocation
page read and write
221A67C0000
heap
page readonly
235E5D30000
trusted library allocation
page read and write
195A5570000
heap
page read and write
235DD388000
trusted library allocation
page read and write
235D4C3D000
heap
page read and write
235E03DA000
trusted library allocation
page read and write
235E5CAD000
trusted library allocation
page read and write
235DDEF3000
trusted library allocation
page read and write
1F9DF70D000
heap
page read and write
235DDABE000
trusted library allocation
page read and write
235DD874000
trusted library allocation
page read and write
1F9DF76B000
heap
page read and write
235DF523000
trusted library allocation
page read and write
235E6125000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DEDA3000
trusted library allocation
page read and write
2380003F000
trusted library allocation
page read and write
1F9DF6E3000
heap
page read and write
235DDA5A000
trusted library allocation
page read and write
235E032D000
trusted library allocation
page read and write
235E6134000
trusted library allocation
page read and write
235E11DB000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235D4C8D000
heap
page read and write
235E0047000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235D4C8D000
heap
page read and write
235DF09F000
trusted library allocation
page read and write
235E8FC0000
trusted library allocation
page read and write
1F9DEDC0000
unclassified section
page read and write
235DF6B3000
trusted library allocation
page read and write
2035E600000
heap
page read and write
235DEB76000
trusted library allocation
page read and write
235D9CC0000
trusted library allocation
page read and write
235E0709000
trusted library allocation
page read and write
235DF381000
trusted library allocation
page read and write
221A6A5F000
trusted library allocation
page read and write
235DF0B3000
trusted library allocation
page read and write
235DACA3000
trusted library allocation
page read and write
235E033F000
trusted library allocation
page read and write
235DDAB5000
trusted library allocation
page read and write
235D4C1C000
heap
page read and write
235E606A000
trusted library allocation
page read and write
235E1907000
trusted library allocation
page read and write
235D4C07000
heap
page read and write
235DDE11000
trusted library allocation
page read and write
235E0245000
trusted library allocation
page read and write
235E11CB000
trusted library allocation
page read and write
235DEB8B000
trusted library allocation
page read and write
235DE6E3000
trusted library allocation
page read and write
235DDA76000
trusted library allocation
page read and write
235E0340000
trusted library allocation
page read and write
235E03FB000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
7D4000
heap
page read and write
235E8896000
trusted library allocation
page read and write
235DD5C0000
heap
page read and write
235D4C3C000
heap
page read and write
235E5CFE000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
235E0211000
trusted library allocation
page read and write
235DDAB2000
trusted library allocation
page read and write
7D4000
heap
page read and write
235E6200000
trusted library allocation
page read and write
235E60C6000
trusted library allocation
page read and write
235E611E000
trusted library allocation
page read and write
235DE3F1000
trusted library allocation
page read and write
235E9357000
heap
page read and write
235E64AE000
trusted library allocation
page read and write
235DEC72000
trusted library allocation
page read and write
235E7ADE000
trusted library allocation
page read and write
235DF6BD000
trusted library allocation
page read and write
235E90D3000
trusted library allocation
page read and write
235DE4C3000
trusted library allocation
page read and write
235E14A0000
trusted library allocation
page read and write
235E607C000
trusted library allocation
page read and write
235E8506000
trusted library allocation
page read and write
235DDFF1000
trusted library allocation
page read and write
235DD98A000
trusted library allocation
page read and write
235DF62D000
trusted library allocation
page read and write
235E023C000
trusted library allocation
page read and write
235DB2E3000
trusted library allocation
page read and write
235DF66D000
trusted library allocation
page read and write
235E5D39000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235DADBE000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235E7968000
trusted library allocation
page read and write
235DEDBD000
trusted library allocation
page read and write
1F9DF6DC000
heap
page read and write
235DF06B000
trusted library allocation
page read and write
235E0571000
trusted library allocation
page read and write
235DF0A6000
trusted library allocation
page read and write
235DDAC9000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DD93C000
trusted library allocation
page read and write
235E114A000
trusted library allocation
page read and write
235D4C8D000
heap
page read and write
235E79F1000
trusted library allocation
page read and write
235E16D0000
trusted library allocation
page read and write
195A70A0000
heap
page read and write
235E64A9000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C45000
heap
page read and write
235DE4EF000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E0216000
trusted library allocation
page read and write
235DF0FE000
trusted library allocation
page read and write
235DFFBC000
trusted library allocation
page read and write
235E6095000
trusted library allocation
page read and write
235DDE6E000
trusted library allocation
page read and write
235DF0C1000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235DD3CF000
trusted library allocation
page read and write
1F9DF769000
heap
page read and write
235DEB6F000
trusted library allocation
page read and write
235E84A7000
trusted library allocation
page read and write
235DF1A3000
trusted library allocation
page read and write
235DED65000
trusted library allocation
page read and write
235DF4E4000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235DABD3000
trusted library allocation
page read and write
235DD9A5000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DEE68000
trusted library allocation
page read and write
235E5AFC000
trusted library allocation
page read and write
235DF696000
trusted library allocation
page read and write
235E5DCF000
trusted library allocation
page read and write
235D4C8F000
heap
page read and write
235DE4E8000
trusted library allocation
page read and write
235DF05E000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D4C84000
heap
page read and write
235DACF8000
trusted library allocation
page read and write
235DD5A0000
heap
page read and write
235E05E9000
trusted library allocation
page read and write
787D67E000
stack
page read and write
235DE4CD000
trusted library allocation
page read and write
235E03C5000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
93983BE000
unkown
page readonly
235E0086000
trusted library allocation
page read and write
235E79BB000
trusted library allocation
page read and write
235D9CC0000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E14A2000
trusted library allocation
page read and write
235E05E5000
trusted library allocation
page read and write
235DF48F000
trusted library allocation
page read and write
235E7962000
trusted library allocation
page read and write
1F9DFD79000
heap
page read and write
235E058E000
trusted library allocation
page read and write
221A65E6000
remote allocation
page execute read
235D4C62000
heap
page read and write
939A67E000
stack
page read and write
235E5C0B000
trusted library allocation
page read and write
235DDA69000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235D4C2E000
heap
page read and write
235DF097000
trusted library allocation
page read and write
235DEC7D000
trusted library allocation
page read and write
235DE4E2000
trusted library allocation
page read and write
235DF4AA000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
1F9DEFBB000
trusted library allocation
page read and write
235DAD23000
trusted library allocation
page read and write
235E5B82000
trusted library allocation
page read and write
221A6ADB000
trusted library allocation
page read and write
235DF653000
trusted library allocation
page read and write
235E1621000
trusted library allocation
page read and write
235D4C87000
heap
page read and write
235DD9A5000
trusted library allocation
page read and write
235DACE2000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
2035E368000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
195A70C2000
heap
page read and write
235DF46A000
trusted library allocation
page read and write
235E5D9C000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235DF03D000
trusted library allocation
page read and write
235DAD42000
trusted library allocation
page read and write
2035E347000
trusted library allocation
page read and write
235E026B000
trusted library allocation
page read and write
235E0089000
trusted library allocation
page read and write
235E7AD0000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
1F9DF766000
heap
page read and write
235E6014000
trusted library allocation
page read and write
235E00FE000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C30000
heap
page read and write
1F9DF771000
heap
page read and write
235DF1F5000
trusted library allocation
page read and write
235E1168000
trusted library allocation
page read and write
235E020D000
trusted library allocation
page read and write
235DE676000
trusted library allocation
page read and write
1F9DFD22000
heap
page read and write
235E5C75000
trusted library allocation
page read and write
235E11D3000
trusted library allocation
page read and write
235DDE7E000
trusted library allocation
page read and write
235E61E3000
trusted library allocation
page read and write
235E11F4000
trusted library allocation
page read and write
235DDE71000
trusted library allocation
page read and write
235DD5BB000
heap
page read and write
235D4C5B000
heap
page read and write
235E5C4B000
trusted library allocation
page read and write
235D4C2F000
heap
page read and write
2035E364000
trusted library allocation
page read and write
235DDED5000
trusted library allocation
page read and write
235E02C9000
trusted library allocation
page read and write
235DF798000
trusted library allocation
page read and write
235DF062000
trusted library allocation
page read and write
235D9CBD000
trusted library allocation
page read and write
235DD261000
trusted library allocation
page read and write
235E032E000
trusted library allocation
page read and write
235D4C2E000
heap
page read and write
3310000
heap
page read and write
235E03BA000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235DAE6E000
trusted library allocation
page read and write
235E60D4000
trusted library allocation
page read and write
235DD988000
trusted library allocation
page read and write
235DE451000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DAB93000
trusted library allocation
page read and write
235E0575000
trusted library allocation
page read and write
235DDA3D000
trusted library allocation
page read and write
235E79FE000
trusted library allocation
page read and write
235DB2A9000
trusted library allocation
page read and write
235E032D000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235E057B000
trusted library allocation
page read and write
235DF7AF000
trusted library allocation
page read and write
235DE6B8000
trusted library allocation
page read and write
235D4C8F000
heap
page read and write
235DDA7D000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E9351000
heap
page read and write
235E03FB000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
235D4C39000
heap
page read and write
235DD359000
trusted library allocation
page read and write
235DFEED000
trusted library allocation
page read and write
787DE7E000
unkown
page readonly
235DF4C3000
trusted library allocation
page read and write
235DE4E8000
trusted library allocation
page read and write
235DACBC000
trusted library allocation
page read and write
235E5CDB000
trusted library allocation
page read and write
235E0351000
trusted library allocation
page read and write
235DAD89000
trusted library allocation
page read and write
235DDA76000
trusted library allocation
page read and write
235E00D0000
trusted library allocation
page read and write
235E8F5F000
trusted library allocation
page read and write
235E020F000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
1F9DF70A000
heap
page read and write
1B30000
heap
page read and write
235DF5E8000
trusted library allocation
page read and write
1F9DF6FD000
heap
page read and write
235DE3E3000
trusted library allocation
page read and write
235DE2A3000
trusted library allocation
page read and write
235DF4B3000
trusted library allocation
page read and write
235DF50B000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E6099000
trusted library allocation
page read and write
235DF191000
trusted library allocation
page read and write
235E5CD4000
trusted library allocation
page read and write
235DEC49000
trusted library allocation
page read and write
235E5CBA000
trusted library allocation
page read and write
235E0360000
trusted library allocation
page read and write
235E90DC000
trusted library allocation
page read and write
235D4C66000
heap
page read and write
235D4C44000
heap
page read and write
235D4C25000
heap
page read and write
235DAE5F000
trusted library allocation
page read and write
235E0273000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
2035E532000
trusted library allocation
page read and write
221A6A11000
trusted library allocation
page read and write
235DF0C1000
trusted library allocation
page read and write
235E05E5000
trusted library allocation
page read and write
235DF1BE000
trusted library allocation
page read and write
235D4C2E000
heap
page read and write
235DD39D000
trusted library allocation
page read and write
235DD9A5000
trusted library allocation
page read and write
235DD267000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E5AEA000
trusted library allocation
page read and write
235DB2BA000
trusted library allocation
page read and write
235DF05E000
trusted library allocation
page read and write
2035E53D000
trusted library allocation
page read and write
235E5C8B000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DDEFC000
trusted library allocation
page read and write
235DF867000
trusted library allocation
page read and write
235DDA95000
trusted library allocation
page read and write
235E5ADB000
trusted library allocation
page read and write
195A5800000
trusted library allocation
page read and write
235DF787000
trusted library allocation
page read and write
235DFCB4000
trusted library allocation
page read and write
235DE4F3000
trusted library allocation
page read and write
235D4C3B000
heap
page read and write
235DF1C0000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E5B79000
trusted library allocation
page read and write
235DE485000
trusted library allocation
page read and write
235E840C000
trusted library allocation
page read and write
235E60B9000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF05C000
trusted library allocation
page read and write
235E028D000
trusted library allocation
page read and write
235E5AF2000
trusted library allocation
page read and write
235DAE64000
trusted library allocation
page read and write
235DEED5000
trusted library allocation
page read and write
235E02E4000
trusted library allocation
page read and write
235E05B3000
trusted library allocation
page read and write
235E02E8000
trusted library allocation
page read and write
235E607A000
trusted library allocation
page read and write
235E7A5F000
trusted library allocation
page read and write
235E8557000
trusted library allocation
page read and write
235D9581000
trusted library allocation
page read and write
1F9DF6E0000
heap
page read and write
235DF05C000
trusted library allocation
page read and write
1F9DEF76000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
1F9DEFE9000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235DD5D0000
heap
page read and write
235DF76F000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235D4C39000
heap
page read and write
235E01D0000
trusted library allocation
page read and write
235DF4DE000
trusted library allocation
page read and write
235DD1D9000
trusted library allocation
page read and write
1A695380000
heap
page read and write
235D4C20000
heap
page read and write
235E11D5000
trusted library allocation
page read and write
235DF528000
trusted library allocation
page read and write
235E88BF000
trusted library allocation
page read and write
235E11D3000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E0315000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DAEB5000
trusted library allocation
page read and write
1F9DF772000
heap
page read and write
235DEE81000
trusted library allocation
page read and write
235DEB42000
trusted library allocation
page read and write
235DD1F6000
trusted library allocation
page read and write
235DDE3B000
trusted library allocation
page read and write
235E8387000
trusted library allocation
page read and write
235DF779000
trusted library allocation
page read and write
235E5ACF000
trusted library allocation
page read and write
235DF0B7000
trusted library allocation
page read and write
235E1E45000
trusted library allocation
page read and write
221A6A6B000
trusted library allocation
page read and write
235DEE0A000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235DF06B000
trusted library allocation
page read and write
221A6A7A000
trusted library allocation
page read and write
235E7A7C000
trusted library allocation
page read and write
235DF61C000
trusted library allocation
page read and write
221A6A49000
trusted library allocation
page read and write
235E01AE000
trusted library allocation
page read and write
235E058E000
trusted library allocation
page read and write
235E01DE000
trusted library allocation
page read and write
235E5C79000
trusted library allocation
page read and write
235E796B000
trusted library allocation
page read and write
235E852C000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235E04C1000
trusted library allocation
page read and write
235DF511000
trusted library allocation
page read and write
235E161B000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235E14AD000
trusted library allocation
page read and write
235DDA78000
trusted library allocation
page read and write
235DF558000
trusted library allocation
page read and write
235E6095000
trusted library allocation
page read and write
235E5CF4000
trusted library allocation
page read and write
235E0283000
trusted library allocation
page read and write
235E0224000
trusted library allocation
page read and write
235E03C5000
trusted library allocation
