IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b28a7b6-a47a-4830-85a9-3b1d4b209c08.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_1b28a7b6-a47a-4830-85a9-3b1d4b209c08.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8XNKN2VTSQLQCVJBX46X.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KC87KDKUKQ0YMP6DW5ZB.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f80434f3-d7c4-431f-b0a9-11014c1336e7 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f80434f3-d7c4-431f-b0a9-11014c1336e7.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2236 -prefMapHandle 2232 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {243aace4-bcac-4ea8-9f43-87ea3ae1b2b5} 7012 "\\.\pipe\gecko-crash-server-pipe.7012" 29b35e70d10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20230927232528 -prefsHandle 3824 -prefMapHandle 3784 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {01e7dc00-77f5-411f-a4cd-12262ae8c574} 7012 "\\.\pipe\gecko-crash-server-pipe.7012" 29b460c4a10 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5024 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4964 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae43fb02-9022-4115-82b4-1b2be35acd22} 7012 "\\.\pipe\gecko-crash-server-pipe.7012" 29b4e7de510 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
http://ocsp.digicek
unknown
https://www.iqiyi.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://amazon.comCA
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
http://mozilla.org/A
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://www.amazon.co.uk/
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://relay.firefox.com/api/v1/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.0.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
216.58.212.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
216.58.206.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
216.58.212.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
29B46765000
trusted library allocation
page read and write
29B3CB81000
heap
page read and write
29B3CB21000
heap
page read and write
29B3CB88000
heap
page read and write
29B458B3000
trusted library allocation
page read and write
29B51335000
heap
page read and write
29B475CB000
trusted library allocation
page read and write
29B46CC1000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB24000
heap
page read and write
29B512B9000
trusted library allocation
page read and write
29B48512000
trusted library allocation
page read and write
29B47579000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B484A0000
trusted library allocation
page read and write
29B458F3000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B496CC000
trusted library allocation
page read and write
29B487A8000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B513E1000
heap
page read and write
29B48462000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B491C7000
trusted library allocation
page read and write
C24E5FE000
stack
page read and write
29B51D19000
trusted library allocation
page read and write
29E2F97B000
trusted library allocation
page read and write
29B47A6D000
trusted library allocation
page read and write
29B45652000
heap
page read and write
29B46759000
trusted library allocation
page read and write
29B4F5FC000
trusted library allocation
page read and write
29B475C2000
trusted library allocation
page read and write
29B51291000
trusted library allocation
page read and write
2200C3AF000
unclassified section
page read and write
29B47CDA000
trusted library allocation
page read and write
29B485C4000
trusted library allocation
page read and write
2200C640000
unkown
page execute read
29B3CB1E000
heap
page read and write
29B485FD000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B41BB1000
trusted library allocation
page read and write
29B47C1A000
trusted library allocation
page read and write
29B46FE6000
trusted library allocation
page read and write
29B47CE6000
trusted library allocation
page read and write
29B47BF2000
trusted library allocation
page read and write
2200D2A9000
heap
page read and write
29B46E8F000
trusted library allocation
page read and write
29E2F4F0000
heap
page read and write
29B485E0000
trusted library allocation
page read and write
29B3CB90000
heap
page read and write
29B475DE000
trusted library allocation
page read and write
29B3CB4C000
heap
page read and write
29B3CB1F000
heap
page read and write
29B4823A000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB32000
heap
page read and write
29B3CB80000
heap
page read and write
29B459A5000
trusted library allocation
page read and write
29B48269000
trusted library allocation
page read and write
29B46F50000
trusted library allocation
page read and write
29B3CB90000
heap
page read and write
29B46EBC000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47581000
trusted library allocation
page read and write
29B4DCD6000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
2200CE00000
trusted library allocation
page read and write
29B4DE16000
trusted library allocation
page read and write
29B47695000
trusted library allocation
page read and write
29B4DB16000
trusted library allocation
page read and write
29B47CD7000
trusted library allocation
page read and write
29B512A1000
trusted library allocation
page read and write
29B496CE000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B49444000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B42CE4000
trusted library allocation
page read and write
29B49671000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B484A0000
trusted library allocation
page read and write
29B471B2000
trusted library allocation
page read and write
29B456AA000
heap
page read and write
29B45ABE000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B47CB3000
trusted library allocation
page read and write
29B45884000
trusted library allocation
page read and write
29B494CE000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4DEFA000
trusted library allocation
page read and write
29B4DA9D000
trusted library allocation
page read and write
AEE00FE000
stack
page read and write
2200D330000
heap
page read and write
29B4566D000
heap
page read and write
29B3CB88000
heap
page read and write
29B3CB20000
heap
page read and write
29B45ABE000
trusted library allocation
page read and write
29B45652000
heap
page read and write
29B4DCF0000
trusted library allocation
page read and write
29B43361000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
1C307965000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B47BB3000
trusted library allocation
page read and write
29B484AB000
trusted library allocation
page read and write
29B41B19000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B484AD000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B3CB07000
heap
page read and write
29B3CB24000
heap
page read and write
29B4DEF3000
trusted library allocation
page read and write
19BFDF6C000
trusted library allocation
page execute read
29B45668000
heap
page read and write
29B3CB5C000
heap
page read and write
29B459A5000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B45AB9000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B4677E000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B47C9C000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B4DDFA000
trusted library allocation
page read and write
29B45904000
trusted library allocation
page read and write
29B478D7000
trusted library allocation
page read and write
29B482AB000
trusted library allocation
page read and write
29B4DB4E000
trusted library allocation
page read and write
29B479CC000
trusted library allocation
page read and write
3E11000
heap
page read and write
29B467B0000
trusted library allocation
page read and write
29B46EC3000
trusted library allocation
page read and write
29B42CEA000
trusted library allocation
page read and write
29B47C5A000
trusted library allocation
page read and write
29B433ED000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B47259000
trusted library allocation
page read and write
29B4DB37000
trusted library allocation
page read and write
29B48588000
trusted library allocation
page read and write
29B477D4000
trusted library allocation
page read and write
29B46E8A000
trusted library allocation
page read and write
29B467B0000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
25B2B3A4000
heap
page read and write
29B4DCD4000
trusted library allocation
page read and write
29B47273000
trusted library allocation
page read and write
29B4878F000
trusted library allocation
page read and write
29B485D5000
trusted library allocation
page read and write
29B45AC4000
trusted library allocation
page read and write
29B479A2000
trusted library allocation
page read and write
2200D340000
heap
page read and write
29B4DCDA000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B48221000
trusted library allocation
page read and write
29B47223000
trusted library allocation
page read and write
29B475D3000
trusted library allocation
page read and write
29B4DB37000
trusted library allocation
page read and write
29B47957000
trusted library allocation
page read and write
29B4F6B4000
trusted library allocation
page read and write
29B49438000
trusted library allocation
page read and write
29B476ED000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
2200C330000
heap
page read and write
29B491B5000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB24000
heap
page read and write
29B46E80000
trusted library allocation
page read and write
8FC000
unkown
page readonly
29B3CB82000
heap
page read and write
29B494AD000
trusted library allocation
page read and write
29B46765000
trusted library allocation
page read and write
2200C581000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4DF87000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B482CD000
trusted library allocation
page read and write
29B42D93000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B4792F000
trusted library allocation
page read and write
29B46753000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B4879A000
trusted library allocation
page read and write
29B51371000
heap
page read and write
29B3CB5C000
heap
page read and write
29B4E7D1000
trusted library allocation
page read and write
29B512F7000
trusted library allocation
page read and write
29B47804000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B487AE000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B4DB4C000
trusted library allocation
page read and write
29B46E50000
trusted library allocation
page read and write
29B467C3000
trusted library allocation
page read and write
29B4DBFE000
trusted library allocation
page read and write
29B47AF5000
trusted library allocation
page read and write
29B46762000
trusted library allocation
page read and write
29B47BF5000
trusted library allocation
page read and write
29B4DB00000
trusted library allocation
page read and write
29B4DABB000
trusted library allocation
page read and write
29B487AA000
trusted library allocation
page read and write
29B494E4000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B5101D000
trusted library allocation
page read and write
29B4DB8C000
trusted library allocation
page read and write
1C3075E0000
unclassified section
page readonly
29B3CB5C000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
861000
unkown
page execute read
29E2F9A1000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB98000
heap
page read and write
136D000
heap
page read and write
29B47CD5000
trusted library allocation
page read and write
29B414BF000
trusted library allocation
page read and write
29B42AE6000
trusted library allocation
page read and write
29B485A6000
trusted library allocation
page read and write
29B4E7B3000
trusted library allocation
page read and write
DBB2A203000
trusted library allocation
page read and write
29B494F7000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B3CB2F000
heap
page read and write
29B3CB3B000
heap
page read and write
29B3CB20000
heap
page read and write
29B47C94000
trusted library allocation
page read and write
29B475DB000
trusted library allocation
page read and write
29B45A8E000
trusted library allocation
page read and write
29B475BB000
trusted library allocation
page read and write
29B47AC9000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB30000
heap
page read and write
29B3CB92000
heap
page read and write
29B46759000
trusted library allocation
page read and write
29B3CB4C000
heap
page read and write
29B3CB1F000
heap
page read and write
29B45894000
trusted library allocation
page read and write
29B47A36000
trusted library allocation
page read and write
29B512A6000
trusted library allocation
page read and write
29B4F689000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
AEDCCDD000
stack
page read and write
29B4789C000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B511F3000
trusted library allocation
page read and write
29E2FA3D000
trusted library allocation
page read and write
29B47ABE000
trusted library allocation
page read and write
2200D3A7000
heap
page read and write
29B3CB2D000
heap
page read and write
29B4DE21000
trusted library allocation
page read and write
29B47254000
trusted library allocation
page read and write
29B496E8000
trusted library allocation
page read and write
29B46E74000
trusted library allocation
page read and write
29B46D85000
trusted library allocation
page read and write
29B4DF4B000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B491DE000
trusted library allocation
page read and write
1C307D0C000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB51000
heap
page read and write
29B47CA9000
trusted library allocation
page read and write
29B485D1000
trusted library allocation
page read and write
29B51059000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B467AB000
trusted library allocation
page read and write
29B4790A000
trusted library allocation
page read and write
29B47215000
trusted library allocation
page read and write
29B4566D000
heap
page read and write
29B3CB4F000
heap
page read and write
12168F51E000
trusted library allocation
page read and write
29B478F6000
trusted library allocation
page read and write
29B4DC19000
trusted library allocation
page read and write
29B4DC43000
trusted library allocation
page read and write
29B50B02000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B3CB2A000
heap
page read and write
29B4DB44000
trusted library allocation
page read and write
29B4DE72000
trusted library allocation
page read and write
29B45AB9000
trusted library allocation
page read and write
29B47A0D000
trusted library allocation
page read and write
29B47AB2000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B478E4000
trusted library allocation
page read and write
29B49145000
trusted library allocation
page read and write
29B510B7000
trusted library allocation
page read and write
29B479A0000
trusted library allocation
page read and write
29B4593C000
trusted library allocation
page read and write
1330000
heap
page read and write
29B3CB49000
heap
page read and write
29B3CB32000
heap
page read and write
29B47C73000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB24000
heap
page read and write
29B4722D000
trusted library allocation
page read and write
29B42AA7000
trusted library allocation
page read and write
2200D2A0000
heap
page read and write
29B41B8D000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB44000
heap
page read and write
29B45AAC000
trusted library allocation
page read and write
1C30795D000
trusted library allocation
page read and write
29B3CB1F000
heap
page read and write
29B481A3000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
2200C500000
trusted library allocation
page read and write
29B43361000
trusted library allocation
page read and write
29B472DE000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B3CB32000
heap
page read and write
29B3CB3A000
heap
page read and write
29B3CB44000
heap
page read and write
29B46EA6000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B46759000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB47000
heap
page read and write
29B46E8D000
trusted library allocation
page read and write
29B4DE7B000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4E7E6000
trusted library allocation
page read and write
29B42A64000
trusted library allocation
page read and write
29B42C4C000
trusted library allocation
page read and write
29B46E6B000
trusted library allocation
page read and write
29B46744000
trusted library allocation
page read and write
29B46E7D000
trusted library allocation
page read and write
29B496CA000
trusted library allocation
page read and write
29B47BB7000
trusted library allocation
page read and write
29B49843000
trusted library allocation
page read and write
29B478E1000
trusted library allocation
page read and write
29B41B1E000
trusted library allocation
page read and write
29B48764000
trusted library allocation
page read and write
29B46E9D000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B41498000
trusted library allocation
page read and write
29B479C6000
trusted library allocation
page read and write
29B47C40000
trusted library allocation
page read and write
29B41AFB000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B3CB5E000
heap
page read and write
29B3CB21000
heap
page read and write
29B475AF000
trusted library allocation
page read and write
29B485AB000
trusted library allocation
page read and write
2200C670000
heap
page read and write
29B3CB20000
heap
page read and write
29B481A3000
trusted library allocation
page read and write
29B42D3D000
trusted library allocation
page read and write
29B487DF000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B4745E000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B467B6000
trusted library allocation
page read and write
2200C5C7000
trusted library allocation
page read and write
29B4DF6C000
trusted library allocation
page read and write
29B484FA000
trusted library allocation
page read and write
29B494F7000
trusted library allocation
page read and write
29B501D3000
trusted library allocation
page read and write
29E2F5F0000
heap
page read and write
25B298B0000
heap
page read and write
29E2F964000
trusted library allocation
page read and write
29B47579000
trusted library allocation
page read and write
29B48299000
trusted library allocation
page read and write
29B481ED000
trusted library allocation
page read and write
