IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2601dfeb-0752-4fcc-90d7-32c92a6d0e47.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_2601dfeb-0752-4fcc-90d7-32c92a6d0e47.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 27954 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5862 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\xulstore.json.tmp
JSON data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2292 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2212 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7c5687c-def4-45c9-ae4a-1b0aa07de766} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 298f5c6ed10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4232 -parentBuildID 20230927232528 -prefsHandle 4340 -prefMapHandle 4220 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55fd1972-1430-4133-9bd8-75ac33fba38e} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 29887e24510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4908 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3536 -prefMapHandle 3456 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76630401-2e09-4eaa-8952-b3400db86ea9} 7736 "\\.\pipe\gecko-crash-server-pipe.7736" 29891abbf10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://www.bbc.co.uk/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://youtube.com/account?=
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://www.wykop.pl/
unknown
https://twitter.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.251.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.1
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.238
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.18.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
142.250.185.238
youtube.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
1134000
heap
page read and write
2988728B000
trusted library allocation
page read and write
2988956D000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875D4000
trusted library allocation
page read and write
20C125E9000
heap
page read and write
2988751E000
trusted library allocation
page read and write
20C12679000
heap
page read and write
29886C5A000
trusted library allocation
page read and write
29887751000
trusted library allocation
page read and write
298855B0000
heap
page read and write
29887718000
trusted library allocation
page read and write
29887690000
trusted library allocation
page read and write
20C12406000
trusted library allocation
page read and write
29885F8B000
trusted library allocation
page read and write
2988717C000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FF213000
trusted library allocation
page read and write
29889570000
trusted library allocation
page read and write
29887699000
trusted library allocation
page read and write
20C125F0000
heap
page read and write
2988F5F0000
trusted library allocation
page read and write
1F7FF405000
trusted library allocation
page read and write
29886FFD000
trusted library allocation
page read and write
2988F3CD000
trusted library allocation
page read and write
2988F3D4000
trusted library allocation
page read and write
29885D48000
trusted library allocation
page read and write
29886FA3000
trusted library allocation
page read and write
298FCAF0000
heap
page read and write
298FCAF8000
heap
page read and write
298FCAE2000
heap
page read and write
298FCACE000
heap
page read and write
298FCACD000
heap
page read and write
298875BB000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
298875B5000
trusted library allocation
page read and write
298879F1000
trusted library allocation
page read and write
29887731000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCAF5000
heap
page read and write
24ABB565000
trusted library allocation
page read and write
298855B0000
heap
page read and write
29887AB1000
trusted library allocation
page read and write
29887121000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29890601000
heap
page read and write
298855A2000
heap
page read and write
298875A9000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
298FCAF8000
heap
page read and write
298876E7000
trusted library allocation
page read and write
17DB000
stack
page read and write
4014000
heap
page read and write
298FCB2E000
heap
page read and write
298FCAD2000
heap
page read and write
298920B0000
trusted library allocation
page read and write
298876F9000
trusted library allocation
page read and write
298895CB000
trusted library allocation
page read and write
298875A9000
trusted library allocation
page read and write
298876E0000
trusted library allocation
page read and write
29885F90000
trusted library allocation
page read and write
29890646000
heap
page read and write
29892094000
trusted library allocation
page read and write
29886CDD000
trusted library allocation
page read and write
29887690000
trusted library allocation
page read and write
29887699000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
298873F6000
trusted library allocation
page read and write
298878E0000
trusted library allocation
page read and write
2988905B000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298872E9000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
29887633000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29885A9C000
trusted library allocation
page read and write
298FFBDB000
trusted library allocation
page read and write
29887AF1000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
298857BD000
trusted library allocation
page read and write
ED15D8000
stack
page read and write
2988F3CA000
trusted library allocation
page read and write
29883342000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298876F9000
trusted library allocation
page read and write
298FFACA000
trusted library allocation
page read and write
24ABB300000
heap
page read and write
29888184000
trusted library allocation
page read and write
298876F4000
trusted library allocation
page read and write
298FFBD7000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
29887042000
trusted library allocation
page read and write
2988794B000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298FCAF8000
heap
page read and write
298FCAF1000
heap
page read and write
2988E33C000
trusted library allocation
page read and write
2988DFEF000
trusted library allocation
page read and write
298879EC000
trusted library allocation
page read and write
29883233000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298859A5000
trusted library allocation
page read and write
298873EB000
trusted library allocation
page read and write
2988F953000
trusted library allocation
page read and write
29892058000
trusted library allocation
page read and write
29887653000
trusted library allocation
page read and write
2988E3C4000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
2988FEE9000
trusted library allocation
page read and write
29886CCC000
trusted library allocation
page read and write
298FF1FE000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298FCAF8000
heap
page read and write
D4652BE000
unkown
page readonly
298878AF000
trusted library allocation
page read and write
298FEB7F000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
1F7FF090000
remote allocation
page read and write
298FFCBC000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29886CE9000
trusted library allocation
page read and write
1F7FF280000
heap
page readonly
298876BF000
trusted library allocation
page read and write
20C125A1000
heap
page read and write
29885ACB000
trusted library allocation
page read and write
298FCAE0000
heap
page read and write
298920DA000
trusted library allocation
page read and write
2988F9D9000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298FCB24000
heap
page read and write
2988FA01000
trusted library allocation
page read and write
298FCAD7000
heap
page read and write
29885A3D000
trusted library allocation
page read and write
2988E1FA000
trusted library allocation
page read and write
2988E37C000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988761E000
trusted library allocation
page read and write
29885AFA000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
2988713E000
trusted library allocation
page read and write
20C11510000
heap
page read and write
29885965000
trusted library allocation
page read and write
29887629000
trusted library allocation
page read and write
15B60A9B000
heap
page read and write
298FFC50000
trusted library allocation
page read and write
29885D43000
trusted library allocation
page read and write
2988F9CB000
trusted library allocation
page read and write
29886FC9000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988F325000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
20C1258D000
heap
page read and write
298859CE000
trusted library allocation
page read and write
1134000
heap
page read and write
298879FB000
trusted library allocation
page read and write
298FCAD9000
heap
page read and write
18C2000
heap
page read and write
29886FEC000
trusted library allocation
page read and write
29885AB3000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
29887125000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29885DD5000
trusted library allocation
page read and write
2988E127000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29883260000
trusted library allocation
page read and write
29890036000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298873D9000
trusted library allocation
page read and write
29887343000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
298875D7000
trusted library allocation
page read and write
2988F5F2000
trusted library allocation
page read and write
1F7FF468000
trusted library allocation
page read and write
15B60A82000
heap
page read and write
20C1256C000
heap
page read and write
298FF176000
trusted library allocation
page read and write
298885AE000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
298F7A04000
heap
page read and write
29889582000
trusted library allocation
page read and write
2988E287000
trusted library allocation
page read and write
2988774A000
trusted library allocation
page read and write
298895B6000
trusted library allocation
page read and write
2988E353000
trusted library allocation
page read and write
298876B4000
trusted library allocation
page read and write
298873F6000
trusted library allocation
page read and write
2988739C000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988E219000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298FCB3E000
heap
page read and write
298FFC98000
trusted library allocation
page read and write
1F7FF478000
trusted library allocation
page read and write
2988F3E1000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298859A5000
trusted library allocation
page read and write
29887AFD000
trusted library allocation
page read and write
29890688000
heap
page read and write
298879EA000
trusted library allocation
page read and write
298871DD000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298FCAF8000
heap
page read and write
298875F4000
trusted library allocation
page read and write
2988917D000
trusted library allocation
page read and write
298873A9000
trusted library allocation
page read and write
2988E366000
trusted library allocation
page read and write
29890040000
trusted library allocation
page read and write
20C12563000
heap
page read and write
29887292000
trusted library allocation
page read and write
29887553000
trusted library allocation
page read and write
298FCAE1000
heap
page read and write
29887AD3000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
18B6000
heap
page read and write
29885AD7000
trusted library allocation
page read and write
29886F18000
trusted library allocation
page read and write
298FFC94000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29891A85000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
2988902C000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
29889557000
trusted library allocation
page read and write
24ABB716000
trusted library allocation
page read and write
20C12564000
heap
page read and write
298875DF000
trusted library allocation
page read and write
2988DFC9000
trusted library allocation
page read and write
29888578000
trusted library allocation
page read and write
298F7A0A000
heap
page read and write
29886F4D000
trusted library allocation
page read and write
298875A2000
trusted library allocation
page read and write
29888195000
trusted library allocation
page read and write
298857EF000
trusted library allocation
page read and write
298FF2EE000
trusted library allocation
page read and write
298872E3000
trusted library allocation
page read and write
2988E3E2000
trusted library allocation
page read and write
2988E1FA000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
2988F9E4000
trusted library allocation
page read and write
2988F375000
trusted library allocation
page read and write
2988FE79000
trusted library allocation
page read and write
29886C0B000
trusted library allocation
page read and write
298873F3000
trusted library allocation
page read and write
298877C8000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
2988E3C4000
trusted library allocation
page read and write
2988E3BD000
trusted library allocation
page read and write
298FEBC5000
trusted library allocation
page read and write
298881E0000
trusted library allocation
page read and write
29887739000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
298FEDF1000
trusted library allocation
page read and write
20C11E60000
heap
page read and write
29890600000
trusted library allocation
page read and write
298873FD000
trusted library allocation
page read and write
2988FA57000
trusted library allocation
page read and write
2988E37C000
trusted library allocation
page read and write
298875F7000
trusted library allocation
page read and write
298872ED000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29886F76000
trusted library allocation
page read and write
29885AC5000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
270770B0000
heap
page read and write
298FFCAA000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
29888565000
trusted library allocation
page read and write
2988F3F1000
trusted library allocation
page read and write
17BF000
stack
page read and write
29886CED000
trusted library allocation
page read and write
2988E341000
trusted library allocation
page read and write
298877AF000
trusted library allocation
page read and write
29891A28000
trusted library allocation
page read and write
1134000
heap
page read and write
2988FA06000
trusted library allocation
page read and write
29885968000
trusted library allocation
page read and write
2988E37E000
trusted library allocation
page read and write
20C1263B000
heap
page read and write
298FCAE3000
heap
page read and write
20C12677000
heap
page read and write
298877C9000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
20C12677000
heap
page read and write
298FCAB5000
heap
page read and write
298FFCA6000
trusted library allocation
page read and write
29887AE2000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298906E1000
heap
page read and write
15B62540000
heap
page read and write
2988733A000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29886F9E000
trusted library allocation
page read and write
2988E17B000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
24ABB0B0000
unclassified section
page readonly
20C11640000
heap
page read and write
29891A2D000
trusted library allocation
page read and write
18C2000
heap
page read and write
298875CC000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
24ABB303000
heap
page read and write
2988E258000
trusted library allocation
page read and write
D46323E000
unkown
page readonly
2988E215000
trusted library allocation
page read and write
2988FE94000
trusted library allocation
page read and write
29889557000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298FCAC9000
heap
page read and write
2988791B000
trusted library allocation
page read and write
298833F4000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
2988F323000
trusted library allocation
page read and write
298FEB98000
trusted library allocation
page read and write
298872E9000
trusted library allocation
page read and write
298873DC000
trusted library allocation
page read and write
29883344000
trusted library allocation
page read and write
29887F10000
trusted library allocation
page read and write
2988904D000
trusted library allocation
page read and write
298855B0000
heap
page read and write
1F7FF504000
heap
page read and write
298FCAEF000
heap
page read and write
298873F3000
trusted library allocation
page read and write
29892073000
trusted library allocation
page read and write
298855B3000
heap
page read and write
298877C9000
trusted library allocation
page read and write
298855B0000
heap
page read and write
2988778C000
trusted library allocation
page read and write
2988F429000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
29886F22000
trusted library allocation
page read and write
1F7FF020000
unclassified section
page readonly
298FCB1D000
heap
page read and write
29887759000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29886F96000
trusted library allocation
page read and write
29890636000
heap
page read and write
20C116E0000
unclassified section
page read and write
20C1256C000
heap
page read and write
29887675000
trusted library allocation
page read and write
298876F9000
trusted library allocation
page read and write
2988A702000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
29887329000
trusted library allocation
page read and write
29888448000
trusted library allocation
page read and write
298FFA9C000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
29887E80000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
29885A8A000
trusted library allocation
page read and write
298FCABD000
heap
page read and write
2988559B000
heap
page read and write
298FCAF8000
heap
page read and write
2988FEFE000
trusted library allocation
page read and write
29891AD6000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
298FCAF8000
heap
page read and write
298FCAEF000
heap
page read and write
298FF9DF000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
298870E5000
trusted library allocation
page read and write
2988717B000
trusted library allocation
page read and write
2988849B000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29891A51000
trusted library allocation
page read and write
298879DB000
trusted library allocation
page read and write
298890C8000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAD5000
heap
page read and write
2988818B000
trusted library allocation
page read and write
2988E37C000
trusted library allocation
page read and write
29891A28000
trusted library allocation
page read and write
29887336000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
2988FE8C000
trusted library allocation
page read and write
298895DE000
trusted library allocation
page read and write
29886CD8000
trusted library allocation
page read and write
29887EF4000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298FCAE4000
heap
page read and write
298872F4000
trusted library allocation
page read and write
298873EB000
trusted library allocation
page read and write
2988F57A000
trusted library allocation
page read and write
298875D4000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
298857F7000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298884E1000
trusted library allocation
page read and write
298877A7000
trusted library allocation
page read and write
FDC000
unkown
page readonly
2988E14F000
trusted library allocation
page read and write
298880FD000
trusted library allocation
page read and write
29887AB6000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
298876C5000
trusted library allocation
page read and write
298FFAC5000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988F5C0000
trusted library allocation
page read and write
29887550000
trusted library allocation
page read and write
1014000
unkown
page readonly
298876B2000
trusted library allocation
page read and write
298875BB000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988F926000
trusted library allocation
page read and write
29887AE3000
trusted library allocation
page read and write
2988D971000
trusted library allocation
page read and write
29886F7C000
trusted library allocation
page read and write
29886C6D000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988F941000
trusted library allocation
page read and write
29887741000
trusted library allocation
page read and write
298FF275000
trusted library allocation
page read and write
15B60A94000
heap
page read and write
298875AE000
trusted library allocation
page read and write
298FFC3E000
trusted library allocation
page read and write
2988DFA3000
trusted library allocation
page read and write
298FFC8C000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCB2E000
heap
page read and write
1F7FF0A6000
remote allocation
page execute read
29886FA9000
trusted library allocation
page read and write
298876C7000
trusted library allocation
page read and write
24ABB547000
trusted library allocation
page read and write
2988F9A3000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298FCAF8000
heap
page read and write
298876C7000