page read and write
235DE3ED000
trusted library allocation
page read and write
235DAEDD000
trusted library allocation
page read and write
221A6C00000
trusted library allocation
page read and write
235E0722000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235E02DC000
trusted library allocation
page read and write
235E9373000
heap
page read and write
1F9DEBDA000
remote allocation
page execute read
235E0528000
trusted library allocation
page read and write
235E19C5000
trusted library allocation
page read and write
235E02F3000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235E05F4000
trusted library allocation
page read and write
235DFD3B000
trusted library allocation
page read and write
235E0313000
trusted library allocation
page read and write
235DE490000
trusted library allocation
page read and write
235DF74E000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
3311000
heap
page read and write
235E7968000
trusted library allocation
page read and write
235E0342000
trusted library allocation
page read and write
235E052A000
trusted library allocation
page read and write
235E060F000
trusted library allocation
page read and write
235E04A7000
trusted library allocation
page read and write
235DD987000
trusted library allocation
page read and write
1F9DF6DF000
heap
page read and write
235D4C59000
heap
page read and write
235E0586000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235E5C4F000
trusted library allocation
page read and write
235DEEF0000
trusted library allocation
page read and write
235DD352000
trusted library allocation
page read and write
235E028D000
trusted library allocation
page read and write
235DF49A000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E5CD4000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C37000
heap
page read and write
235DF4ED000
trusted library allocation
page read and write
235E7762000
trusted library allocation
page read and write
235E817D000
trusted library allocation
page read and write
235DEB7E000
trusted library allocation
page read and write
235E90FC000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DADB0000
trusted library allocation
page read and write
235E5C4B000
trusted library allocation
page read and write
939AEBE000
unkown
page read and write
235E79AF000
trusted library allocation
page read and write
235D4C51000
heap
page read and write
235E04A3000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D9C26000
trusted library allocation
page read and write
235E071B000
trusted library allocation
page read and write
235E7A9F000
trusted library allocation
page read and write
235E05E0000
trusted library allocation
page read and write
1F9DF768000
heap
page read and write
235DF097000
trusted library allocation
page read and write
235D4C8E000
heap
page read and write
235DD84B000
trusted library allocation
page read and write
235DEC82000
trusted library allocation
page read and write
235DF4C3000
trusted library allocation
page read and write
235E7A44000
trusted library allocation
page read and write
235D9C75000
trusted library allocation
page read and write
235DDAA7000
trusted library allocation
page read and write
235DF55F000
trusted library allocation
page read and write
235DD596000
heap
page read and write
235E796D000
trusted library allocation
page read and write
235E1E86000
trusted library allocation
page read and write
195A55B0000
heap
page read and write
235DEEC4000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
221A69B6000
heap
page read and write
235E7AD2000
trusted library allocation
page read and write
235DE3DD000
trusted library allocation
page read and write
1F9DF728000
heap
page read and write
235E60A6000
trusted library allocation
page read and write
235DEB89000
trusted library allocation
page read and write
235E0083000
trusted library allocation
page read and write
235DE336000
trusted library allocation
page read and write
235DF09F000
trusted library allocation
page read and write
235DEC81000
trusted library allocation
page read and write
235D4C2F000
heap
page read and write
235E02DC000
trusted library allocation
page read and write
235E5C18000
trusted library allocation
page read and write
235DDAB7000
trusted library allocation
page read and write
235E14E4000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235DEBB4000
trusted library allocation
page read and write
235E6099000
trusted library allocation
page read and write
235E03AB000
trusted library allocation
page read and write
235E7722000
trusted library allocation
page read and write
235DADFA000
trusted library allocation
page read and write
235E9350000
heap
page read and write
2035E366000
trusted library allocation
page read and write
221A6A65000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C5B000
heap
page read and write
235DDABE000
trusted library allocation
page read and write
235E7A00000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C2D000
heap
page read and write
235D4C61000
heap
page read and write
235D4C3E000
heap
page read and write
235DF02D000
trusted library allocation
page read and write
235E1E06000
trusted library allocation
page read and write
235E5C44000
trusted library allocation
page read and write
235DEB5B000
trusted library allocation
page read and write
235E1641000
trusted library allocation
page read and write
2035E372000
trusted library allocation
page read and write
235DE442000
trusted library allocation
page read and write
235DD1FD000
trusted library allocation
page read and write
235D4C89000
heap
page read and write
235E5CDB000
trusted library allocation
page read and write
235E03AB000
trusted library allocation
page read and write
235DD87B000
trusted library allocation
page read and write
2035DEC0000
unclassified section
page readonly
235DF3F0000
trusted library allocation
page read and write
235E5ADB000
trusted library allocation
page read and write
235E5D7E000
trusted library allocation
page read and write
235DDA57000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
235E16E1000
trusted library allocation
page read and write
6F0000
heap
page read and write
235E5C6A000
trusted library allocation
page read and write
235E1465000
trusted library allocation
page read and write
235DD3A9000
trusted library allocation
page read and write
221A6AB6000
trusted library allocation
page read and write
235E02F8000
trusted library allocation
page read and write
235E60ED000
trusted library allocation
page read and write
235DE4C1000
trusted library allocation
page read and write
1F9DF769000
heap
page read and write
1F9DF000000
trusted library section
page readonly
235DF4C5000
trusted library allocation
page read and write
235E908B000
trusted library allocation
page read and write
235E816E000
trusted library allocation
page read and write
235DFE8C000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
2035E3B4000
trusted library allocation
page read and write
235DEC49000
trusted library allocation
page read and write
235E5B33000
trusted library allocation
page read and write
235E6091000
trusted library allocation
page read and write
235DEBEC000
trusted library allocation
page read and write
235E7958000
trusted library allocation
page read and write
235DF08B000
trusted library allocation
page read and write
1F9DEFC7000
trusted library allocation
page read and write
235DAD80000
trusted library allocation
page read and write
939A5FE000
unkown
page readonly
235E5F08000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DF4E5000
trusted library allocation
page read and write
235DEC7D000
trusted library allocation
page read and write
235E0356000
trusted library allocation
page read and write
235E7ADC000
trusted library allocation
page read and write
235DDF89000
trusted library allocation
page read and write
1F9DFD6C000
heap
page read and write
235DF539000
trusted library allocation
page read and write
2035E470000
heap
page read and write
235D4C39000
heap
page read and write
235E05BB000
trusted library allocation
page read and write
235DE4E8000
trusted library allocation
page read and write
235DABDA000
trusted library allocation
page read and write
235D4C3C000
heap
page read and write
235DEF9C000
trusted library allocation
page read and write
235E112C000
trusted library allocation
page read and write
235E0245000
trusted library allocation
page read and write
235DF0C4000
trusted library allocation
page read and write
235E8FAF000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E77D8000
trusted library allocation
page read and write
E9672BE000
stack
page read and write
235DE3DD000
trusted library allocation
page read and write
235DF499000
trusted library allocation
page read and write
235E07EE000
trusted library allocation
page read and write
235E0549000
trusted library allocation
page read and write
1F9DFC30000
trusted library allocation
page read and write
235E7762000
trusted library allocation
page read and write
235DF75F000
trusted library allocation
page read and write
235DD161000
trusted library allocation
page read and write
235E18C8000
trusted library allocation
page read and write
235DAE44000
trusted library allocation
page read and write
235DD593000
heap
page read and write
235DEB1A000
trusted library allocation
page read and write
235E6038000
trusted library allocation
page read and write
235E774E000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF7B5000
trusted library allocation
page read and write
235E1A2E000
trusted library allocation
page read and write
235DF08A000
trusted library allocation
page read and write
235DECFB000
trusted library allocation
page read and write
1F9DF77D000
heap
page read and write
235E8FC5000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E04D8000
trusted library allocation
page read and write
2035DF40000
unclassified section
page readonly
235D4C45000
heap
page read and write
235DF47D000
trusted library allocation
page read and write
1F9DEF48000
trusted library allocation
page read and write
235E1449000
trusted library allocation
page read and write
235DD8CE000
trusted library allocation
page read and write
235E1943000
trusted library allocation
page read and write
235E0273000
trusted library allocation
page read and write
235E0680000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235E0325000
trusted library allocation
page read and write
235D4C04000
heap
page read and write
235E037C000
trusted library allocation
page read and write
235DF4F9000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DF59F000
trusted library allocation
page read and write
235E5C6D000
trusted library allocation
page read and write
689000
stack
page read and write
235D9CB9000
trusted library allocation
page read and write
2035E30D000
trusted library allocation
page read and write
235E5C2C000
trusted library allocation
page read and write
235D9CFC000
trusted library allocation
page read and write
235DE3FB000
trusted library allocation
page read and write
235DD1D4000
trusted library allocation
page read and write
235E1E2C000
trusted library allocation
page read and write
235DD12A000
trusted library allocation
page read and write
235E0351000
trusted library allocation
page read and write
221A6900000
unclassified section
page readonly
235DAF22000
trusted library allocation
page read and write
235DDFCC000
trusted library allocation
page read and write
235DD97A000
trusted library allocation
page read and write
235DE49A000
trusted library allocation
page read and write
235E5CDB000
trusted library allocation
page read and write
235E053A000
trusted library allocation
page read and write
235E7AD4000
trusted library allocation
page read and write
1F9DFD77000
heap
page read and write
235DD5D0000
heap
page read and write
235DF59F000
trusted library allocation
page read and write
235DDE83000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235D4C35000
heap
page read and write
2035E170000
unclassified section
page readonly
235DDAB9000
trusted library allocation
page read and write
235E5C69000
trusted library allocation
page read and write
235E036C000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D4C39000
heap
page read and write
235DF4AA000
trusted library allocation
page read and write
235DD865000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235DD894000
trusted library allocation
page read and write
235E04A7000
trusted library allocation
page read and write
235DDACC000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235E5B8E000
trusted library allocation
page read and write
235DDA8F000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235E02FA000
trusted library allocation
page read and write
235E5C4F000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235D95C8000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
235D4C3A000
heap
page read and write
235E9A1C000
trusted library allocation
page read and write
235DEB8B000
trusted library allocation
page read and write
235E77A5000
trusted library allocation
page read and write
235DF462000
trusted library allocation
page read and write
235DDE71000
trusted library allocation
page read and write
235E7A44000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DEB4D000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5AE3000
trusted library allocation
page read and write
235DAE31000
trusted library allocation
page read and write
235E1141000
trusted library allocation
page read and write
235D4C93000
heap
page read and write
7D4000
heap
page read and write
235DF1A4000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235DAEEB000
trusted library allocation
page read and write
235D4C83000
heap
page read and write
235E7AFE000
trusted library allocation
page read and write
235E035F000
trusted library allocation
page read and write
235DF06B000
trusted library allocation
page read and write
235E03BA000
trusted library allocation
page read and write
235DF13B000
trusted library allocation
page read and write
235E88B9000
trusted library allocation
page read and write
235E5CCA000
trusted library allocation
page read and write
235E0284000
trusted library allocation
page read and write
1F9DEDCF000
unclassified section
page read and write
235D4C45000
heap
page read and write
235E0073000
trusted library allocation
page read and write
235DF076000
trusted library allocation
page read and write
235E03ED000
trusted library allocation
page read and write
235DADE8000
trusted library allocation
page read and write
235DD3F4000
trusted library allocation
page read and write
235E5CB9000
trusted library allocation
page read and write
235DDAC7000
trusted library allocation
page read and write
235D4C2B000
heap
page read and write
1F9DF050000
unkown
page execute read
235DF668000
trusted library allocation
page read and write
235DDA74000
trusted library allocation
page read and write
235DDA6B000
trusted library allocation
page read and write
235E84C5000
trusted library allocation
page read and write
235DABC2000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235D4C32000
heap
page read and write
235DF370000
trusted library allocation
page read and write
235DF38D000
trusted library allocation
page read and write
235E5CF4000
trusted library allocation
page read and write
235DE3A5000
trusted library allocation
page read and write
235DD700000
trusted library allocation
page read and write
235DF4EE000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235DF4DE000
trusted library allocation
page read and write
221A6AC4000
trusted library allocation
page read and write
235E020A000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
725F7FE000
stack
page read and write
235E79AC000
trusted library allocation
page read and write
1A695490000
heap
page read and write
235DDAC4000
trusted library allocation
page read and write
235DE2F3000
trusted library allocation
page read and write
1F9DF689000
heap
page read and write
235DD134000
trusted library allocation
page read and write
235DF195000
trusted library allocation
page read and write
1F9DFD6C000
heap
page read and write
235D9C9E000
trusted library allocation
page read and write
902000
unkown
page readonly
235D4C8D000
heap
page read and write
235E5CF4000
trusted library allocation
page read and write
235DEB99000
trusted library allocation
page read and write
235DF68C000
trusted library allocation
page read and write
235E90AA000
trusted library allocation
page read and write
1F9DEDC2000
unclassified section
page read and write
235DADEA000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235D4C21000
heap
page read and write
235DFE74000
trusted library allocation
page read and write
235DE3F5000
trusted library allocation
page read and write
235DECFB000
trusted library allocation
page read and write
235DF6B3000
trusted library allocation
page read and write
235DD591000
heap
page read and write
235E5C4B000
trusted library allocation
page read and write
235DEEEE000
trusted library allocation
page read and write
1F9DFD59000
heap
page read and write
1F9DF6DC000
heap
page read and write
235E7AD2000
trusted library allocation
page read and write
235DD870000
trusted library allocation
page read and write
195A5807000
trusted library allocation
page read and write
235DD5A2000
heap
page read and write
235E90DC000
trusted library allocation
page read and write
235DDE5C000
trusted library allocation
page read and write
235E9391000
heap
page read and write
235E79F5000
trusted library allocation
page read and write
235E77EC000
trusted library allocation
page read and write
840000
unkown
page readonly
1F9DFD6C000
heap
page read and write
1F9DF681000
heap
page read and write
235E115E000
trusted library allocation
page read and write
235DEC65000
trusted library allocation
page read and write
235DDE40000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E161B000
trusted library allocation
page read and write
235DDE17000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
235DE4EF000
trusted library allocation
page read and write
235D4C3D000
heap
page read and write
235D4C31000
heap
page read and write
235DEEB2000
trusted library allocation
page read and write
1F9DF6CD000
heap
page read and write
235E5B16000
trusted library allocation
page read and write
235E90FC000
trusted library allocation
page read and write
235DECF7000
trusted library allocation
page read and write
235DDA80000
trusted library allocation
page read and write
195A580A000
trusted library allocation
page read and write
235D9CB9000
trusted library allocation
page read and write
235E1681000
trusted library allocation
page read and write
235DF1EC000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C20000
heap
page read and write
235E9D37000
trusted library allocation
page read and write
235DD5BB000
heap
page read and write
235DF05A000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DE275000
trusted library allocation
page read and write
235DF347000
trusted library allocation