29B45ABB000
trusted library allocation
page read and write
29B475F7000
trusted library allocation
page read and write
29B45878000
trusted library allocation
page read and write
29B4DCC6000
trusted library allocation
page read and write
29B485C4000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B3CB47000
heap
page read and write
29B4DFF4000
trusted library allocation
page read and write
29B42C3A000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B49493000
trusted library allocation
page read and write
29B475E6000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
29B3CB80000
heap
page read and write
1C3079B6000
trusted library allocation
page read and write
29B3CB3B000
heap
page read and write
29B3CB5E000
heap
page read and write
29B48065000
trusted library allocation
page read and write
29B4DEC3000
trusted library allocation
page read and write
29B47276000
trusted library allocation
page read and write
200E000
stack
page read and write
29B472B0000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B3CB2A000
heap
page read and write
29B47596000
trusted library allocation
page read and write
29B4DCE4000
trusted library allocation
page read and write
2200D3A7000
heap
page read and write
29E2F6B2000
unclassified section
page read and write
29B3CB8D000
heap
page read and write
29B485E4000
trusted library allocation
page read and write
29B433D7000
trusted library allocation
page read and write
29B3CB38000
heap
page read and write
29B4E212000
trusted library allocation
page read and write
29B47AE9000
trusted library allocation
page read and write
29B46FBC000
trusted library allocation
page read and write
29B4726A000
trusted library allocation
page read and write
29B47940000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB47000
heap
page read and write
29B3CB85000
heap
page read and write
29B47CB5000
trusted library allocation
page read and write
29B4DCAB000
trusted library allocation
page read and write
29B501EC000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B485E0000
trusted library allocation
page read and write
29B46E39000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB4F000
heap
page read and write
29B47749000
trusted library allocation
page read and write
29E2F97D000
trusted library allocation
page read and write
29B458CF000
trusted library allocation
page read and write
29B46D8C000
trusted library allocation
page read and write
2200D2A3000
heap
page read and write
29B41AFE000
trusted library allocation
page read and write
29B48075000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B4DC9D000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B47A33000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B45E79000
trusted library allocation
page read and write
29B46F5D000
trusted library allocation
page read and write
29B479D1000
trusted library allocation
page read and write
29B5133F000
heap
page read and write
29B47AA7000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
2200C310000
heap
page read and write
29B3CB50000
heap
page read and write
29B3CB88000
heap
page read and write
29B494C5000
trusted library allocation
page read and write
29B47CC5000
trusted library allocation
page read and write
29B433DB000
trusted library allocation
page read and write
29B46C8F000
trusted library allocation
page read and write
29B484FA000
trusted library allocation
page read and write
29B479C6000
trusted library allocation
page read and write
29E2F6A0000
heap
page readonly
29B3CB5D000
heap
page read and write
559F43E000
unkown
page readonly
29B47CF9000
trusted library allocation
page read and write
29B482CD000
trusted library allocation
page read and write
2200C140000
unclassified section
page readonly
29B47CA2000
trusted library allocation
page read and write
29B485AB000
trusted library allocation
page read and write
29B479C0000
trusted library allocation
page read and write
29E2F600000
heap
page read and write
29B3CB47000
heap
page read and write
29B4DB95000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B4DEE7000
trusted library allocation
page read and write
2200C5C4000
trusted library allocation
page read and write
29B5128F000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B3CB32000
heap
page read and write
29B3CB4F000
heap
page read and write
29B48778000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB67000
heap
page read and write
29B45671000
heap
page read and write
29B47AF3000
trusted library allocation
page read and write
29B46F4A000
trusted library allocation
page read and write
29B3CB37000
heap
page read and write
1C307970000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB43000
heap
page read and write
29B3CB25000
heap
page read and write
29B3CB34000
heap
page read and write
29B3CB4F000
heap
page read and write
2200D2BF000
heap
page read and write
29B47238000
trusted library allocation
page read and write
29B48524000
trusted library allocation
page read and write
29B4E7C9000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB25000
heap
page read and write
AEE00BE000
unkown
page readonly
29B494BA000
trusted library allocation
page read and write
29B512A6000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B51D0F000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B45A4C000
trusted library allocation
page read and write
29B46DAA000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B47923000
trusted library allocation
page read and write
29B47CE6000
trusted library allocation
page read and write
29B47273000
trusted library allocation
page read and write
29B510BF000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB4A000
heap
page read and write
29B3CB80000
heap
page read and write
29B4796B000
trusted library allocation
page read and write
29B42D3F000
trusted library allocation
page read and write
29B47991000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B477D9000
trusted library allocation
page read and write
29B479F9000
trusted library allocation
page read and write
29B4756A000
trusted library allocation
page read and write
29B45693000
heap
page read and write
29B51065000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B4943B000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
29B3CB1A000
heap
page read and write
29B43543000
trusted library allocation
page read and write
29B45961000
trusted library allocation
page read and write
29B42A8B000
trusted library allocation
page read and write
29B42CF9000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B47C88000
trusted library allocation
page read and write
29B41B80000
trusted library allocation
page read and write
29B47CFB000
trusted library allocation
page read and write
4A313EE000
stack
page read and write
1381000
heap
page read and write
29B4678A000
trusted library allocation
page read and write
29B4673F000
trusted library allocation
page read and write
29B51DCC000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
1C307982000
trusted library allocation
page read and write
29B47242000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B4781C000
trusted library allocation
page read and write
29B4879E000
trusted library allocation
page read and write
29B4749D000
trusted library allocation
page read and write
29B4830A000
trusted library allocation
page read and write
29B42C63000
trusted library allocation
page read and write
29B47B63000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
121B000
stack
page read and write
29B4E7E6000
trusted library allocation
page read and write
29B42D9E000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB1E000
heap
page read and write
1C307724000
heap
page read and write
29B479FA000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
25B29B07000
trusted library allocation
page read and write
29B4E000000
trusted library allocation
page read and write
29B47BEF000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B475BE000
trusted library allocation
page read and write
29B48591000
trusted library allocation
page read and write
AEDF07E000
unkown
page readonly
29B3CB2C000
heap
page read and write
29B3CB24000
heap
page read and write
29B3CB55000
heap
page read and write
2200D29F000
heap
page read and write
29B511ED000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
2200D2F9000
heap
page read and write
29B4DB2B000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B47CFB000
trusted library allocation
page read and write
29B475FE000
trusted library allocation
page read and write
29B4792F000
trusted library allocation
page read and write
29B47277000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B459CE000
trusted library allocation
page read and write
29B46CB0000
trusted library allocation
page read and write
29E2FA0C000
trusted library allocation
page read and write
2200D2DC000
heap
page read and write
29B47CC8000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B42AC0000
trusted library allocation
page read and write
29B4F661000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
2200C400000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B3CB32000
heap
page read and write
29B3CB31000
heap
page read and write
1C3079A2000
trusted library allocation
page read and write
29B50224000
trusted library allocation
page read and write
29E2F981000
trusted library allocation
page read and write
29B48285000
trusted library allocation
page read and write
1C3079C4000
trusted library allocation
page read and write
29B467F4000
trusted library allocation
page read and write
29B41B1E000
trusted library allocation
page read and write
29E2F9C9000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B42CE4000
trusted library allocation
page read and write
29B47CEC000
trusted library allocation
page read and write
2200C576000
trusted library allocation
page read and write
29B479BE000
trusted library allocation
page read and write
29B46EAB000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B477D6000
trusted library allocation
page read and write
29B475C5000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
1C307930000
trusted library allocation
page read and write
29B475C5000
trusted library allocation
page read and write
29B42AA7000
trusted library allocation
page read and write
29B4DEFE000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B43361000
trusted library allocation
page read and write
29B4DFF0000
trusted library allocation
page read and write
29B4F6FC000
trusted library allocation
page read and write
29B4DB55000
trusted library allocation
page read and write
2200D2AC000
heap
page read and write
29B47453000
trusted library allocation
page read and write
29B496CC000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
1C307949000
trusted library allocation
page read and write
29B4DED2000
trusted library allocation
page read and write
29B49438000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB32000
heap
page read and write
29B45A3D000
trusted library allocation
page read and write
29B4E26D000
trusted library allocation
page read and write
29B494F7000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B475C5000
trusted library allocation
page read and write
29B4875D000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29E2F6B0000
unclassified section
page read and write
29B47A17000
trusted library allocation
page read and write
29B4785D000
trusted library allocation
page read and write
29B47743000
trusted library allocation
page read and write
29B467B6000
trusted library allocation
page read and write
29B47C33000
trusted library allocation
page read and write
1C307911000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B45675000
heap
page read and write
29B3CB4F000
heap
page read and write
29B4F689000
trusted library allocation
page read and write
29B475D0000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B4DED9000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B3CB24000
heap
page read and write
29B45EE5000
trusted library allocation
page read and write
29B46747000
trusted library allocation
page read and write
29B47AB0000
trusted library allocation
page read and write
29B4768A000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4DE30000
trusted library allocation
page read and write
930000
unkown
page write copy
29B3CB80000
heap
page read and write
29B4566D000
heap
page read and write
29B459CE000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B435CF000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B3CB54000
heap
page read and write
2200C3A2000
unclassified section
page read and write
29B456D1000
heap
page read and write
29B47ABE000
trusted library allocation
page read and write
29E2FA32000
trusted library allocation
page read and write
29B4E2D0000
trusted library allocation
page read and write
29B4791B000
trusted library allocation
page read and write
29B4DED8000
trusted library allocation
page read and write
29B4850A000
trusted library allocation
page read and write
29B4672F000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B42CF9000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B47A89000
trusted library allocation
page read and write
29B3CB22000
heap
page read and write
29B51370000
heap
page read and write
29B51301000
heap
page read and write
2200C564000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47672000
trusted library allocation
page read and write
29B4781A000
trusted library allocation
page read and write
29B481ED000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B4793F000
trusted library allocation
page read and write
29B48285000
trusted library allocation
page read and write
29B485D5000
trusted library allocation
page read and write
3AC4000
heap
page read and write
29B42D97000
trusted library allocation
page read and write
29B467AB000
trusted library allocation
page read and write
29B49130000
trusted library allocation
page read and write
29B475DE000
trusted library allocation
page read and write
29B3CB54000
heap
page read and write
29B479D1000
trusted library allocation
page read and write
29B433A1000
trusted library allocation
page read and write
29B50E9A000
trusted library allocation
page read and write
29B502F8000
trusted library allocation
page read and write
29E2F95D000
trusted library allocation
page read and write
29B491FB000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B41BB4000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B4758A000
trusted library allocation
page read and write
29B3CB2D000
heap
page read and write
29B3CB98000
heap
page read and write
29B41BFA000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B46D92000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
136C000
heap
page read and write
29B4794F000
trusted library allocation
page read and write
29B3CB55000
heap
page read and write
29B479A0000
trusted library allocation
page read and write
29B46E8D000
trusted library allocation
page read and write
29B3CBA1000
heap
page read and write
29B41BFA000
trusted library allocation
page read and write
29B471BD000
trusted library allocation
page read and write
29B46DAE000
trusted library allocation
page read and write
29B4857C000
trusted library allocation
page read and write
29B47CDC000
trusted library allocation
page read and write
29B48437000
trusted library allocation
page read and write
29B472D1000
trusted library allocation
page read and write
2200D2CD000
heap
page read and write
29E2F9B7000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB4F000
heap
page read and write
29B4916C000
trusted library allocation
page read and write
29B47987000
trusted library allocation
page read and write
29B510D3000
trusted library allocation
page read and write
29B49438000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B479DA000
trusted library allocation
page read and write
4A32DFE000
stack
page read and write
29B4DBD9000
trusted library allocation
page read and write
29B47CB1000
trusted library allocation
page read and write
29B512E1000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B482D8000
trusted library allocation
page read and write
29B481C3000
trusted library allocation
page read and write
29B4DCD6000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB98000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB5E000
heap
page read and write
29B3CB44000
heap
page read and write
29B3CB8D000
heap
page read and write
29B51D45000
trusted library allocation
page read and write
29B456DE000
heap
page read and write
29B479A0000
trusted library allocation
page read and write
29B46E86000
trusted library allocation
page read and write
2200D330000
heap
page read and write
29B37A64000
heap
page read and write
29B475F3000
trusted library allocation
page read and write
29B4DEEE000
trusted library allocation
page read and write
29B51A27000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
1C307903000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B45871000
trusted library allocation
page read and write
29B4725E000
trusted library allocation
page read and write
29B47A91000
trusted library allocation
page read and write
92C000
unkown
page write copy
29B3CB32000
heap
page read and write
29B47C40000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B484A8000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B485C8000
trusted library allocation
page read and write
C24F5FE000
stack
page read and write
29B479C2000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B4568E000
heap
page read and write
29B47953000
trusted library allocation
page read and write
29B4DCF4000
trusted library allocation
page read and write
29B45EED000
trusted library allocation
page read and write
29B41B7E000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B46CA5000
trusted library allocation
page read and write
559EBFE000
stack
page read and write
29B3CB98000
heap
page read and write
29B3CB25000
heap
page read and write
29B47ACD000
trusted library allocation
page read and write
29B479DA000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B50BA8000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB88000
heap
page read and write
29B4F618000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B3CB20000
heap
page read and write
29B48299000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B42D2F000
trusted library allocation
page read and write
29B3CBBA000
heap
page read and write
29B45EFD000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B3CB1E000
heap
page read and write
29B50E9A000
trusted library allocation
page read and write
29E2F972000