trusted library allocation
page read and write
298890D4000
trusted library allocation
page read and write
298FCAD9000
heap
page read and write
29887AF1000
trusted library allocation
page read and write
298FEBD7000
trusted library allocation
page read and write
298876B6000
trusted library allocation
page read and write
29887694000
trusted library allocation
page read and write
298877BD000
trusted library allocation
page read and write
2988F3B3000
trusted library allocation
page read and write
2988739F000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
29888FC5000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
29886F2D000
trusted library allocation
page read and write
29886CCC000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FCAEF000
heap
page read and write
2988E3CB000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
2988DFC9000
trusted library allocation
page read and write
298867F0000
trusted library allocation
page read and write
29887B00000
trusted library allocation
page read and write
29887AE3000
trusted library allocation
page read and write
2988F5E4000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
20C1262A000
heap
page read and write
29887532000
trusted library allocation
page read and write
29886CBB000
trusted library allocation
page read and write
298FEBEF000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29891AF1000
trusted library allocation
page read and write
29891C9E000
trusted library allocation
page read and write
298FF1F6000
trusted library allocation
page read and write
29885AFA000
trusted library allocation
page read and write
2988753B000
trusted library allocation
page read and write
29883350000
trusted library allocation
page read and write
29891A28000
trusted library allocation
page read and write
29886F9B000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
298877D1000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
2988FE31000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29889565000
trusted library allocation
page read and write
298879B1000
trusted library allocation
page read and write
29885985000
trusted library allocation
page read and write
29887175000
trusted library allocation
page read and write
15B62546000
heap
page read and write
298873C6000
trusted library allocation
page read and write
2988729F000
trusted library allocation
page read and write
2988F5A7000
trusted library allocation
page read and write
24ABB560000
trusted library allocation
page read and write
298876AF000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29885589000
heap
page read and write
2988F3CA000
trusted library allocation
page read and write
2988DF18000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
2988F5FA000
trusted library allocation
page read and write
2988F3BE000
trusted library allocation
page read and write
20C12621000
heap
page read and write
298FFCBC000
trusted library allocation
page read and write
2988F972000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
298FCAC0000
heap
page read and write
298890D6000
trusted library allocation
page read and write
24ABB170000
heap
page read and write
29888547000
trusted library allocation
page read and write
1F7FF465000
trusted library allocation
page read and write
2988E3C4000
trusted library allocation
page read and write
2988E115000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
1F7FF482000
trusted library allocation
page read and write
29886CED000
trusted library allocation
page read and write
298857F3000
trusted library allocation
page read and write
18B2000
heap
page read and write
298877C9000
trusted library allocation
page read and write
29885A5E000
trusted library allocation
page read and write
298885E1000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988559B000
heap
page read and write
29885D59000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298857A1000
trusted library allocation
page read and write
29888166000
trusted library allocation
page read and write
298FCABD000
heap
page read and write
298FCB1C000
heap
page read and write
29887141000
trusted library allocation
page read and write
20C1255C000
heap
page read and write
7051FF000
stack
page read and write
18C0000
heap
page read and write
1F7FF506000
heap
page read and write
298FCB08000
heap
page read and write
298FCAF5000
heap
page read and write
20C1262A000
heap
page read and write
20C12658000
heap
page read and write
2988F3D1000
trusted library allocation
page read and write
2988E351000
trusted library allocation
page read and write
29885985000
trusted library allocation
page read and write
29886FFD000
trusted library allocation
page read and write
2988F3A6000
trusted library allocation
page read and write
29891A91000
trusted library allocation
page read and write
298FCAEB000
heap
page read and write
2988F3C9000
trusted library allocation
page read and write
2988559D000
heap
page read and write
298FFBC5000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
29885AB6000
trusted library allocation
page read and write
2988E1E1000
trusted library allocation
page read and write
29885718000
trusted library allocation
page read and write
298FFCDC000
trusted library allocation
page read and write
20C11803000
trusted library allocation
page read and write
2988E360000
trusted library allocation
page read and write
29887694000
trusted library allocation
page read and write
298855A2000
heap
page read and write
2988F5DD000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
298875DF000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAD2000
heap
page read and write
298876D4000
trusted library allocation
page read and write
298885F6000
trusted library allocation
page read and write
29887709000
trusted library allocation
page read and write
2988F3C6000
trusted library allocation
page read and write
29885985000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
3E50000
heap
page read and write
20C125B9000
heap
page read and write
298FFC50000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298879E7000
trusted library allocation
page read and write
298F7A0A000
heap
page read and write
298FCAD2000
heap
page read and write
298FCB1F000
heap
page read and write
2988798F000
trusted library allocation
page read and write
29888190000
trusted library allocation
page read and write
FAF9F3E000
stack
page read and write
29888F9E000
trusted library allocation
page read and write
298FF92D000
trusted library allocation
page read and write
298872AF000
trusted library allocation
page read and write
2988F4E7000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875A9000
trusted library allocation
page read and write
2988E348000
trusted library allocation
page read and write
298872DA000
trusted library allocation
page read and write
298876A8000
trusted library allocation
page read and write
29889047000
trusted library allocation
page read and write
298FF21B000
trusted library allocation
page read and write
298875DB000
trusted library allocation
page read and write
2988F997000
trusted library allocation
page read and write
20C1266A000
heap
page read and write
29887588000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
2988777A000
trusted library allocation
page read and write
29886FB3000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
298890DB000
trusted library allocation
page read and write
298833F4000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FCAD5000
heap
page read and write
FAF6B5E000
unkown
page readonly
298FCB30000
heap
page read and write
29890AA8000
trusted library allocation
page read and write
2988E3E4000
trusted library allocation
page read and write
29887377000
trusted library allocation
page read and write
298873DF000
trusted library allocation
page read and write
298906B8000
heap
page read and write
298875F5000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
1F7FF449000
trusted library allocation
page read and write
2988E3AB000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
29889123000
trusted library allocation
page read and write
2988FE98000
trusted library allocation
page read and write
29891871000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298FCAF8000
heap
page read and write
298855A4000
heap
page read and write
29891A51000
trusted library allocation
page read and write
29886FC5000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
298875F7000
trusted library allocation
page read and write
29885968000
trusted library allocation
page read and write
29891A93000
trusted library allocation
page read and write
298877A5000
trusted library allocation
page read and write
2988E321000
trusted library allocation
page read and write
298FCAE5000
heap
page read and write
29886F31000
trusted library allocation
page read and write
20C1258A000
heap
page read and write
298FCAF5000
heap
page read and write
29886FF2000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
2988E3E4000
trusted library allocation
page read and write
2988E3EC000
trusted library allocation
page read and write
29885985000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
298876DC000
trusted library allocation
page read and write
29886F82000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29891ACA000
trusted library allocation
page read and write
1F7FF45F000
trusted library allocation
page read and write
298879E7000
trusted library allocation
page read and write
2988F5AC000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
298FEB88000
trusted library allocation
page read and write
24ABB130000
unclassified section
page readonly
29887FC7000
trusted library allocation
page read and write
2988E0FE000
trusted library allocation
page read and write
298FFCC7000
trusted library allocation
page read and write
2988D9D4000
trusted library allocation
page read and write
2988F974000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29887224000
trusted library allocation
page read and write
2989184A000
trusted library allocation
page read and write
29885AFA000
trusted library allocation
page read and write
1F7FF2A0000
heap
page read and write
126D17724000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298876F9000
trusted library allocation
page read and write
29887725000
trusted library allocation
page read and write
298FFA6E000
trusted library allocation
page read and write
29885F8E000
trusted library allocation
page read and write
20C116B0000
heap
page readonly
2988D9A2000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
2988E177000
trusted library allocation
page read and write
29886FAD000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298879B1000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298FCAEF000
heap
page read and write
20C12569000
heap
page read and write
298FCB1C000
heap
page read and write
29885A60000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
2988F5A9000
trusted library allocation
page read and write
29887553000
trusted library allocation
page read and write
29886FB9000
trusted library allocation
page read and write
298FEBDF000
trusted library allocation
page read and write
2988819E000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
24ABB71D000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298876A3000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
298FFD28000
trusted library allocation
page read and write
15B60A93000
heap
page read and write
29887728000
trusted library allocation
page read and write
29888FC5000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
298FCAB5000
heap
page read and write
298FCAF8000
heap
page read and write
29885766000
trusted library allocation
page read and write
298885FC000
trusted library allocation
page read and write
298879EC000
trusted library allocation
page read and write
29886C6A000
trusted library allocation
page read and write
298FFC33000
trusted library allocation
page read and write
20C1257D000
heap
page read and write
298FCAD5000
heap
page read and write
298FCAD2000
heap
page read and write
2988F96D000
trusted library allocation
page read and write
2988E238000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
298871E2000
trusted library allocation
page read and write
298857BD000
trusted library allocation
page read and write
2988E3CA000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298FCAEE000
heap
page read and write
2988F3A2000
trusted library allocation
page read and write
24ABB57A000
trusted library allocation
page read and write
20C114E4000
remote allocation
page execute read
298FCAEF000
heap
page read and write
2988758A000
trusted library allocation
page read and write
2988911D000
trusted library allocation
page read and write
2988FED5000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298879F1000
trusted library allocation
page read and write
298FFCF6000
trusted library allocation
page read and write
298FCACE000
heap
page read and write
2988F4AE000
trusted library allocation
page read and write
298872CB000
trusted library allocation
page read and write
298881BE000
trusted library allocation
page read and write
298FCAD3000
heap
page read and write
2988E31F000
trusted library allocation
page read and write
298873F6000
trusted library allocation
page read and write
27077300000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
29887066000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
29890C00000
trusted library allocation
page read and write
29887327000
trusted library allocation
page read and write
29886F8B000
trusted library allocation
page read and write
298FFCBE000
trusted library allocation
page read and write
298FCAE0000
heap
page read and write
298FCB26000
heap
page read and write
298FFD22000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29886F26000
trusted library allocation
page read and write
29886F77000
trusted library allocation
page read and write
2988F3DF000
trusted library allocation
page read and write
89ACFFF000
stack
page read and write
2988776C000
trusted library allocation
page read and write
2988E3E4000
trusted library allocation
page read and write
298FCB2A000
heap
page read and write
29886F29000
trusted library allocation
page read and write
29887645000
trusted library allocation
page read and write
2988559C000
heap
page read and write
2988798F000
trusted library allocation
page read and write
298881E6000
trusted library allocation
page read and write
89ACFFC000
stack
page read and write
2988F4CF000
trusted library allocation
page read and write
298890ED000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298FEDFD000
trusted library allocation
page read and write
2989205F000
trusted library allocation
page read and write
298876B2000
trusted library allocation
page read and write
2988F334000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875E7000
trusted library allocation
page read and write
298FCAE9000
heap
page read and write
29887699000
trusted library allocation
page read and write
2988E3AE000
trusted library allocation
page read and write
29885D6B000
trusted library allocation
page read and write
29883344000
trusted library allocation
page read and write
29891A99000
trusted library allocation
page read and write
298876AF000
trusted library allocation
page read and write
29885968000
trusted library allocation
page read and write
298872C7000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
2988E3AF000
trusted library allocation
page read and write
298876D4000
trusted library allocation
page read and write
298876F9000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
20C12658000
heap
page read and write
2988F9F4000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29886F33000
trusted library allocation
page read and write
298FF226000
trusted library allocation
page read and write
29885AFA000
trusted library allocation
page read and write
2988818B000
trusted library allocation
page read and write
89ADFFF000
stack
page read and write
20C1258A000
heap
page read and write
298FFC88000
trusted library allocation
page read and write
298FF2B9000
trusted library allocation
page read and write
2988E357000
trusted library allocation
page read and write
2988E3D0000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
2988F3AD000
trusted library allocation
page read and write
2988E339000
trusted library allocation
page read and write
298FFA86000
trusted library allocation
page read and write
20C12658000
heap
page read and write
29886CC7000
trusted library allocation
page read and write
2988FE10000
trusted library allocation
page read and write
29886F77000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
298876AF000
trusted library allocation
page read and write
29888135000
trusted library allocation
page read and write
298855A4000
heap
page read and write
298FCB08000
heap
page read and write
29887619000
trusted library allocation
page read and write
29885A9C000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298875F1000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298FFC9D000
trusted library allocation
page read and write
298875DD000
trusted library allocation
page read and write
29887E82000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298855B0000
heap
page read and write
298876C7000
trusted library allocation
page read and write
298876A3000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
298877CF000
trusted library allocation
page read and write
1134000
heap
page read and write
298FCAE4000
heap
page read and write
24ABB312000
unclassified section
page read and write
298FCAF5000
heap
page read and write
298873F8000
trusted library allocation
page read and write
29886F42000
trusted library allocation
page read and write
20C12622000
heap
page read and write
29887287000
trusted library allocation
page read and write
29888140000
trusted library allocation
page read and write
298884C2000
trusted library allocation
page read and write
29887728000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988F3FA000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
298878D6000
trusted library allocation
page read and write
29886FEC000
trusted library allocation
page read and write
2988F3E5000
trusted library allocation
page read and write
2988596A000
trusted library allocation
page read and write
29887AAD000
trusted library allocation
page read and write
2988F3DF000
trusted library allocation
page read and write
24ABB581000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988339D000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29887766000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
2988F98C000
trusted library allocation
page read and write
2988F3F6000
trusted library allocation
page read and write
298875D4000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298FCAF6000
heap
page read and write
298857EF000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298FCADE000
heap
page read and write
298890F5000
trusted library allocation
page read and write
298870D9000
trusted library allocation
page read and write
298875F7000
trusted library allocation
page read and write
298832E2000
trusted library allocation
page read and write
29886F82000
trusted library allocation
page read and write
298FFB98000
trusted library allocation
page read and write
29891A79000
trusted library allocation
page read and write
298876A3000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
298879FA000
trusted library allocation
page read and write
1F7FF1D3000
heap
page read and write
298879CD000
trusted library allocation
page read and write
298895AE000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
29890601000
heap
page read and write
298FCAEC000
heap
page read and write
2988DF4F000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
29885D6F000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988E3B7000
trusted library allocation
page read and write
298879E7000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
29886CF2000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29885AC5000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298875AE000
trusted library allocation
page read and write
18AF000
heap
page read and write
29888F69000
trusted library allocation
page read and write
298855B9000
heap
page read and write
29887785000
trusted library allocation
page read and write
29889012000
trusted library allocation
page read and write
298876E7000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
2988E154000
trusted library allocation
page read and write
18C1000
heap
page read and write
298FCADC000
heap
page read and write
29885AFA000
trusted library allocation
page read and write
2988D9D0000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
298FFBBC000
trusted library allocation
page read and write
24ABB400000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
2988E068000
trusted library allocation
page read and write
2988E143000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298FCAFF000
heap
page read and write
29887129000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29887785000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
29887759000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
1F7FF4F6000
trusted library allocation
page read and write
298855A2000
heap
page read and write
29886C9F000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FF29D000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