page read and write
235DE3D0000
trusted library allocation
page read and write
235DAB57000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235E64D1000
trusted library allocation
page read and write
235E01E8000
trusted library allocation
page read and write
235E6048000
trusted library allocation
page read and write
235E77A5000
trusted library allocation
page read and write
235DDEDB000
trusted library allocation
page read and write
235DE24E000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235D4C20000
heap
page read and write
235E5C71000
trusted library allocation
page read and write
235DDD18000
trusted library allocation
page read and write
235E79BB000
trusted library allocation
page read and write
235DF4E5000
trusted library allocation
page read and write
235DADB0000
trusted library allocation
page read and write
235E9313000
heap
page read and write
235D4C3E000
heap
page read and write
235E028F000
trusted library allocation
page read and write
DF4000
heap
page read and write
235E0772000
trusted library allocation
page read and write
235DF1BE000
trusted library allocation
page read and write
235D9CFC000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DF36C000
trusted library allocation
page read and write
235DDA4F000
trusted library allocation
page read and write
235D4C8B000
heap
page read and write
235DD9A5000
trusted library allocation
page read and write
235D4C2D000
heap
page read and write
235DDE5C000
trusted library allocation
page read and write
235DDA95000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DEB27000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DD84F000
trusted library allocation
page read and write
DF2000
heap
page read and write
235D4C84000
heap
page read and write
235D4C37000
heap
page read and write
235E00FB000
trusted library allocation
page read and write
1F9DEB70000
unclassified section
page readonly
235E0351000
trusted library allocation
page read and write
235D4C3B000
heap
page read and write
235DD84F000
trusted library allocation
page read and write
235DEBC1000
trusted library allocation
page read and write
235DD593000
heap
page read and write
235D4C82000
heap
page read and write
235DF4E8000
trusted library allocation
page read and write
235E7ACE000
trusted library allocation
page read and write
235DDA90000
trusted library allocation
page read and write
235E03E0000
trusted library allocation
page read and write
235E004B000
trusted library allocation
page read and write
235DE3D6000
trusted library allocation
page read and write
E96723E000
stack
page read and write
1F9DFD77000
heap
page read and write
235E79DF000
trusted library allocation
page read and write
235DE4CB000
trusted library allocation
page read and write
235DF4DC000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E5C23000
trusted library allocation
page read and write
195A55A2000
heap
page read and write
221A6AB2000
trusted library allocation
page read and write
1D77FD703000
trusted library allocation
page read and write
2035E394000
trusted library allocation
page read and write
235DE4C5000
trusted library allocation
page read and write
235E058A000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235E163D000
trusted library allocation
page read and write
221A6C03000
trusted library allocation
page read and write
235DD133000
trusted library allocation
page read and write
235DECD1000
trusted library allocation
page read and write
235DFE7D000
trusted library allocation
page read and write
235DEBB4000
trusted library allocation
page read and write
235DAEEB000
trusted library allocation
page read and write
235DFE92000
trusted library allocation
page read and write
235DD976000
trusted library allocation
page read and write
235DEBCF000
trusted library allocation
page read and write
235E166E000
trusted library allocation
page read and write
235DAF35000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DFCCC000
trusted library allocation
page read and write
235DE290000
trusted library allocation
page read and write
235DDE92000
trusted library allocation
page read and write
235DEFA9000
trusted library allocation
page read and write
3311000
heap
page read and write
235DF656000
trusted library allocation
page read and write
235E0216000
trusted library allocation
page read and write
235E796B000
trusted library allocation
page read and write
235DF4B8000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235E052A000
trusted library allocation
page read and write
235DE6A6000
trusted library allocation
page read and write
235DEED3000
trusted library allocation
page read and write
235DF6F5000
trusted library allocation
page read and write
235E03C5000
trusted library allocation
page read and write
235DED8E000
trusted library allocation
page read and write
235E18CE000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
2035DEB0000
unclassified section
page readonly
235DF59D000
trusted library allocation
page read and write
235DF79C000
trusted library allocation
page read and write
221A675A000
heap
page read and write
235DE26F000
trusted library allocation
page read and write
1F9DF6FD000
heap
page read and write
235D4C19000
heap
page read and write
1F9DF6E0000
heap
page read and write
235E7AD8000
trusted library allocation
page read and write
235E9338000
heap
page read and write
235E03E7000
trusted library allocation
page read and write
235E9D57000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
914000
unkown
page readonly
235DDABC000
trusted library allocation
page read and write
235D4C2B000
heap
page read and write
235DAB93000
trusted library allocation
page read and write
235D95DF000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E037C000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
195A5594000
heap
page read and write
235D4C3F000
heap
page read and write
235D4C37000
heap
page read and write
235E1E64000
trusted library allocation
page read and write
235E0755000
trusted library allocation
page read and write
235DDAAA000
trusted library allocation
page read and write
235DF115000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DDE7E000
trusted library allocation
page read and write
235E5CEA000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235E9A93000
trusted library allocation
page read and write
235DF4E4000
trusted library allocation
page read and write
235DF773000
trusted library allocation
page read and write
235DDE37000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C11000
heap
page read and write
235D4C37000
heap
page read and write
235DD286000
trusted library allocation
page read and write
235E64F8000
trusted library allocation
page read and write
235E9A8A000
trusted library allocation
page read and write
235DF080000
trusted library allocation
page read and write
235E0284000
trusted library allocation
page read and write
235DD17A000
trusted library allocation
page read and write
235E1630000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
7D4000
heap
page read and write
235E0796000
trusted library allocation
page read and write
235DAEDD000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E9A05000
trusted library allocation
page read and write
235E0283000
trusted library allocation
page read and write
15BE000
stack
page read and write
235D4C4E000
heap
page read and write
235DF614000
trusted library allocation
page read and write
235E7A7C000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235DAB93000
trusted library allocation
page read and write
1F9DF0C4000
heap
page read and write
221A6A05000
trusted library allocation
page read and write
235E6007000
trusted library allocation
page read and write
235E795F000
trusted library allocation
page read and write
235E0257000
trusted library allocation
page read and write
235DF195000
trusted library allocation
page read and write
235E9401000
heap
page read and write
1F9DF771000
heap
page read and write
235DF0C2000
trusted library allocation
page read and write
1F9DEF78000
trusted library allocation
page read and write
235DF498000
trusted library allocation
page read and write
235E5BDE000
trusted library allocation
page read and write
235D4C27000
heap
page read and write
235DF0B5000
trusted library allocation
page read and write
235E03C5000
trusted library allocation
page read and write
235E88D7000
trusted library allocation
page read and write
235DEB2C000
trusted library allocation
page read and write
235DD3FE000
trusted library allocation
page read and write
235E05FC000
trusted library allocation
page read and write
90C000
unkown
page write copy
235E11FC000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DEDA7000
trusted library allocation
page read and write
235E1670000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E04F8000
trusted library allocation
page read and write
235DF19A000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235D4C43000
heap
page read and write
235E5BC3000
trusted library allocation
page read and write
235DDE32000
trusted library allocation
page read and write
221A6A1C000
trusted library allocation
page read and write
235E5AE3000
trusted library allocation
page read and write
235E77B2000
trusted library allocation
page read and write
235DAEB5000
trusted library allocation
page read and write
E07000
heap
page read and write
235DE3F5000
trusted library allocation
page read and write
235D95C6000
trusted library allocation
page read and write
235E795D000
trusted library allocation
page read and write
235DD591000
heap
page read and write
235D4C5A000
heap
page read and write
235E611F000
trusted library allocation
page read and write
235E90D3000
trusted library allocation
page read and write
235E034E000
trusted library allocation
page read and write
235E02E0000
trusted library allocation
page read and write
235E7ACE000
trusted library allocation
page read and write
235DD398000
trusted library allocation
page read and write
235DAD89000
trusted library allocation
page read and write
235E5B8B000
trusted library allocation
page read and write
235E5CE2000
trusted library allocation
page read and write
235E8F5F000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
235E61E0000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235DEDEE000
trusted library allocation
page read and write
235E0377000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
7D4000
heap
page read and write
235D4C45000
heap
page read and write
235DEED7000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235DF6BA000
trusted library allocation
page read and write
235D9F3E000
trusted library allocation
page read and write
235E033B000
trusted library allocation
page read and write
235DDA95000
trusted library allocation
page read and write
235DAB9B000
trusted library allocation
page read and write
235E035D000
trusted library allocation
page read and write
195A5460000
heap
page read and write
235D4C3E000
heap
page read and write
235E1941000
trusted library allocation
page read and write
235DD1AA000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E5DFC000
trusted library allocation
page read and write
235E04A3000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF474000
trusted library allocation
page read and write
1F9DFD44000
heap
page read and write
235E5B00000
trusted library allocation
page read and write
235D9598000
trusted library allocation
page read and write
235DFDE4000
trusted library allocation
page read and write
235E02AB000
trusted library allocation
page read and write
235DD134000
trusted library allocation
page read and write
235DFAED000
trusted library allocation
page read and write
235D9590000
trusted library allocation
page read and write
235DEBF5000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235DEB4D000
trusted library allocation
page read and write
235E7955000
trusted library allocation
page read and write
235DEB71000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
1F9DF6DC000
heap
page read and write
235E9180000
trusted library allocation
page read and write
235E03AE000
trusted library allocation
page read and write
235DF0A9000
trusted library allocation
page read and write
235E6048000
trusted library allocation
page read and write
235DDA80000
trusted library allocation
page read and write
235E5D41000
trusted library allocation
page read and write
235DE669000
trusted library allocation
page read and write
1F9DF771000
heap
page read and write
235E0233000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E612E000
trusted library allocation
page read and write
939837B000
stack
page read and write
235DEC91000
trusted library allocation
page read and write
235DE3E3000
trusted library allocation
page read and write
235D4C2D000
heap
page read and write
235D4C4E000
heap
page read and write
1F9DF70A000
heap
page read and write
235DF875000
trusted library allocation
page read and write
235D4C84000
heap
page read and write
235DEBEC000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DEC88000
trusted library allocation
page read and write
235E5D96000
trusted library allocation
page read and write
235E93BA000
heap
page read and write
235DDE7E000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235E027F000
trusted library allocation
page read and write
235DFF91000
trusted library allocation
page read and write
235DF6ED000
trusted library allocation
page read and write
235DF60A000
trusted library allocation
page read and write
235E5C12000
trusted library allocation
page read and write
235DE243000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E04B8000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235DF4EA000
trusted library allocation
page read and write
235E074C000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D4C84000
heap
page read and write
235DAE1D000
trusted library allocation
page read and write
235DF7C3000
trusted library allocation
page read and write
235DF05E000
trusted library allocation
page read and write
235DDA3B000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
2035E476000
heap
page read and write
72617FE000
stack
page read and write
235DEB9E000
trusted library allocation
page read and write
235E79D8000
trusted library allocation
page read and write
235DF0B3000
trusted library allocation
page read and write
235E03C5000
trusted library allocation
page read and write
235E07CF000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DF6E4000
trusted library allocation
page read and write
235DEBA2000
trusted library allocation
page read and write
235E5DC2000
trusted library allocation
page read and write
235E1A2C000
trusted library allocation
page read and write
235E9353000
heap
page read and write
235E796D000
trusted library allocation
page read and write
235DEBF1000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E02AE000
trusted library allocation
page read and write
235E1A01000
trusted library allocation
page read and write
1F9DF0C6000
heap
page read and write
235DDE54000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235D9CAF000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DD907000
trusted library allocation
page read and write
235E027F000
trusted library allocation
page read and write
1F9DF6E4000
heap
page read and write
235D9C7E000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
1F9DEB60000
unclassified section
page readonly
235E5C50000
trusted library allocation
page read and write
235DF05E000
trusted library allocation
page read and write
235E0346000
trusted library allocation
page read and write
235DAB1B000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E5C4B000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235DE3D0000
trusted library allocation
page read and write
235DD5BB000
heap
page read and write
235E03A1000
trusted library allocation
page read and write
235DD5CC000
heap
page read and write
235E0557000
trusted library allocation
page read and write
235DF0BE000
trusted library allocation
page read and write
235DEBF2000
trusted library allocation
page read and write
235DABD3000
trusted library allocation
page read and write
235D4C83000
heap
page read and write
235D9C9E000
trusted library allocation
page read and write
235E03BA000
trusted library allocation
page read and write
235DF4B3000
trusted library allocation
page read and write
235E5C23000
trusted library allocation
page read and write
235E0200000
trusted library allocation
page read and write
221A6750000
heap
page read and write
235D9C66000
trusted library allocation
page read and write
1F9DF6FF000
heap
page read and write
235E5AC4000
trusted library allocation
page read and write
235DF1DA000
trusted library allocation
page read and write
235DFD40000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235E0483000
trusted library allocation
page read and write
235DDAB1000
trusted library allocation
page read and write
235DAB47000
trusted library allocation
page read and write
235DD5A6000
heap
page read and write
235DDE83000
trusted library allocation
page read and write
235E5C93000
trusted library allocation
page read and write
9399DFE000
stack
page read and write
235DF3CE000
trusted library allocation
page read and write
1EDDFF000
stack
page read and write
DE6000
heap
page read and write
235E64A0000
trusted library allocation
page read and write
2035E323000
trusted library allocation
page read and write
235DD32F000
trusted library allocation
page read and write
235DAD32000
trusted library allocation
page read and write
235D9CD7000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235DEF9C000
trusted library allocation
page read and write
235DE3AF000
trusted library allocation
page read and write
1F9DF768000
heap
page read and write
235E7A94000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235DF616000
trusted library allocation
page read and write
1F9DF6E9000
heap
page read and write
235D4C2B000
heap
page read and write
235D4C99000
heap
page read and write
235E03C1000
trusted library allocation
page read and write
235E02D1000
trusted library allocation
page read and write
235DED63000
trusted library allocation
page read and write
235E5C73000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
2035E01F000
unclassified section
page read and write
235DEB8E000
trusted library allocation
page read and write
235E05E0000
trusted library allocation
page read and write
235E1193000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
235E036F000
trusted library allocation
page read and write
235E0546000
trusted library allocation
page read and write
235DB2D1000
trusted library allocation
page read and write
235DAD83000
trusted library allocation
page read and write
235DE3E5000
trusted library allocation
page read and write
235E5CB9000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DECC8000
trusted library allocation
page read and write
235DF4E1000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E5D36000
trusted library allocation