trusted library allocation
page read and write
25B298E3000
heap
page read and write
29B484AD000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B475DB000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B4581D000
trusted library allocation
page read and write
29B4DB2D000
trusted library allocation
page read and write
29B471A9000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B46EC3000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B46C4A000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B46D1D000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B3CB4A000
heap
page read and write
29B3CB92000
heap
page read and write
4A3132E000
unkown
page readonly
29B45AC4000
trusted library allocation
page read and write
29B4DC36000
trusted library allocation
page read and write
19BFDFA1000
trusted library allocation
page execute read
1340000
heap
page read and write
29B4DCDF000
trusted library allocation
page read and write
29B48573000
trusted library allocation
page read and write
29B47F5E000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29E2F66A000
heap
page read and write
29B47C8C000
trusted library allocation
page read and write
2200C1EA000
heap
page read and write
DECB903000
trusted library allocation
page read and write
132E000
stack
page read and write
25B298E4000
heap
page read and write
29B5128F000
trusted library allocation
page read and write
29B47AA5000
trusted library allocation
page read and write
29B414B3000
trusted library allocation
page read and write
29B41490000
trusted library allocation
page read and write
29B45EDD000
trusted library allocation
page read and write
29B496C4000
trusted library allocation
page read and write
29B476E2000
trusted library allocation
page read and write
29B45A87000
trusted library allocation
page read and write
29B46DAE000
trusted library allocation
page read and write
29B477D6000
trusted library allocation
page read and write
29B4DECB000
trusted library allocation
page read and write
29B47C2B000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B456E7000
heap
page read and write
29B4DD95000
trusted library allocation
page read and write
29B45EDD000
trusted library allocation
page read and write
29B3CB67000
heap
page read and write
29B47CFB000
trusted library allocation
page read and write
29B479EC000
trusted library allocation
page read and write
29B4596A000
trusted library allocation
page read and write
29B494F7000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
AEDEFFE000
unkown
page readonly
29B47473000
trusted library allocation
page read and write
29B42AAA000
trusted library allocation
page read and write
29E2F96E000
trusted library allocation
page read and write
29B47CEC000
trusted library allocation
page read and write
2200C3F0000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B47BD8000
trusted library allocation
page read and write
19BFDF91000
trusted library allocation
page execute read
29B3CB82000
heap
page read and write
29B4598E000
trusted library allocation
page read and write
29B42A8B000
trusted library allocation
page read and write
29B3CB3E000
heap
page read and write
29B47CDE000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47C94000
trusted library allocation
page read and write
29E2F9E9000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B46E63000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B50D9C000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
29E2FB08000
heap
page read and write
29B45652000
heap
page read and write
29B494D3000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
122F000
stack
page read and write
29B4F659000
trusted library allocation
page read and write
29B3CB48000
heap
page read and write
29B47957000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B459CE000
trusted library allocation
page read and write
29B4337A000
trusted library allocation
page read and write
29B484BB000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4674E000
trusted library allocation
page read and write
29B47CA9000
trusted library allocation
page read and write
29B491E9000
trusted library allocation
page read and write
29B4914A000
trusted library allocation
page read and write
29B4598D000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB3C000
heap
page read and write
29B47692000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B47586000
trusted library allocation
page read and write
29B51D4B000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB8D000
heap
page read and write
29B47C2B000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B47CF9000
trusted library allocation
page read and write
29B479C2000
trusted library allocation
page read and write
29B484BF000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB1E000
heap
page read and write
29B45ECE000
trusted library allocation
page read and write
29B467F8000
trusted library allocation
page read and write
29B3CB5A000
heap
page read and write
8E11FD000
stack
page read and write
29B47A76000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B4DCE1000
trusted library allocation
page read and write
29B3CB2D000
heap
page read and write
29B4F5FC000
trusted library allocation
page read and write
29B479EA000
trusted library allocation
page read and write
29B47259000
trusted library allocation
page read and write
29B4E2E5000
trusted library allocation
page read and write
29B4DCE4000
trusted library allocation
page read and write
2200D330000
heap
page read and write
29B4566D000
heap
page read and write
29B46C2F000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
1C307726000
heap
page read and write
29B46CE7000
trusted library allocation
page read and write
860000
unkown
page readonly
29B3CB88000
heap
page read and write
29B41BBC000
trusted library allocation
page read and write
29B46DC6000
trusted library allocation
page read and write
29B456E2000
heap
page read and write
29B475D5000
trusted library allocation
page read and write
29B42AF1000
trusted library allocation
page read and write
29B46E60000
trusted library allocation
page read and write
29B4F6CA000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB32000
heap
page read and write
29B47CA2000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
25B2B3B7000
heap
page read and write
29B3CB2A000
heap
page read and write
29B3CB8A000
heap
page read and write
29B4676B000
trusted library allocation
page read and write
29B42C6A000
trusted library allocation
page read and write
29B4DEE1000
trusted library allocation
page read and write
29B46749000
trusted library allocation
page read and write
29B494E4000
trusted library allocation
page read and write
29B4F6F9000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B47998000
trusted library allocation
page read and write
29B512A6000
trusted library allocation
page read and write
29B45699000
heap
page read and write
29B3CB98000
heap
page read and write
29B45A53000
trusted library allocation
page read and write
29B45A5E000
trusted library allocation
page read and write
29B45A6E000
trusted library allocation
page read and write
29B42AAA000
trusted library allocation
page read and write
29B4DF81000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
29B482E6000
trusted library allocation
page read and write
29B46C7B000
trusted library allocation
page read and write
29B47907000
trusted library allocation
page read and write
29B46C30000
trusted library allocation
page read and write
29B46F7B000
trusted library allocation
page read and write
29B47676000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
1361000
heap
page read and write
29B4828D000
trusted library allocation
page read and write
29B4DE1D000
trusted library allocation
page read and write
29B4DF9D000
trusted library allocation
page read and write
29B42C56000
trusted library allocation
page read and write
29B414C1000
trusted library allocation
page read and write
29B485AB000
trusted library allocation
page read and write
29B51346000
heap
page read and write
29B4784A000
trusted library allocation
page read and write
29B3CB3F000
heap
page read and write
29B510C1000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
1C3079AA000
trusted library allocation
page read and write
29B4599E000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
AEDCDDE000
stack
page read and write
4A3136D000
stack
page read and write
29B476A3000
trusted library allocation
page read and write
29B45EFD000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B472D1000
trusted library allocation
page read and write
2200CCA0000
heap
page read and write
29B494BA000
trusted library allocation
page read and write
25B2B3AB000
heap
page read and write
2200D36A000
heap
page read and write
29B46D52000
trusted library allocation
page read and write
29B458AC000
trusted library allocation
page read and write
29B4DF84000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B475D5000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B478C8000
trusted library allocation
page read and write
29B4DEFA000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B3CB5C000
heap
page read and write
1C3076F0000
heap
page read and write
29B3CB24000
heap
page read and write
29B45E96000
trusted library allocation
page read and write
29B47C92000
trusted library allocation
page read and write
29B49431000
trusted library allocation
page read and write
29B45697000
heap
page read and write
2200D328000
heap
page read and write
29B4582B000
trusted library allocation
page read and write
29B47CDA000
trusted library allocation
page read and write
29B46F76000
trusted library allocation
page read and write
29B47A7F000
trusted library allocation
page read and write
29B3CB53000
heap
page read and write
29B3CB1E000
heap
page read and write
29B481BB000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
1C307600000
heap
page read and write
29B46744000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29E2F996000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4E7E3000
trusted library allocation
page read and write
29B47284000
trusted library allocation
page read and write
2200D384000
heap
page read and write
29B3CB4F000
heap
page read and write
29B4DEA4000
trusted library allocation
page read and write
29B47A64000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B475DA000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B501DE000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B491CB000
trusted library allocation
page read and write
29B47BEB000
trusted library allocation
page read and write
8E19FE000
stack
page read and write
29B477AE000
trusted library allocation
page read and write
29B47CD0000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B42CEF000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B487F0000
trusted library allocation
page read and write
29B4586A000
trusted library allocation
page read and write
29B456DE000
heap
page read and write
29B477B6000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B47591000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B48242000
trusted library allocation
page read and write
29B47407000
trusted library allocation
page read and write
29E2F95B000
trusted library allocation
page read and write
29B4790C000
trusted library allocation
page read and write
3E11000
heap
page read and write
29B3CB2E000
heap
page read and write
29B496CA000
trusted library allocation
page read and write
29B42CE4000
trusted library allocation
page read and write
29B458CF000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B477A3000
trusted library allocation
page read and write
29B4DCA6000
trusted library allocation
page read and write
29B4E7FB000
trusted library allocation
page read and write
29B47AA1000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B3CB1E000
heap
page read and write
29B48496000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B47FE9000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B47A9F000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B3CB5E000
heap
page read and write
29B478C8000
trusted library allocation
page read and write
2200C676000
heap
page read and write
29B4DDCD000
trusted library allocation
page read and write
29B45AB6000
trusted library allocation
page read and write
29B5105B000
trusted library allocation
page read and write
29B46EB6000
trusted library allocation
page read and write
29B46E9D000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B3CB30000
heap
page read and write
29B4DB40000
trusted library allocation
page read and write
29B41481000
trusted library allocation
page read and write
29B5018E000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B3CB4F000
heap
page read and write
29B4DF59000
trusted library allocation
page read and write
29B4DE86000
trusted library allocation
page read and write
29B47AA5000
trusted library allocation
page read and write
29E2F9BA000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B3CB1E000
heap
page read and write
29B3CB44000
heap
page read and write
2200D2A0000
heap
page read and write
29B3CB1F000
heap
page read and write
AEDCD1E000
unkown
page readonly
29B3CB37000
heap
page read and write
29B4F6FC000
trusted library allocation
page read and write
29B48756000
trusted library allocation
page read and write
29B47AB2000
trusted library allocation
page read and write
29B4967C000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B4DC1F000
trusted library allocation
page read and write
29B42DF8000
trusted library allocation
page read and write
29E2F6C0000
heap
page read and write
29B4DEF3000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B487D6000
trusted library allocation
page read and write
29B3CB45000
heap
page read and write
29B3CB5D000
heap
page read and write
AEDF87E000
stack
page read and write
29B4967C000
trusted library allocation
page read and write
29B51291000
trusted library allocation
page read and write
29B4740A000
trusted library allocation
page read and write
29B475EE000
trusted library allocation
page read and write
29B4911B000
trusted library allocation
page read and write
2200C380000
heap
page readonly
12E4000
heap
page read and write
29B3CB40000
heap
page read and write
29B49958000
trusted library allocation
page read and write
29B46C28000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
2200D36A000
heap
page read and write
29B4DD95000
trusted library allocation
page read and write
29B46D61000
trusted library allocation
page read and write
29B42DF6000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B4E7CC000
trusted library allocation
page read and write
29B4DEFA000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B482F9000
trusted library allocation
page read and write
29B47BC6000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B433B5000
trusted library allocation
page read and write
29B3CB81000
heap
page read and write
29B5135B000
heap
page read and write
29B3CB24000
heap
page read and write
29B3CB80000
heap
page read and write
29B4567E000
heap
page read and write
29B481AF000
trusted library allocation
page read and write
29B3CB1F000
heap
page read and write
29B510B5000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B487B5000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B456E4000
heap
page read and write
29B42DF6000
trusted library allocation
page read and write
29B47239000
trusted library allocation
page read and write
29B4DCF8000
trusted library allocation
page read and write
29B3CB4E000
heap
page read and write
29B456E7000
heap
page read and write
29B46D3F000
trusted library allocation
page read and write
2200D2A0000
heap
page read and write
29B4DACF000
trusted library allocation
page read and write
29B46C7B000
trusted library allocation
page read and write
29B4DFE6000
trusted library allocation
page read and write
29B4F704000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B46C25000
trusted library allocation
page read and write
29B47C40000
trusted library allocation
page read and write
29B4DD4C000
trusted library allocation
page read and write
29B51089000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B46F66000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B4772B000
trusted library allocation
page read and write
29B4DACB000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B49129000
trusted library allocation
page read and write
29B4599E000
trusted library allocation
page read and write
29B47CDC000
trusted library allocation
page read and write
29B4DEC3000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B4676B000
trusted library allocation
page read and write
29B47AC1000
trusted library allocation
page read and write
29E2FA12000
trusted library allocation
page read and write
29B4DF10000
trusted library allocation
page read and write
29B46F53000
trusted library allocation
page read and write
29B46E95000
trusted library allocation
page read and write
29B47938000
trusted library allocation
page read and write
29B45A60000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B45A8E000
trusted library allocation
page read and write
29B45EDF000
trusted library allocation
page read and write
29B3CB15000
heap
page read and write
29B46D46000
trusted library allocation
page read and write
29B42CEF000
trusted library allocation
page read and write
2200C650000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B475D5000
trusted library allocation
page read and write
2200D249000
heap
page read and write
29B4949B000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B46DC6000
trusted library allocation
page read and write
29B433D7000
trusted library allocation
page read and write
29B458CC000
trusted library allocation
page read and write
29B47CEC000
trusted library allocation
page read and write
29B482CD000
trusted library allocation
page read and write
29B4566B000
heap
page read and write
29B47957000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B45E33000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B4DE96000
trusted library allocation
page read and write
29B4793F000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B475C8000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB32000
heap
page read and write
29B47790000
trusted library allocation
page read and write
29B42DF8000
trusted library allocation
page read and write
29B45EEB000
trusted library allocation
page read and write
29B476B4000
trusted library allocation
page read and write
29B4DEBC000
trusted library allocation
page read and write