29887ADD000
trusted library allocation
page read and write
20C11800000
trusted library allocation
page read and write
29887629000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988598A000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298873F6000
trusted library allocation
page read and write
2988911A000
trusted library allocation
page read and write
29887615000
trusted library allocation
page read and write
298FCB34000
heap
page read and write
298881D7000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298876DC000
trusted library allocation
page read and write
298FFCF6000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298FFCC1000
trusted library allocation
page read and write
2988774C000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
18BC000
heap
page read and write
2988557E000
heap
page read and write
2988E383000
trusted library allocation
page read and write
2988FE4E000
trusted library allocation
page read and write
298FCACE000
heap
page read and write
298F79F6000
heap
page read and write
2988F5B7000
trusted library allocation
page read and write
298895B9000
trusted library allocation
page read and write
29887550000
trusted library allocation
page read and write
2988E26B000
trusted library allocation
page read and write
298855B0000
heap
page read and write
2988757C000
trusted library allocation
page read and write
29886CF2000
trusted library allocation
page read and write
29887AFC000
trusted library allocation
page read and write
2988738D000
trusted library allocation
page read and write
298FCAE5000
heap
page read and write
298875E7000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298FFC94000
trusted library allocation
page read and write
29887546000
trusted library allocation
page read and write
29886CED000
trusted library allocation
page read and write
29887690000
trusted library allocation
page read and write
FDC000
unkown
page readonly
298876E7000
trusted library allocation
page read and write
20C125FD000
heap
page read and write
298876E0000
trusted library allocation
page read and write
20C12560000
heap
page read and write
20C1153A000
heap
page read and write
298F7A0A000
heap
page read and write
29887FDA000
trusted library allocation
page read and write
298FF9DB000
trusted library allocation
page read and write
298884D8000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
3F50000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FCAF1000
heap
page read and write
298880ED000
trusted library allocation
page read and write
29885D3E000
trusted library allocation
page read and write
298876DD000
trusted library allocation
page read and write
298876BC000
trusted library allocation
page read and write
29886FB8000
trusted library allocation
page read and write
298875FD000
trusted library allocation
page read and write
20C118C1000
trusted library allocation
page read and write
29885A93000
trusted library allocation
page read and write
2988F8E5000
trusted library allocation
page read and write
2988906C000
trusted library allocation
page read and write
298FCAD9000
heap
page read and write
298875FE000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
2988598E000
trusted library allocation
page read and write
29885968000
trusted library allocation
page read and write
1F7FF500000
heap
page read and write
1F7FF0B0000
unclassified section
page readonly
29885589000
heap
page read and write
2988E3DF000
trusted library allocation
page read and write
298873F8000
trusted library allocation
page read and write
298FFBB4000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
298855A2000
heap
page read and write
298918F1000
trusted library allocation
page read and write
29886FF4000
trusted library allocation
page read and write
298FFA28000
trusted library allocation
page read and write
1F7FF200000
heap
page read and write
29885589000
heap
page read and write
298FFCEB000
trusted library allocation
page read and write
298878FE000
trusted library allocation
page read and write
298857E2000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298857F3000
trusted library allocation
page read and write
2988758F000
trusted library allocation
page read and write
29887570000
trusted library allocation
page read and write
2988F4EF000
trusted library allocation
page read and write
298872F2000
trusted library allocation
page read and write
298876AF000
trusted library allocation
page read and write
298879E2000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
298880FD000
trusted library allocation
page read and write
29888143000
trusted library allocation
page read and write
2988F3D1000
trusted library allocation
page read and write
29885DD3000
trusted library allocation
page read and write
2988708A000
trusted library allocation
page read and write
29883362000
trusted library allocation
page read and write
29885DC5000
trusted library allocation
page read and write
298FF171000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
24ABB340000
unclassified section
page readonly
29889024000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
20C11873000
trusted library allocation
page read and write
298FEB78000
trusted library allocation
page read and write
298FCB27000
heap
page read and write
24ABB0A0000
unclassified section
page readonly
29885FF6000
trusted library allocation
page read and write
2988E147000
trusted library allocation
page read and write
298920EE000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
20C1180A000
trusted library allocation
page read and write
298875FB000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
29887694000
trusted library allocation
page read and write
298875FB000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29886FB3000
trusted library allocation
page read and write
298880C6000
trusted library allocation
page read and write
20C12677000
heap
page read and write
29885A8E000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875BC000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
298884BE000
trusted library allocation
page read and write
298FFCA8000
trusted library allocation
page read and write
298876A3000
trusted library allocation
page read and write
29886C43000
trusted library allocation
page read and write
29890601000
heap
page read and write
298FCAF5000
heap
page read and write
29887175000
trusted library allocation
page read and write
2988E1A4000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29885977000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FEBA1000
trusted library allocation
page read and write
29887522000
trusted library allocation
page read and write
2988F953000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29883363000
trusted library allocation
page read and write
F40000
unkown
page readonly
29885AA8000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FF9AA000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
29886F9B000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298879B1000
trusted library allocation
page read and write
29891A7B000
trusted library allocation
page read and write
1F7FF403000
trusted library allocation
page read and write
29886F7B000
trusted library allocation
page read and write
29889565000
trusted library allocation
page read and write
29886CD8000
trusted library allocation
page read and write
2988E39E000
trusted library allocation
page read and write
2988812E000
trusted library allocation
page read and write
298876F4000
trusted library allocation
page read and write
298FCB3E000
heap
page read and write
2988E3A0000
trusted library allocation
page read and write
29885AB9000
trusted library allocation
page read and write
29888529000
trusted library allocation
page read and write
298FCAD3000
heap
page read and write
29887629000
trusted library allocation
page read and write
2290000
heap
page read and write
298920DC000
trusted library allocation
page read and write
298890DB000
trusted library allocation
page read and write
2988F5DA000
trusted library allocation
page read and write
29887AA3000
trusted library allocation
page read and write
7031FF000
stack
page read and write
298FCB34000
heap
page read and write
298FCAE3000
heap
page read and write
2988F3F8000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
29886F7F000
trusted library allocation
page read and write
20C125F2000
heap
page read and write
298FCAF1000
heap
page read and write
29886FA3000
trusted library allocation
page read and write
298FFCBC000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
29887653000
trusted library allocation
page read and write
298FCADE000
heap
page read and write
298855A2000
heap
page read and write
2988F3A4000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
298FCAF8000
heap
page read and write
24ABB70C000
trusted library allocation
page read and write
298FFBF8000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298877CD000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
2988753B000
trusted library allocation
page read and write
29886FA1000
trusted library allocation
page read and write
2988F887000
trusted library allocation
page read and write
29887141000
trusted library allocation
page read and write
29886F22000
trusted library allocation
page read and write
2988559C000
heap
page read and write
298FCB24000
heap
page read and write
298881BA000
trusted library allocation
page read and write
2988E3B3000
trusted library allocation
page read and write
1F7FF030000
unclassified section
page readonly
2988DF4A000
trusted library allocation
page read and write
29887633000
trusted library allocation
page read and write
29886FFD000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
1F7FF45D000
trusted library allocation
page read and write
29885A8A000
trusted library allocation
page read and write
298872DB000
trusted library allocation
page read and write
298FCAC1000
heap
page read and write
2988739F000
trusted library allocation
page read and write
298FCAB5000
heap
page read and write
2988E38E000
trusted library allocation
page read and write
29887629000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29887699000
trusted library allocation
page read and write
298FCAEC000
heap
page read and write
2988E3EC000
trusted library allocation
page read and write
29887749000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
298877C8000
trusted library allocation
page read and write
270774D0000
heap
page read and write
298FCAD2000
heap
page read and write
298876AF000
trusted library allocation
page read and write
1F7FF240000
heap
page read and write
298FFBA3000
trusted library allocation
page read and write
2988E3C6000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
298879E2000
trusted library allocation
page read and write
2988754B000
trusted library allocation
page read and write
29886FB9000
trusted library allocation
page read and write
29886C47000
trusted library allocation
page read and write
29885772000
trusted library allocation
page read and write
298877CF000
trusted library allocation
page read and write
20C12621000
heap
page read and write
298FCAD7000
heap
page read and write
298877BC000
trusted library allocation
page read and write
29886F33000
trusted library allocation
page read and write
298918CC000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
29885961000
trusted library allocation
page read and write
20C12569000
heap
page read and write
298FCB03000
heap
page read and write
298FCACE000
heap
page read and write
24ABB503000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988E283000
trusted library allocation
page read and write
2988F3F6000
trusted library allocation
page read and write
2988DFEF000
trusted library allocation
page read and write
29886FCD000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
29886C86000
trusted library allocation
page read and write
2988F9C1000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298890E9000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298879CD000
trusted library allocation
page read and write
29885F97000
trusted library allocation
page read and write
2988F3DF000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988713E000
trusted library allocation
page read and write
2988F9AC000
trusted library allocation
page read and write
29885AD7000
trusted library allocation
page read and write
298855A4000
heap
page read and write
2988F5DD000
trusted library allocation
page read and write
1F7FF2C0000
unclassified section
page readonly
2988FEF4000
trusted library allocation
page read and write
298832DC000
trusted library allocation
page read and write
3E3F000
stack
page read and write
29887762000
trusted library allocation
page read and write
298890CC000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FCAF5000
heap
page read and write
298880CA000
trusted library allocation
page read and write
2988771C000
trusted library allocation
page read and write
29885AB7000
trusted library allocation
page read and write
298FFBDB000
trusted library allocation
page read and write
15B60A7D000
heap
page read and write
29887719000
trusted library allocation
page read and write
2988E20F000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
29887AF1000
trusted library allocation
page read and write
298877BF000
trusted library allocation
page read and write
29885AD1000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
15B60C0A000
trusted library allocation
page read and write
298885DF000
trusted library allocation
page read and write
298879CD000
trusted library allocation
page read and write
29886F69000
trusted library allocation
page read and write
29886FAD000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29887583000
trusted library allocation
page read and write
2988E09C000
trusted library allocation
page read and write
298FCAB5000
heap
page read and write
298FEB56000
trusted library allocation
page read and write
1134000
heap
page read and write
29886C47000
trusted library allocation
page read and write
2988798F000
trusted library allocation
page read and write
29885A6F000
trusted library allocation
page read and write
298857E2000
trusted library allocation
page read and write
2988D997000
trusted library allocation
page read and write
20C118C7000
trusted library allocation
page read and write
2988859E000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
298FCAE1000
heap
page read and write
29885766000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
24ABB310000
unclassified section
page read and write
298872CD000
trusted library allocation
page read and write
29891AD4000
trusted library allocation
page read and write
298877C6000
trusted library allocation
page read and write
20C11879000
trusted library allocation
page read and write
4010000
heap
page read and write
2988D9BA000
trusted library allocation
page read and write
1F7FF1E0000
heap
page read and write
24ABB516000
trusted library allocation
page read and write
298872D9000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
298FEB85000
trusted library allocation
page read and write
29885763000
trusted library allocation
page read and write
29887AF1000
trusted library allocation
page read and write
29889580000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29885DC5000
trusted library allocation
page read and write
7039FF000
stack
page read and write
298FCAF5000
heap
page read and write
298920A1000
trusted library allocation
page read and write
298875A9000
trusted library allocation
page read and write
29885DCD000
trusted library allocation
page read and write
298873C6000
trusted library allocation
page read and write
6187761000
trusted library allocation
page execute read
298FCAF5000
heap
page read and write
298FCAC4000
heap
page read and write
298873BA000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
298872F2000
trusted library allocation
page read and write
29887FE2000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
24ABB523000
trusted library allocation
page read and write
2988762D000
trusted library allocation
page read and write
2988559D000
heap
page read and write
F41000
unkown
page execute read
20C11861000
trusted library allocation
page read and write
29886CA2000
trusted library allocation
page read and write
2988FE28000
trusted library allocation
page read and write
2988954B000
trusted library allocation
page read and write
2988E117000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
29885737000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29890635000
heap
page read and write
298875DD000
trusted library allocation
page read and write
20C1263B000
heap
page read and write
298FFCDC000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
2988E0A6000
trusted library allocation
page read and write
29890601000
heap
page read and write
298857FC000
trusted library allocation
page read and write
298875E7000
trusted library allocation
page read and write
1F7FF4A2000
trusted library allocation
page read and write
2988E34C000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAC4000
heap
page read and write
29888F86000
trusted library allocation
page read and write
29885A47000
trusted library allocation
page read and write
2988F3A8000
trusted library allocation
page read and write
18C2000
heap
page read and write
298FF93B000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
29886F82000
trusted library allocation
page read and write
298857C1000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
10B9000
stack
page read and write
2988E336000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298FCAD4000
heap
page read and write
298FCAE3000
heap
page read and write
2988819A000
trusted library allocation
page read and write
298FFAE6000
trusted library allocation
page read and write
298FCAEB000
heap
page read and write
298FCAE3000
heap
page read and write
298876D4000
trusted library allocation
page read and write
298872ED000
trusted library allocation
page read and write
29887B00000
trusted library allocation
page read and write
298FCAD7000
heap
page read and write
298876AD000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
29886F98000
trusted library allocation
page read and write
298F79F7000
heap
page read and write
298FCB2A000
heap
page read and write
2988F5A9000
trusted library allocation
page read and write
2988711A000
trusted library allocation
page read and write
24ABB732000
trusted library allocation
page read and write
20C11876000
trusted library allocation
page read and write
298895CF000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
29885968000
trusted library allocation
page read and write
298FCB2A000
heap
page read and write
29886CED000
trusted library allocation
page read and write
298879EC000
trusted library allocation
page read and write
20C11823000
trusted library allocation
page read and write
2988F3E3000
trusted library allocation
page read and write
29888184000
trusted library allocation
page read and write
298890E9000
trusted library allocation
page read and write
29890601000
heap
page read and write
298FCB1C000
heap
page read and write
29887694000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FCB1C000
heap
page read and write
24ABB512000
trusted library allocation
page read and write
2988F3CD000
trusted library allocation
page read and write
29885778000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
29887606000
trusted library allocation
page read and write
2988776C000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
2988E33D000
trusted library allocation
page read and write
298890B0000
trusted library allocation
page read and write
20C11470000
unclassified section
page readonly
29885FF9000
trusted library allocation
page read and write
29886FFD000
trusted library allocation
page read and write
2988E287000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
2988E37A000
trusted library allocation
page read and write
20C125FD000
heap
page read and write
29885792000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
FAF8DFE000
unkown
page readonly
20C1254D000
heap
page read and write
298872E9000
trusted library allocation
page read and write
298895C2000
trusted library allocation
page read and write
29887AB5000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988F8C8000
trusted library allocation
page read and write
1F7FF400000
trusted library allocation
page read and write
29885AAD000
trusted library allocation
page read and write
298876AA000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FF933000
trusted library allocation
page read and write
29888F9E000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
298FCADA000
heap
page read and write
298FCAF5000
heap
page read and write
298FCB2E000
heap
page read and write
298876C7000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29886F69000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
298FFC81000
trusted library allocation
page read and write
29889053000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAD4000
heap
page read and write
2988815B000
trusted library allocation
page read and write
29886CE3000
trusted library allocation
page read and write
298877A9000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
29885766000
trusted library allocation
page read and write
2988595A000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
20C11DC0000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