page read and write
235E02AB000
trusted library allocation
page read and write
235DFDFD000
trusted library allocation
page read and write
235DE42D000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C1A000
heap
page read and write
235DE324000
trusted library allocation
page read and write
235E0315000
trusted library allocation
page read and write
235DDA66000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235E7ADC000
trusted library allocation
page read and write
235DF4C3000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235E93E3000
heap
page read and write
1F9DEF12000
trusted library allocation
page read and write
235E773F000
trusted library allocation
page read and write
235E13F6000
trusted library allocation
page read and write
235E5C5C000
trusted library allocation
page read and write
235DF6F1000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
2035E3A0000
trusted library allocation
page read and write
235DF474000
trusted library allocation
page read and write
235DAD32000
trusted library allocation
page read and write
1F9DEBE0000
unclassified section
page readonly
235D4C37000
heap
page read and write
235E81E2000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235E81E6000
trusted library allocation
page read and write
1A695707000
trusted library allocation
page read and write
235D4C28000
heap
page read and write
235E182F000
trusted library allocation
page read and write
235DD58D000
heap
page read and write
235DDA83000
trusted library allocation
page read and write
235DEB8E000
trusted library allocation
page read and write
235DF4AA000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E7A04000
trusted library allocation
page read and write
1F9DFD6C000
heap
page read and write
235D4C3E000
heap
page read and write
1F9DEF6F000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235E14ED000
trusted library allocation
page read and write
235DE3AA000
trusted library allocation
page read and write
235E1630000
trusted library allocation
page read and write
235D9CC0000
trusted library allocation
page read and write
235E5ADF000
trusted library allocation
page read and write
235E607C000
trusted library allocation
page read and write
235DF3B7000
trusted library allocation
page read and write
235E77D8000
trusted library allocation
page read and write
235DEB1E000
trusted library allocation
page read and write
235E1641000
trusted library allocation
page read and write
235DEBCF000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235DD84F000
trusted library allocation
page read and write
235E01D2000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DF139000
trusted library allocation
page read and write
235DF47D000
trusted library allocation
page read and write
235DDA88000
trusted library allocation
page read and write
1F9DEF5F000
trusted library allocation
page read and write
235DADA4000
trusted library allocation
page read and write
235DD5A2000
heap
page read and write
235E03E5000
trusted library allocation
page read and write
195A70B0000
heap
page read and write
235E5C8B000
trusted library allocation
page read and write
235DEDE2000
trusted library allocation
page read and write
235D4C62000
heap
page read and write
235DF6DB000
trusted library allocation
page read and write
235DF4C3000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
195A57B0000
heap
page read and write
235DEC99000
trusted library allocation
page read and write
235DDAD6000
trusted library allocation
page read and write
235DEEE5000
trusted library allocation
page read and write
235E88DA000
trusted library allocation
page read and write
235DF688000
trusted library allocation
page read and write
235E0269000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235DF117000
trusted library allocation
page read and write
235E9A50000
trusted library allocation
page read and write
235D4C27000
heap
page read and write
235D4C2E000
heap
page read and write
235DAEB5000
trusted library allocation
page read and write
235E5CCA000
trusted library allocation
page read and write
235DF0B7000
trusted library allocation
page read and write
235DFAB2000
trusted library allocation
page read and write
E9682FE000
unkown
page readonly
235DACC8000
trusted library allocation
page read and write
235DF069000
trusted library allocation
page read and write
235DEB6F000
trusted library allocation
page read and write
235DF05C000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E03C2000
trusted library allocation
page read and write
235E027A000
trusted library allocation
page read and write
221A6D0C000
trusted library allocation
page read and write
841000
unkown
page execute read
787E73E000
stack
page read and write
235E02DC000
trusted library allocation
page read and write
235DD596000
heap
page read and write
235DF6BA000
trusted library allocation
page read and write
235DDECE000
trusted library allocation
page read and write
235E028F000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E02C9000
trusted library allocation
page read and write
235E5CFE000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235E5CB5000
trusted library allocation
page read and write
235D4C9E000
heap
page read and write
235DDE7E000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
D2E000
stack
page read and write
235D4C32000
heap
page read and write
235E60DF000
trusted library allocation
page read and write
235DAE16000
trusted library allocation
page read and write
235DF482000
trusted library allocation
page read and write
235E60E8000
trusted library allocation
page read and write
221A6670000
heap
page read and write
221A6A24000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235E5CD4000
trusted library allocation
page read and write
235DABF3000
trusted library allocation
page read and write
235DD89A000
trusted library allocation
page read and write
235DE4C6000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DEB0E000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E79A5000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235E79F5000
trusted library allocation
page read and write
235DDA80000
trusted library allocation
page read and write
235D959E000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235D4C51000
heap
page read and write
235DF48F000
trusted library allocation
page read and write
235E5C79000
trusted library allocation
page read and write
235DD160000
trusted library allocation
page read and write
221A69B0000
heap
page read and write
1F9DF670000
heap
page read and write
235DD1FD000
trusted library allocation
page read and write
235DF0AB000
trusted library allocation
page read and write
235E02AB000
trusted library allocation
page read and write
235DD881000
trusted library allocation
page read and write
3311000
heap
page read and write
221A6AF1000
trusted library allocation
page read and write
235E0360000
trusted library allocation
page read and write
235E7A7C000
trusted library allocation
page read and write
CFE000
stack
page read and write
235E0283000
trusted library allocation
page read and write
235DD8CE000
trusted library allocation
page read and write
235DD988000
trusted library allocation
page read and write
E964FEE000
unkown
page readonly
235E5C5C000
trusted library allocation
page read and write
235E5D94000
trusted library allocation
page read and write
235E054D000
trusted library allocation
page read and write
235DF3C0000
trusted library allocation
page read and write
235DD98A000
trusted library allocation
page read and write
235DDADB000
trusted library allocation
page read and write
235DDAB9000
trusted library allocation
page read and write
235DEC6C000
trusted library allocation
page read and write
235DD9A5000
trusted library allocation
page read and write
787DF3E000
unkown
page readonly
1ECDFC000
stack
page read and write
235DDFFC000
trusted library allocation
page read and write
235E162B000
trusted library allocation
page read and write
235DFF7C000
trusted library allocation
page read and write
235E1EAC000
trusted library allocation
page read and write
235E5CEE000
trusted library allocation
page read and write
235DF2FA000
trusted library allocation
page read and write
235DF749000
trusted library allocation
page read and write
235D9CAC000
trusted library allocation
page read and write
235DAE7C000
trusted library allocation
page read and write
235DF4BA000
trusted library allocation
page read and write
235E5B64000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DADF7000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E03DA000
trusted library allocation
page read and write
235DD591000
heap
page read and write
235D4C37000
heap
page read and write
235D9BF6000
trusted library allocation
page read and write
235E88C0000
trusted library allocation
page read and write
235DE2EB000
trusted library allocation
page read and write
235DDA5A000
trusted library allocation
page read and write
235DACFB000
trusted library allocation
page read and write
1F9DF05E000
unkown
page execute read
235DF66D000
trusted library allocation
page read and write
235DD355000
trusted library allocation
page read and write
235E026B000
trusted library allocation
page read and write
E96727E000
unkown
page readonly
235E03A1000
trusted library allocation
page read and write
235DAC9E000
trusted library allocation
page read and write
235E90A2000
trusted library allocation
page read and write
235DFCC1000
trusted library allocation
page read and write
235E7AD8000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235D4C8D000
heap
page read and write
235D4C2D000
heap
page read and write
235E11AC000
trusted library allocation
page read and write
235DEC44000
trusted library allocation
page read and write
235E9313000
heap
page read and write
235DDA76000
trusted library allocation
page read and write
235DF400000
trusted library allocation
page read and write
235E605B000
trusted library allocation
page read and write
235E5C13000
trusted library allocation
page read and write
1A037C624000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235DE4BB000
trusted library allocation
page read and write
235DE3F9000
trusted library allocation
page read and write
195A558F000
heap
page read and write
725EFFF000
stack
page read and write
235D4C4E000
heap
page read and write
235DF511000
trusted library allocation
page read and write
235E01BF000
trusted library allocation
page read and write
235E5CE5000
trusted library allocation
page read and write
235DE3F5000
trusted library allocation
page read and write
235DEC41000
trusted library allocation
page read and write
1F9DF766000
heap
page read and write
235E5C23000
trusted library allocation
page read and write
787AAFC000
stack
page read and write
235E7A44000
trusted library allocation
page read and write
235E03BA000
trusted library allocation
page read and write
235DD30B000
trusted library allocation
page read and write
235E1175000
trusted library allocation
page read and write
1F9DEF2F000
trusted library allocation
page read and write
235E77C7000
trusted library allocation
page read and write
235E6099000
trusted library allocation
page read and write
2035DF90000
heap
page read and write
235E0222000
trusted library allocation
page read and write
235D9CD7000
trusted library allocation
page read and write
1F9DEF10000
trusted library allocation
page read and write
235DFD5D000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DD596000
heap
page read and write
221A67DF000
unclassified section
page read and write
235E03FE000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DF6BD000
trusted library allocation
page read and write
235E02A4000
trusted library allocation
page read and write
235DE4CD000
trusted library allocation
page read and write
235DD904000
trusted library allocation
page read and write
235E5C4F000
trusted library allocation
page read and write
235DDE6B000
trusted library allocation
page read and write
235E19E4000
trusted library allocation
page read and write
235DDE1F000
trusted library allocation
page read and write
235E1616000
trusted library allocation
page read and write
1F9DED30000
heap
page read and write
235D4C25000
heap
page read and write
235DF445000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235E166E000
trusted library allocation
page read and write
235DF06D000
trusted library allocation
page read and write
235DEEE3000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5DF2000
trusted library allocation
page read and write
DE6000
heap
page read and write
235E07CF000
trusted library allocation
page read and write
235DF491000
trusted library allocation
page read and write
235DAC59000
trusted library allocation
page read and write
235E0568000
trusted library allocation
page read and write
235DE4EC000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
1F9DF76B000
heap
page read and write
235D4C1E000
heap
page read and write
235DE444000
trusted library allocation
page read and write
235DECC4000
trusted library allocation
page read and write
235DF4F0000
trusted library allocation
page read and write
235E852E000
trusted library allocation
page read and write
235E1629000
trusted library allocation
page read and write
235DDA88000
trusted library allocation
page read and write
235DF111000
trusted library allocation
page read and write
235DED75000
trusted library allocation
page read and write
27DF0061000
trusted library allocation
page execute read
221A6630000
heap
page read and write
235DEC86000
trusted library allocation
page read and write
235DD5CC000
heap
page read and write
235DDA3B000
trusted library allocation
page read and write
235E14ED000
trusted library allocation
page read and write
2035E500000
trusted library allocation
page read and write
235DD14C000
trusted library allocation
page read and write
235DAE38000
trusted library allocation
page read and write
235E5B77000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5D69000
trusted library allocation
page read and write
235DEC41000
trusted library allocation
page read and write
235DDAC2000
trusted library allocation
page read and write
90C000
unkown
page read and write
235DF032000
trusted library allocation
page read and write
235E7ADE000
trusted library allocation
page read and write
235E7600000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235E5C46000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235D4C29000
heap
page read and write
235DF0BA000
trusted library allocation
page read and write
235DD1FD000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E7968000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
820000
heap
page read and write
235E60CC000
trusted library allocation
page read and write
235DE4F8000
trusted library allocation
page read and write
235E5BDC000
trusted library allocation
page read and write
235D4C83000
heap
page read and write
235DAEF6000
trusted library allocation
page read and write
235DDA6F000
trusted library allocation
page read and write
235E14BF000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E5ADF000
trusted library allocation
page read and write
235DAB81000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DEB9E000
trusted library allocation
page read and write
235DD27F000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C82000
heap
page read and write
235DE4D9000
trusted library allocation
page read and write
235DDABE000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
235E5AEE000
trusted library allocation
page read and write
235E113A000
trusted library allocation
page read and write
235DF05F000
trusted library allocation
page read and write
235E90D3000
trusted library allocation
page read and write
235E035D000
trusted library allocation
page read and write
235E118D000
trusted library allocation
page read and write
1F9DEF03000
trusted library allocation
page read and write
235DF4EE000
trusted library allocation
page read and write
235DD988000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235E19A7000
trusted library allocation
page read and write
235E02C9000
trusted library allocation
page read and write
1F9DF6E0000
heap
page read and write
235D4C28000
heap
page read and write
1F9DFD58000
heap
page read and write
235E846D000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235DF04E000
trusted library allocation
page read and write
235DF798000
trusted library allocation
page read and write
235DF05A000
trusted library allocation
page read and write
235D4C29000
heap
page read and write
235E60E3000
trusted library allocation
page read and write
235DFE8A000
trusted library allocation
page read and write
235DF3FE000
trusted library allocation
page read and write
235E601F000
trusted library allocation
page read and write
235D4C15000
heap
page read and write
235D4C45000
heap
page read and write
235DF447000
trusted library allocation
page read and write
235DE30B000
trusted library allocation
page read and write
235DEB92000
trusted library allocation
page read and write
235D4C6E000
heap
page read and write
235E908B000
trusted library allocation
page read and write
235DF5D5000
trusted library allocation
page read and write
235E059E000
trusted library allocation
page read and write
235E796D000
trusted library allocation
page read and write
235E0313000
trusted library allocation
page read and write
235E02C9000
trusted library allocation
page read and write
235E04C3000
trusted library allocation
page read and write
235E5C6F000
trusted library allocation
page read and write
235D4C15000
heap
page read and write
235DF53B000
trusted library allocation
page read and write
235D4C27000
heap
page read and write
235E79DB000
trusted library allocation
page read and write
235E6048000
trusted library allocation
page read and write
235E7AD2000
trusted library allocation
page read and write
221A6570000
unclassified section
page readonly
235DAB9B000
trusted library allocation
page read and write
235DF387000
trusted library allocation
page read and write
235E79B1000
trusted library allocation
page read and write
235E5D3D000
trusted library allocation
page read and write
235E1884000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DDEF6000
trusted library allocation
page read and write
235DEB7A000
trusted library allocation
page read and write
235DF046000
trusted library allocation
page read and write
235DD38D000
trusted library allocation
page read and write
235E18F1000
trusted library allocation
page read and write
235E5C6A000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5C46000
trusted library allocation
page read and write
235DF45E000
trusted library allocation
page read and write
235E5ACD000
trusted library allocation
page read and write
235E0575000
trusted library allocation
page read and write
235DEB67000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
1F9DF760000
heap
page read and write
235DD28D000
trusted library allocation
page read and write
235E90BE000
trusted library allocation