29B51DAC000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
29B47C90000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
861000
unkown
page execute read
29B3CB82000
heap
page read and write
29B482AB000
trusted library allocation
page read and write
29B456D4000
heap
page read and write
29B3CB98000
heap
page read and write
2200D323000
heap
page read and write
29B47BF2000
trusted library allocation
page read and write
29B47AF9000
trusted library allocation
page read and write
559F4BE000
unkown
page readonly
29B4759D000
trusted library allocation
page read and write
29B485A2000
trusted library allocation
page read and write
2170000
heap
page read and write
29B48588000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B3CB81000
heap
page read and write
29B3CB44000
heap
page read and write
29B47CA9000
trusted library allocation
page read and write
29B46CBA000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B474B6000
trusted library allocation
page read and write
29B4783C000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B475DE000
trusted library allocation
page read and write
2200D2A9000
heap
page read and write
29B45968000
trusted library allocation
page read and write
29B4DEFE000
trusted library allocation
page read and write
29B42CE4000
trusted library allocation
page read and write
29B41BFA000
trusted library allocation
page read and write
29B3CB5D000
heap
page read and write
29B47A9F000
trusted library allocation
page read and write
29B47BF5000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B4DC36000
trusted library allocation
page read and write
29B4919E000
trusted library allocation
page read and write
29B46E3D000
trusted library allocation
page read and write
2200D384000
heap
page read and write
29B47A89000
trusted library allocation
page read and write
29B46CF1000
trusted library allocation
page read and write
29B47848000
trusted library allocation
page read and write
29B47114000
trusted library allocation
page read and write
29B4795C000
trusted library allocation
page read and write
29B45E2F000
trusted library allocation
page read and write
29B4DF3D000
trusted library allocation
page read and write
29B4725C000
trusted library allocation
page read and write
29B4DE5B000
trusted library allocation
page read and write
29E2FA00000
trusted library allocation
page read and write
29B47C88000
trusted library allocation
page read and write
29B47260000
trusted library allocation
page read and write
29B4568F000
heap
page read and write
29B491E6000
trusted library allocation
page read and write
29B42C59000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B3CB32000
heap
page read and write
29B479C0000
trusted library allocation
page read and write
29B47996000
trusted library allocation
page read and write
29B4753E000
trusted library allocation
page read and write
29B47468000
trusted library allocation
page read and write
29B47CFB000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B48514000
trusted library allocation
page read and write
29B4DC9F000
trusted library allocation
page read and write
29B477B6000
trusted library allocation
page read and write
29B4DCA5000
trusted library allocation
page read and write
C24FDFF000
stack
page read and write
29B47A2D000
trusted library allocation
page read and write
29B47CF9000
trusted library allocation
page read and write
29B467BA000
trusted library allocation
page read and write
29B45964000
trusted library allocation
page read and write
2200D2E1000
heap
page read and write
29B494D3000
trusted library allocation
page read and write
29B46729000
trusted library allocation
page read and write
29B475AF000
trusted library allocation
page read and write
1364000
heap
page read and write
29B4DED6000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B46D5F000
trusted library allocation
page read and write
29B4DF8F000
trusted library allocation
page read and write
29E2F967000
trusted library allocation
page read and write
29B42CE8000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB80000
heap
page read and write
29B47CF9000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
2200D37B000
heap
page read and write
29B45A5E000
trusted library allocation
page read and write
29B494CE000
trusted library allocation
page read and write
29B43552000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
29B42DDF000
trusted library allocation
page read and write
29B3CB67000
heap
page read and write
29B4DFDA000
trusted library allocation
page read and write
29B42C79000
trusted library allocation
page read and write
29B3CB28000
heap
page read and write
29B491FB000
trusted library allocation
page read and write
2200D384000
heap
page read and write
29B3CB8D000
heap
page read and write
29B496CE000
trusted library allocation
page read and write
29B475D3000
trusted library allocation
page read and write
29B3CB28000
heap
page read and write
29B4DC26000
trusted library allocation
page read and write
29E2F5F3000
heap
page read and write
29B41B82000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB5D000
heap
page read and write
12E0000
heap
page read and write
29B3CB2C000
heap
page read and write
29B47AA7000
trusted library allocation
page read and write
29B46CA0000
trusted library allocation
page read and write
29B475EC000
trusted library allocation
page read and write
29B467F8000
trusted library allocation
page read and write
29B47827000
trusted library allocation
page read and write
29B42ADA000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B501C6000
trusted library allocation
page read and write
29B494FA000
trusted library allocation
page read and write
29B47594000
trusted library allocation
page read and write
29B47296000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B50DA9000
trusted library allocation
page read and write
2200C59F000
trusted library allocation
page read and write
29B45AD2000
trusted library allocation
page read and write
2200D2A0000
heap
page read and write
29B3CB5E000
heap
page read and write
29B482AB000
trusted library allocation
page read and write
29B46EE0000
trusted library allocation
page read and write
29B4568E000
heap
page read and write
29B51057000
trusted library allocation
page read and write
29B49863000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B487D4000
trusted library allocation
page read and write
29B3CB31000
heap
page read and write
29B485B0000
trusted library allocation
page read and write
29B47A36000
trusted library allocation
page read and write
29B47947000
trusted library allocation
page read and write
29B46765000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B4793F000
trusted library allocation
page read and write
11650380000
heap
page read and write
29B4F5C1000
trusted library allocation
page read and write
29E2F912000
trusted library allocation
page read and write
29B486AD000
trusted library allocation
page read and write
29B45EFD000
trusted library allocation
page read and write
29B45961000
trusted library allocation
page read and write
1C3077B0000
heap
page read and write
29B47BA3000
trusted library allocation
page read and write
29B47A6D000
trusted library allocation
page read and write
29B46EBC000
trusted library allocation
page read and write
29B4591F000
trusted library allocation
page read and write
29B47697000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB24000
heap
page read and write
29B3CB45000
heap
page read and write
29B4E2D0000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B46CAA000
trusted library allocation
page read and write
29B46D92000
trusted library allocation
page read and write
29B3CB3D000
heap
page read and write
29B47ABF000
trusted library allocation
page read and write
29B4759D000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
2200D3B7000
heap
page read and write
29B42D3A000
trusted library allocation
page read and write
29B477D9000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47266000
trusted library allocation
page read and write
29B42D4F000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B479C2000
trusted library allocation
page read and write
2200C1C0000
unclassified section
page readonly
29B3CB43000
heap
page read and write
29B3CB32000
heap
page read and write
29B475C8000
trusted library allocation
page read and write
29B42D95000
trusted library allocation
page read and write
29B49900000
trusted library allocation
page read and write
29B4DC90000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B512C6000
trusted library allocation
page read and write
1C3079F6000
trusted library allocation
page read and write
4A3363E000
unkown
page readonly
29B43583000
trusted library allocation
page read and write
29B3CB33000
heap
page read and write
29B3CB5D000
heap
page read and write
29B3CB3B000
heap
page read and write
29B4DC43000
trusted library allocation
page read and write
29B4943B000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB49000
heap
page read and write
2200D320000
heap
page read and write
29B3CB5C000
heap
page read and write
29B3CB8D000
heap
page read and write
29B3CB4F000
heap
page read and write
1C3075C0000
remote allocation
page read and write
29B47743000
trusted library allocation
page read and write
29B37A5C000
heap
page read and write
29B4DE3B000
trusted library allocation
page read and write
29B46EE0000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B45AFC000
trusted library allocation
page read and write
1C307A20000
heap
page read and write
29B475DA000
trusted library allocation
page read and write
29B42E29000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B3CB88000
heap
page read and write
29B487D2000
trusted library allocation
page read and write
29B4568F000
heap
page read and write
2200CC90000
heap
page read and write
29B4823A000
trusted library allocation
page read and write
29B479A9000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B46C3C000
trusted library allocation
page read and write
29B51D35000
trusted library allocation
page read and write
29E2F979000
trusted library allocation
page read and write
29B482D1000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B46F7E000
trusted library allocation
page read and write
1C307924000
trusted library allocation
page read and write
29B4857C000
trusted library allocation
page read and write
29B4DC87000
trusted library allocation
page read and write
29B47AF3000
trusted library allocation
page read and write
25B2B3A5000
heap
page read and write
29B496CA000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
AEE013E000
unkown
page readonly
137A000
heap
page read and write
29B4848C000
trusted library allocation
page read and write
2200C512000
trusted library allocation
page read and write
29B50234000
trusted library allocation
page read and write
29B3CB99000
heap
page read and write
29B47586000
trusted library allocation
page read and write
29B473DC000
trusted library allocation
page read and write
29B477CC000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B46DBD000
trusted library allocation
page read and write
29B49457000
trusted library allocation
page read and write
29B482CD000
trusted library allocation
page read and write
29E2F700000
trusted library allocation
page read and write
1290000
heap
page read and write
29B51D4E000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
11650700000
trusted library allocation
page read and write
29B474D4000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B3CB8D000
heap
page read and write
29B46C40000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
1C3079B2000
trusted library allocation
page read and write
29B47A9A000
trusted library allocation
page read and write
29E2F4B0000
remote allocation
page read and write
29B3CB4F000
heap
page read and write
2200D384000
heap
page read and write
29B510FE000
trusted library allocation
page read and write
29B4725C000
trusted library allocation
page read and write
29B475DA000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B45A3B000
trusted library allocation
page read and write
29B4354E000
trusted library allocation
page read and write
29B4851C000
trusted library allocation
page read and write
29B46D86000
trusted library allocation
page read and write
29B46DA5000
trusted library allocation
page read and write
29B4943F000
trusted library allocation
page read and write
29B47957000
trusted library allocation
page read and write
29B476E6000
trusted library allocation
page read and write
29E2FA1B000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB32000
heap
page read and write
29B475DB000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B42C99000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B46E80000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B3CB24000
heap
page read and write
AEDCD98000
stack
page read and write
29B50D96000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB82000
heap
page read and write
29B479DE000
trusted library allocation
page read and write
29B467F8000
trusted library allocation
page read and write
29B47581000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B479C0000
trusted library allocation
page read and write
2200D2A4000
heap
page read and write
29B3CB82000
heap
page read and write
29B45A5E000
trusted library allocation
page read and write
29B4DCD6000
trusted library allocation
page read and write
29B47C8C000
trusted library allocation
page read and write
29B4791F000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B496BC000
trusted library allocation
page read and write
29B45863000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
1C307C00000
trusted library allocation
page read and write
29B46CC5000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B49438000
trusted library allocation
page read and write
2200C55C000
trusted library allocation
page read and write
2200C1E0000
heap
page read and write
29B435F4000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B42AC0000
trusted library allocation
page read and write
29B45ABB000
trusted library allocation
page read and write
29B4DAB5000
trusted library allocation
page read and write
29B48269000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B47CD5000
trusted library allocation
page read and write
29B4873F000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B512DD000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B3CB92000
heap
page read and write
29B494F2000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B3CB1E000
heap
page read and write
29B43333000
trusted library allocation
page read and write
29B4795A000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B47AD1000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B48234000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B48434000
trusted library allocation
page read and write
2200D328000
heap
page read and write
29B45AD1000
trusted library allocation
page read and write
29B47CF9000
trusted library allocation
page read and write
29B4805B000
trusted library allocation
page read and write
29B42D9C000
trusted library allocation
page read and write
29B467F4000
trusted library allocation
page read and write
29B47927000
trusted library allocation
page read and write
29B49170000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB4F000
heap
page read and write
29B48512000
trusted library allocation
page read and write
29B467AB000
trusted library allocation
page read and write
29B47957000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B47562000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B3CB32000
heap
page read and write
29B482D3000
trusted library allocation
page read and write
29B4676E000
trusted library allocation
page read and write
29B3CB38000
heap
page read and write
29B45EE3000
trusted library allocation
page read and write
29B472D1000
trusted library allocation
page read and write
29B47A4A000
trusted library allocation
page read and write
29B3CB9A000
heap
page read and write
29B46C40000
trusted library allocation
page read and write
29B47996000
trusted library allocation
page read and write
29B41A2F000
trusted library allocation
page read and write
29B494D3000
trusted library allocation
page read and write
29B47979000
trusted library allocation
page read and write
29B46EAD000
trusted library allocation
page read and write
29B47C88000
trusted library allocation
page read and write
1C307782000
unclassified section
page read and write
29B3CB48000
heap
page read and write
29B433CA000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
25B2B3BA000
heap
page read and write
29B45ABE000
trusted library allocation
page read and write
1C307977000
trusted library allocation
page read and write
29B494CE000
trusted library allocation
page read and write
29B42D73000
trusted library allocation
page read and write
29B3CB4D000
heap
page read and write
29B3CB36000
heap
page read and write
29B4795D000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B3CB23000
heap
page read and write
29B51028000
trusted library allocation
page read and write
29B458B3000
trusted library allocation
page read and write
29B42D9C000
trusted library allocation
page read and write
29E2F9A6000
trusted library allocation
page read and write
29B3CB38000
heap
page read and write
29B456E7000
heap
page read and write
29B4DC90000
trusted library allocation
page read and write
29B4DB79000
trusted library allocation
page read and write
29B46E69000
trusted library allocation
page read and write
29B4727C000
trusted library allocation
page read and write
29B435FE000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B43DAA000
trusted library allocation
page read and write
29B479CC000
trusted library allocation
page read and write
29B4769C000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B47402000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B47A79000
trusted library allocation
page read and write
29B47C98000
trusted library allocation
page read and write
29B4790F000
trusted library allocation
page read and write
29B4DCCF000
trusted library allocation
page read and write
29B4757B000
trusted library allocation
page read and write
29B47A7F000
trusted library allocation
page read and write
29B42AC0000
trusted library allocation
page read and write
29B46D9C000
trusted library allocation
page read and write
29B45AD8000
trusted library allocation
page read and write
29B49160000
trusted library allocation
page read and write
29B494E4000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4DF72000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB5C000