2988755C000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298857F7000
trusted library allocation
page read and write
298FCAF0000
heap
page read and write
29887577000
trusted library allocation
page read and write
29887AE7000
trusted library allocation
page read and write
298FF9DB000
trusted library allocation
page read and write
298876E7000
trusted library allocation
page read and write
2988559C000
heap
page read and write
2988D99C000
trusted library allocation
page read and write
298FCB34000
heap
page read and write
298876AA000
trusted library allocation
page read and write
298875DD000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
29886C83000
trusted library allocation
page read and write
298FFC14000
trusted library allocation
page read and write
298FFCC7000
trusted library allocation
page read and write
2988732A000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29891CF1000
trusted library allocation
page read and write
15B60C00000
trusted library allocation
page read and write
298878DE000
trusted library allocation
page read and write
15B60A9B000
heap
page read and write
298884E4000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298FFA8C000
trusted library allocation
page read and write
2988F34E000
trusted library allocation
page read and write
29886CED000
trusted library allocation
page read and write
29888181000
trusted library allocation
page read and write
29885AD1000
trusted library allocation
page read and write
298877C9000
trusted library allocation
page read and write
298873FB000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
2988F38F000
trusted library allocation
page read and write
29885A9E000
trusted library allocation
page read and write
20C11660000
heap
page read and write
298918F1000
trusted library allocation
page read and write
298879EA000
trusted library allocation
page read and write
20C1240A000
trusted library allocation
page read and write
29885A3B000
trusted library allocation
page read and write
298FFC4E000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
29886CC7000
trusted library allocation
page read and write
2988557E000
heap
page read and write
298FCADA000
heap
page read and write
20C125E0000
heap
page read and write
2988F3DF000
trusted library allocation
page read and write
298855B0000
heap
page read and write
2988E3B3000
trusted library allocation
page read and write
2988F948000
trusted library allocation
page read and write
1F7FF4DB000
trusted library allocation
page read and write
18C4000
heap
page read and write
2988559C000
heap
page read and write
298FCAEF000
heap
page read and write
298876E7000
trusted library allocation
page read and write
2988573D000
trusted library allocation
page read and write
2988756A000
trusted library allocation
page read and write
298877CD000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
2988F5AB000
trusted library allocation
page read and write
29887581000
trusted library allocation
page read and write
2988758C000
trusted library allocation
page read and write
D4642BE000
unkown
page readonly
17FE000
stack
page read and write
29888532000
trusted library allocation
page read and write
2988F5D6000
trusted library allocation
page read and write
1F7FF470000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298859CE000
trusted library allocation
page read and write
298FF123000
trusted library allocation
page read and write
29888537000
trusted library allocation
page read and write
29890601000
heap
page read and write
298872DA000
trusted library allocation
page read and write
29885961000
trusted library allocation
page read and write
298872F4000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FCADA000
heap
page read and write
29885D6B000
trusted library allocation
page read and write
298FF2FC000
trusted library allocation
page read and write
29885D55000
trusted library allocation
page read and write
29885D4B000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
2988D9EA000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
298FCAE4000
heap
page read and write
298FCAEF000
heap
page read and write
2988E380000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
15B62552000
heap
page read and write
298FCADA000
heap
page read and write
2988F972000
trusted library allocation
page read and write
298FCADE000
heap
page read and write
2988FE26000
trusted library allocation
page read and write
298857C5000
trusted library allocation
page read and write
24ABB55D000
trusted library allocation
page read and write
F41000
unkown
page execute read
298FFCC1000
trusted library allocation
page read and write
20C11865000
trusted library allocation
page read and write
29885AC0000
trusted library allocation
page read and write
2988762D000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
2988F5EC000
trusted library allocation
page read and write
29891C6D000
trusted library allocation
page read and write
2988F3E6000
trusted library allocation
page read and write
298832D7000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
2988F3FA000
trusted library allocation
page read and write
29888166000
trusted library allocation
page read and write
2988F3E6000
trusted library allocation
page read and write
298876B2000
trusted library allocation
page read and write
15B6255B000
heap
page read and write
298879CD000
trusted library allocation
page read and write
2989065C000
heap
page read and write
298FCAE4000
heap
page read and write
298FCAF5000
heap
page read and write
298879EC000
trusted library allocation
page read and write
298FF950000
trusted library allocation
page read and write
29886CC7000
trusted library allocation
page read and write
29886F3B000
trusted library allocation
page read and write
29888190000
trusted library allocation
page read and write
298855B0000
heap
page read and write
2988DFA7000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
298FFD37000
trusted library allocation
page read and write
15B60A9B000
heap
page read and write
298873FD000
trusted library allocation
page read and write
D464ABE000
stack
page read and write
2988F3DF000
trusted library allocation
page read and write
298876AA000
trusted library allocation
page read and write
2988E08E000
trusted library allocation
page read and write
298872F2000
trusted library allocation
page read and write
298895D2000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
2988F42C000
trusted library allocation
page read and write
3D98A6203000
trusted library allocation
page read and write
2988E2F5000
trusted library allocation
page read and write
2988FE66000
trusted library allocation
page read and write
298FFC3E000
trusted library allocation
page read and write
FAF967E000
stack
page read and write
298FCAE4000
heap
page read and write
ED0B6E000
stack
page read and write
29887625000
trusted library allocation
page read and write
29886CC1000
trusted library allocation
page read and write
29887175000
trusted library allocation
page read and write
29887141000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29885583000
heap
page read and write
298857C5000
trusted library allocation
page read and write
FAFB77E000
stack
page read and write
2988598D000
trusted library allocation
page read and write
20C125E8000
heap
page read and write
298FCAF8000
heap
page read and write
298FF217000
trusted library allocation
page read and write
29887ADD000
trusted library allocation
page read and write
298FFCEB000
trusted library allocation
page read and write
298872A5000
trusted library allocation
page read and write
29891A93000
trusted library allocation
page read and write
2988F3E1000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
2988754B000
trusted library allocation
page read and write
2988F5EE000
trusted library allocation
page read and write
298881D7000
trusted library allocation
page read and write
298FFAEB000
trusted library allocation
page read and write
298FCAEC000
heap
page read and write
298FCB20000
heap
page read and write
29886F7F000
trusted library allocation
page read and write
29885FD2000
trusted library allocation
page read and write
298FEBB3000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
2988599E000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
298FEB81000
trusted library allocation
page read and write
29885AC8000
trusted library allocation
page read and write
29885589000
heap
page read and write
298879EA000
trusted library allocation
page read and write
29891A1C000
trusted library allocation
page read and write
D4619D8000
stack
page read and write
29885A8E000
trusted library allocation
page read and write
20C11E72000
heap
page read and write
298FCAE1000
heap
page read and write
298F7A04000
heap
page read and write
298FEB9F000
trusted library allocation
page read and write
29887615000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875FE000
trusted library allocation
page read and write
2988DFA3000
trusted library allocation
page read and write
2988F385000
trusted library allocation
page read and write
2988761B000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
2988F9C5000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29885A87000
trusted library allocation
page read and write
20C116C6000
heap
page read and write
29886C5D000
trusted library allocation
page read and write
298872ED000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298875A9000
trusted library allocation
page read and write
298FFBF8000
trusted library allocation
page read and write
29890645000
heap
page read and write
298876AD000
trusted library allocation
page read and write
298877A5000
trusted library allocation
page read and write
2988E0FE000
trusted library allocation
page read and write
298FFC44000
trusted library allocation
page read and write
29885751000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FCAEC000
heap
page read and write
298875DF000
trusted library allocation
page read and write
2988E2F5000
trusted library allocation
page read and write
298876D4000
trusted library allocation
page read and write
298884E4000
trusted library allocation
page read and write
1180000
heap
page read and write
298FF9C6000
trusted library allocation
page read and write
29885AA9000
trusted library allocation
page read and write
29891A17000
trusted library allocation
page read and write
2988F5E8000
trusted library allocation
page read and write
27077170000
heap
page read and write
29885F4F000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298FCAF5000
heap
page read and write
298879E7000
trusted library allocation
page read and write
298FF9DF000
trusted library allocation
page read and write
29885F96000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29885D3E000
trusted library allocation
page read and write
29888573000
trusted library allocation
page read and write
2988DFA7000
trusted library allocation
page read and write
2988738A000
trusted library allocation
page read and write
298FEB52000
trusted library allocation
page read and write
29887923000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
29887694000
trusted library allocation
page read and write
29887665000
trusted library allocation
page read and write
29886F7B000
trusted library allocation
page read and write
2988FE45000
trusted library allocation
page read and write
298FF27D000
trusted library allocation
page read and write
2988335C000
trusted library allocation
page read and write
29886FD0000
trusted library allocation
page read and write
298FCAE5000
heap
page read and write
298FCB2A000
heap
page read and write
29886C83000
trusted library allocation
page read and write
24ABB6A6000
heap
page read and write
29885DF6000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29887653000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
20C118E9000
trusted library allocation
page read and write
298879FE000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988F3D3000
trusted library allocation
page read and write
29891AF1000
trusted library allocation
page read and write
298876E0000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
29890671000
heap
page read and write
1134000
heap
page read and write
D4631FE000
unkown
page readonly
298872E9000
trusted library allocation
page read and write
2988751B000
trusted library allocation
page read and write
298855B0000
heap
page read and write
298FCAEF000
heap
page read and write
298FCABE000
heap
page read and write
2988FECC000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29885AD7000
trusted library allocation
page read and write
29891A32000
trusted library allocation
page read and write
298872CD000
trusted library allocation
page read and write
298876F4000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298875FB000
trusted library allocation
page read and write
2988E173000
trusted library allocation
page read and write
2988F3E8000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
29887581000
trusted library allocation
page read and write
29886FBF000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
2988E3AF000
trusted library allocation
page read and write
2988F349000
trusted library allocation
page read and write
2988F4E7000
trusted library allocation
page read and write
270770D0000
heap
page read and write
29885DF8000
trusted library allocation
page read and write
29885D3D000
trusted library allocation
page read and write
20C116F0000
trusted library allocation
page read and write
2988F360000
trusted library allocation
page read and write
298855B1000
heap
page read and write
298FCAD2000
heap
page read and write
298873BA000
trusted library allocation
page read and write
298FFCA8000
trusted library allocation
page read and write
298855B1000
heap
page read and write
2988E39C000
trusted library allocation
page read and write
298918DE000
trusted library allocation
page read and write
298872DA000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29887675000
trusted library allocation
page read and write
298FFBF0000
trusted library allocation
page read and write
2988F3AD000
trusted library allocation
page read and write
29887FB1000
trusted library allocation
page read and write
298876B7000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29886F2F000
trusted library allocation
page read and write
298891C0000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
29887907000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
298895B2000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
298FFBD7000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCABE000
heap
page read and write
298FCAE7000
heap
page read and write
298FCAD2000
heap
page read and write
D460FEE000
stack
page read and write
29885A91000
trusted library allocation
page read and write
20C11881000
trusted library allocation
page read and write
298857E8000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298895C8000
trusted library allocation
page read and write
298FCAE1000
heap
page read and write
2988559B000
heap
page read and write
2988E3AE000
trusted library allocation
page read and write
18CE000
heap
page read and write
298FCAFF000
heap
page read and write
20C11814000
trusted library allocation
page read and write
298FCAA4000
heap
page read and write
20C11700000
trusted library allocation
page read and write
FAF9EBE000
stack
page read and write
298876F6000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
FAF9E7E000
unkown
page readonly
2988F3B4000
trusted library allocation
page read and write
29887557000
trusted library allocation
page read and write
29888F9A000
trusted library allocation
page read and write
29887FB2000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCB1C000
heap
page read and write
27077179000
heap
page read and write
298876F9000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988847F000
trusted library allocation
page read and write
29886CDD000
trusted library allocation
page read and write
29889554000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
298FF2A2000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
29886F33000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298857EF000
trusted library allocation
page read and write
29883260000
trusted library allocation
page read and write
29886CCC000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2707730A000
trusted library allocation
page read and write
29887336000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
20C11D60000
trusted library section
page readonly
298879CD000
trusted library allocation
page read and write
29888139000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298FCAE4000
heap
page read and write
29887AE7000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
2988F90C000
trusted library allocation
page read and write
298870CE000
trusted library allocation
page read and write
29885AD1000
trusted library allocation
page read and write
20C12644000
heap
page read and write
298FFAF3000
trusted library allocation
page read and write
20C1266A000
heap
page read and write
1F7FF48F000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
29887696000
trusted library allocation
page read and write
29888555000
trusted library allocation
page read and write
298FEB98000
trusted library allocation
page read and write
FAF6BDB000
stack
page read and write
2988595A000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
29887AE7000
trusted library allocation
page read and write
29887769000
trusted library allocation
page read and write
298FCAC5000
heap
page read and write
29886F3D000
trusted library allocation
page read and write
298FFBA3000
trusted library allocation
page read and write
2988DF4A000
trusted library allocation
page read and write
298FF9DF000
trusted library allocation
page read and write
29888200000
trusted library allocation
page read and write
2988955C000
trusted library allocation
page read and write
29889118000
trusted library allocation
page read and write
29885A53000
trusted library allocation
page read and write
2988F39B000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988F5EB000
trusted library allocation
page read and write
29889022000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
1F7FF704000
trusted library allocation
page read and write
298FEDFD000
trusted library allocation
page read and write
298FCAEC000
heap
page read and write
2988F99D000
trusted library allocation
page read and write
29886C9C000
trusted library allocation
page read and write
29885A67000
trusted library allocation
page read and write
298876AA000
trusted library allocation
page read and write
2988E348000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
29887728000
trusted library allocation
page read and write
298855A4000
heap
page read and write
298FCAF8000
heap
page read and write
24ABB121000
remote allocation
page execute read
298877B4000
trusted library allocation
page read and write
ED0A6B000
stack
page read and write
29885AB6000
trusted library allocation
page read and write
2988854E000
trusted library allocation
page read and write
2988E39E000
trusted library allocation
page read and write
29886CF2000
trusted library allocation
page read and write
2988FE8C000
trusted library allocation
page read and write
29887E50000
trusted library allocation
page read and write
298FCB1D000
heap
page read and write
2988557E000
heap
page read and write
20C1263B000
heap
page read and write
298FF2A2000
trusted library allocation
page read and write
298879E2000
trusted library allocation
page read and write
298877C3000
trusted library allocation
page read and write
100C000
unkown
page read and write
2988F3F8000
trusted library allocation
page read and write
298876F9000
trusted library allocation
page read and write
298FFC42000
trusted library allocation
page read and write
29885AD9000
trusted library allocation
page read and write
298876A3000
trusted library allocation
page read and write
298855B0000
heap
page read and write
298890FD000
trusted library allocation
page read and write
298855A4000
heap
page read and write
29887588000
trusted library allocation
page read and write
29887AB5000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
2988E360000
trusted library allocation
page read and write
298876F5000
trusted library allocation
page read and write
20C125A8000
heap
page read and write
29885A73000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298875FB000
trusted library allocation
page read and write
2988F4B9000
trusted library allocation
page read and write
29891A8E000
trusted library allocation
page read and write
29887588000
trusted library allocation
page read and write
2988594B000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988FE8C000
trusted library allocation
page read and write
29887AE4000
trusted library allocation
page read and write
20C1266A000
heap
page read and write
29890601000
heap
page read and write
29891A9D000
trusted library allocation
page read and write
29891A07000
trusted library allocation
page read and write
20C1262D000
heap
page read and write
298FFBD0000
trusted library allocation
page read and write
2988E387000
trusted library allocation
page read and write
29885AB7000
trusted library allocation
page read and write
2988E21E000
trusted library allocation
page read and write
298FF298000
trusted library allocation
page read and write
D4629FE000
stack
page read and write
298879E2000
trusted library allocation
page read and write
24ABB55B000