page read and write
235DF4EE000
trusted library allocation
page read and write
235E5C3B000
trusted library allocation
page read and write
235DABFA000
trusted library allocation
page read and write
235E7958000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235DACD2000
trusted library allocation
page read and write
235DD3BE000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
221A6A63000
trusted library allocation
page read and write
235DF7E4000
trusted library allocation
page read and write
1F9DF6EC000
heap
page read and write
235E7802000
trusted library allocation
page read and write
235E03E5000
trusted library allocation
page read and write
235DAE2C000
trusted library allocation
page read and write
235E0311000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DAE81000
trusted library allocation
page read and write
235DB293000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DEC4F000
trusted library allocation
page read and write
235E5CD4000
trusted library allocation
page read and write
235D4C8E000
heap
page read and write
235E5AEA000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DDAC4000
trusted library allocation
page read and write
235DEFA4000
trusted library allocation
page read and write
235E16B4000
trusted library allocation
page read and write
235DF3C0000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235D4C32000
heap
page read and write
235DEEE8000
trusted library allocation
page read and write
235DF5EC000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235D4C21000
heap
page read and write
235E8880000
trusted library allocation
page read and write
235E0065000
trusted library allocation
page read and write
235D4C4A000
heap
page read and write
235DD345000
trusted library allocation
page read and write
235DF7BA000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E0380000
trusted library allocation
page read and write
1F9DFD2A000
heap
page read and write
235E8441000
trusted library allocation
page read and write
235E7A8A000
trusted library allocation
page read and write
DF0000
heap
page read and write
D0B000
stack
page read and write
1F9DFD58000
heap
page read and write
235DD84F000
trusted library allocation
page read and write
235DD91F000
trusted library allocation
page read and write
235E03A6000
trusted library allocation
page read and write
235E05AF000
trusted library allocation
page read and write
2035DF3C000
remote allocation
page execute read
235E939B000
heap
page read and write
235DF480000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235E0343000
trusted library allocation
page read and write
235DF5FC000
trusted library allocation
page read and write
235E0375000
trusted library allocation
page read and write
235E7AD4000
trusted library allocation
page read and write
235E07EC000
trusted library allocation
page read and write
235DF49A000
trusted library allocation
page read and write
2035E010000
unclassified section
page read and write
235E02FC000
trusted library allocation
page read and write
235E5CFB000
trusted library allocation
page read and write
235E7955000
trusted library allocation
page read and write
235DF050000
trusted library allocation
page read and write
235DEC3F000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
221A65F0000
unclassified section
page readonly
235E06D5000
trusted library allocation
page read and write
235E03DA000
trusted library allocation
page read and write
235E5DF0000
trusted library allocation
page read and write
235E61E0000
trusted library allocation
page read and write
235DFF9C000
trusted library allocation
page read and write
235E796B000
trusted library allocation
page read and write
235E06DF000
trusted library allocation
page read and write
235E936D000
heap
page read and write
235DAE39000
trusted library allocation
page read and write
235D9FAE000
trusted library allocation
page read and write
235DF02A000
trusted library allocation
page read and write
1F9DFD58000
heap
page read and write
235E8F56000
trusted library allocation
page read and write
235DF2E5000
trusted library allocation
page read and write
235E14EB000
trusted library allocation
page read and write
235E7991000
trusted library allocation
page read and write
235DECD5000
trusted library allocation
page read and write
221A6AF6000
trusted library allocation
page read and write
221A67D0000
unclassified section
page read and write
235D4C30000
heap
page read and write
235DD8F6000
trusted library allocation
page read and write
235D4C51000
heap
page read and write
235E0369000
trusted library allocation
page read and write
235DECF7000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235E5C1D000
trusted library allocation
page read and write
235D4C04000
heap
page read and write
235DE3F1000
trusted library allocation
page read and write
235E01D6000
trusted library allocation
page read and write
E967AFE000
stack
page read and write
235DF648000
trusted library allocation
page read and write
235E03E0000
trusted library allocation
page read and write
235DF4EE000
trusted library allocation
page read and write
235E0315000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
2035E060000
heap
page read and write
235DDAD5000
trusted library allocation
page read and write
235D4C2F000
heap
page read and write
235E11B2000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235D9B23000
trusted library allocation
page read and write
235DFE6A000
trusted library allocation
page read and write
235DADF8000
trusted library allocation
page read and write
235E9338000
heap
page read and write
235D9C1A000
trusted library allocation
page read and write
235E0332000
trusted library allocation
page read and write
235E0284000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235DF60A000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235E9303000
heap
page read and write
235E07EE000
trusted library allocation
page read and write
235DF024000
trusted library allocation
page read and write
235DF4B8000
trusted library allocation
page read and write
235E0557000
trusted library allocation
page read and write
235E5B72000
trusted library allocation
page read and write
235E7A12000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
235E79D8000
trusted library allocation
page read and write
235E77B2000
trusted library allocation
page read and write
235E03B7000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235DF6F1000
trusted library allocation
page read and write
235D4C25000
heap
page read and write
235D4C8A000
heap
page read and write
235E84AC000
trusted library allocation
page read and write
235D4C93000
heap
page read and write
235DD30B000
trusted library allocation
page read and write
235DF7BD000
trusted library allocation
page read and write
235DF0E9000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235DF497000
trusted library allocation
page read and write
1F9DFD2A000
heap
page read and write
2035E35B000
trusted library allocation
page read and write
235DEC2B000
trusted library allocation
page read and write
235DEEDF000
trusted library allocation
page read and write
235E034F000
trusted library allocation
page read and write
235DD87B000
trusted library allocation
page read and write
235D4C9E000
heap
page read and write
235E5C58000
trusted library allocation
page read and write
235E79E8000
trusted library allocation
page read and write
235DEC66000
trusted library allocation
page read and write
235DF3DE000
trusted library allocation
page read and write
235D4C2F000
heap
page read and write
235D4C32000
heap
page read and write
235E03F6000
trusted library allocation
page read and write
235D4C4A000
heap
page read and write
235DF4AA000
trusted library allocation
page read and write
235E05AF000
trusted library allocation
page read and write
235D4C15000
heap
page read and write
235E64F8000
trusted library allocation
page read and write
235DFFB7000
trusted library allocation
page read and write
235E79F6000
trusted library allocation
page read and write
235DF086000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235D4C89000
heap
page read and write
2035E392000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235E1123000
trusted library allocation
page read and write
235E0254000
trusted library allocation
page read and write
235DD3D4000
trusted library allocation
page read and write
1F9DF761000
heap
page read and write
235DEB7E000
trusted library allocation
page read and write
235DD5CB000
heap
page read and write
235E034F000
trusted library allocation
page read and write
235DE240000
trusted library allocation
page read and write
235E03DA000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235DF176000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C35000
heap
page read and write
235D4C32000
heap
page read and write
1F9DF550000
heap
page read and write
235E04D4000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235E612E000
trusted library allocation
page read and write
235E9D0B000
trusted library allocation
page read and write
235DDE95000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235D4C59000
heap
page read and write
235DD863000
trusted library allocation
page read and write
1F9DF6EC000
heap
page read and write
235D4C15000
heap
page read and write
235E7A52000
trusted library allocation
page read and write
235E79DD000
trusted library allocation
page read and write
235E84E4000
trusted library allocation
page read and write
235E186D000
trusted library allocation
page read and write
235DD267000
trusted library allocation
page read and write
235DD34E000
trusted library allocation
page read and write
235DD986000
trusted library allocation
page read and write
235E8407000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
1F9DEF0A000
trusted library allocation
page read and write
235E05F6000
trusted library allocation
page read and write
235E05B3000
trusted library allocation
page read and write
235E5D92000
trusted library allocation
page read and write
235E14C9000
trusted library allocation
page read and write
2035E310000
trusted library allocation
page read and write
235E02D0000
trusted library allocation
page read and write
235DADE4000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DF5D3000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
72607FE000
stack
page read and write
235DDA9D000
trusted library allocation
page read and write
235DE390000
trusted library allocation
page read and write
235DE278000
trusted library allocation
page read and write
235E16E1000
trusted library allocation
page read and write
235DE3AB000
trusted library allocation
page read and write
235E1497000
trusted library allocation
page read and write
235DD390000
trusted library allocation
page read and write
235E2802000
trusted library allocation
page read and write
235E03FB000
trusted library allocation
page read and write
235DEB9E000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
7D4000
heap
page read and write
235D4C82000
heap
page read and write
235E5AE3000
trusted library allocation
page read and write
1F9DED50000
heap
page read and write
235E5D63000
trusted library allocation
page read and write
235E06B9000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
235E5CFE000
trusted library allocation
page read and write
235E7A52000
trusted library allocation
page read and write
235E79AF000
trusted library allocation
page read and write
235DF6DB000
trusted library allocation
page read and write
235E60D9000
trusted library allocation
page read and write
235E0586000
trusted library allocation
page read and write
235DD1BC000
trusted library allocation
page read and write
235DE4E6000
trusted library allocation
page read and write
235DDE51000
trusted library allocation
page read and write
235DAEF6000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E06CB000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E1690000
trusted library allocation
page read and write
1F9DFD44000
heap
page read and write
235DF761000
trusted library allocation
page read and write
235E03E0000
trusted library allocation
page read and write
235DE4E6000
trusted library allocation
page read and write
235E11E8000
trusted library allocation
page read and write
235DE2CF000
trusted library allocation
page read and write
235DAE26000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235E772A000
trusted library allocation
page read and write
235E90F2000
trusted library allocation
page read and write
235E5D9A000
trusted library allocation
page read and write
235DF480000
trusted library allocation
page read and write
725EFFA000
stack
page read and write
235D4C3E000
heap
page read and write
235DAE61000
trusted library allocation
page read and write
235E07BA000
trusted library allocation
page read and write
235E06CE000
trusted library allocation
page read and write
235DDABC000
trusted library allocation
page read and write
235E602F000
trusted library allocation
page read and write
235DF0A0000
trusted library allocation
page read and write
235E0527000
trusted library allocation
page read and write
235DF4E2000
trusted library allocation
page read and write
235DEB86000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DF02F000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235D4C32000
heap
page read and write
235D4C3E000
heap
page read and write
235DAE40000
trusted library allocation
page read and write
235DEF0B000
trusted library allocation
page read and write
235DF4B3000
trusted library allocation
page read and write
235E5DF6000
trusted library allocation
page read and write
235DECD6000
trusted library allocation
page read and write
235E5AFC000
trusted library allocation
page read and write
235DFAAC000
trusted library allocation
page read and write
195A5540000
heap
page read and write
235DAEF3000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235E034B000
trusted library allocation
page read and write
235DECC7000
trusted library allocation
page read and write
235DDEDA000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
1F9DFD3B000
heap
page read and write
235E90B6000
trusted library allocation
page read and write
235DD961000
trusted library allocation
page read and write
235D4C85000
heap
page read and write
235DF088000
trusted library allocation
page read and write
235DF4D6000
trusted library allocation
page read and write
235E1616000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DAC55000
trusted library allocation
page read and write
235E11AF000
trusted library allocation
page read and write
235E5CD4000
trusted library allocation
page read and write
27DF0051000
trusted library allocation
page execute read
235E7721000
trusted library allocation
page read and write
235DD977000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235DF6FB000
trusted library allocation
page read and write
235E5CF4000
trusted library allocation
page read and write
235DE3D6000
trusted library allocation
page read and write
235DDE71000
trusted library allocation
page read and write
221A6A82000
trusted library allocation
page read and write
235DF076000
trusted library allocation
page read and write
235DEE70000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235D4C21000
heap
page read and write
235DF081000
trusted library allocation
page read and write
235E5F0A000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
235DDAC4000
trusted library allocation
page read and write
235DF625000
trusted library allocation
page read and write
235DDE51000
trusted library allocation
page read and write
235E0351000
trusted library allocation
page read and write
235E0045000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E1EAE000
trusted library allocation
page read and write
235DF345000
trusted library allocation
page read and write
235E8F44000
trusted library allocation
page read and write
235E5CE5000
trusted library allocation
page read and write
235D95EF000
trusted library allocation
page read and write
235E04AA000
trusted library allocation
page read and write
235E1145000
trusted library allocation
page read and write
235E01E3000
trusted library allocation
page read and write
235DD596000
heap
page read and write
2035E503000
trusted library allocation
page read and write
235DECB7000
trusted library allocation
page read and write
235E02A6000
trusted library allocation
page read and write
235DF4E8000
trusted library allocation
page read and write
235DDE37000
trusted library allocation
page read and write
235E6000000
trusted library allocation
page read and write
DFE000
heap
page read and write
7260FFF000
stack
page read and write
235E03E0000
trusted library allocation
page read and write
235DB253000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
235E7A90000
trusted library allocation
page read and write
235DE43F000
trusted library allocation
page read and write
235E5CB4000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235D4C66000
heap
page read and write
235DF06B000
trusted library allocation
page read and write
235E144F000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
235D4C29000
heap
page read and write
235D4C1D000
heap
page read and write
235DFF72000
trusted library allocation
page read and write
235E88C2000
trusted library allocation
page read and write
1F9DEF16000
trusted library allocation
page read and write
235E02E8000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235D4C1A000
heap
page read and write
235DB26D000
trusted library allocation
page read and write
235E90EC000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235DF6D3000
trusted library allocation
page read and write
235E0784000
trusted library allocation
page read and write
235E77A8000
trusted library allocation
page read and write
DFE000
heap
page read and write
221A6A5D000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235DF04B000
trusted library allocation
page read and write
235DFFDB000
trusted library allocation
page read and write
2035E381000
trusted library allocation
page read and write
235DF069000
trusted library allocation
page read and write
235E8405000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235D4C3E000
heap
page read and write
235D4C40000
heap
page read and write
235E79E8000
trusted library allocation
page read and write
235DF471000
trusted library allocation
page read and write
235DD5CC000
heap
page read and write
235E194D000
trusted library allocation
page read and write
235DABC2000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235D4C32000
heap
page read and write
235DEFA4000
trusted library allocation
page read and write
235DD95C000
trusted library allocation
page read and write
902000
unkown
page readonly
235E7ADC000
trusted library allocation
page read and write
235DF5DA000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
235DF59F000
trusted library allocation
page read and write
235E9D57000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C45000
heap
page read and write