heap
page read and write
29B3CB32000
heap
page read and write
29B4DC9D000
trusted library allocation
page read and write
29B47CC8000
trusted library allocation
page read and write
29B4798A000
trusted library allocation
page read and write
2200D2E8000
heap
page read and write
29B51A3B000
trusted library allocation
page read and write
29B4943F000
trusted library allocation
page read and write
29B487C4000
trusted library allocation
page read and write
2200D328000
heap
page read and write
29B45A87000
trusted library allocation
page read and write
29B4943B000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B4DCDA000
trusted library allocation
page read and write
29B4DD5D000
trusted library allocation
page read and write
29B4759B000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B47CDA000
trusted library allocation
page read and write
29B46C2B000
trusted library allocation
page read and write
2200C63E000
unkown
page execute read
29B3CB60000
heap
page read and write
29B477CC000
trusted library allocation
page read and write
29B475DB000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB4F000
heap
page read and write
29B46CA2000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B4E7AB000
trusted library allocation
page read and write
29B46E3D000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B474E7000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47CB5000
trusted library allocation
page read and write
29B3CB04000
heap
page read and write
29B42D79000
trusted library allocation
page read and write
29B47CB3000
trusted library allocation
page read and write
2200D2AC000
heap
page read and write
29B45EBD000
trusted library allocation
page read and write
29B47733000
trusted library allocation
page read and write
29B45EEB000
trusted library allocation
page read and write
29B4DFF9000
trusted library allocation
page read and write
29B480A9000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B480C1000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B4DE9B000
trusted library allocation
page read and write
29B4DF9B000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
C24DDFA000
stack
page read and write
29B3CB32000
heap
page read and write
29B3CB6F000
heap
page read and write
29B49444000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
29B491A7000
trusted library allocation
page read and write
29B4DECC000
trusted library allocation
page read and write
29B4963E000
trusted library allocation
page read and write
29B46E5C000
trusted library allocation
page read and write
29B47FBE000
trusted library allocation
page read and write
29B47CA9000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B50980000
trusted library allocation
page read and write
29B485A2000
trusted library allocation
page read and write
29B42C6F000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B3CB32000
heap
page read and write
29B42CEF000
trusted library allocation
page read and write
29B47764000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B3CB4F000
heap
page read and write
29B485B8000
trusted library allocation
page read and write
AEE113E000
unkown
page readonly
25B29860000
heap
page read and write
29B47998000
trusted library allocation
page read and write
29B41AF6000
trusted library allocation
page read and write
29B46D9A000
trusted library allocation
page read and write
29B4756A000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
29B467AE000
trusted library allocation
page read and write
29B47CD0000
trusted library allocation
page read and write
29B4589A000
trusted library allocation
page read and write
29B4DFE0000
trusted library allocation
page read and write
29B41BA0000
trusted library allocation
page read and write
29B4676B000
trusted library allocation
page read and write
29B45964000
trusted library allocation
page read and write
29B45AFC000
trusted library allocation
page read and write
29B4DFF4000
trusted library allocation
page read and write
1375000
heap
page read and write
29B494F4000
trusted library allocation
page read and write
29B4DCA5000
trusted library allocation
page read and write
29B47AC9000
trusted library allocation
page read and write
29B42D9E000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
2200D361000
heap
page read and write
29B485A6000
trusted library allocation
page read and write
25B29A80000
heap
page read and write
29B496CC000
trusted library allocation
page read and write
29B4F701000
trusted library allocation
page read and write
29B45977000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29E2F923000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B46DC8000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47ABE000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
4A33E3E000
stack
page read and write
29B45ECD000
trusted library allocation
page read and write
29B50DE2000
trusted library allocation
page read and write
559F47D000
stack
page read and write
29B3CB4F000
heap
page read and write
29B3CB1D000
heap
page read and write
29B494AC000
trusted library allocation
page read and write
29B46762000
trusted library allocation
page read and write
29B41BB4000
trusted library allocation
page read and write
AEDD7D8000
stack
page read and write
29B42DEB000
trusted library allocation
page read and write
29B475C8000
trusted library allocation
page read and write
29B4805F000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
11650600000
trusted library allocation
page read and write
29B481F0000
trusted library allocation
page read and write
29B46765000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B45A58000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B3CB24000
heap
page read and write
29B479CF000
trusted library allocation
page read and write
29B484BF000
trusted library allocation
page read and write
29B3CB3D000
heap
page read and write
29B46DA5000
trusted library allocation
page read and write
29B475D3000
trusted library allocation
page read and write
29B3CB54000
heap
page read and write
1C3077A0000
heap
page read and write
29B3CB1E000
heap
page read and write
29B3CB5E000
heap
page read and write
29B4725E000
trusted library allocation
page read and write
29B47CD5000
trusted library allocation
page read and write
29B477CC000
trusted library allocation
page read and write
29B4599E000
trusted library allocation
page read and write
29B4772B000
trusted library allocation
page read and write
29B46D7E000
trusted library allocation
page read and write
29B4DCD6000
trusted library allocation
page read and write
29B3CB3D000
heap
page read and write
29B46FF6000
trusted library allocation
page read and write
29B4DC3E000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B4DBC8000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B41B75000
trusted library allocation
page read and write
29B4DB7B000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B4DB4C000
trusted library allocation
page read and write
29B4DC43000
trusted library allocation
page read and write
29B45EB1000
trusted library allocation
page read and write
29B4588A000
trusted library allocation
page read and write
29B4851A000
trusted library allocation
page read and write
29B4DCF0000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B4757B000
trusted library allocation
page read and write
29B47A1E000
trusted library allocation
page read and write
29B42C6A000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B4DFF0000
trusted library allocation
page read and write
29B47953000
trusted library allocation
page read and write
29B4DAD7000
trusted library allocation
page read and write
29B45A3D000
trusted library allocation
page read and write
29B478CC000
trusted library allocation
page read and write
29B4DAC0000
trusted library allocation
page read and write
29B47CEC000
trusted library allocation
page read and write
29B46FCC000
trusted library allocation
page read and write
29B4DCFB000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B475C5000
trusted library allocation
page read and write
29B46EA0000
trusted library allocation
page read and write
29E2FB00000
heap
page read and write
29B45EF4000
trusted library allocation
page read and write
29B475A8000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B47AE9000
trusted library allocation
page read and write
29B433D3000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B433EF000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B3CB5E000
heap
page read and write
2200D362000
heap
page read and write
29B3CB25000
heap
page read and write
25B29A25000
heap
page read and write
29B4DEC9000
trusted library allocation
page read and write
29B47AC7000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B42AC9000
trusted library allocation
page read and write
29B3CB1C000
heap
page read and write
29B4757B000
trusted library allocation
page read and write
1C30797A000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB5C000
heap
page read and write
29B48573000
trusted library allocation
page read and write
29B41B6A000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
C24DDFF000
stack
page read and write
29B46797000
trusted library allocation
page read and write
29B484AB000
trusted library allocation
page read and write
29B47C8C000
trusted library allocation
page read and write
2200D320000
heap
page read and write
29B4568E000
heap
page read and write
29B4DFB3000
trusted library allocation
page read and write
29B4599E000
trusted library allocation
page read and write
29B4DED6000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B3CB3E000
heap
page read and write
29B4DFF7000
trusted library allocation
page read and write
29B4720D000
trusted library allocation
page read and write
29B42D27000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B4672F000
trusted library allocation
page read and write
2200C5EF000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B42D9E000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B3CB4F000
heap
page read and write
29B45699000
heap
page read and write
29B4589A000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B50D3E000
trusted library allocation
page read and write
29B42D4F000
trusted library allocation
page read and write
29B4599E000
trusted library allocation
page read and write
29B3CB90000
heap
page read and write
29B499E1000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B46DBD000
trusted library allocation
page read and write
29B3CB1C000
heap
page read and write
29B46DA1000
trusted library allocation
page read and write
2200C3B0000
trusted library section
page readonly
29B48481000
trusted library allocation
page read and write
29B42D79000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B46DC8000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B42C4F000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B3CB40000
heap
page read and write
29B4DADD000
trusted library allocation
page read and write
29B45676000
heap
page read and write
29B494F7000
trusted library allocation
page read and write
29B48090000
trusted library allocation
page read and write
559D1CB000
stack
page read and write
29B51D23000
trusted library allocation
page read and write
1375000
heap
page read and write
29B4857C000
trusted library allocation
page read and write
29B5137E000
heap
page read and write
29B4942C000
trusted library allocation
page read and write
2200C620000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB88000
heap
page read and write
1C307730000
heap
page read and write
29E2F864000
heap
page read and write
29B47F72000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B4568E000
heap
page read and write
29B4DCEA000
trusted library allocation
page read and write
29B48496000
trusted library allocation
page read and write
29B481BB000
trusted library allocation
page read and write
29B46CBD000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B45964000
trusted library allocation
page read and write
29B46E71000
trusted library allocation
page read and write
29B47938000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B494FA000
trusted library allocation
page read and write
29B3CB5D000
heap
page read and write
29B47CDC000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB20000
heap
page read and write
29B4677E000
trusted library allocation
page read and write
29B42D2C000
trusted library allocation
page read and write
29B494F2000
trusted library allocation
page read and write
29B484BB000
trusted library allocation
page read and write
29B47A11000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B51061000
trusted library allocation
page read and write
29B3CB15000
heap
page read and write
29B47ACD000
trusted library allocation
page read and write
29B456CE000
heap
page read and write
29B4768C000
trusted library allocation
page read and write
29B4847D000
trusted library allocation
page read and write
29B45AA9000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
2200D28D000
heap
page read and write
29B45EA7000
trusted library allocation
page read and write
29B480B7000
trusted library allocation
page read and write
29B456BC000
heap
page read and write
29B4675E000
trusted library allocation
page read and write
29B414BF000
trusted library allocation
page read and write
29B4797D000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
2200D33D000
heap
page read and write
29B45EED000
trusted library allocation
page read and write
29B4DEB7000
trusted library allocation
page read and write
29B45EFD000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B4828D000
trusted library allocation
page read and write
29B51D12000
trusted library allocation
page read and write
29B4DCC8000
trusted library allocation
page read and write
29B3CB6F000
heap
page read and write
29B494F2000
trusted library allocation
page read and write
29B4966B000
trusted library allocation
page read and write
29B45ED1000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B510F3000
trusted library allocation
page read and write
29B48747000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B456E7000
heap
page read and write
29B3CB3B000
heap
page read and write
29B3CB1A000
heap
page read and write
29B45ECD000
trusted library allocation
page read and write
29B46D61000
trusted library allocation
page read and write
29B48588000
trusted library allocation
page read and write
29B4949F000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4DE13000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B47CC8000
trusted library allocation
page read and write
29B475EC000
trusted library allocation
page read and write
29B510E8000
trusted library allocation
page read and write
29B4DB6C000
trusted library allocation
page read and write
29B472A8000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B47ABE000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B478C4000
trusted library allocation
page read and write
29B47AA3000
trusted library allocation
page read and write
29B3CB9A000
heap
page read and write
29B47BA3000
trusted library allocation
page read and write
29B4DECC000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B4DA87000
trusted library allocation
page read and write
29B512F4000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B48234000
trusted library allocation
page read and write
2200C514000
trusted library allocation
page read and write
29B47CC5000
trusted library allocation
page read and write
29B4DCDF000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B46769000
trusted library allocation
page read and write
29B481BB000
trusted library allocation
page read and write
29B494B6000
trusted library allocation
page read and write
29B482FB000
trusted library allocation
page read and write
29B47952000
trusted library allocation
page read and write
29B4DB4C000
trusted library allocation
page read and write
29B479DE000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B46CA0000
trusted library allocation
page read and write
29B4F6F9000
trusted library allocation
page read and write
AEDE7FE000
stack
page read and write
29B47CFB000
trusted library allocation
page read and write
29B473F9000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
2200CE05000
trusted library allocation
page read and write
2200D29C000
heap
page read and write
29B3CB1A000
heap
page read and write
29B3CB32000
heap
page read and write
29B471E9000
trusted library allocation
page read and write
29B458CF000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47AA3000
trusted library allocation
page read and write
29B4E75A000
trusted library allocation
page read and write
29B47CDA000
trusted library allocation
page read and write
29B494D3000
trusted library allocation
page read and write
29B4828D000
trusted library allocation
page read and write
29B46C3F000
trusted library allocation
page read and write
29B47AA0000
trusted library allocation
page read and write
29B47ACD000
trusted library allocation
page read and write
AEE093E000
stack
page read and write
29B3CB40000
heap
page read and write
29B472A6000
trusted library allocation
page read and write
29B4568F000
heap
page read and write
29B4778E000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B3CB8D000
heap
page read and write
29B46D7F000
trusted library allocation
page read and write
29B4359D000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B3CB2A000
heap
page read and write
29B496E8000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B4DCD4000
trusted library allocation
page read and write
29B496BC000
trusted library allocation
page read and write
29B47C4B000
trusted library allocation
page read and write
2200D2A0000
heap
page read and write
29B3CB21000
heap
page read and write
29B45864000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B45AFC000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B478A5000
trusted library allocation
page read and write
29B487A0000
trusted library allocation
page read and write
29B479A0000
trusted library allocation
page read and write
29B491E6000
trusted library allocation
page read and write
29B485A6000
trusted library allocation
page read and write
29B50D98000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B485C4000
trusted library allocation
page read and write
29B475CB000
trusted library allocation
page read and write
29B485B8000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B47953000
trusted library allocation
page read and write
29B475A8000
trusted library allocation
page read and write
29B46E5C000
trusted library allocation