trusted library allocation
page read and write
298873D9000
trusted library allocation
page read and write
29887AAF000
trusted library allocation
page read and write
29885A83000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
29887AE7000
trusted library allocation
page read and write
1134000
heap
page read and write
2988738D000
trusted library allocation
page read and write
2988E3B3000
trusted library allocation
page read and write
298857BD000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
27077200000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988F377000
trusted library allocation
page read and write
298881AA000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
298878A3000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298872E3000
trusted library allocation
page read and write
2988F460000
trusted library allocation
page read and write
20C11DF7000
unkown
page execute read
29886FBF000
trusted library allocation
page read and write
298FF9DF000
trusted library allocation
page read and write
1120000
heap
page read and write
298877CF000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29887A93000
trusted library allocation
page read and write
298876AB000
trusted library allocation
page read and write
20C1266A000
heap
page read and write
24ABB739000
trusted library allocation
page read and write
2988DA32000
trusted library allocation
page read and write
29885700000
trusted library allocation
page read and write
29887AAF000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
298FCAF8000
heap
page read and write
2988E0A6000
trusted library allocation
page read and write
298FFBF0000
trusted library allocation
page read and write
24ABB110000
remote allocation
page read and write
2988E37A000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298FFCBE000
trusted library allocation
page read and write
20C12569000
heap
page read and write
298FFCC1000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
29886F15000
trusted library allocation
page read and write
298FFA77000
trusted library allocation
page read and write
2988E131000
trusted library allocation
page read and write
298FCABD000
heap
page read and write
298FF2F0000
trusted library allocation
page read and write
29883230000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FFCEB000
trusted library allocation
page read and write
298879CE000
trusted library allocation
page read and write
15B60A60000
heap
page read and write
20C116C0000
heap
page read and write
298875F1000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29887696000
trusted library allocation
page read and write
29887734000
trusted library allocation
page read and write
298FCAE9000
heap
page read and write
29885D13000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
298918FD000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
298857AD000
trusted library allocation
page read and write
298FFCA6000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
2988E217000
trusted library allocation
page read and write
2988593C000
trusted library allocation
page read and write
29887283000
trusted library allocation
page read and write
298890B9000
trusted library allocation
page read and write
2988E340000
trusted library allocation
page read and write
20C11886000
trusted library allocation
page read and write
1F7FF290000
unclassified section
page read and write
298FCAD2000
heap
page read and write
298873D1000
trusted library allocation
page read and write
2988E3B7000
trusted library allocation
page read and write
29888176000
trusted library allocation
page read and write
29886FAD000
trusted library allocation
page read and write
29886CD8000
trusted library allocation
page read and write
298872FD000
trusted library allocation
page read and write
298885CD000
trusted library allocation
page read and write
29891A9D000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298879E7000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
24ABB31F000
unclassified section
page read and write
298881EE000
trusted library allocation
page read and write
298918EB000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
24ABB2A0000
heap
page read and write
29885756000
trusted library allocation
page read and write
298872F7000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
100C000
unkown
page write copy
298FCAF6000
heap
page read and write
298877CD000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298895E7000
trusted library allocation
page read and write
2988E37E000
trusted library allocation
page read and write
29885ACB000
trusted library allocation
page read and write
298877CD000
trusted library allocation
page read and write
29887553000
trusted library allocation
page read and write
298FCAD8000
heap
page read and write
29887AB1000
trusted library allocation
page read and write
29887582000
trusted library allocation
page read and write
29891ADF000
trusted library allocation
page read and write
29883260000
trusted library allocation
page read and write
D460FAE000
unkown
page readonly
298FF12F000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
2988E08E000
trusted library allocation
page read and write
1F7FF4C4000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298FCB34000
heap
page read and write
298877CD000
trusted library allocation
page read and write
29886CE3000
trusted library allocation
page read and write
2988D9AF000
trusted library allocation
page read and write
298877C8000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
29888FE0000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
2988E3AE000
trusted library allocation
page read and write
298FCAFF000
heap
page read and write
298FCACD000
heap
page read and write
2988E18A000
trusted library allocation
page read and write
15B60980000
heap
page read and write
298FFCDD000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29885AB9000
trusted library allocation
page read and write
D460F6E000
stack
page read and write
2988330D000
trusted library allocation
page read and write
20C11E50000
heap
page read and write
2988F905000
trusted library allocation
page read and write
298855A4000
heap
page read and write
298FCAD2000
heap
page read and write
29886F22000
trusted library allocation
page read and write
29890601000
heap
page read and write
29888FF7000
trusted library allocation
page read and write
29885AA9000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
298876E7000
trusted library allocation
page read and write
298895F6000
trusted library allocation
page read and write
1F7FF700000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
29886F33000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
298FEBF8000
trusted library allocation
page read and write
298855A4000
heap
page read and write
298FCAE4000
heap
page read and write
298FCACE000
heap
page read and write
2988739C000
trusted library allocation
page read and write
2988E3AA000
trusted library allocation
page read and write
2988F9EB000
trusted library allocation
page read and write
29888189000
trusted library allocation
page read and write
2988F3FC000
trusted library allocation
page read and write
20C125AA000
heap
page read and write
298FCAE4000
heap
page read and write
298875A0000
trusted library allocation
page read and write
298855B0000
heap
page read and write
298895C3000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
29887E49000
trusted library allocation
page read and write
2988F588000
trusted library allocation
page read and write
2988FE37000
trusted library allocation
page read and write
ED25FE000
stack
page read and write
298877C6000
trusted library allocation
page read and write
298895D0000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298872E3000
trusted library allocation
page read and write
298876D4000
trusted library allocation
page read and write
298877CD000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
2988E3B3000
trusted library allocation
page read and write
20C11848000
trusted library allocation
page read and write
298884D2000
trusted library allocation
page read and write
20C12600000
heap
page read and write
29885AFA000
trusted library allocation
page read and write
24ABB5C9000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
20C1257D000
heap
page read and write
298FCAD2000
heap
page read and write
298875AE000
trusted library allocation
page read and write
298876E7000
trusted library allocation
page read and write
2988E3C4000
trusted library allocation
page read and write
15B60C07000
trusted library allocation
page read and write
298FEB98000
trusted library allocation
page read and write
298875E7000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
29885A58000
trusted library allocation
page read and write
2988DA3C000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298876A3000
trusted library allocation
page read and write
2988E385000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
298890A3000
trusted library allocation
page read and write
20C11812000
trusted library allocation
page read and write
2988E326000
trusted library allocation
page read and write
29886CCC000
trusted library allocation
page read and write
29891A79000
trusted library allocation
page read and write
20C11867000
trusted library allocation
page read and write
298879E2000
trusted library allocation
page read and write
298FFBB4000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
298FCB03000
heap
page read and write
29887AE7000
trusted library allocation
page read and write
29892061000
trusted library allocation
page read and write
1134000
heap
page read and write
298877C6000
trusted library allocation
page read and write
20C118C5000
trusted library allocation
page read and write
2988733C000
trusted library allocation
page read and write
2988F377000
trusted library allocation
page read and write
2988717B000
trusted library allocation
page read and write
298875DF000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
29885F8E000
trusted library allocation
page read and write
20C12400000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
298FCAC4000
heap
page read and write
FAFAF7E000
unkown
page readonly
298833F4000
trusted library allocation
page read and write
298884C2000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
89AD7FE000
stack
page read and write
298884F7000
trusted library allocation
page read and write
D4632BE000
unkown
page readonly
298FCAD4000
heap
page read and write
29888FE0000
trusted library allocation
page read and write
298890C8000
trusted library allocation
page read and write
298876AF000
trusted library allocation
page read and write
298918BA000
trusted library allocation
page read and write
2988E3C2000
trusted library allocation
page read and write
29886F98000
trusted library allocation
page read and write
2988E22C000
trusted library allocation
page read and write
29885A91000
trusted library allocation
page read and write
298FCB27000
heap
page read and write
2988E346000
trusted library allocation
page read and write
29887586000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCB1F000
heap
page read and write
298875CC000
trusted library allocation
page read and write
298873F3000
trusted library allocation
page read and write
29886F22000
trusted library allocation
page read and write
2988758A000
trusted library allocation
page read and write
2988DF4F000
trusted library allocation
page read and write
20C116EF000
unclassified section
page read and write
2988F366000
trusted library allocation
page read and write
298875FB000
trusted library allocation
page read and write
2988F3EA000
trusted library allocation
page read and write
1F7FF0D0000
heap
page read and write
2988754A000
trusted library allocation
page read and write
29891A79000
trusted library allocation
page read and write
298876E7000
trusted library allocation
page read and write
298873E3000
trusted library allocation
page read and write
2988901A000
trusted library allocation
page read and write
298875A9000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAEF000
heap
page read and write
2988332B000
trusted library allocation
page read and write
298895D2000
trusted library allocation
page read and write
29885AB3000
trusted library allocation
page read and write
2988F33C000
trusted library allocation
page read and write
29886C9C000
trusted library allocation
page read and write
2988F908000
trusted library allocation
page read and write
298872F7000
trusted library allocation
page read and write
298881C2000
trusted library allocation
page read and write
29887728000
trusted library allocation
page read and write
298855B0000
heap
page read and write
20C12500000
heap
page read and write
298FCB22000
heap
page read and write
298FFCF6000
trusted library allocation
page read and write
29885AC0000
trusted library allocation
page read and write
15B60D90000
heap
page read and write
298859A5000
trusted library allocation
page read and write
2988F337000
trusted library allocation
page read and write
2988F3EB000
trusted library allocation
page read and write
298881FC000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29887731000
trusted library allocation
page read and write
18BA000
heap
page read and write
298FFC2F000
trusted library allocation
page read and write
29886CBB000
trusted library allocation
page read and write
298885D9000
trusted library allocation
page read and write
29886F67000
trusted library allocation
page read and write
29885ACB000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
298876F9000
trusted library allocation
page read and write
2988F3E1000
trusted library allocation
page read and write
29887AAF000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
20C116E2000
unclassified section
page read and write
298895C6000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
7031FA000
stack
page read and write
298FFB86000
trusted library allocation
page read and write
29886F2F000
trusted library allocation
page read and write
2988763D000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
2988F5C7000
trusted library allocation
page read and write
20C12677000
heap
page read and write
2988FE45000
trusted library allocation
page read and write
29887751000
trusted library allocation
page read and write
29888FD3000
trusted library allocation
page read and write
298872D3000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
15B62545000
heap
page read and write
298876C7000
trusted library allocation
page read and write
2988FE4E000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988598E000
trusted library allocation
page read and write
15B60B00000
trusted library allocation
page read and write
29890601000
heap
page read and write
298FCAF5000
heap
page read and write
29888FF7000
trusted library allocation
page read and write
298877D3000
trusted library allocation
page read and write
29887730000
trusted library allocation
page read and write
298873F8000
trusted library allocation
page read and write
2988F399000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
20C1259C000
heap
page read and write
298873FB000
trusted library allocation
page read and write
2988DA00000
trusted library allocation
page read and write
20C12644000
heap
page read and write
29886FCD000
trusted library allocation
page read and write
20C125E0000
heap
page read and write
29890014000
trusted library allocation
page read and write
298FCAE1000
heap
page read and write
298FCAEF000
heap
page read and write
2988771C000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
2988F3EB000
trusted library allocation
page read and write
29887694000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
298FF21E000
trusted library allocation
page read and write
2988FE41000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCAEF000
heap
page read and write
29883339000
trusted library allocation
page read and write
29887377000
trusted library allocation
page read and write
298F79F7000
heap
page read and write
298FCB1D000
heap
page read and write
20C1185F000
trusted library allocation
page read and write
298876C7000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298873FB000
trusted library allocation
page read and write
298918AB000
trusted library allocation
page read and write
1F7FF510000
heap
page read and write
298FFC24000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
2988DFB5000
trusted library allocation
page read and write
29887761000
trusted library allocation
page read and write
2988776C000
trusted library allocation
page read and write
298875DB000
trusted library allocation
page read and write
298876B7000
trusted library allocation
page read and write
20C125E8000
heap
page read and write
7049FE000
stack
page read and write
298FCAEF000
heap
page read and write
298FF282000
trusted library allocation
page read and write
298876DC000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29885D7C000
trusted library allocation
page read and write
29885A5E000
trusted library allocation
page read and write
2988F49C000
trusted library allocation
page read and write
29886FA9000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCAD5000
heap
page read and write
29891A1C000
trusted library allocation
page read and write
298FCB20000
heap
page read and write
298FCAD4000
heap
page read and write
2988557C000
heap
page read and write
2988F3D4000
trusted library allocation
page read and write
29886FB3000
trusted library allocation
page read and write
18B6000
heap
page read and write
298FCACE000
heap
page read and write
29887761000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
29891A2D000
trusted library allocation
page read and write
2988771C000
trusted library allocation
page read and write
2988E342000
trusted library allocation
page read and write
2988E27F000
trusted library allocation
page read and write
29886C72000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
298FCAD2000
heap
page read and write
298FCAF5000
heap
page read and write
2988766C000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
29887550000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298FCAE3000
heap
page read and write
298FCAF5000
heap
page read and write
29887734000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
2988F39E000
trusted library allocation
page read and write
298876F4000
trusted library allocation
page read and write
298884E1000
trusted library allocation
page read and write
2988702D000
trusted library allocation
page read and write
29885798000
trusted library allocation
page read and write
2988770E000
trusted library allocation
page read and write
2988559C000
heap
page read and write
298875DB000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29885989000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
298FEB9E000
trusted library allocation
page read and write
2988F385000
trusted library allocation
page read and write
29886FAE000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
29885756000
trusted library allocation
page read and write
29887AE7000
trusted library allocation
page read and write
298879F7000
trusted library allocation
page read and write
298873EA000
trusted library allocation
page read and write
29885D43000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298884BE000
trusted library allocation
page read and write
29885D9B000
trusted library allocation
page read and write
298FCAFF000
heap
page read and write
2988F5F4000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29885579000
heap
page read and write
29886CF2000
trusted library allocation
page read and write
298876A5000
trusted library allocation
page read and write
15B62554000
heap
page read and write
2988E35E000
trusted library allocation
page read and write
298877A5000
trusted library allocation
page read and write
20C116C4000
heap
page read and write
298877A5000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988E31B000
trusted library allocation
page read and write
29886FA1000
trusted library allocation
page read and write
2988E3BD000
trusted library allocation
page read and write
298877C9000
trusted library allocation
page read and write
2988E3D6000
trusted library allocation
page read and write
29891A2D000
trusted library allocation
page read and write
298FFBB9000
trusted library allocation
page read and write
2988856E000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCAF5000
heap
page read and write
298FCB1F000
heap
page read and write
298FCAEF000
heap
page read and write
2988755C000
trusted library allocation
page read and write
2988707D000
trusted library allocation
page read and write
18BD000
heap
page read and write
2988776C000
trusted library allocation
page read and write
29887F19000
trusted library allocation
page read and write
29887730000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988E0FE000
trusted library allocation
page read and write
ED2DFE000
unkown
page readonly
20C125E9000
heap
page read and write
298875A9000
trusted library allocation
page read and write
29885F3F000
trusted library allocation
page read and write
298877CD000
trusted library allocation
page read and write
2988F3A6000
trusted library allocation
page read and write
298855A4000
heap
page read and write
29886F15000
trusted library allocation
page read and write
29887048000
trusted library allocation
page read and write
24ABB596000
trusted library allocation
page read and write