235DF081000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235E05FC000
trusted library allocation
page read and write
235DD887000
trusted library allocation
page read and write
235E79A5000
trusted library allocation
page read and write
235E7A9F000
trusted library allocation
page read and write
235DEC72000
trusted library allocation
page read and write
235E02F5000
trusted library allocation
page read and write
235E0313000
trusted library allocation
page read and write
235DF0C2000
trusted library allocation
page read and write
235E7ACE000
trusted library allocation
page read and write
235DDE71000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
235DE240000
trusted library allocation
page read and write
235E79F1000
trusted library allocation
page read and write
235E81F6000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E1ED7000
trusted library allocation
page read and write
235E5CF1000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DF069000
trusted library allocation
page read and write
1A037C61E000
trusted library allocation
page read and write
1F9DF0C0000
heap
page read and write
235E168B000
trusted library allocation
page read and write
235E058C000
trusted library allocation
page read and write
235E034F000
trusted library allocation
page read and write
235E6125000
trusted library allocation
page read and write
235DD9A5000
trusted library allocation
page read and write
195A55A4000
heap
page read and write
DEE000
heap
page read and write
235E5B6B000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235D9CD7000
trusted library allocation
page read and write
8DC000
unkown
page readonly
235D4C37000
heap
page read and write
235DAEF8000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
235DD59C000
heap
page read and write
235DD591000
heap
page read and write
235DAEF0000
trusted library allocation
page read and write
235DECC3000
trusted library allocation
page read and write
235E02C9000
trusted library allocation
page read and write
235DEDFA000
trusted library allocation
page read and write
235DE3D0000
trusted library allocation
page read and write
235DF0C1000
trusted library allocation
page read and write
235DAE77000
trusted library allocation
page read and write
235E02FA000
trusted library allocation
page read and write
235E0207000
trusted library allocation
page read and write
235DF35F000
trusted library allocation
page read and write
235DF611000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
DEB000
heap
page read and write
235DD359000
trusted library allocation
page read and write
1F9DF721000
heap
page read and write
235E7A94000
trusted library allocation
page read and write
235DEC37000
trusted library allocation
page read and write
235E190C000
trusted library allocation
page read and write
1F9DF060000
trusted library allocation
page read and write
235E77B7000
trusted library allocation
page read and write
235DEB67000
trusted library allocation
page read and write
2035DFA0000
heap
page read and write
235DF4C6000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235E773F000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235E03D3000
trusted library allocation
page read and write
235E7A36000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DADA0000
trusted library allocation
page read and write
DE2000
heap
page read and write
235E88D7000
trusted library allocation
page read and write
235E0586000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235E5B1A000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235E06BD000
trusted library allocation
page read and write
910000
unkown
page write copy
235DAE16000
trusted library allocation
page read and write
235DEC8C000
trusted library allocation
page read and write
235E88CE000
trusted library allocation
page read and write
235E77A5000
trusted library allocation
page read and write
235DDE3D000
trusted library allocation
page read and write
235D4C94000
heap
page read and write
235D9FDE000
trusted library allocation
page read and write
235E11BB000
trusted library allocation
page read and write
235E79AC000
trusted library allocation
page read and write
235DF696000
trusted library allocation
page read and write
221A6673000
heap
page read and write
221A6A76000
trusted library allocation
page read and write
235E5DFA000
trusted library allocation
page read and write
235DE4CD000
trusted library allocation
page read and write
235E038D000
trusted library allocation
page read and write
235DD98E000
trusted library allocation
page read and write
235E0255000
trusted library allocation
page read and write
235DD98E000
trusted library allocation
page read and write
235E03AF000
trusted library allocation
page read and write
235E5BCC000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
7D4000
heap
page read and write
235D9CC0000
trusted library allocation
page read and write
787EF3E000
unkown
page readonly
235E77BF000
trusted library allocation
page read and write
939A6BE000
unkown
page readonly
235DF787000
trusted library allocation
page read and write
235E16CC000
trusted library allocation
page read and write
2035DFC0000
heap
page read and write
235E03DB000
trusted library allocation
page read and write
235D4C85000
heap
page read and write
235DDA6B000
trusted library allocation
page read and write
235DF3FE000
trusted library allocation
page read and write
235DF7A1000
trusted library allocation
page read and write
840000
unkown
page readonly
235D4C61000
heap
page read and write
235DDA76000
trusted library allocation
page read and write
235E1629000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DAC7B000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235E02B0000
trusted library allocation
page read and write
195A5600000
trusted library allocation
page read and write
235E5ACB000
trusted library allocation
page read and write
235DD5BB000
heap
page read and write
235E022F000
trusted library allocation
page read and write
235DD32F000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E026B000
trusted library allocation
page read and write
235E11CB000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DECC3000
trusted library allocation
page read and write
235D9FF1000
trusted library allocation
page read and write
235DF4DE000
trusted library allocation
page read and write
235DECC3000
trusted library allocation
page read and write
235DE3E5000
trusted library allocation
page read and write
235DF0E6000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235E01F4000
trusted library allocation
page read and write
235DF1F5000
trusted library allocation
page read and write
235DF0DC000
trusted library allocation
page read and write
235DE4AD000
trusted library allocation
page read and write
235E025F000
trusted library allocation
page read and write
235E614E000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DF683000
trusted library allocation
page read and write
235DADF8000
trusted library allocation
page read and write
1F9DFD3B000
heap
page read and write
235E5C75000
trusted library allocation
page read and write
235DACEC000
trusted library allocation
page read and write
235D4C3D000
heap
page read and write
235DF06B000
trusted library allocation
page read and write
235E1886000
trusted library allocation
page read and write
235E058C000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235D4C82000
heap
page read and write
235E0284000
trusted library allocation
page read and write
1F9DFD77000
heap
page read and write
235DF2B7000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E076A000
trusted library allocation
page read and write
235E8F79000
trusted library allocation
page read and write
235DE4F1000
trusted library allocation
page read and write
235DF77E000
trusted library allocation
page read and write
235DE4F8000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
1F9DEC0A000
heap
page read and write
235E0221000
trusted library allocation
page read and write
DC8000
heap
page read and write
235DD596000
heap
page read and write
235D4C45000
heap
page read and write
235E7A9F000
trusted library allocation
page read and write
787C5FE000
stack
page read and write
235E7ADE000
trusted library allocation
page read and write
235D4C3D000
heap
page read and write
235DE4E6000
trusted library allocation
page read and write
235E033B000
trusted library allocation
page read and write
235E79DB000
trusted library allocation
page read and write
235DDED5000
trusted library allocation
page read and write
235E64FB000
trusted library allocation
page read and write
235E14AD000
trusted library allocation
page read and write
235E6114000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C1A000
heap
page read and write
235DF4ED000
trusted library allocation
page read and write
235DEF0E000
trusted library allocation
page read and write
235DE333000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DF526000
trusted library allocation
page read and write
235DF3B2000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235E14A2000
trusted library allocation
page read and write
235DE2BF000
trusted library allocation
page read and write
235DEB81000
trusted library allocation
page read and write
235E0759000
trusted library allocation
page read and write
235DE3AE000
trusted library allocation
page read and write
235DDE54000
trusted library allocation
page read and write
235E0311000
trusted library allocation
page read and write
235D4C8E000
heap
page read and write
235E149E000
trusted library allocation
page read and write
235DF48F000
trusted library allocation
page read and write
235DEEB6000
trusted library allocation
page read and write
235DF455000
trusted library allocation
page read and write
235E7AFE000
trusted library allocation
page read and write
235E5B1C000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DD38C000
trusted library allocation
page read and write
235D4C30000
heap
page read and write
235E81F6000
trusted library allocation
page read and write
235E00DE000
trusted library allocation
page read and write
235E00BE000
trusted library allocation
page read and write
235DE69E000
trusted library allocation
page read and write
235E0342000
trusted library allocation
page read and write
235DF119000
trusted library allocation
page read and write
787AB3E000
unkown
page readonly
235D4C59000
heap
page read and write
235DF4BA000
trusted library allocation
page read and write
235DD1DC000
trusted library allocation
page read and write
235DEFC5000
trusted library allocation
page read and write
235DDE83000
trusted library allocation
page read and write
2035E000000
heap
page readonly
235DE3F1000
trusted library allocation
page read and write
235E773D000
trusted library allocation
page read and write
787ABB8000
stack
page read and write
235E027F000
trusted library allocation
page read and write
235E5B1A000
trusted library allocation
page read and write
235DADEA000
trusted library allocation
page read and write
235E196D000
trusted library allocation
page read and write
235DF59D000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235DEC37000
trusted library allocation
page read and write
235DF370000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
1F9DF71C000
heap
page read and write
235DF76D000
trusted library allocation
page read and write
235E0535000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
221A6610000
heap
page read and write
E9672FE000
unkown
page readonly
235DD59C000
heap
page read and write
235DEB8B000
trusted library allocation
page read and write
235E02D0000
trusted library allocation
page read and write
235DD120000
trusted library allocation
page read and write
221A6A13000
trusted library allocation
page read and write
235D4C44000
heap
page read and write
235E0342000
trusted library allocation
page read and write
235E64A7000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235D4C89000
heap
page read and write
235E5B3C000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235DADF8000
trusted library allocation
page read and write
235DE4CB000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C3E000
heap
page read and write
235DEB7E000
trusted library allocation
page read and write
2035E200000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
235E5C6F000
trusted library allocation
page read and write
235DDE7E000
trusted library allocation
page read and write
787CE7E000
unkown
page readonly
235DEC6C000
trusted library allocation
page read and write
235DD857000
trusted library allocation
page read and write
1F9DF768000
heap
page read and write
235DDE40000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
1F9DFD3B000
heap
page read and write
235DEE7D000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235E83A3000
trusted library allocation
page read and write
235E143C000
trusted library allocation
page read and write
235DE2CD000
trusted library allocation
page read and write
195A5577000
heap
page read and write
235E02F5000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E5AD1000
trusted library allocation
page read and write
235DDA80000
trusted library allocation
page read and write
235DDEFC000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235DE4E6000
trusted library allocation
page read and write
235DEC44000
trusted library allocation
page read and write
235DD86D000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235D4C3E000
heap
page read and write
235DF191000
trusted library allocation
page read and write
235DF497000
trusted library allocation
page read and write
235DEBAC000
trusted library allocation
page read and write
1F9DF760000
heap
page read and write
235E5C95000
trusted library allocation
page read and write
235E1166000
trusted library allocation
page read and write
235DF7C3000
trusted library allocation
page read and write
1F9DFD6C000
heap
page read and write
235D4C35000
heap
page read and write
1F9DFC00000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235D4C20000
heap
page read and write
235D4C3C000
heap
page read and write
235E027F000
trusted library allocation
page read and write
235E0346000
trusted library allocation
page read and write
235DEE02000
trusted library allocation
page read and write
235DFFE7000
trusted library allocation
page read and write
235DDF74000
trusted library allocation
page read and write
235E5F0A000
trusted library allocation
page read and write
235D4C28000
heap
page read and write
235DF070000
trusted library allocation
page read and write
235E166E000
trusted library allocation
page read and write
235E816C000
trusted library allocation
page read and write
235E844D000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235DEC31000
trusted library allocation
page read and write
235E7AD4000
trusted library allocation
page read and write
235E5AEE000
trusted library allocation
page read and write
DF1000
heap
page read and write
235E7762000
trusted library allocation
page read and write
235DF0BA000
trusted library allocation
page read and write
235E5B87000
trusted library allocation
page read and write
235DAD74000
trusted library allocation
page read and write
235DE486000
trusted library allocation
page read and write
235DACCB000
trusted library allocation
page read and write
235DFAB9000
trusted library allocation
page read and write
235E189E000
trusted library allocation
page read and write
235E5C0A000
trusted library allocation
page read and write
235D4C51000
heap
page read and write
235DD84F000
trusted library allocation
page read and write
235D95EF000
trusted library allocation
page read and write
235E0609000
trusted library allocation
page read and write
235E07C6000
trusted library allocation
page read and write
235DEB74000
trusted library allocation
page read and write
235E02B0000
trusted library allocation
page read and write
235DD1E3000
trusted library allocation
page read and write
235E03FE000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235DAD89000
trusted library allocation
page read and write
725FFFE000
stack
page read and write
235D4C61000
heap
page read and write
235E9080000
trusted library allocation
page read and write
235D9F6B000
trusted library allocation
page read and write
1F9DFD77000
heap
page read and write
235D4C21000
heap
page read and write
235E1E27000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E88D7000
trusted library allocation
page read and write
1F9DF77D000
heap
page read and write
235E02FA000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E7A5F000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
939A63E000
unkown
page readonly
1F9DF6E9000
heap
page read and write
235D4C82000
heap
page read and write
195A71C0000
heap
page read and write
195A70A9000
heap
page read and write
235E5C55000
trusted library allocation
page read and write
235E5CEA000
trusted library allocation
page read and write
235E7AFE000
trusted library allocation
page read and write
235DE6A0000
trusted library allocation
page read and write
235DF51C000
trusted library allocation
page read and write
235D9BFB000
trusted library allocation
page read and write
2035E36E000
trusted library allocation
page read and write
235D4C2A000
heap
page read and write
235DE3DF000
trusted library allocation
page read and write
235DAE81000
trusted library allocation
page read and write
235E647F000
trusted library allocation
page read and write
235DD96C000
trusted library allocation
page read and write
235DD852000
trusted library allocation
page read and write
235DE3CB000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E0292000
trusted library allocation
page read and write
195A55A0000
heap
page read and write
235DE4FE000
trusted library allocation
page read and write
235DFFC5000
trusted library allocation
page read and write
235E7ADA000
trusted library allocation
page read and write
235E64A7000
trusted library allocation
page read and write
235DEE89000
trusted library allocation
page read and write
235E023A000
trusted library allocation
page read and write
235E07EC000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DDAD4000
trusted library allocation
page read and write
235D4C25000
heap
page read and write
235D4C40000
heap
page read and write
1A695529000
heap
page read and write
235DD160000
trusted library allocation
page read and write
235DADEA000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235D9FB7000
trusted library allocation
page read and write
235E9303000
heap
page read and write
235DF070000
trusted library allocation
page read and write
235D4C24000
heap
page read and write
235E053A000
trusted library allocation
page read and write
235DECAC000
trusted library allocation
page read and write
235E0380000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E7A68000
trusted library allocation
page read and write
235E90AA000
trusted library allocation
page read and write
235DE3FB000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235D9B76000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C20000