page read and write
29B485EC000
trusted library allocation
page read and write
29B4567F000
heap
page read and write
29B47991000
trusted library allocation
page read and write
29B3CB90000
heap
page read and write
29B482FB000
trusted library allocation
page read and write
29B477BB000
trusted library allocation
page read and write
29B42CF9000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B47A76000
trusted library allocation
page read and write
1C3077BA000
heap
page read and write
29B47CA9000
trusted library allocation
page read and write
29B42DDF000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
934000
unkown
page readonly
29B51D5C000
trusted library allocation
page read and write
29B45A9D000
trusted library allocation
page read and write
29B4DBF9000
trusted library allocation
page read and write
1369000
heap
page read and write
29B45E27000
trusted library allocation
page read and write
29B3CBA1000
heap
page read and write
29B3CB80000
heap
page read and write
29B3CB8A000
heap
page read and write
29B512C0000
trusted library allocation
page read and write
29B45EE3000
trusted library allocation
page read and write
29B3CB48000
heap
page read and write
2200C636000
unkown
page execute read
29B47C8C000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B42E38000
trusted library allocation
page read and write
29B49431000
trusted library allocation
page read and write
29B4DEC1000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B51D23000
trusted library allocation
page read and write
29B47BEB000
trusted library allocation
page read and write
29B467D1000
trusted library allocation
page read and write
29B4790F000
trusted library allocation
page read and write
29B45671000
heap
page read and write
29B3CB1E000
heap
page read and write
29B5134C000
heap
page read and write
29B3CB4F000
heap
page read and write
29B479DD000
trusted library allocation
page read and write
2200D2BD000
heap
page read and write
29E2FA17000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B4759B000
trusted library allocation
page read and write
29B47749000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B4824A000
trusted library allocation
page read and write
29B4E2B8000
trusted library allocation
page read and write
29B50DFE000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B50198000
trusted library allocation
page read and write
29B4DCCD000
trusted library allocation
page read and write
29B4DCE4000
trusted library allocation
page read and write
29B46C79000
trusted library allocation
page read and write
29B467B0000
trusted library allocation
page read and write
29B47860000
trusted library allocation
page read and write
29B47947000
trusted library allocation
page read and write
29E2FB03000
heap
page read and write
29B4753A000
trusted library allocation
page read and write
29B47957000
trusted library allocation
page read and write
29B48583000
trusted library allocation
page read and write
29B45EFB000
trusted library allocation
page read and write
29B4966B000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B475C5000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB5C000
heap
page read and write
29B47529000
trusted library allocation
page read and write
29B4758D000
trusted library allocation
page read and write
29B494F2000
trusted library allocation
page read and write
29B48458000
trusted library allocation
page read and write
29B3CB4E000
heap
page read and write
29B4F666000
trusted library allocation
page read and write
29B477B8000
trusted library allocation
page read and write
29B4DF9F000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B3CB88000
heap
page read and write
29B3CB44000
heap
page read and write
29B475D3000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB80000
heap
page read and write
25B29890000
heap
page read and write
29B46E9A000
trusted library allocation
page read and write
29B4587B000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B47C97000
trusted library allocation
page read and write
1C307800000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B484FC000
trusted library allocation
page read and write
29E2FA20000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4677E000
trusted library allocation
page read and write
29B3CB2D000
heap
page read and write
29B481ED000
trusted library allocation
page read and write
29B43561000
trusted library allocation
page read and write
29B494FA000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47CC5000
trusted library allocation
page read and write
29B3CB4E000
heap
page read and write
29B3CB20000
heap
page read and write
29B3CB1A000
heap
page read and write
29B459A5000
trusted library allocation
page read and write
29B478CC000
trusted library allocation
page read and write
29B456DD000
heap
page read and write
29B3CB4D000
heap
page read and write
29B485E4000
trusted library allocation
page read and write
29B4F5BA000
trusted library allocation
page read and write
29B4598C000
trusted library allocation
page read and write
29B475BE000
trusted library allocation
page read and write
29B472F6000
trusted library allocation
page read and write
2200D3A7000
heap
page read and write
2200D240000
heap
page read and write
29B459A5000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B512E5000
trusted library allocation
page read and write
29B494E4000
trusted library allocation
page read and write
29B4759A000
trusted library allocation
page read and write
1C0E000
stack
page read and write
29B3CB2A000
heap
page read and write
29B485A8000
trusted library allocation
page read and write
29B47812000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B477F4000
trusted library allocation
page read and write
29B42C47000
trusted library allocation
page read and write
29B47AA5000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B475BB000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
11650707000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B3CB5C000
heap
page read and write
29B512B7000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B47AD1000
trusted library allocation
page read and write
29B45A8A000
trusted library allocation
page read and write
29B49454000
trusted library allocation
page read and write
29B45968000
trusted library allocation
page read and write
29B475D3000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B47CD5000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B456DE000
heap
page read and write
29B47C90000
trusted library allocation
page read and write
29B4E773000
trusted library allocation
page read and write
29B4DB63000
trusted library allocation
page read and write
29B48221000
trusted library allocation
page read and write
29B4DEAF000
trusted library allocation
page read and write
29B4DD6A000
trusted library allocation
page read and write
29B484A2000
trusted library allocation
page read and write
2200D2A0000
heap
page read and write
29B4758D000
trusted library allocation
page read and write
29B42CE8000
trusted library allocation
page read and write
29B480C7000
trusted library allocation
page read and write
29B47C5A000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
2200C220000
heap
page read and write
29B477B8000
trusted library allocation
page read and write
29B477CC000
trusted library allocation
page read and write
29B42C6A000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B47AB0000
trusted library allocation
page read and write
559FD3E000
unkown
page read and write
29B46765000
trusted library allocation
page read and write
29B494AD000
trusted library allocation
page read and write
29B3CB15000
heap
page read and write
29B3CB5D000
heap
page read and write
29B479CC000
trusted library allocation
page read and write
25B29900000
trusted library allocation
page read and write
1C307C07000
trusted library allocation
page read and write
29B4DEE3000
trusted library allocation
page read and write
2200C5C2000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B49493000
trusted library allocation
page read and write
29B42C79000
trusted library allocation
page read and write
29B42AA7000
trusted library allocation
page read and write
29B42C59000
trusted library allocation
page read and write
29B482D1000
trusted library allocation
page read and write
29B501DE000
trusted library allocation
page read and write
29B47822000
trusted library allocation
page read and write
29B478F1000
trusted library allocation
page read and write
29B485A8000
trusted library allocation
page read and write
29B47AE9000
trusted library allocation
page read and write
29B475CB000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B4850D000
trusted library allocation
page read and write
29B481F5000
trusted library allocation
page read and write
29B477BB000
trusted library allocation
page read and write
29B4FA00000
trusted library allocation
page read and write
29B467CA000
trusted library allocation
page read and write
29B47FE0000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B47252000
trusted library allocation
page read and write
29B47505000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B4DEC9000
trusted library allocation
page read and write
29B491BF000
trusted library allocation
page read and write
29B46F36000
trusted library allocation
page read and write
29B48583000
trusted library allocation
page read and write
29B3CB19000
heap
page read and write
1C307C03000
trusted library allocation
page read and write
29B475FE000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B47240000
trusted library allocation
page read and write
29B4DBEB000
trusted library allocation
page read and write
29B42D73000
trusted library allocation
page read and write
25B2B3AE000
heap
page read and write
29B481F0000
trusted library allocation
page read and write
29B47A81000
trusted library allocation
page read and write
29B475BB000
trusted library allocation
page read and write
29B41B9B000
trusted library allocation
page read and write
29B4DB89000
trusted library allocation
page read and write
29E2F903000
trusted library allocation
page read and write
2200C5E9000
trusted library allocation
page read and write
29B4764C000
trusted library allocation
page read and write
29B479EA000
trusted library allocation
page read and write
29B477B8000
trusted library allocation
page read and write
29B3CB3B000
heap
page read and write
29B4795A000
trusted library allocation
page read and write
29B4DEC3000
trusted library allocation
page read and write
25B2B3AF000
heap
page read and write
29B47A89000
trusted library allocation
page read and write
29B4566B000
heap
page read and write
29B48526000
trusted library allocation
page read and write
29B4DCDF000
trusted library allocation
page read and write
29B46DBD000
trusted library allocation
page read and write
29B47AE9000
trusted library allocation
page read and write
29B491DE000
trusted library allocation
page read and write
29B50D00000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
29B487AC000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B3CB88000
heap
page read and write
29B471B8000
trusted library allocation
page read and write
29B41C00000
trusted library allocation
page read and write
29B47539000
trusted library allocation
page read and write
29B4DF57000
trusted library allocation
page read and write
29B482F9000
trusted library allocation
page read and write
29B43328000
trusted library allocation
page read and write
29B42CEA000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B494CE000
trusted library allocation
page read and write
29B4DB41000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B42AFA000
trusted library allocation
page read and write
29B42D9E000
trusted library allocation
page read and write
29B474BF000
trusted library allocation
page read and write
29B47AF5000
trusted library allocation
page read and write
29B4809E000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B47259000
trusted library allocation
page read and write
29B4795C000
trusted library allocation
page read and write
29B45ACD000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB1A000
heap
page read and write
29B3CB5C000
heap
page read and write
29B3CB36000
heap
page read and write
29B3CB4F000
heap
page read and write
29B47944000
trusted library allocation
page read and write
29B475BB000
trusted library allocation
page read and write
29B48489000
trusted library allocation
page read and write
C250DFE000
stack
page read and write
29B467F4000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B4DD68000
trusted library allocation
page read and write
29B47CD7000
trusted library allocation
page read and write
29B485D1000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B3CB8E000
heap
page read and write
29B4E2B8000
trusted library allocation
page read and write
29B4A802000
trusted library allocation
page read and write
29B471BF000
trusted library allocation
page read and write
29B46CC1000
trusted library allocation
page read and write
29B3CB28000
heap
page read and write
29B456DE000
heap
page read and write
29B467AB000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B479FB000
trusted library allocation
page read and write
29B494AC000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B4587B000
trusted library allocation
page read and write
29B4598A000
trusted library allocation
page read and write
29B47CA9000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B47A6B000
trusted library allocation
page read and write
29B45A77000
trusted library allocation
page read and write
29B501EC000
trusted library allocation
page read and write
1165070A000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4DF70000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B494D3000
trusted library allocation
page read and write
29B3CB30000
heap
page read and write
29B47CE6000
trusted library allocation
page read and write
29B3CB34000
heap
page read and write
29B3CB20000
heap
page read and write
29B4E245000
trusted library allocation
page read and write
29B46E6E000
trusted library allocation
page read and write
29B47AD1000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B47C2B000
trusted library allocation
page read and write
2ADDC4103000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
92C000
unkown
page read and write
29B46756000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B4DB40000
trusted library allocation
page read and write
AEDCD9B000
stack
page read and write
29B3CB1E000
heap
page read and write
29B485B4000
trusted library allocation
page read and write
29B49123000
trusted library allocation
page read and write
29B46E90000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B482AB000
trusted library allocation
page read and write
29B4DEEE000
trusted library allocation
page read and write
29B4792D000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
29B47477000
trusted library allocation
page read and write
29B477F5000
trusted library allocation
page read and write
3E10000
heap
page read and write
29B3CB1E000
heap
page read and write
1348000
heap
page read and write
29B47024000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B3CB25000
heap
page read and write
29B4DBAD000
trusted library allocation
page read and write
29B45A87000
trusted library allocation
page read and write
29B433D0000
trusted library allocation
page read and write
29B478BC000
trusted library allocation
page read and write
29B46E5E000
trusted library allocation
page read and write
29B45673000
heap
page read and write
29B49682000
trusted library allocation
page read and write
29B4755F000
trusted library allocation
page read and write
29B46EAD000
trusted library allocation
page read and write
29B4DAC4000
trusted library allocation
page read and write
29B501E5000
trusted library allocation
page read and write
29B47BBA000
trusted library allocation
page read and write
12168F524000
trusted library allocation
page read and write
29B4DB75000
trusted library allocation
page read and write
29B47AC9000
trusted library allocation
page read and write
29B47337000
trusted library allocation
page read and write
29B47A39000
trusted library allocation
page read and write
29B4F5D6000
trusted library allocation
page read and write
29B47BF2000
trusted library allocation
page read and write
29B47A6D000
trusted library allocation
page read and write
29B47951000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B4727C000
trusted library allocation
page read and write
29B46C57000
trusted library allocation
page read and write
29B42DF4000
trusted library allocation
page read and write
2200D2AC000
heap
page read and write
29B4851A000
trusted library allocation
page read and write
29B4F701000
trusted library allocation
page read and write
29B475C8000
trusted library allocation
page read and write
29B47CB3000
trusted library allocation
page read and write
29B485B8000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B4DEE7000
trusted library allocation
page read and write
29B47936000
trusted library allocation
page read and write
29B479EA000
trusted library allocation
page read and write
29B4566B000
heap
page read and write
29B4DCE4000
trusted library allocation
page read and write
29B4676B000
trusted library allocation
page read and write
29B4F724000
trusted library allocation
page read and write
29B47C1E000
trusted library allocation
page read and write
29B4679F000
trusted library allocation
page read and write
29B3CB5D000
heap
page read and write
29B4790C000
trusted library allocation
page read and write
29B456DE000
heap
page read and write
29B3CB81000
heap
page read and write
29B45853000
trusted library allocation
page read and write
29B456A3000
heap
page read and write
1381000
heap
page read and write
29E2F860000
heap
page read and write
29B479CC000
trusted library allocation
page read and write
29B42AA7000
trusted library allocation
page read and write
29B481AF000
trusted library allocation
page read and write
29B42CEB000
trusted library allocation
page read and write
29B467F8000
trusted library allocation
page read and write
29B4726A000
trusted library allocation
page read and write
29B46762000
trusted library allocation
page read and write
29B45968000
trusted library allocation
page read and write
29B477D6000
trusted library allocation
page read and write
29B4DB59000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
1C307B20000
unclassified section
page readonly
29B4DFF7000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B45A47000
trusted library allocation