29885AC0000
trusted library allocation
page read and write
24ABB19A000
heap
page read and write
29883328000
trusted library allocation
page read and write
298876A3000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
2988D9A2000
trusted library allocation
page read and write
298880ED000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
20C11DE0000
trusted library allocation
page read and write
2988E085000
trusted library allocation
page read and write
29886CBB000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
15B62555000
heap
page read and write
29885F7D000
trusted library allocation
page read and write
298879F2000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
20C125F0000
heap
page read and write
298876E7000
trusted library allocation
page read and write
298891E2000
trusted library allocation
page read and write
29887AFC000
trusted library allocation
page read and write
29885D6F000
trusted library allocation
page read and write
2988F3D5000
trusted library allocation
page read and write
298FFCA6000
trusted library allocation
page read and write
1890000
heap
page read and write
29887570000
trusted library allocation
page read and write
2988FA2C000
trusted library allocation
page read and write
298891E5000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
29886CA4000
trusted library allocation
page read and write
29887AE7000
trusted library allocation
page read and write
1F7FF413000
trusted library allocation
page read and write
298884D8000
trusted library allocation
page read and write
29885DC5000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29891AFB000
trusted library allocation
page read and write
FAF6B1D000
stack
page read and write
298876AD000
trusted library allocation
page read and write
29886F18000
trusted library allocation
page read and write
298878C2000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29885579000
heap
page read and write
298877C3000
trusted library allocation
page read and write
29887AD1000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988F4B7000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAD5000
heap
page read and write
29891A91000
trusted library allocation
page read and write
298875CE000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298FCADB000
heap
page read and write
298FCABE000
heap
page read and write
298FCADE000
heap
page read and write
2988776C000
trusted library allocation
page read and write
298872FD000
trusted library allocation
page read and write
29887557000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
298FCABE000
heap
page read and write
298877BF000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
ED0AAE000
unkown
page readonly
298FCAE7000
heap
page read and write
20C12677000
heap
page read and write
298FCAE3000
heap
page read and write
29887615000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
29887FE2000
trusted library allocation
page read and write
298FCB38000
heap
page read and write
298FCABE000
heap
page read and write
24ABBB40000
heap
page read and write
298FCB1C000
heap
page read and write
2988F5B9000
trusted library allocation
page read and write
2988F908000
trusted library allocation
page read and write
298876AD000
trusted library allocation
page read and write
2988FE66000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
29885A52000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298FCAF5000
heap
page read and write
2988798F000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
298FCAF5000
heap
page read and write
29887699000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
29887690000
trusted library allocation
page read and write
298FCAB5000
heap
page read and write
298873FB000
trusted library allocation
page read and write
2988E12B000
trusted library allocation
page read and write
1014000
unkown
page readonly
298876A1000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAE1000
heap
page read and write
2988771F000
trusted library allocation
page read and write
2989066A000
heap
page read and write
298FEB90000
trusted library allocation
page read and write
298877B5000
trusted library allocation
page read and write
298FFC44000
trusted library allocation
page read and write
298879EC000
trusted library allocation
page read and write
298918CC000
trusted library allocation
page read and write
2988763D000
trusted library allocation
page read and write
20C1185C000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29887749000
trusted library allocation
page read and write
298873FD000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
2988E396000
trusted library allocation
page read and write
29885960000
trusted library allocation
page read and write
298920E6000
trusted library allocation
page read and write
29891A32000
trusted library allocation
page read and write
2988F3FC000
trusted library allocation
page read and write
298FCB38000
heap
page read and write
29885960000
trusted library allocation
page read and write
20C118F3000
trusted library allocation
page read and write
298FFCF3000
trusted library allocation
page read and write
D46327E000
stack
page read and write
298895E7000
trusted library allocation
page read and write
24ABB56E000
trusted library allocation
page read and write
29887AB5000
trusted library allocation
page read and write
24ABB500000
trusted library allocation
page read and write
298875E7000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298895E4000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
298FCAD2000
heap
page read and write
29888176000
trusted library allocation
page read and write
2988FE79000
trusted library allocation
page read and write
298832BF000
trusted library allocation
page read and write
2988E19D000
trusted library allocation
page read and write
298872F4000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298FF2A6000
trusted library allocation
page read and write
29887708000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298918E7000
trusted library allocation
page read and write
2988751B000
trusted library allocation
page read and write
298872F4000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298876DD000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298873F3000
trusted library allocation
page read and write
298832BA000
trusted library allocation
page read and write
298876B2000
trusted library allocation
page read and write
298872B7000
trusted library allocation
page read and write
2988FE20000
trusted library allocation
page read and write
2988F3C4000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
29887FC6000
trusted library allocation
page read and write
298872F7000
trusted library allocation
page read and write
FAF9EFE000
unkown
page readonly
29887705000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
29885D16000
trusted library allocation
page read and write
298FCAD3000
heap
page read and write
2988F446000
trusted library allocation
page read and write
18D7000
heap
page read and write
20C12501000
heap
page read and write
298FCAC4000
heap
page read and write
298876DC000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
FAF85FE000
stack
page read and write
298FCAF5000
heap
page read and write
298891DB000
trusted library allocation
page read and write
2988F3F6000
trusted library allocation
page read and write
2988575C000
trusted library allocation
page read and write
2988559E000
heap
page read and write
29887173000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
298875EC000
trusted library allocation
page read and write
298871E8000
trusted library allocation
page read and write
29885D56000
trusted library allocation
page read and write
2988F9FE000
trusted library allocation
page read and write
29889061000
trusted library allocation
page read and write
2988E1EB000
trusted library allocation
page read and write
298872ED000
trusted library allocation
page read and write
29889147000
trusted library allocation
page read and write
29885AC8000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
29890A02000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAF8000
heap
page read and write
2988F3E3000
trusted library allocation
page read and write
29887588000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
20C12644000
heap
page read and write
298875FB000
trusted library allocation
page read and write
298918FD000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298FFAD0000
trusted library allocation
page read and write
298877C6000
trusted library allocation
page read and write
298FF950000
trusted library allocation
page read and write
29891842000
trusted library allocation
page read and write
298876C7000
trusted library allocation
page read and write
298876F5000
trusted library allocation
page read and write
18CE000
heap
page read and write
298FCAD6000
heap
page read and write
FAFBF7E000
unkown
page readonly
298FF2B9000
trusted library allocation
page read and write
29887543000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
29887175000
trusted library allocation
page read and write
2988F341000
trusted library allocation
page read and write
298FCACE000
heap
page read and write
2988760A000
trusted library allocation
page read and write
29889570000
trusted library allocation
page read and write
298873D6000
trusted library allocation
page read and write
24ABB52E000
trusted library allocation
page read and write
298FCAE1000
heap
page read and write
298FCB34000
heap
page read and write
298FCB2E000
heap
page read and write
298FCAF8000
heap
page read and write
2989002D000
trusted library allocation
page read and write
FAF9F7E000
unkown
page readonly
298FCAE5000
heap
page read and write
2988599E000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
29887690000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
7041FE000
stack
page read and write
298881AA000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298FF9DB000
trusted library allocation
page read and write
1F7FF1D0000
heap
page read and write
D463ABE000
stack
page read and write
298FCAE4000
heap
page read and write
2988F5F0000
trusted library allocation
page read and write
29888189000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
2988579A000
trusted library allocation
page read and write
20C11DDD000
unkown
page execute read
298885D7000
trusted library allocation
page read and write
298FCB33000
heap
page read and write
298FCAD2000
heap
page read and write
298877C6000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
29885A9D000
trusted library allocation
page read and write
2988753F000
trusted library allocation
page read and write
29885AC0000
trusted library allocation
page read and write
29887519000
trusted library allocation
page read and write
298FCAF0000
heap
page read and write
298FCAEA000
heap
page read and write
24ABB6A0000
heap
page read and write
20C1180C000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
24ABB57E000
trusted library allocation
page read and write
2988F3AD000
trusted library allocation
page read and write
2988E088000
trusted library allocation
page read and write
20C12658000
heap
page read and write
298FCAC0000
heap
page read and write
298FCACE000
heap
page read and write
298FCB1C000
heap
page read and write
24ABB2F0000
heap
page readonly
2988757C000
trusted library allocation
page read and write
298833F4000
trusted library allocation
page read and write
2988F5CA000
trusted library allocation
page read and write
2988F3E6000
trusted library allocation
page read and write
298873D5000
trusted library allocation
page read and write
29888FD3000
trusted library allocation
page read and write
298877CD000
trusted library allocation
page read and write
298884AE000
trusted library allocation
page read and write
2988E0A6000
trusted library allocation
page read and write
29886FA9000
trusted library allocation
page read and write
298890CC000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988776C000
trusted library allocation
page read and write
298FFC20000
trusted library allocation
page read and write
298876B6000
trusted library allocation
page read and write
29886F7B000
trusted library allocation
page read and write
1F7FF4B2000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
24ABB567000
trusted library allocation
page read and write
20C125E8000
heap
page read and write
29889576000
trusted library allocation
page read and write
29891A8E000
trusted library allocation
page read and write
2988E0AC000
trusted library allocation
page read and write
20C125E8000
heap
page read and write
298833C8000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
2988DFF3000
trusted library allocation
page read and write
29886CC2000
trusted library allocation
page read and write
2988F5C0000
trusted library allocation
page read and write
298875DD000
trusted library allocation
page read and write
29885AA9000
trusted library allocation
page read and write
20C12658000
heap
page read and write
298877AC000
trusted library allocation
page read and write
298FEDF1000
trusted library allocation
page read and write
298FFCC1000
trusted library allocation
page read and write
298FF9DB000
trusted library allocation
page read and write
29885AB9000
trusted library allocation
page read and write
29886CA7000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FFCF6000
trusted library allocation
page read and write
15B62700000
heap
page read and write
ED0B2E000
unkown
page readonly
2988913A000
trusted library allocation
page read and write
29887759000
trusted library allocation
page read and write
29887ADD000
trusted library allocation
page read and write
298877B7000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298FCAF5000
heap
page read and write
298855A2000
heap
page read and write
20C12560000
heap
page read and write
15B60A70000
heap
page read and write
20C1262A000
heap
page read and write
298FCAD6000
heap
page read and write
2988FE41000
trusted library allocation
page read and write
2988777E000
trusted library allocation
page read and write
2988E1EB000
trusted library allocation
page read and write
298895B6000
trusted library allocation
page read and write
29887726000
trusted library allocation
page read and write
298876B2000
trusted library allocation
page read and write
2988559C000
heap
page read and write
298918D4000
trusted library allocation
page read and write
298FEB7F000
trusted library allocation
page read and write
298873F8000
trusted library allocation
page read and write
298FFA1E000
trusted library allocation
page read and write
298875D4000
trusted library allocation
page read and write
2988F94D000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
29890688000
heap
page read and write
29887633000
trusted library allocation
page read and write
29888181000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
298FCAD8000
heap
page read and write
20C12644000
heap
page read and write
298877BA000
trusted library allocation
page read and write
298876B2000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FCAEB000
heap
page read and write
1F7FF707000
trusted library allocation
page read and write
29885778000
trusted library allocation
page read and write
2988F598000
trusted library allocation
page read and write
29885A49000
trusted library allocation
page read and write
29886CDD000
trusted library allocation
page read and write
29887AB5000
trusted library allocation
page read and write
29885A8E000
trusted library allocation
page read and write
2988819E000
trusted library allocation
page read and write
29885AAB000
trusted library allocation
page read and write
298878B1000
trusted library allocation
page read and write
298855A1000
heap
page read and write
2988758A000
trusted library allocation
page read and write
298879FA000
trusted library allocation
page read and write
298FFCEB000
trusted library allocation
page read and write
29885589000
heap
page read and write
29887557000
trusted library allocation
page read and write
29886F3C000
trusted library allocation
page read and write
29887F67000
trusted library allocation
page read and write
29885955000
trusted library allocation
page read and write
15B6254E000
heap
page read and write
2988E133000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
298FCAD2000
heap
page read and write
298FCB34000
heap
page read and write
298FCAF5000
heap
page read and write
29889172000
trusted library allocation
page read and write
2988FE59000
trusted library allocation
page read and write
29885579000
heap
page read and write
29887519000
trusted library allocation
page read and write
298FCAD5000
heap
page read and write
29887768000
trusted library allocation
page read and write
ED363E000
stack
page read and write
298FCAF5000
heap
page read and write
2988E3C2000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
29891A1A000
trusted library allocation
page read and write
29891AFB000
trusted library allocation
page read and write
298879B1000
trusted library allocation
page read and write
29891A85000
trusted library allocation
page read and write
1F7FF430000
trusted library allocation
page read and write
2988F3CA000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298881FC000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
2988771C000
trusted library allocation
page read and write
298FCAE1000
heap
page read and write
29891A93000
trusted library allocation
page read and write
2988F95C000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
29887653000
trusted library allocation
page read and write
24ABB5EB000
trusted library allocation
page read and write
2988E383000
trusted library allocation
page read and write
2988559C000
heap
page read and write
2988F9A7000
trusted library allocation
page read and write
29887588000
trusted library allocation
page read and write
2988F3A6000
trusted library allocation
page read and write
2988756A000
trusted library allocation
page read and write
298873B5000
trusted library allocation
page read and write
2988798F000
trusted library allocation
page read and write
29886CDD000
trusted library allocation
page read and write
29887AE7000
trusted library allocation
page read and write
24ABB5CB000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
298FFCBE000
trusted library allocation
page read and write
2988754B000
trusted library allocation
page read and write
2988F8A3000
trusted library allocation
page read and write
2988754A000
trusted library allocation
page read and write
2988E1E1000
trusted library allocation
page read and write
29886FC3000
trusted library allocation
page read and write
20C1266A000
heap
page read and write
29885961000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
298918B7000
trusted library allocation
page read and write
298FCABD000
heap
page read and write
298873D5000
trusted library allocation
page read and write
298876CC000
trusted library allocation
page read and write
298FCAE0000
heap
page read and write
1F7FF4B8000
trusted library allocation
page read and write
29890000000
trusted library allocation
page read and write
20C114F0000
unclassified section
page readonly
29887665000
trusted library allocation
page read and write
20C125E1000
heap
page read and write
29885772000
trusted library allocation
page read and write
29889059000
trusted library allocation
page read and write
2988E06B000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
2988FEB4000
trusted library allocation
page read and write
298876C7000
trusted library allocation
page read and write
298FF300000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
2988750B000
trusted library allocation
page read and write
2988E353000
trusted library allocation
page read and write
2988F448000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988E385000
trusted library allocation
page read and write
2988E323000
trusted library allocation
page read and write
2988F9A2000
trusted library allocation
page read and write
29885AB9000
trusted library allocation
page read and write
298FCAC3000
heap
page read and write
298875FB000
trusted library allocation
page read and write
298878C9000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298FCAD5000
heap
page read and write
2988598C000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988E0A6000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
2270000
heap
page read and write
29887665000
trusted library allocation
page read and write
20C125F0000
heap
page read and write
298FCAD2000
heap
page read and write
2988770E000
trusted library allocation
page read and write
24ABB5B7000
trusted library allocation
page read and write
2988557E000
heap
page read and write
2988F3EB000
trusted library allocation
page read and write
2988955C000
trusted library allocation
page read and write
298FCAA8000
heap
page read and write
298855A2000
heap
page read and write
2988E3C4000
trusted library allocation
page read and write
298FFCBE000
trusted library allocation
page read and write
2989064E000
heap
page read and write
298FCADC000
heap
page read and write
298872E9000
trusted library allocation
page read and write
29887071000
trusted library allocation
page read and write
2988F424000
trusted library allocation
page read and write
29887FDB000
trusted library allocation
page read and write
1F7FF29F000
unclassified section
page read and write
29886F43000
trusted library allocation
page read and write
298879F1000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