heap
page read and write
235E7A26000
trusted library allocation
page read and write
235DF10D000
trusted library allocation
page read and write
235E7A52000
trusted library allocation
page read and write
235DEB89000
trusted library allocation
page read and write
235E1439000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
235D4C41000
heap
page read and write
221A6560000
unclassified section
page readonly
235DD263000
trusted library allocation
page read and write
235E930D000
heap
page read and write
235E603B000
trusted library allocation
page read and write
235D4C94000
heap
page read and write
235D4C37000
heap
page read and write
235DF088000
trusted library allocation
page read and write
235DAEEB000
trusted library allocation
page read and write
235E8F44000
trusted library allocation
page read and write
235E936F000
heap
page read and write
235D4C45000
heap
page read and write
235E5AFC000
trusted library allocation
page read and write
235DF2F2000
trusted library allocation
page read and write
235E11BD000
trusted library allocation
page read and write
235E0245000
trusted library allocation
page read and write
235E5C5C000
trusted library allocation
page read and write
235DADE4000
trusted library allocation
page read and write
235DF34C000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
221A6C07000
trusted library allocation
page read and write
235DF069000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235DEB86000
trusted library allocation
page read and write
235E79FE000
trusted library allocation
page read and write
235D9CD7000
trusted library allocation
page read and write
235DDE83000
trusted library allocation
page read and write
235DF2D6000
trusted library allocation
page read and write
235E0360000
trusted library allocation
page read and write
235DED31000
trusted library allocation
page read and write
235E0254000
trusted library allocation
page read and write
235E0793000
trusted library allocation
page read and write
235E0281000
trusted library allocation
page read and write
235E1639000
trusted library allocation
page read and write
235DF0A5000
trusted library allocation
page read and write
235E036B000
trusted library allocation
page read and write
235E5B1A000
trusted library allocation
page read and write
235E9D37000
trusted library allocation
page read and write
1ECDFF000
stack
page read and write
235E5CED000
trusted library allocation
page read and write
235E5CF5000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E7A5F000
trusted library allocation
page read and write
235D95BF000
trusted library allocation
page read and write
235DF7C3000
trusted library allocation
page read and write
1F9DEF00000
trusted library allocation
page read and write
1F9DF680000
heap
page read and write
235D4C3E000
heap
page read and write
235E025C000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235D4C3E000
heap
page read and write
2035E312000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235DAEB5000
trusted library allocation
page read and write
235DECF3000
trusted library allocation
page read and write
235DD3F4000
trusted library allocation
page read and write
235E0750000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
221A6A00000
trusted library allocation
page read and write
221A6AA2000
trusted library allocation
page read and write
235DF77F000
trusted library allocation
page read and write
235DF49A000
trusted library allocation
page read and write
235E036E000
trusted library allocation
page read and write
235E6028000
trusted library allocation
page read and write
235E607A000
trusted library allocation
page read and write
235E1948000
trusted library allocation
page read and write
235D4C5A000
heap
page read and write
235DAEF6000
trusted library allocation
page read and write
235D9C13000
trusted library allocation
page read and write
235DF5F1000
trusted library allocation
page read and write
235E79D2000
trusted library allocation
page read and write
235E61E3000
trusted library allocation
page read and write
235DF35F000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DD9A5000
trusted library allocation
page read and write
235E03E3000
trusted library allocation
page read and write
235E8F56000
trusted library allocation
page read and write
235E143C000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235DD5D0000
heap
page read and write
235E02D5000
trusted library allocation
page read and write
235DDAB2000
trusted library allocation
page read and write
235E036E000
trusted library allocation
page read and write
235DEEB4000
trusted library allocation
page read and write
1F9DFD2D000
heap
page read and write
235DF08D000
trusted library allocation
page read and write
235DF0F8000
trusted library allocation
page read and write
235E034B000
trusted library allocation
page read and write
235E8F2F000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DF3F7000
trusted library allocation
page read and write
235E058A000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DF0B5000
trusted library allocation
page read and write
235E5DFE000
trusted library allocation
page read and write
235DF069000
trusted library allocation
page read and write
235E024B000
trusted library allocation
page read and write
2035DF20000
remote allocation
page read and write
235D4C35000
heap
page read and write
235E0253000
trusted library allocation
page read and write
235DADE4000
trusted library allocation
page read and write
235DFA49000
trusted library allocation
page read and write
235DF54A000
trusted library allocation
page read and write
235DFEE6000
trusted library allocation
page read and write
1F9DF771000
heap
page read and write
235E0358000
trusted library allocation
page read and write
235DEE87000
trusted library allocation
page read and write
235DE4FB000
trusted library allocation
page read and write
235DF140000
trusted library allocation
page read and write
235D4C25000
heap
page read and write
235E9313000
heap
page read and write
235DDA88000
trusted library allocation
page read and write
235E18E5000
trusted library allocation
page read and write
235E8FD8000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E14C3000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235DF1D0000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235E024B000
trusted library allocation
page read and write
235DD890000
trusted library allocation
page read and write
1F9DFD44000
heap
page read and write
235DECF7000
trusted library allocation
page read and write
235E034F000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DDAA3000
trusted library allocation
page read and write
1F9DFD21000
heap
page read and write
235DF050000
trusted library allocation
page read and write
235DD1AD000
trusted library allocation
page read and write
235DD3D4000
trusted library allocation
page read and write
235E79F8000
trusted library allocation
page read and write
2035E303000
trusted library allocation
page read and write
235DD8D1000
trusted library allocation
page read and write
235E16D4000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
E9669FE000
stack
page read and write
235D4C1A000
heap
page read and write
235DD8B5000
trusted library allocation
page read and write
235DD32F000
trusted library allocation
page read and write
235E5CED000
trusted library allocation
page read and write
235DE4D3000
trusted library allocation
page read and write
235E05B3000
trusted library allocation
page read and write
235E606A000
trusted library allocation
page read and write
235DABF7000
trusted library allocation
page read and write
235DD59C000
heap
page read and write
235DEBEF000
trusted library allocation
page read and write
235E5AF8000
trusted library allocation
page read and write
235DD9CE000
trusted library allocation
page read and write
235E07FA000
trusted library allocation
page read and write
235D4C3F000
heap
page read and write
235DEE05000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E5C4F000
trusted library allocation
page read and write
235E5AAF000
trusted library allocation
page read and write
235D4C15000
heap
page read and write
235D4C82000
heap
page read and write
914000
unkown
page readonly
235DD14C000
trusted library allocation
page read and write
235D4C66000
heap
page read and write
235DABC2000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DF1D0000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E04D2000
trusted library allocation
page read and write
235D4C83000
heap
page read and write
235E1690000
trusted library allocation
page read and write
235E90A4000
trusted library allocation
page read and write
787ABBB000
stack
page read and write
235E11B5000
trusted library allocation
page read and write
1F9DEF73000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E11FC000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E79F8000
trusted library allocation
page read and write
235DEB79000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235E01E9000
trusted library allocation
page read and write
235DE443000
trusted library allocation
page read and write
1F9DEF64000
trusted library allocation
page read and write
235DAE7C000
trusted library allocation
page read and write
235DE687000
trusted library allocation
page read and write
235E0575000
trusted library allocation
page read and write
235E88FD000
trusted library allocation
page read and write
235DDF49000
trusted library allocation
page read and write
235E02B1000
trusted library allocation
page read and write
235DF79C000
trusted library allocation
page read and write
235E07F0000
trusted library allocation
page read and write
235E0612000
trusted library allocation
page read and write
235DE408000
trusted library allocation
page read and write
1A695600000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DEBAC000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
1F9DF771000
heap
page read and write
235DFD29000
trusted library allocation
page read and write
235E03D3000
trusted library allocation
page read and write
1F9DF771000
heap
page read and write
235E8501000
trusted library allocation
page read and write
235E5DF8000
trusted library allocation
page read and write
235D4C51000
heap
page read and write
CEE000
stack
page read and write
235D4C39000
heap
page read and write
235DEBC3000
trusted library allocation
page read and write
235DF776000
trusted library allocation
page read and write
235E004F000
trusted library allocation
page read and write
235DABC2000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DEC8F000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C59000
heap
page read and write
221A6A0C000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
235E5CAD000
trusted library allocation
page read and write
235DD58B000
heap
page read and write
235E0273000
trusted library allocation
page read and write
235DF036000
trusted library allocation
page read and write
235E1670000
trusted library allocation
page read and write
235E03DA000
trusted library allocation
page read and write
235D4C43000
heap
page read and write
235D4C8E000
heap
page read and write
235E5AD1000
trusted library allocation
page read and write
235E774E000
trusted library allocation
page read and write
235DDA88000
trusted library allocation
page read and write
235E6497000
trusted library allocation
page read and write
235DAE4D000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E78A8000
trusted library allocation
page read and write
1A695520000
heap
page read and write
235D4C27000
heap
page read and write
235E5CD5000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235DDAD0000
trusted library allocation
page read and write
235DF611000
trusted library allocation
page read and write
235DF4EA000
trusted library allocation
page read and write
1F9DF739000
heap
page read and write
235E02AE000
trusted library allocation
page read and write
235E0310000
trusted library allocation
page read and write
235D4C5B000
heap
page read and write
235DAE77000
trusted library allocation
page read and write
235DFD8C000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
235E034E000
trusted library allocation
page read and write
235DF03A000
trusted library allocation
page read and write
235DE3FD000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235DF19F000
trusted library allocation
page read and write
235DEBEC000
trusted library allocation
page read and write
235DE2D3000
trusted library allocation
page read and write
235DE6BB000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E03AB000
trusted library allocation
page read and write
235E8FD8000
trusted library allocation
page read and write
235DFEF3000
trusted library allocation
page read and write
235DFEFD000
trusted library allocation
page read and write
235E16C8000
trusted library allocation
page read and write
235DEE07000
trusted library allocation
page read and write
235E028F000
trusted library allocation
page read and write
235E19AC000
trusted library allocation
page read and write
235DD14C000
trusted library allocation
page read and write
235DAE81000
trusted library allocation
page read and write
235DF19F000
trusted library allocation
page read and write
235DEC1C000
trusted library allocation
page read and write
235DD84F000
trusted library allocation
page read and write
235D95B3000
trusted library allocation
page read and write
235DEEC2000
trusted library allocation
page read and write
235D4C82000
heap
page read and write
235DF659000
trusted library allocation
page read and write
235E5B3B000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
1F9DEF23000
trusted library allocation
page read and write
235E0228000
trusted library allocation
page read and write
235E9072000
trusted library allocation
page read and write
1F9DFD58000
heap
page read and write
235DAD97000
trusted library allocation
page read and write
235DE382000
trusted library allocation
page read and write
235E143C000
trusted library allocation
page read and write
235E5C6A000
trusted library allocation
page read and write
235E6037000
trusted library allocation
page read and write
235E7400000
trusted library allocation
page read and write
235D4C8F000
heap
page read and write
235D4C20000
heap
page read and write
235DD5CB000
heap
page read and write
235DD593000
heap
page read and write
1F9DEF0C000
trusted library allocation
page read and write
235D4C28000
heap
page read and write
235E14FD000
trusted library allocation
page read and write
235DD5D4000
heap
page read and write
235DD99E000
trusted library allocation
page read and write
235E9DA7000
trusted library allocation
page read and write
235DE685000
trusted library allocation
page read and write
1F9DEC00000
heap
page read and write
235E9303000
heap
page read and write
235D4C25000
heap
page read and write
DFE000
heap
page read and write
235E608E000
trusted library allocation
page read and write
235E0233000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
841000
unkown
page execute read
1F9DFD77000
heap
page read and write
235DF3B5000
trusted library allocation
page read and write
235E0342000
trusted library allocation
page read and write
235DF6F5000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235DE4E2000
trusted library allocation
page read and write
235E611D000
trusted library allocation
page read and write
235DEB86000
trusted library allocation
page read and write
235DAE26000
trusted library allocation
page read and write
235E7A94000
trusted library allocation
page read and write
235DF7E4000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235DF0E6000
trusted library allocation
page read and write
235E03C1000
trusted library allocation
page read and write
235E0253000
trusted library allocation
page read and write
235DD30B000
trusted library allocation
page read and write
235E01D6000
trusted library allocation
page read and write
235E03E3000
trusted library allocation
page read and write
235E77B2000
trusted library allocation
page read and write
235E8448000
trusted library allocation
page read and write
235E0292000
trusted library allocation
page read and write
235E03AB000
trusted library allocation
page read and write
235DDEF5000
trusted library allocation
page read and write
235DF1DA000
trusted library allocation
page read and write
235DEF17000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235E7953000
trusted library allocation
page read and write
235DE39F000
trusted library allocation
page read and write
235DAEEB000
trusted library allocation
page read and write
235D4C21000
heap
page read and write
1F9DF6E9000
heap
page read and write
235DF4F0000
trusted library allocation
page read and write
235DD596000
heap
page read and write
235D9CFC000
trusted library allocation
page read and write
235E02EA000
trusted library allocation
page read and write
235DF476000
trusted library allocation
page read and write
235DF50B000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DF4C3000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235E03FE000
trusted library allocation
page read and write
235DDE92000
trusted library allocation
page read and write
235D4C1E000
heap
page read and write
235DF361000
trusted library allocation
page read and write
235DF4E8000
trusted library allocation
page read and write
235DDAD2000
trusted library allocation
page read and write
235E057B000
trusted library allocation
page read and write
235DEBCF000
trusted library allocation
page read and write
235DE2E0000
trusted library allocation
page read and write
235DF68C000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235E1629000
trusted library allocation
page read and write
235D4C2A000
heap
page read and write
1A695700000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235D4C3B000
heap
page read and write
235DE3CE000
trusted library allocation
page read and write
235DDEF0000
trusted library allocation
page read and write
1F9DFD77000
heap
page read and write
235E6155000
trusted library allocation
page read and write
235E027F000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235D4C5B000
heap
page read and write
221A6B00000
heap
page read and write
D6E000
stack
page read and write
235D4C39000
heap
page read and write
235E0329000
trusted library allocation
page read and write
235E5D90000
trusted library allocation
page read and write
235E02F5000
trusted library allocation
page read and write
235DDA6F000
trusted library allocation
page read and write
1F9DFD2A000
heap
page read and write
1F9DF6E0000
heap
page read and write
235D4C45000
heap
page read and write
235E90AA000
trusted library allocation
page read and write
235E939B000
heap
page read and write
235E163D000
trusted library allocation
page read and write
235DD5A2000
heap
page read and write
235D4C3E000
heap
page read and write
235DD874000
trusted library allocation
page read and write
235E0619000
trusted library allocation
page read and write
2035E35D000
trusted library allocation