page read and write
29B47CD0000
trusted library allocation
page read and write
29B49454000
trusted library allocation
page read and write
29B48312000
trusted library allocation
page read and write
29B46E71000
trusted library allocation
page read and write
29B485E4000
trusted library allocation
page read and write
29E2F440000
unclassified section
page readonly
29B496E8000
trusted library allocation
page read and write
29B4F704000
trusted library allocation
page read and write
29B479BE000
trusted library allocation
page read and write
4A312EE000
stack
page read and write
29B46DC8000
trusted library allocation
page read and write
29B45652000
heap
page read and write
29B4331D000
trusted library allocation
page read and write
2200D3B7000
heap
page read and write
29B4F666000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47C94000
trusted library allocation
page read and write
2200D326000
heap
page read and write
29B475BB000
trusted library allocation
page read and write
29B3CB85000
heap
page read and write
29B459A5000
trusted library allocation
page read and write
29B4DDFA000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B3CB4A000
heap
page read and write
29B512A3000
trusted library allocation
page read and write
29B3CB3B000
heap
page read and write
29B494F2000
trusted library allocation
page read and write
29B491A7000
trusted library allocation
page read and write
2200D37B000
heap
page read and write
2200D330000
heap
page read and write
29B4772B000
trusted library allocation
page read and write
29B47CFE000
trusted library allocation
page read and write
29B47543000
trusted library allocation
page read and write
1C307770000
heap
page readonly
29B47AE9000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
29B50D84000
trusted library allocation
page read and write
29B477AE000
trusted library allocation
page read and write
29B3CB3B000
heap
page read and write
29B5127E000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B48065000
trusted library allocation
page read and write
29B4DED8000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B4DFF9000
trusted library allocation
page read and write
29B484A2000
trusted library allocation
page read and write
29B3CB2D000
heap
page read and write
29B3CB22000
heap
page read and write
29B45EB2000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB38000
heap
page read and write
29B3CB44000
heap
page read and write
29B47CA3000
trusted library allocation
page read and write
29B481F5000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B42D31000
trusted library allocation
page read and write
29B42D3F000
trusted library allocation
page read and write
29B46DAA000
trusted library allocation
page read and write
29B51A61000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB2A000
heap
page read and write
29B3CB8A000
heap
page read and write
29B494E4000
trusted library allocation
page read and write
29B4824A000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B478C4000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
1381000
heap
page read and write
29B49183000
trusted library allocation
page read and write
860000
unkown
page readonly
29B4585F000
trusted library allocation
page read and write
29B491EE000
trusted library allocation
page read and write
25B29780000
heap
page read and write
29B3CB1D000
heap
page read and write
29B4739B000
trusted library allocation
page read and write
29B45E75000
trusted library allocation
page read and write
29B484A8000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB24000
heap
page read and write
29B485EC000
trusted library allocation
page read and write
29B4DF84000
trusted library allocation
page read and write
2200D36A000
heap
page read and write
29B48299000
trusted library allocation
page read and write
29B414EF000
trusted library allocation
page read and write
29B4943F000
trusted library allocation
page read and write
29B481DF000
trusted library allocation
page read and write
29B42D95000
trusted library allocation
page read and write
1C307550000
unclassified section
page readonly
29B47A76000
trusted library allocation
page read and write
29B471FE000
trusted library allocation
page read and write
2200D241000
heap
page read and write
29B45A6F000
trusted library allocation
page read and write
29B475D5000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B4DAF7000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B43598000
trusted library allocation
page read and write
29B4DC47000
trusted library allocation
page read and write
29E2F4C6000
remote allocation
page execute read
29B46DAE000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B47984000
trusted library allocation
page read and write
29B478BC000
trusted library allocation
page read and write
29B45ACF000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B45EE3000
trusted library allocation
page read and write
29B42D69000
trusted library allocation
page read and write
29B4872F000
trusted library allocation
page read and write
29B4677E000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B4DE47000
trusted library allocation
page read and write
29B46D92000
trusted library allocation
page read and write
29B414EF000
trusted library allocation
page read and write
29B4581D000
trusted library allocation
page read and write
29B4DBFB000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
2200D326000
heap
page read and write
29B475D3000
trusted library allocation
page read and write
29B4DDAB000
trusted library allocation
page read and write
29B47484000
trusted library allocation
page read and write
29B4DEF3000
trusted library allocation
page read and write
29B479ED000
trusted library allocation
page read and write
C2505FF000
stack
page read and write
29B45EDD000
trusted library allocation
page read and write
29B3CB8E000
heap
page read and write
29B47743000
trusted library allocation
page read and write
29B50D8C000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
2200C3A0000
unclassified section
page read and write
29B48259000
trusted library allocation
page read and write
1C3077A3000
heap
page read and write
25B298CD000
heap
page read and write
29B477D4000
trusted library allocation
page read and write
559DBD8000
stack
page read and write
29B512A6000
trusted library allocation
page read and write
29B49996000
trusted library allocation
page read and write
2200C5AD000
trusted library allocation
page read and write
11650400000
heap
page read and write
29B41B66000
trusted library allocation
page read and write
29B4DCCD000
trusted library allocation
page read and write
29B47AE9000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B5105D000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B4F6B1000
trusted library allocation
page read and write
1C307A00000
heap
page read and write
29B4805F000
trusted library allocation
page read and write
29B477D4000
trusted library allocation
page read and write
29B42CEA000
trusted library allocation
page read and write
29B4846C000
trusted library allocation
page read and write
25B29A20000
heap
page read and write
29B3CB44000
heap
page read and write
29B47594000
trusted library allocation
page read and write
29B49682000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B46C2D000
trusted library allocation
page read and write
29B46C4F000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B479A0000
trusted library allocation
page read and write
29B4949B000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B47C8C000
trusted library allocation
page read and write
29B48591000
trusted library allocation
page read and write
29B45675000
heap
page read and write
25B298C0000
heap
page read and write
29B47260000
trusted library allocation
page read and write
29B3CB67000
heap
page read and write
29B50EC7000
trusted library allocation
page read and write
2FF2E0A03000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
29E2FA05000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
C24EDFE000
stack
page read and write
29B3CB44000
heap
page read and write
29B471AE000
trusted library allocation
page read and write
29B3CB15000
heap
page read and write
29B472F5000
trusted library allocation
page read and write
29B3CB12000
heap
page read and write
29B5129B000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB04000
heap
page read and write
29B42C99000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B494A6000
trusted library allocation
page read and write
29B3CB53000
heap
page read and write
29B482D3000
trusted library allocation
page read and write
29B48535000
trusted library allocation
page read and write
29E2F900000
trusted library allocation
page read and write
29B3CB8B000
heap
page read and write
29B4795C000
trusted library allocation
page read and write
29B47A2D000
trusted library allocation
page read and write
29B478A1000
trusted library allocation
page read and write
29B47CD7000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B45A8E000
trusted library allocation
page read and write
29B47662000
trusted library allocation
page read and write
29B480E9000
trusted library allocation
page read and write
1C30796A000
trusted library allocation
page read and write
29B47CD7000
trusted library allocation
page read and write
29B4792F000
trusted library allocation
page read and write
29B45E18000
trusted library allocation
page read and write
29B4F618000
trusted library allocation
page read and write
29B4568E000
heap
page read and write
12E4000
heap
page read and write
12E4000
heap
page read and write
29B47F89000
trusted library allocation
page read and write
29B47CD0000
trusted library allocation
page read and write
29B45E9C000
trusted library allocation
page read and write
29B3CB54000
heap
page read and write
29B46EAF000
trusted library allocation
page read and write
1FB981104000
trusted library allocation
page read and write
20126E604000
trusted library allocation
page read and write
29B4DCD4000
trusted library allocation
page read and write
29B46D6E000
trusted library allocation
page read and write
29B479BE000
trusted library allocation
page read and write
29B479EA000
trusted library allocation
page read and write
29B496C4000
trusted library allocation
page read and write
29B47CE9000
trusted library allocation
page read and write
29B4337F000
trusted library allocation
page read and write
2200D36D000
heap
page read and write
29B3CB24000
heap
page read and write
29B47BEF000
trusted library allocation
page read and write
29B47925000
trusted library allocation
page read and write
29B50195000
trusted library allocation
page read and write
29B42D9A000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B3CB24000
heap
page read and write
29B477B6000
trusted library allocation
page read and write
29B47877000
trusted library allocation
page read and write
29B47579000
trusted library allocation
page read and write
116503C0000
heap
page read and write
29B477F6000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B474E4000
trusted library allocation
page read and write
29B47685000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B3CB3E000
heap
page read and write
29B46E7A000
trusted library allocation
page read and write
29B477AE000
trusted library allocation
page read and write
29B4DB0A000
trusted library allocation
page read and write
2200CE07000
trusted library allocation
page read and write
12DD000
stack
page read and write
29B45955000
trusted library allocation
page read and write
29B482D3000
trusted library allocation
page read and write
29B47255000
trusted library allocation
page read and write
29B47BA3000
trusted library allocation
page read and write
29B4968E000
trusted library allocation
page read and write
29B47A36000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4792F000
trusted library allocation
page read and write
29B4949D000
trusted library allocation
page read and write
29B47C94000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B485D1000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
29B479C6000
trusted library allocation
page read and write
29B46E89000
trusted library allocation
page read and write
29B4584B000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB4A000
heap
page read and write
29B51301000
heap
page read and write
29B474A7000
trusted library allocation
page read and write
1373000
heap
page read and write
29B3CB1E000
heap
page read and write
29B3CB82000
heap
page read and write
29B496C4000
trusted library allocation
page read and write
29B46D6E000
trusted library allocation
page read and write
29B45AB2000
trusted library allocation
page read and write
29B47CDA000
trusted library allocation
page read and write
29B512B7000
trusted library allocation
page read and write
29B47862000
trusted library allocation
page read and write
2200C578000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4DF41000
trusted library allocation
page read and write
29B486E4000
trusted library allocation
page read and write
1C30795F000
trusted library allocation
page read and write
4A335FE000
unkown
page readonly
29B4759D000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B45669000
heap
page read and write
29B479DE000
trusted library allocation
page read and write
217660403000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B47C45000
trusted library allocation
page read and write
29B47A6D000
trusted library allocation
page read and write
2200D321000
heap
page read and write
29B3CB5E000
heap
page read and write
29B4E200000
trusted library allocation
page read and write
29B4675E000
trusted library allocation
page read and write
29B4949D000
trusted library allocation
page read and write
29B49457000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B50900000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B4968E000
trusted library allocation
page read and write
29B48583000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B46F9D000
trusted library allocation
page read and write
29B475DB000
trusted library allocation
page read and write
29B479B9000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB8D000
heap
page read and write
1C307913000
trusted library allocation
page read and write
29B4676E000
trusted library allocation
page read and write
29B46C79000
trusted library allocation
page read and write
29B485B0000
trusted library allocation
page read and write
29B4F724000
trusted library allocation
page read and write
29B48197000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB4F000
heap
page read and write
29B46FC6000
trusted library allocation
page read and write
29B435A9000
trusted library allocation
page read and write
2200D2CA000
heap
page read and write
2200D3A7000
heap
page read and write
29B3CB5C000
heap
page read and write
29B47A2D000
trusted library allocation
page read and write
29B512FE000
trusted library allocation
page read and write
29B494E4000
trusted library allocation
page read and write
29B481F0000
trusted library allocation
page read and write
29B45985000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B3CB24000
heap
page read and write
29E2F866000
heap
page read and write
29B3CB92000
heap
page read and write
120E000
stack
page read and write
29B3CB1E000
heap
page read and write
29B482E6000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
1C30790C000
trusted library allocation
page read and write
29B43556000
trusted library allocation
page read and write
29B47CB3000
trusted library allocation
page read and write
55A053E000
unkown
page readonly
1371000
heap
page read and write
29B4758D000
trusted library allocation
page read and write
29B475A8000
trusted library allocation
page read and write
29B485FD000
trusted library allocation
page read and write
29B3CB43000
heap
page read and write
29B4DECF000
trusted library allocation
page read and write
2200C63C000
unkown
page execute read
29B51296000
trusted library allocation
page read and write
29B49452000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B47AC1000
trusted library allocation
page read and write
25B298D2000
heap
page read and write
29B4DEE7000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B485B4000
trusted library allocation
page read and write
29B47CDA000
trusted library allocation
page read and write
29B4DC3A000
trusted library allocation
page read and write
29B45685000
heap
page read and write
29B47249000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B3CB5C000
heap
page read and write
29B3CB32000
heap
page read and write
29B433DC000
trusted library allocation
page read and write
29B47938000
trusted library allocation
page read and write
29B4DBB2000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B45964000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B512F7000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB2C000
heap
page read and write
29B4DD70000
trusted library allocation
page read and write
29B475B5000
trusted library allocation
page read and write
29B41B26000
trusted library allocation
page read and write
29B4E218000
trusted library allocation
page read and write
29B510C3000
trusted library allocation
page read and write
29B433E2000
trusted library allocation
page read and write
29B4E76A000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47BAF000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B510BD000
trusted library allocation
page read and write
29B4755F000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB2C000
heap
page read and write
29B50D4E000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B4DBD1000
trusted library allocation
page read and write
29B47A9E000
trusted library allocation
page read and write
29B46D3F000
trusted library allocation
page read and write
2110000
trusted library allocation
page read and write
29B491BF000
trusted library allocation
page read and write
29B496F7000
trusted library allocation
page read and write
1C3075D5000
remote allocation
page execute read
29E2F620000
heap
page read and write
29B4DEE4000
trusted library allocation
page read and write
25B298B8000
heap
page read and write
29B4679F000
trusted library allocation
page read and write
29B42AC0000
trusted library allocation
page read and write
29B4DBFE000
trusted library allocation
page read and write
29B46DB0000
trusted library allocation
page read and write
29B46C3F000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB88000
heap
page read and write
29B47AD1000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B4754F000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B3CB2C000