20C1182F000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
2988E110000
trusted library allocation
page read and write
298876DC000
trusted library allocation
page read and write
298FCAC3000
heap
page read and write
2988DF41000
trusted library allocation
page read and write
1F7FF40C000
trusted library allocation
page read and write
298875E0000
trusted library allocation
page read and write
29885AAD000
trusted library allocation
page read and write
2988794B000
trusted library allocation
page read and write
298875DB000
trusted library allocation
page read and write
298880CA000
trusted library allocation
page read and write
29887726000
trusted library allocation
page read and write
29885D46000
trusted library allocation
page read and write
1F7FF417000
trusted library allocation
page read and write
24ABB703000
trusted library allocation
page read and write
7061FE000
stack
page read and write
298FCAC4000
heap
page read and write
29886C72000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCAE4000
heap
page read and write
298FCAD8000
heap
page read and write
298FCAD4000
heap
page read and write
29887535000
trusted library allocation
page read and write
20C11810000
trusted library allocation
page read and write
298855D7000
heap
page read and write
29891C2F000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
2988E37A000
trusted library allocation
page read and write
2988E1D0000
trusted library allocation
page read and write
20C125E0000
heap
page read and write
29887583000
trusted library allocation
page read and write
298FCB31000
heap
page read and write
2988F4E7000
trusted library allocation
page read and write
29890056000
trusted library allocation
page read and write
29887AB5000
trusted library allocation
page read and write
298875DD000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
298FEBA5000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
2988F5B1000
trusted library allocation
page read and write
298891A8000
trusted library allocation
page read and write
298875D4000
trusted library allocation
page read and write
ED463E000
stack
page read and write
298876DC000
trusted library allocation
page read and write
29885A6C000
trusted library allocation
page read and write
2988F935000
trusted library allocation
page read and write
29889521000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298FCB24000
heap
page read and write
ED0BAE000
unkown
page readonly
20C11530000
heap
page read and write
298873D1000
trusted library allocation
page read and write
298FFAF7000
trusted library allocation
page read and write
298FF2A6000
trusted library allocation
page read and write
298FFD39000
trusted library allocation
page read and write
298FF950000
trusted library allocation
page read and write
298884D2000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
298895BD000
trusted library allocation
page read and write
298879FA000
trusted library allocation
page read and write
18B8000
heap
page read and write
298FCAFA000
heap
page read and write
298890FD000
trusted library allocation
page read and write
20C11480000
unclassified section
page readonly
298871FA000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298FCAF1000
heap
page read and write
298FF266000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FF92C000
trusted library allocation
page read and write
2988E0AC000
trusted library allocation
page read and write
29885F4C000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988E1F5000
trusted library allocation
page read and write
298880FA000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298881EE000
trusted library allocation
page read and write
29885589000
heap
page read and write
6187801000
trusted library allocation
page execute read
298FCAE3000
heap
page read and write
298875F4000
trusted library allocation
page read and write
298875EE000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
2988E397000
trusted library allocation
page read and write
2988F3E3000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
24ABB190000
heap
page read and write
29887699000
trusted library allocation
page read and write
29887031000
trusted library allocation
page read and write
2988E3E0000
trusted library allocation
page read and write
29887784000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
2988E349000
trusted library allocation
page read and write
2988F3E1000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
29891A51000
trusted library allocation
page read and write
2988761E000
trusted library allocation
page read and write
298875F4000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
2988F3F2000
trusted library allocation
page read and write
20C125E3000
heap
page read and write
298FCAE5000
heap
page read and write
20C125E6000
heap
page read and write
2988DA16000
trusted library allocation
page read and write
29888FAF000
trusted library allocation
page read and write
298855B0000
heap
page read and write
298890A0000
trusted library allocation
page read and write
29887731000
trusted library allocation
page read and write
29887562000
trusted library allocation
page read and write
298FFBF8000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
ED3E3E000
unkown
page readonly
2988F95C000
trusted library allocation
page read and write
29887577000
trusted library allocation
page read and write
298871C3000
trusted library allocation
page read and write
298FF9F1000
trusted library allocation
page read and write
2988F39E000
trusted library allocation
page read and write
1898000
heap
page read and write
298FFC88000
trusted library allocation
page read and write
29885A87000
trusted library allocation
page read and write
298FF2A7000
trusted library allocation
page read and write
3F50000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
29887AA3000
trusted library allocation
page read and write
FAF8E7E000
unkown
page readonly
29887665000
trusted library allocation
page read and write
298FFC57000
trusted library allocation
page read and write
2988E3AB000
trusted library allocation
page read and write
2988E09F000
trusted library allocation
page read and write
215F000
stack
page read and write
298876D4000
trusted library allocation
page read and write
298FCADB000
heap
page read and write
2988E0BE000
trusted library allocation
page read and write
298FFCDD000
trusted library allocation
page read and write
298877B0000
trusted library allocation
page read and write
298877BC000
trusted library allocation
page read and write
2988E226000
trusted library allocation
page read and write
2988DFB5000
trusted library allocation
page read and write
298875E7000
trusted library allocation
page read and write
298875FE000
trusted library allocation
page read and write
298918D4000
trusted library allocation
page read and write
20C12677000
heap
page read and write
298872E3000
trusted library allocation
page read and write
29885985000
trusted library allocation
page read and write
298879F1000
trusted library allocation
page read and write
29887714000
trusted library allocation
page read and write
298895E4000
trusted library allocation
page read and write
298855B3000
heap
page read and write
29887694000
trusted library allocation
page read and write
2988E3AA000
trusted library allocation
page read and write
298FEB98000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
29887667000
trusted library allocation
page read and write
298FFCC7000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
298FCAF8000
heap
page read and write
298FFAB9000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FEB57000
trusted library allocation
page read and write
24ABB598000
trusted library allocation
page read and write
2988F4CF000
trusted library allocation
page read and write
2988E3D6000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298875D2000
trusted library allocation
page read and write
20C125E6000
heap
page read and write
298877C9000
trusted library allocation
page read and write
298855B0000
heap
page read and write
298895C6000
trusted library allocation
page read and write
298857AD000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298FCAEF000
heap
page read and write
298FCAD2000
heap
page read and write
298855A4000
heap
page read and write
29891897000
trusted library allocation
page read and write
298885D3000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988703A000
trusted library allocation
page read and write
298FFCDD000
trusted library allocation
page read and write
298FCAF1000
heap
page read and write
298FCAF5000
heap
page read and write
29887AE3000
trusted library allocation
page read and write
298875D4000
trusted library allocation
page read and write
29891839000
trusted library allocation
page read and write
1F7FF474000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29886FC2000
trusted library allocation
page read and write
2988E3EC000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298877FE000
trusted library allocation
page read and write
29888FCA000
trusted library allocation
page read and write
29885F50000
trusted library allocation
page read and write
298FFCC1000
trusted library allocation
page read and write
2988F444000
trusted library allocation
page read and write
2988E3BF000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
29885AAF000
trusted library allocation
page read and write
298872DA000
trusted library allocation
page read and write
20C12560000
heap
page read and write
298877BE000
trusted library allocation
page read and write
298918C3000
trusted library allocation
page read and write
2988F3D5000
trusted library allocation
page read and write
298FCADC000
heap
page read and write
1134000
heap
page read and write
117E000
stack
page read and write
298FCAF5000
heap
page read and write
298873FD000
trusted library allocation
page read and write
1F7FF40E000
trusted library allocation
page read and write
298F7A17000
heap
page read and write
29883217000
trusted library allocation
page read and write
298FFBF0000
trusted library allocation
page read and write
29887289000
trusted library allocation
page read and write
298879B1000
trusted library allocation
page read and write
2988847F000
trusted library allocation
page read and write
15B60AB0000
heap
page read and write
29886CB9000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298857EF000
trusted library allocation
page read and write
2988755C000
trusted library allocation
page read and write
27077307000
trusted library allocation
page read and write
2988711E000
trusted library allocation
page read and write
2988E249000
trusted library allocation
page read and write
20C12659000
heap
page read and write
298FCAF1000
heap
page read and write
29891000000
trusted library allocation
page read and write
2988813D000
trusted library allocation
page read and write
29885AA0000
trusted library allocation
page read and write
298890F5000
trusted library allocation
page read and write
29887759000
trusted library allocation
page read and write
298918C3000
trusted library allocation
page read and write
298876B4000
trusted library allocation
page read and write
2988758A000
trusted library allocation
page read and write
2988E1F7000
trusted library allocation
page read and write
298875A9000
trusted library allocation
page read and write
2988D9D8000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988F940000
trusted library allocation
page read and write
298857E8000
trusted library allocation
page read and write
29887AD3000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCB1C000
heap
page read and write
298FF9F1000
trusted library allocation
page read and write
2988F986000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298FFA1C000
trusted library allocation
page read and write
29886F33000
trusted library allocation
page read and write
298FCB1D000
heap
page read and write
298FCAC9000
heap
page read and write
298FCB36000
heap
page read and write
29886FA9000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
20C12010000
heap
page read and write
29891A7B000
trusted library allocation
page read and write
2988952E000
trusted library allocation
page read and write
29883320000
trusted library allocation
page read and write
2988758A000
trusted library allocation
page read and write
298875D2000
trusted library allocation
page read and write
2988F5BC000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298881C2000
trusted library allocation
page read and write
298FCAA4000
heap
page read and write
298FEB85000
trusted library allocation
page read and write
2988711E000
trusted library allocation
page read and write
20C1255C000
heap
page read and write
29887AB6000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
2988F3C4000
trusted library allocation
page read and write
2988956D000
trusted library allocation
page read and write
29887AD3000
trusted library allocation
page read and write
29886FA1000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
29886CA6000
trusted library allocation
page read and write
298FFA55000
trusted library allocation
page read and write
29886CC7000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
298890D6000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
29885ACB000
trusted library allocation
page read and write
298FF96C000
trusted library allocation
page read and write
298FCAE3000
heap
page read and write
298859A5000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
2988FE66000
trusted library allocation
page read and write
2988753F000
trusted library allocation
page read and write
29887729000
trusted library allocation
page read and write
29886F82000
trusted library allocation
page read and write
298FCAD9000
heap
page read and write
24ABB569000
trusted library allocation
page read and write
2988F3C9000
trusted library allocation
page read and write
298918EB000
trusted library allocation
page read and write
2988751B000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298875F5000
trusted library allocation
page read and write
29886CA8000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
20C125E3000
heap
page read and write
298832DC000
trusted library allocation
page read and write
2988918B000
trusted library allocation
page read and write
29887AD1000
trusted library allocation
page read and write
2988E385000
trusted library allocation
page read and write
2988F37F000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29885587000
heap
page read and write
298FCAD7000
heap
page read and write
298890ED000
trusted library allocation
page read and write
29885D37000
trusted library allocation
page read and write
298876B7000
trusted library allocation
page read and write
2988F9C3000
trusted library allocation
page read and write
2988FE79000
trusted library allocation
page read and write
29887B1B000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCB1C000
heap
page read and write
29885DE5000
trusted library allocation
page read and write
2988576C000
trusted library allocation
page read and write
298879D8000
trusted library allocation
page read and write
1134000
heap
page read and write
298875FB000
trusted library allocation
page read and write
298FF226000
trusted library allocation
page read and write
298857EC000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298879E7000
trusted library allocation
page read and write
298879F1000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29886F4B000
trusted library allocation
page read and write
29883309000
trusted library allocation
page read and write
2988852E000
trusted library allocation
page read and write
298855A4000
heap
page read and write
2988763C000
trusted library allocation
page read and write
29886F42000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
29885738000
trusted library allocation
page read and write
298833F1000
trusted library allocation
page read and write
298879E2000
trusted library allocation
page read and write
298920FC000
trusted library allocation
page read and write
ED0AEC000
stack
page read and write
29885D48000
trusted library allocation
page read and write
29887759000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
29890601000
heap
page read and write
2988E3F7000
trusted library allocation
page read and write
1134000
heap
page read and write
298FCAEF000
heap
page read and write
298FFC8C000
trusted library allocation
page read and write
298FCAB1000
heap
page read and write
298FCB1F000
heap
page read and write
298FFCBE000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298877CD000
trusted library allocation
page read and write
2988F3D4000
trusted library allocation
page read and write
2988FA33000
trusted library allocation
page read and write
24ABB59D000
trusted library allocation
page read and write
2988706E000
trusted library allocation
page read and write
29885DD0000
trusted library allocation
page read and write
29887699000
trusted library allocation
page read and write
298FFAFA000
trusted library allocation
page read and write
2988F5C7000
trusted library allocation
page read and write
29887759000
trusted library allocation
page read and write
298FCB34000
heap
page read and write
29888200000
trusted library allocation
page read and write
29885AD1000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
29886FBE000
trusted library allocation
page read and write
29887513000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
20C12677000
heap
page read and write
298877A5000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298879D8000
trusted library allocation
page read and write
24ABB720000
trusted library allocation
page read and write
298872AA000
trusted library allocation
page read and write
298873F6000
trusted library allocation
page read and write
298FCACE000
heap
page read and write
298855A4000
heap
page read and write
29885F8B000
trusted library allocation
page read and write
29887513000
trusted library allocation
page read and write
298871E9000
trusted library allocation
page read and write
298FFCAC000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
2988578E000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
2988E0AC000
trusted library allocation
page read and write
1F7FF411000
trusted library allocation
page read and write
20C1255C000
heap
page read and write
2988F3AD000
trusted library allocation
page read and write
2988F353000
trusted library allocation
page read and write
29887AD3000
trusted library allocation
page read and write
2988777C000
trusted library allocation
page read and write
2988753E000
trusted library allocation
page read and write
29886FB3000
trusted library allocation
page read and write
298FCAFA000
heap
page read and write
1F7FF424000
trusted library allocation
page read and write
298872FD000
trusted library allocation
page read and write
298875F5000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
2988FE31000
trusted library allocation
page read and write
298876D4000
trusted library allocation
page read and write
298FF2A4000
trusted library allocation
page read and write
1010000
unkown
page write copy
29887E64000
trusted library allocation
page read and write
18CE000
heap
page read and write
2988FE59000
trusted library allocation
page read and write
298879DC000
trusted library allocation
page read and write
298879AE000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29887EA5000
trusted library allocation
page read and write
24ABB320000
heap
page read and write
298FFC26000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
29885F96000
trusted library allocation
page read and write
298891A8000
trusted library allocation
page read and write
20C1240F000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
2988591F000
trusted library allocation
page read and write
29885A93000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
29887718000
trusted library allocation
page read and write
2988557E000
heap
page read and write
298859A5000
trusted library allocation
page read and write
2988F399000
trusted library allocation
page read and write
FAFA77E000
stack
page read and write
298FCAF8000
heap
page read and write
298FCADC000
heap
page read and write
2988F3E1000
trusted library allocation
page read and write
298877C8000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
298855A1000
heap
page read and write
29885589000
heap
page read and write
29885ACB000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
298FCAE4000
heap
page read and write
2988760A000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29885ACB000
trusted library allocation
page read and write
29887690000
trusted library allocation
page read and write
29886F96000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298871E4000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29886F33000
trusted library allocation
page read and write
20C12509000
heap
page read and write
2988594F000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
298881E6000
trusted library allocation
page read and write
29889541000
trusted library allocation
page read and write
24ABB572000
trusted library allocation
page read and write
2988728D000
trusted library allocation
page read and write
29891A91000
trusted library allocation
page read and write
29890E80000
trusted library allocation
page read and write
298895BD000
trusted library allocation
page read and write
18BE000
heap
page read and write
298FFCA1000