page read and write
235DF456000
trusted library allocation
page read and write
235E0788000
trusted library allocation
page read and write
235E1A06000
trusted library allocation
page read and write
235DF0B3000
trusted library allocation
page read and write
235E14BA000
trusted library allocation
page read and write
2035E3B7000
trusted library allocation
page read and write
235DEDF0000
trusted library allocation
page read and write
235D4C3B000
heap
page read and write
235E02C9000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
DEB000
heap
page read and write
221A6A70000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
235DF50D000
trusted library allocation
page read and write
DFE000
heap
page read and write
235E027F000
trusted library allocation
page read and write
235DE4F6000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E8533000
trusted library allocation
page read and write
1F9DF6E9000
heap
page read and write
235DEEFB000
trusted library allocation
page read and write
235E035D000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
787DEFE000
stack
page read and write
1F9DEF81000
trusted library allocation
page read and write
235E5C88000
trusted library allocation
page read and write
235E04AA000
trusted library allocation
page read and write
235E7A68000
trusted library allocation
page read and write
235E773D000
trusted library allocation
page read and write
1A695470000
heap
page read and write
235D4C3E000
heap
page read and write
235E03C5000
trusted library allocation
page read and write
235E03E7000
trusted library allocation
page read and write
235DDA69000
trusted library allocation
page read and write
235E5AF2000
trusted library allocation
page read and write
235E01DE000
trusted library allocation
page read and write
235DF45A000
trusted library allocation
page read and write
235E027F000
trusted library allocation
page read and write
235DDA76000
trusted library allocation
page read and write
235DD58D000
heap
page read and write
235D4C1F000
heap
page read and write
235E64D2000
trusted library allocation
page read and write
235DE3B2000
trusted library allocation
page read and write
235DECCF000
trusted library allocation
page read and write
235E90EC000
trusted library allocation
page read and write
235E5CD4000
trusted library allocation
page read and write
7D0000
heap
page read and write
235DEBFD000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DEB2A000
trusted library allocation
page read and write
235DAD42000
trusted library allocation
page read and write
235E608E000
trusted library allocation
page read and write
235DE394000
trusted library allocation
page read and write
235E5AEE000
trusted library allocation
page read and write
235D9C80000
trusted library allocation
page read and write
235DD1AF000
trusted library allocation
page read and write
235E79FE000
trusted library allocation
page read and write
235D9B71000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235DE4A5000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E14E4000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235E06DB000
trusted library allocation
page read and write
235DDA88000
trusted library allocation
page read and write
235E5CB4000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235DF1C0000
trusted library allocation
page read and write
2035E379000
trusted library allocation
page read and write
34C0000
heap
page read and write
235DEBEC000
trusted library allocation
page read and write
235DED1A000
trusted library allocation
page read and write
1F9DEF9E000
trusted library allocation
page read and write
235DE3FE000
trusted library allocation
page read and write
235E0332000
trusted library allocation
page read and write
235E79B1000
trusted library allocation
page read and write
235E79D8000
trusted library allocation
page read and write
235D4C8A000
heap
page read and write
235E6142000
trusted library allocation
page read and write
235DDABE000
trusted library allocation
page read and write
235D4C61000
heap
page read and write
235D4C4E000
heap
page read and write
1F9DF6E0000
heap
page read and write
235DEB96000
trusted library allocation
page read and write
235DDAA7000
trusted library allocation
page read and write
2035DF93000
heap
page read and write
235E01E3000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DAE81000
trusted library allocation
page read and write
235DD172000
trusted library allocation
page read and write
235E7A8A000
trusted library allocation
page read and write
235D95EF000
trusted library allocation
page read and write
235E90AB000
trusted library allocation
page read and write
1F9DF760000
heap
page read and write
235DDFF3000
trusted library allocation
page read and write
235E1670000
trusted library allocation
page read and write
235DFCF8000
trusted library allocation
page read and write
787B5D8000
stack
page read and write
221A6A30000
trusted library allocation
page read and write
235DD59C000
heap
page read and write
235DEBCF000
trusted library allocation
page read and write
235DF77A000
trusted library allocation
page read and write
235E773F000
trusted library allocation
page read and write
235DEC1C000
trusted library allocation
page read and write
235DECD5000
trusted library allocation
page read and write
235DADEB000
trusted library allocation
page read and write
235E5D98000
trusted library allocation
page read and write
235E025F000
trusted library allocation
page read and write
235E027F000
trusted library allocation
page read and write
235DE393000
trusted library allocation
page read and write
235D4C93000
heap
page read and write
235D4C32000
heap
page read and write
235DF387000
trusted library allocation
page read and write
235DF5ED000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
221A6650000
heap
page read and write
235E5ACF000
trusted library allocation
page read and write
D1F000
stack
page read and write
235E79C2000
trusted library allocation
page read and write
235DABD3000
trusted library allocation
page read and write
221A65D0000
remote allocation
page read and write
235D4C35000
heap
page read and write
235DE4E8000
trusted library allocation
page read and write
235DF7A1000
trusted library allocation
page read and write
235E5C4F000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235E03C5000
trusted library allocation
page read and write
235D4C20000
heap
page read and write
235DE3D6000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
235E14C7000
trusted library allocation
page read and write
235DABD3000
trusted library allocation
page read and write
235E1446000
trusted library allocation
page read and write
235DDEFC000
trusted library allocation
page read and write
235E0570000
trusted library allocation
page read and write
221A6800000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DE271000
trusted library allocation
page read and write
235E5CB9000
trusted library allocation
page read and write
235D4C95000
heap
page read and write
235E03FB000
trusted library allocation
page read and write
235DF55A000
trusted library allocation
page read and write
235DF7C0000
trusted library allocation
page read and write
235DD59A000
heap
page read and write
235E14BF000
trusted library allocation
page read and write
235E007C000
trusted library allocation
page read and write
235DF0BA000
trusted library allocation
page read and write
235E03AD000
trusted library allocation
page read and write
235E02D6000
trusted library allocation
page read and write
7D4000
heap
page read and write
235DF150000
trusted library allocation
page read and write
235DF606000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235E0343000
trusted library allocation
page read and write
235DAE77000
trusted library allocation
page read and write
235DF189000
trusted library allocation
page read and write
235DE4E3000
trusted library allocation
page read and write
235E02EA000
trusted library allocation
page read and write
235DAB93000
trusted library allocation
page read and write
235E06A4000
trusted library allocation
page read and write
235E5CEB000
trusted library allocation
page read and write
235DF767000
trusted library allocation
page read and write
235E9301000
heap
page read and write
235DF0A5000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
235D4C3E000
heap
page read and write
235E0267000
trusted library allocation
page read and write
DF2000
heap
page read and write
235D4C8A000
heap
page read and write
235D9C26000
trusted library allocation
page read and write
235E11DB000
trusted library allocation
page read and write
235E5C93000
trusted library allocation
page read and write
235E90DC000
trusted library allocation
page read and write
235DE3E3000
trusted library allocation
page read and write
235E1429000
trusted library allocation
page read and write
235DEDB3000
trusted library allocation
page read and write
235DE398000
trusted library allocation
page read and write
235DACE7000
trusted library allocation
page read and write
235DDEF0000
trusted library allocation
page read and write
235E5B32000
trusted library allocation
page read and write
235E603D000
trusted library allocation
page read and write
235E77A8000
trusted library allocation
page read and write
235DE30B000
trusted library allocation
page read and write
235E0360000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DDA66000
trusted library allocation
page read and write
235DAD9B000
trusted library allocation
page read and write
235E02D9000
trusted library allocation
page read and write
235DF097000
trusted library allocation
page read and write
235DEB2F000
trusted library allocation
page read and write
235E04AA000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DEDBA000
trusted library allocation
page read and write
235E03E9000
trusted library allocation
page read and write
2035E51C000
trusted library allocation
page read and write
235E88A3000
trusted library allocation
page read and write
235DDF8C000
trusted library allocation
page read and write
235D4C3E000
heap
page read and write
235E02C9000
trusted library allocation
page read and write
235DF381000
trusted library allocation
page read and write
235E02D9000
trusted library allocation
page read and write
235DD99E000
trusted library allocation
page read and write
235DD8AE000
trusted library allocation
page read and write
2035E012000
unclassified section
page read and write
1F9DF76B000
heap
page read and write
235D4C08000
heap
page read and write
235D4C24000
heap
page read and write
221A69B4000
heap
page read and write
235D4C1C000
heap
page read and write
235D4C45000
heap
page read and write
235DD133000
trusted library allocation
page read and write
1F9DEF86000
trusted library allocation
page read and write
235DDA64000
trusted library allocation
page read and write
1F9DFC03000
trusted library allocation
page read and write
235E053C000
trusted library allocation
page read and write
235DE482000
trusted library allocation
page read and write
1A69570A000
trusted library allocation
page read and write
235E037C000
trusted library allocation
page read and write
1F9DEC40000
heap
page read and write
235E162B000
trusted library allocation
page read and write
235D4C40000
heap
page read and write
235E0245000
trusted library allocation
page read and write
235DEE7F000
trusted library allocation
page read and write
1F9DFD77000
heap
page read and write
235DEC99000
trusted library allocation
page read and write
235D95CE000
trusted library allocation
page read and write
235E05EB000
trusted library allocation
page read and write
235E05AF000
trusted library allocation
page read and write
235DF064000
trusted library allocation
page read and write
235DE25B000
trusted library allocation
page read and write
235DF668000
trusted library allocation
page read and write
1F9DEE00000
trusted library allocation
page read and write
235DD96C000
trusted library allocation
page read and write
235DEB9E000
trusted library allocation
page read and write
235E03A9000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235E83E5000
trusted library allocation
page read and write
2035E32E000
trusted library allocation
page read and write
235DECC9000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235D4C21000
heap
page read and write
235E906E000
trusted library allocation
page read and write
235E037F000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DF4E1000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DABE1000
trusted library allocation
page read and write
235DF0EA000
trusted library allocation
page read and write
221A6A78000
trusted library allocation
page read and write
235E8885000
trusted library allocation
page read and write
235E03E5000
trusted library allocation
page read and write
235D4C19000
heap
page read and write
235E149C000
trusted library allocation
page read and write
235DF097000
trusted library allocation
page read and write
235DF05E000
trusted library allocation
page read and write
235E1E81000
trusted library allocation
page read and write
235E5C62000
trusted library allocation
page read and write
27DEFF9D000
trusted library allocation
page execute read
235E5CBA000
trusted library allocation
page read and write
235DB2F4000
trusted library allocation
page read and write
235D4C1F000
heap
page read and write
235DAE2C000
trusted library allocation
page read and write
235DE267000
trusted library allocation
page read and write
235DF4ED000
trusted library allocation
page read and write
235E027F000
trusted library allocation
page read and write
1ED5FE000
stack
page read and write
235E05F6000
trusted library allocation
page read and write
235DAB9B000
trusted library allocation
page read and write
195A57B5000
heap
page read and write
235E8443000
trusted library allocation
page read and write
235DF086000
trusted library allocation
page read and write
235DF06B000
trusted library allocation
page read and write
235DABD3000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E1681000
trusted library allocation
page read and write
235DF506000
trusted library allocation
page read and write
235DF5F8000
trusted library allocation
page read and write
235D4C6E000
heap
page read and write
235D4C43000
heap
page read and write
195A70BF000
heap
page read and write
235E88CA000
trusted library allocation
page read and write
235E00F0000
trusted library allocation
page read and write
235DD27F000
trusted library allocation
page read and write
235E052A000
trusted library allocation
page read and write
235E05BB000
trusted library allocation
page read and write
2035DF60000
heap
page read and write
235DEC41000
trusted library allocation
page read and write
235E774E000
trusted library allocation
page read and write
235DD5D0000
heap
page read and write
235E0694000
trusted library allocation
page read and write
235E1986000
trusted library allocation
page read and write
235E887E000
trusted library allocation
page read and write
235E9A37000
trusted library allocation
page read and write
235E5B16000
trusted library allocation
page read and write
235D4C35000
heap
page read and write
235DADF7000
trusted library allocation
page read and write
235DDE92000
trusted library allocation
page read and write
235D4C4E000
heap
page read and write
235DD9CE000
trusted library allocation
page read and write
235E5C79000
trusted library allocation
page read and write
235D4C31000
heap
page read and write
235D4C82000
heap
page read and write
235D4C45000
heap
page read and write
235E0360000
trusted library allocation
page read and write
235D9BFE000
trusted library allocation
page read and write
235E9390000
heap
page read and write
235DF043000
trusted library allocation
page read and write
235DAE61000
trusted library allocation
page read and write
235E77A5000
trusted library allocation
page read and write
235D4C37000
heap
page read and write
235DEECC000
trusted library allocation
page read and write
235E0264000
trusted library allocation
page read and write
DC0000
heap
page read and write
235E5ACD000
trusted library allocation
page read and write
235DAE77000
trusted library allocation
page read and write
93983FC000
stack
page read and write
235D4C2A000
heap
page read and write
235E14BA000
trusted library allocation
page read and write
235DEDF0000
trusted library allocation
page read and write
235E026B000
trusted library allocation
page read and write
235DED2D000
trusted library allocation
page read and write
1F9DFC0E000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235DDA6D000
trusted library allocation
page read and write
235DEBB4000
trusted library allocation
page read and write
235DEC6A000
trusted library allocation
page read and write
235E5B7B000
trusted library allocation
page read and write
235D4C39000
heap
page read and write
235DAB9B000
trusted library allocation
page read and write
235E64D1000
trusted library allocation
page read and write
235DE4D1000
trusted library allocation
page read and write
235DEF1B000
trusted library allocation
page read and write
939B6BE000
unkown
page readonly
235E00ED000
trusted library allocation
page read and write
235DD89C000
trusted library allocation
page read and write
235E5CF1000
trusted library allocation
page read and write
235E03DA000
trusted library allocation
page read and write
235D4C1A000
heap
page read and write
235E03E7000
trusted library allocation
page read and write
235E5CB9000
trusted library allocation
page read and write
235E60C2000
trusted library allocation
page read and write
235D4C59000
heap
page read and write
235DD1DC000
trusted library allocation
page read and write
235DF7BA000
trusted library allocation
page read and write
235DD160000
trusted library allocation
page read and write
235DF605000
trusted library allocation
page read and write
235E022A000
trusted library allocation
page read and write
235E0069000
trusted library allocation
page read and write
1F9DFD44000
heap
page read and write
235DDAC4000
trusted library allocation
page read and write
235DF476000
trusted library allocation
page read and write
235D4C45000
heap
page read and write
235E02E3000
trusted library allocation
page read and write
235D4C32000
heap
page read and write
235D4C44000
heap
page read and write
235DE68C000
trusted library allocation
page read and write
1F9DF053000
unkown
page execute read
235D4C37000
heap
page read and write
235DF4C3000
trusted library allocation
page read and write
235DDE63000
trusted library allocation
page read and write
235DE7F5000
trusted library allocation
page read and write
235D4C2D000
heap
page read and write
235DF069000
trusted library allocation
page read and write
235DD5CB000
heap
page read and write
235DADF8000
trusted library allocation
page read and write
235E0095000
trusted library allocation
page read and write
235D4C25000
heap
page read and write
235DECF7000
trusted library allocation
page read and write
There are 3661 hidden memdumps, click here to show them.