trusted library allocation
page read and write
298F7A04000
heap
page read and write
298FEBD7000
trusted library allocation
page read and write
2988F3A2000
trusted library allocation
page read and write
29890601000
heap
page read and write
29887769000
trusted library allocation
page read and write
298880FA000
trusted library allocation
page read and write
20C125F0000
heap
page read and write
29891C84000
trusted library allocation
page read and write
298876E0000
trusted library allocation
page read and write
29886FB9000
trusted library allocation
page read and write
2988E3E9000
trusted library allocation
page read and write
29885A73000
trusted library allocation
page read and write
29885711000
trusted library allocation
page read and write
29891ADF000
trusted library allocation
page read and write
2988F3D1000
trusted library allocation
page read and write
24ABB510000
trusted library allocation
page read and write
298877A5000
trusted library allocation
page read and write
298876E7000
trusted library allocation
page read and write
298FCADD000
heap
page read and write
298FCB24000
heap
page read and write
F40000
unkown
page readonly
29888195000
trusted library allocation
page read and write
2988F4BB000
trusted library allocation
page read and write
29887768000
trusted library allocation
page read and write
298833C8000
trusted library allocation
page read and write
298875DF000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
298FCACE000
heap
page read and write
298FCAF5000
heap
page read and write
2988F3E1000
trusted library allocation
page read and write
298876A9000
trusted library allocation
page read and write
2988FA2E000
trusted library allocation
page read and write
298FCAD4000
heap
page read and write
29891A7B000
trusted library allocation
page read and write
298857E8000
trusted library allocation
page read and write
27076FC0000
heap
page read and write
298FCB28000
heap
page read and write
2989066A000
heap
page read and write
298FFCF6000
trusted library allocation
page read and write
29886F18000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
2988778C000
trusted library allocation
page read and write
29891A8E000
trusted library allocation
page read and write
298873FD000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
298833CF000
trusted library allocation
page read and write
29891A85000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FFC42000
trusted library allocation
page read and write
29885589000
heap
page read and write
298FCAF5000
heap
page read and write
298FCB28000
heap
page read and write
298FCAE4000
heap
page read and write
298FCAE4000
heap
page read and write
298FCAEE000
heap
page read and write
2988559C000
heap
page read and write
29887665000
trusted library allocation
page read and write
298918FD000
trusted library allocation
page read and write
29885ADA000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298885D5000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
29885AD7000
trusted library allocation
page read and write
2988593F000
trusted library allocation
page read and write
29886F15000
trusted library allocation
page read and write
15B60D95000
heap
page read and write
298857E2000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
29883325000
trusted library allocation
page read and write
29887AD3000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298875B5000
trusted library allocation
page read and write
29891ACA000
trusted library allocation
page read and write
298881E0000
trusted library allocation
page read and write
298875F1000
trusted library allocation
page read and write
2988E080000
trusted library allocation
page read and write
298FCB22000
heap
page read and write
298920FE000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
298872CE000
trusted library allocation
page read and write
2988717B000
trusted library allocation
page read and write
298FF9DB000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29890800000
trusted library allocation
page read and write
298FFA9F000
trusted library allocation
page read and write
29887377000
trusted library allocation
page read and write
2988849B000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
29887074000
trusted library allocation
page read and write
29887714000
trusted library allocation
page read and write
298FCB28000
heap
page read and write
298895C8000
trusted library allocation
page read and write
2988F4B5000
trusted library allocation
page read and write
298FFD35000
trusted library allocation
page read and write
29887751000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
29887115000
trusted library allocation
page read and write
298FEBBF000
trusted library allocation
page read and write
2988F38F000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29887AFC000
trusted library allocation
page read and write
2988F383000
trusted library allocation
page read and write
298FFCC7000
trusted library allocation
page read and write
1130000
heap
page read and write
29887AB1000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
29887FAB000
trusted library allocation
page read and write
29887696000
trusted library allocation
page read and write
2988757C000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
2988595C000
trusted library allocation
page read and write
ED4E3E000
unkown
page readonly
298FCAD2000
heap
page read and write
298877D1000
trusted library allocation
page read and write
1F7FF300000
trusted library allocation
page read and write
2988812C000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
29887913000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
11DE000
stack
page read and write
298FCADA000
heap
page read and write
2988E3BD000
trusted library allocation
page read and write
298884F7000
trusted library allocation
page read and write
FAF6BD8000
stack
page read and write
298872F7000
trusted library allocation
page read and write
298FFC9D000
trusted library allocation
page read and write
29886CA6000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
298F79F4000
heap
page read and write
298FFBA1000
trusted library allocation
page read and write
2988753B000
trusted library allocation
page read and write
298FFBD7000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
298FCB2E000
heap
page read and write
2988819A000
trusted library allocation
page read and write
29886C75000
trusted library allocation
page read and write
298875B5000
trusted library allocation
page read and write
1134000
heap
page read and write
298FCAE5000
heap
page read and write
2988E211000
trusted library allocation
page read and write
2988578C000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
298875A0000
trusted library allocation
page read and write
298876D4000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCB24000
heap
page read and write
298FCAF5000
heap
page read and write
29888FEE000
trusted library allocation
page read and write
2988F3FA000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29885589000
heap
page read and write
20C125F0000
heap
page read and write
298855A4000
heap
page read and write
2988954C000
trusted library allocation
page read and write
29887570000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
298875F4000
trusted library allocation
page read and write
298FCB1C000
heap
page read and write
20C1266A000
heap
page read and write
2988E26E000
trusted library allocation
page read and write
7059FF000
stack
page read and write
298FCAF5000
heap
page read and write
298FCADF000
heap
page read and write
29885AC5000
trusted library allocation
page read and write
298FCABD000
heap
page read and write
298FCAF1000
heap
page read and write
29891AD4000
trusted library allocation
page read and write
298878D2000
trusted library allocation
page read and write
29887AE4000
trusted library allocation
page read and write
298855B1000
heap
page read and write
298872FD000
trusted library allocation
page read and write
29887AD1000
trusted library allocation
page read and write
29886F40000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29888FAF000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
3E51000
heap
page read and write
2988905D000
trusted library allocation
page read and write
2988953A000
trusted library allocation
page read and write
298FFC98000
trusted library allocation
page read and write
29887AB6000
trusted library allocation
page read and write
298FFCEB000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298879CD000
trusted library allocation
page read and write
2988766C000
trusted library allocation
page read and write
298FEB81000
trusted library allocation
page read and write
29886CE3000
trusted library allocation
page read and write
298879F9000
trusted library allocation
page read and write
FAF75D8000
stack
page read and write
298FCAF5000
heap
page read and write
29886C70000
trusted library allocation
page read and write
29888FEE000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAC4000
heap
page read and write
2988F3AF000
trusted library allocation
page read and write
15B60AD0000
heap
page read and write
298FCAD1000
heap
page read and write
2988798F000
trusted library allocation
page read and write
298FFC96000
trusted library allocation
page read and write
298876C2000
trusted library allocation
page read and write
2988599E000
trusted library allocation
page read and write
29887699000
trusted library allocation
page read and write
2988E07B000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
298872F2000
trusted library allocation
page read and write
29888587000
trusted library allocation
page read and write
298890D4000
trusted library allocation
page read and write
2988F5BE000
trusted library allocation
page read and write
2988F943000
trusted library allocation
page read and write
2988E3F7000
trusted library allocation
page read and write
298FCAC0000
heap
page read and write
298920C5000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
1F7FF80C000
trusted library allocation
page read and write
298881BE000
trusted library allocation
page read and write
2988918B000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298FCAA4000
heap
page read and write
298FCAE1000
heap
page read and write
298876DC000
trusted library allocation
page read and write
298877D1000
trusted library allocation
page read and write
2988F4F9000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
2988733C000
trusted library allocation
page read and write
2988335F000
trusted library allocation
page read and write
2988DF24000
trusted library allocation
page read and write
2988F5B8000
trusted library allocation
page read and write
298FFA69000
trusted library allocation
page read and write
15B60A6A000
heap
page read and write
298FFCC7000
trusted library allocation
page read and write
2988E3B3000
trusted library allocation
page read and write
29886FC2000
trusted library allocation
page read and write
298884AE000
trusted library allocation
page read and write
298FCB1F000
heap
page read and write
6187811000
trusted library allocation
page execute read
2988F39B000
trusted library allocation
page read and write
298875CC000
trusted library allocation
page read and write
29885AAF000
trusted library allocation
page read and write
3E51000
heap
page read and write
298FCB20000
heap
page read and write
2988E23F000
trusted library allocation
page read and write
298879EA000
trusted library allocation
page read and write
17EF000
stack
page read and write
29887AE7000
trusted library allocation
page read and write
2988E3E4000
trusted library allocation
page read and write
20C12569000
heap
page read and write
29888FF7000
trusted library allocation
page read and write
29887AD1000
trusted library allocation
page read and write
298877FE000
trusted library allocation
page read and write
2988DFF3000
trusted library allocation
page read and write
298873F8000
trusted library allocation
page read and write
298FFC81000
trusted library allocation
page read and write
2988F3A4000
trusted library allocation
page read and write
29888FC5000
trusted library allocation
page read and write
29885A8E000
trusted library allocation
page read and write
2988557C000
heap
page read and write
298FCAF8000
heap
page read and write
2988F36C000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298FCACF000
heap
page read and write
2988599E000
trusted library allocation
page read and write
298895C8000
trusted library allocation
page read and write
29885AFA000
trusted library allocation
page read and write
298FCAE4000
heap
page read and write
298FCADB000
heap
page read and write
298FF9DF000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
298918E7000
trusted library allocation
page read and write
29885A87000
trusted library allocation
page read and write
298FFC9D000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCABE000
heap
page read and write
298FCAF6000
heap
page read and write
298857E2000
trusted library allocation
page read and write
20C1256C000
heap
page read and write
15B62559000
heap
page read and write
1F7FF20A000
heap
page read and write
298FCAD2000
heap
page read and write
298FCADD000
heap
page read and write
298876F4000
trusted library allocation
page read and write
2988853E000
trusted library allocation
page read and write
17CF000
stack
page read and write
2988599E000
trusted library allocation
page read and write
29889111000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29886FAD000
trusted library allocation
page read and write
298879E7000
trusted library allocation
page read and write
29887675000
trusted library allocation
page read and write
298877B5000
trusted library allocation
page read and write
2988F3F8000
trusted library allocation
page read and write
298FCAE7000
heap
page read and write
298FCAEF000
heap
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
298876F4000
trusted library allocation
page read and write
2988E22C000
trusted library allocation
page read and write
2988956C000
trusted library allocation
page read and write
126D1771E000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
29885AC0000
trusted library allocation
page read and write
24ABB700000
trusted library allocation
page read and write
298FCAC4000
heap
page read and write
29886FA3000
trusted library allocation
page read and write
29888FD3000
trusted library allocation
page read and write
2988337E000
trusted library allocation
page read and write
20C12658000
heap
page read and write
298FCAC4000
heap
page read and write
298FCAF5000
heap
page read and write
2988F907000
trusted library allocation
page read and write
20C1186F000
trusted library allocation
page read and write
298873DF000
trusted library allocation
page read and write
2988F5B4000
trusted library allocation
page read and write
298918DE000
trusted library allocation
page read and write
2988F940000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
29885AFA000
trusted library allocation
page read and write
298FCAA7000
heap
page read and write
29885798000
trusted library allocation
page read and write
298FCB34000
heap
page read and write
29883337000
trusted library allocation
page read and write
298879B1000
trusted library allocation
page read and write
298FCADF000
heap
page read and write
298879B1000
trusted library allocation
page read and write
298859CE000
trusted library allocation
page read and write
29885DFB000
trusted library allocation
page read and write
2988704B000
trusted library allocation
page read and write
298FCAF8000
heap
page read and write
24ABB150000
heap
page read and write
298FCAF5000
heap
page read and write
298FCAF5000
heap
page read and write
29885583000
heap
page read and write
298879CD000
trusted library allocation
page read and write
298855B0000
heap
page read and write
2988598A000
trusted library allocation
page read and write
20C125FD000
heap
page read and write
20C11DD1000
unkown
page execute read
29887AE7000
trusted library allocation
page read and write
298FFC9A000
trusted library allocation
page read and write
298FCAE5000
heap
page read and write
298855A4000
heap
page read and write
298875FB000
trusted library allocation
page read and write
298FCABE000
heap
page read and write
2988E3E4000
trusted library allocation
page read and write
298FFCFA000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
29889576000
trusted library allocation
page read and write
1F7FF800000
trusted library allocation
page read and write
298855B1000
heap
page read and write
2988E351000
trusted library allocation
page read and write
298FCAEF000
heap
page read and write
2988FE4E000
trusted library allocation
page read and write
29886CE3000
trusted library allocation
page read and write
2988E0BC000
trusted library allocation
page read and write
2988711A000
trusted library allocation
page read and write
29891A32000
trusted library allocation
page read and write
1002000
unkown
page readonly
298906E1000
heap
page read and write
298879BD000
trusted library allocation
page read and write
298FEB78000
trusted library allocation
page read and write
1134000
heap
page read and write
2988766C000
trusted library allocation
page read and write
29887690000
trusted library allocation
page read and write
24ABB5A7000
trusted library allocation
page read and write
298871E9000
trusted library allocation
page read and write
29885F74000
trusted library allocation
page read and write
3E51000
heap
page read and write
29886F3B000
trusted library allocation
page read and write
29887532000
trusted library allocation
page read and write
29887175000
trusted library allocation
page read and write
29888542000
trusted library allocation
page read and write
298855A4000
heap
page read and write
298879F4000
trusted library allocation
page read and write
298895B9000
trusted library allocation
page read and write
29887653000
trusted library allocation
page read and write
2988761B000
trusted library allocation
page read and write
29886FA3000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988F4EA000
trusted library allocation
page read and write
298FCAEE000
heap
page read and write
298FCAD2000
heap
page read and write
298FFAFD000
trusted library allocation
page read and write
298FCAD2000
heap
page read and write
298FCAEF000
heap
page read and write
298FF1FB000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
20C125F0000
heap
page read and write
298FCB1D000
heap
page read and write
298FCAEF000
heap
page read and write
2988772F000
trusted library allocation
page read and write
298876A7000
trusted library allocation
page read and write
29885A6C000
trusted library allocation
page read and write
29886FA6000
trusted library allocation
page read and write
298FCAF5000
heap
page read and write
2988759E000
trusted library allocation
page read and write
29885ADA000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
298879CE000
trusted library allocation
page read and write
298879F7000
trusted library allocation
page read and write
298FCB25000
heap
page read and write
298873B9000
trusted library allocation
page read and write
29887AF6000
trusted library allocation
page read and write
2989205D000
trusted library allocation
page read and write
298875AE000
trusted library allocation
page read and write
29885A73000
trusted library allocation
page read and write
2988F926000
trusted library allocation
page read and write
298FCADA000
heap
page read and write
2988E383000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
29887519000
trusted library allocation
page read and write
298877C4000
trusted library allocation
page read and write
29891CCE000
trusted library allocation
page read and write
298FF2FB000
trusted library allocation
page read and write
298885A5000
trusted library allocation
page read and write
298FCAF6000
heap
page read and write
1002000
unkown
page readonly
2988FE37000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298877C8000
trusted library allocation
page read and write
298FCAD8000
heap
page read and write
2988E0FE000
trusted library allocation
page read and write
1F7FF292000
unclassified section
page read and write
298855A2000
heap
page read and write
29886F6D000
trusted library allocation
page read and write
29887645000
trusted library allocation
page read and write
29886F18000
trusted library allocation
page read and write
298881BA000
trusted library allocation
page read and write
24ABB6A4000
heap
page read and write
298FCB1C000
heap
page read and write
2988F5BC000
trusted library allocation
page read and write
29886C83000
trusted library allocation
page read and write
29887069000
trusted library allocation
page read and write
29887665000
trusted library allocation
page read and write
298FCB24000
heap
page read and write
2988F935000
trusted library allocation
page read and write
298855A4000
heap
page read and write
29887690000
trusted library allocation
page read and write
2988754A000
trusted library allocation
page read and write
2988E179000
trusted library allocation
page read and write
20C1257F000
heap
page read and write
2988FE59000
trusted library allocation
page read and write
298855A2000
heap
page read and write
298877C6000
trusted library allocation
page read and write
298859A5000
trusted library allocation
page read and write
298FCACD000
heap
page read and write
29887731000
trusted library allocation
page read and write
There are 3643 hidden memdumps, click here to show them.