heap
page read and write
29B45A7A000
trusted library allocation
page read and write
29B4786B000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB1A000
heap
page read and write
29B51A04000
trusted library allocation
page read and write
29B41A23000
trusted library allocation
page read and write
29B4DEA0000
trusted library allocation
page read and write
29B4593B000
trusted library allocation
page read and write
29B458B1000
trusted library allocation
page read and write
29B477A3000
trusted library allocation
page read and write
29B48591000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B49673000
trusted library allocation
page read and write
29B50DDD000
trusted library allocation
page read and write
29B4DE94000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B48242000
trusted library allocation
page read and write
29B47586000
trusted library allocation
page read and write
11650850000
heap
page read and write
29B3CB5F000
heap
page read and write
29B3CB8A000
heap
page read and write
29B4DCEA000
trusted library allocation
page read and write
29B478F1000
trusted library allocation
page read and write
29B467B0000
trusted library allocation
page read and write
29B4DEC5000
trusted library allocation
page read and write
29B4149E000
trusted library allocation
page read and write
29B3CB89000
heap
page read and write
29B3CB20000
heap
page read and write
29B46C7B000
trusted library allocation
page read and write
29B46D9A000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B481C3000
trusted library allocation
page read and write
29B467F4000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B42C9A000
trusted library allocation
page read and write
29B47A7F000
trusted library allocation
page read and write
29B4587B000
trusted library allocation
page read and write
29B456DE000
heap
page read and write
29B45EF7000
trusted library allocation
page read and write
29B486AA000
trusted library allocation
page read and write
29B47754000
trusted library allocation
page read and write
29B46E63000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B4DCDF000
trusted library allocation
page read and write
29B4DECB000
trusted library allocation
page read and write
29B47AA3000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB44000
heap
page read and write
29B4DB67000
trusted library allocation
page read and write
29B4DF78000
trusted library allocation
page read and write
29B458CA000
trusted library allocation
page read and write
29B477D6000
trusted library allocation
page read and write
29B47C5A000
trusted library allocation
page read and write
29B50EFE000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B42DA3000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB67000
heap
page read and write
29B45E8D000
trusted library allocation
page read and write
29B3CB3F000
heap
page read and write
29B3CB20000
heap
page read and write
29B4DFE6000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B47957000
trusted library allocation
page read and write
29B46F78000
trusted library allocation
page read and write
29B479BE000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B4595A000
trusted library allocation
page read and write
29B4588A000
trusted library allocation
page read and write
29B4DED9000
trusted library allocation
page read and write
29B4F661000
trusted library allocation
page read and write
29E2F947000
trusted library allocation
page read and write
29B46DBD000
trusted library allocation
page read and write
29B48095000
trusted library allocation
page read and write
29B4949F000
trusted library allocation
page read and write
29B487AF000
trusted library allocation
page read and write
29B482D1000
trusted library allocation
page read and write
29B3CB04000
heap
page read and write
29B481E3000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B4DFAD000
trusted library allocation
page read and write
29B4793D000
trusted library allocation
page read and write
29B46467000
trusted library allocation
page read and write
29B46D5D000
trusted library allocation
page read and write
29B45668000
heap
page read and write
29B475F7000
trusted library allocation
page read and write
29B49115000
trusted library allocation
page read and write
29B45A52000
trusted library allocation
page read and write
29B50DD4000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B482D8000
trusted library allocation
page read and write
29B47CFB000
trusted library allocation
page read and write
29B4DAD3000
trusted library allocation
page read and write
29B47CB1000
trusted library allocation
page read and write
29B47C8E000
trusted library allocation
page read and write
29B3CB49000
heap
page read and write
29B3CB4F000
heap
page read and write
29B4793D000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB54000
heap
page read and write
29B46762000
trusted library allocation
page read and write
29B3CB4C000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB5E000
heap
page read and write
29B46E6B000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B433D8000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB21000
heap
page read and write
29B50D63000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B46EBC000
trusted library allocation
page read and write
25B2B3AA000
heap
page read and write
29B46D59000
trusted library allocation
page read and write
29B475BE000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B47A89000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B3CB24000
heap
page read and write
29B3CB80000
heap
page read and write
29B48262000
trusted library allocation
page read and write
29B42E35000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B47A76000
trusted library allocation
page read and write
29B48285000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B47535000
trusted library allocation
page read and write
1C307D00000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B47790000
trusted library allocation
page read and write
29B510BB000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B4805B000
trusted library allocation
page read and write
29B45A91000
trusted library allocation
page read and write
29B512B7000
trusted library allocation
page read and write
29B47A25000
trusted library allocation
page read and write
1C307560000
unclassified section
page readonly
29B43DAC000
trusted library allocation
page read and write
29B47CE7000
trusted library allocation
page read and write
29B42DEB000
trusted library allocation
page read and write
29B47405000
trusted library allocation
page read and write
29B45700000
trusted library allocation
page read and write
29B484FC000
trusted library allocation
page read and write
29B4791F000
trusted library allocation
page read and write
29B474EB000
trusted library allocation
page read and write
29B494A6000
trusted library allocation
page read and write
29B485EC000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
2200D323000
heap
page read and write
29B47277000
trusted library allocation
page read and write
29B485A2000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B3CB32000
heap
page read and write
29B3CB32000
heap
page read and write
29B43333000
trusted library allocation
page read and write
29B46F47000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B3CB3B000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
29B50EF9000
trusted library allocation
page read and write
29B48333000
trusted library allocation
page read and write
29B47AA5000
trusted library allocation
page read and write
29B4772B000
trusted library allocation
page read and write
29B473D1000
trusted library allocation
page read and write
29B498C3000
trusted library allocation
page read and write
29B46FBE000
trusted library allocation
page read and write
29B486B4000
trusted library allocation
page read and write
29B45884000
trusted library allocation
page read and write
2200C5BC000
trusted library allocation
page read and write
29B3CB90000
heap
page read and write
29B46EA0000
trusted library allocation
page read and write
29B46DA1000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB40000
heap
page read and write
29B3CB1E000
heap
page read and write
2200C150000
unclassified section
page readonly
29B45ED1000
trusted library allocation
page read and write
29B48269000
trusted library allocation
page read and write
2200C632000
unkown
page execute read
29B3CB32000
heap
page read and write
29B3CB36000
heap
page read and write
29B4DEFE000
trusted library allocation
page read and write
2200C674000
heap
page read and write
29B3CB1F000
heap
page read and write
29B3CB88000
heap
page read and write
29B46E94000
trusted library allocation
page read and write
29B47A43000
trusted library allocation
page read and write
29B433DB000
trusted library allocation
page read and write
2200D33D000
heap
page read and write
29B481A3000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B47581000
trusted library allocation
page read and write
29B4DFF2000
trusted library allocation
page read and write
29B45A96000
trusted library allocation
page read and write
29B3CB2E000
heap
page read and write
29B46DC3000
trusted library allocation
page read and write
29E2F910000
trusted library allocation
page read and write
29B435F4000
trusted library allocation
page read and write
29B49673000
trusted library allocation
page read and write
29B485B0000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B4945B000
trusted library allocation
page read and write
29B4DB7B000
trusted library allocation
page read and write
2200D3A7000
heap
page read and write
4A313AE000
unkown
page readonly
29B49480000
trusted library allocation
page read and write
29B496CE000
trusted library allocation
page read and write
29B414F9000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB4F000
heap
page read and write
29B3CB21000
heap
page read and write
29B4DCE4000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B3CB44000
heap
page read and write
29B4832F000
trusted library allocation
page read and write
29B4797A000
trusted library allocation
page read and write
29B41BA0000
trusted library allocation
page read and write
29B479DA000
trusted library allocation
page read and write
29B4961E000
trusted library allocation
page read and write
29B42DEB000
trusted library allocation
page read and write
29B3CB89000
heap
page read and write
29B3CB82000
heap
page read and write
29B46F5B000
trusted library allocation
page read and write
29B3CB38000
heap
page read and write
29B46CAC000
trusted library allocation
page read and write
29B48573000
trusted library allocation
page read and write
29B494D3000
trusted library allocation
page read and write
29B491EE000
trusted library allocation
page read and write
29B45A9C000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB2C000
heap
page read and write
29B51D08000
trusted library allocation
page read and write
29B478D7000
trusted library allocation
page read and write
2200C510000
trusted library allocation
page read and write
29B475C8000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B46F6F000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B46EC3000
trusted library allocation
page read and write
2200C55F000
trusted library allocation
page read and write
29B4DF4E000
trusted library allocation
page read and write
29B45EBA000
trusted library allocation
page read and write
29B43372000
trusted library allocation
page read and write
29B494CE000
trusted library allocation
page read and write
29B4DCB9000
trusted library allocation
page read and write
29B47A25000
trusted library allocation
page read and write
29B4DC3E000
trusted library allocation
page read and write
29B42C36000
trusted library allocation
page read and write
29B475D3000
trusted library allocation
page read and write
934000
unkown
page readonly
29B4726A000
trusted library allocation
page read and write
29B475BE000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B479A0000
trusted library allocation
page read and write
29B4DF62000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
29B41B26000
trusted library allocation
page read and write
2200D33D000
heap
page read and write
1C307900000
trusted library allocation
page read and write
29B4DFD8000
trusted library allocation
page read and write
29B42A4B000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B4DC3E000
trusted library allocation
page read and write
29B42AD3000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B51094000
trusted library allocation
page read and write
29B47BAF000
trusted library allocation
page read and write
29B459CE000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B481E3000
trusted library allocation
page read and write
29B47764000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB5C000
heap
page read and write
29B3CB55000
heap
page read and write
29B3CB82000
heap
page read and write
29B477BB000
trusted library allocation
page read and write
29B47BEB000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B3CB1E000
heap
page read and write
29B4DE41000
trusted library allocation
page read and write
29B47BEB000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B41BBC000
trusted library allocation
page read and write
29B4DB4C000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B47252000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B48299000
trusted library allocation
page read and write
29B4674E000
trusted library allocation
page read and write
29B46DB0000
trusted library allocation
page read and write
29B47BD5000
trusted library allocation
page read and write
29B3CB8E000
heap
page read and write
29B47BB8000
trusted library allocation
page read and write
29B42C34000
trusted library allocation
page read and write
29B477CC000
trusted library allocation
page read and write
29B46E69000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B43563000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B46E74000
trusted library allocation
page read and write
29B49154000
trusted library allocation
page read and write
29B51A83000
trusted library allocation
page read and write
2200D2CA000
heap
page read and write
2200D2A0000
heap
page read and write
29B42CEA000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B42DEB000
trusted library allocation
page read and write
29B499AD000
trusted library allocation
page read and write
29B4DD49000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB8A000
heap
page read and write
29B478B0000
trusted library allocation
page read and write
29B491E9000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B3CB25000
heap
page read and write
29B47918000
trusted library allocation
page read and write
29B46D4F000
trusted library allocation
page read and write
29B496BC000
trusted library allocation
page read and write
123E000
stack
page read and write
29B3CB92000
heap
page read and write
29B45ABB000
trusted library allocation
page read and write
29B487E8000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B3CB25000
heap
page read and write
29E2F960000
trusted library allocation
page read and write
29B4853F000
trusted library allocation
page read and write
29B45907000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B48543000
trusted library allocation
page read and write
2200D3B9000
heap
page read and write
29B491CB000
trusted library allocation
page read and write
29B3CB15000
heap
page read and write
29B3CB4F000
heap
page read and write
29B47CA9000
trusted library allocation
page read and write
29B46D7E000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B47543000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B47CFB000
trusted library allocation
page read and write
29B46E39000
trusted library allocation
page read and write
29B46E63000
trusted library allocation
page read and write
29B47CE7000
trusted library allocation
page read and write
29B47CE6000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
29B46DC6000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B476DA000
trusted library allocation
page read and write
29B3CB4F000
heap
page read and write
29B3CB1A000
heap
page read and write
29B45985000
trusted library allocation
page read and write
29B414A6000
trusted library allocation
page read and write
29B48750000
trusted library allocation
page read and write
1381000
heap
page read and write
29B3CB80000
heap
page read and write
29B50EAA000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB88000
heap
page read and write
29B4DFB5000
trusted library allocation
page read and write
29B3CB36000
heap
page read and write
29B47CA2000
trusted library allocation
page read and write
29B46FE9000
trusted library allocation
page read and write
29B4DB2D000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B46C52000
trusted library allocation
page read and write
29B45AC1000
trusted library allocation
page read and write
29B4F5BA000
trusted library allocation
page read and write
29B3CB45000
heap
page read and write
2200CBA0000
heap
page read and write
29B3CB8D000
heap
page read and write
29B477AE000
trusted library allocation
page read and write
29B46F8A000
trusted library allocation
page read and write
29B47AC7000
trusted library allocation
page read and write
29B471A3000
trusted library allocation
page read and write
29B47843000
trusted library allocation
page read and write
29B45E0F000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB5E000
heap
page read and write
29B4964F000
trusted library allocation
page read and write
29B47A79000
trusted library allocation
page read and write
29B4850D000
trusted library allocation
page read and write
29B41B13000
trusted library allocation
page read and write
29B45859000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B46EAF000
trusted library allocation
page read and write
29B4F685000
trusted library allocation
page read and write
29B3CB3C000
heap
page read and write
29B501CF000
trusted library allocation
page read and write
29B491C7000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
29B4DCD4000
trusted library allocation
page read and write
29B47938000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
2200D2BD000
heap
page read and write
29B45EAD000
trusted library allocation
page read and write
29B46FC4000
trusted library allocation
page read and write
29B46D9C000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B46EB6000
trusted library allocation
page read and write
922000
unkown
page readonly
29B51A6A000
trusted library allocation
page read and write
29B475F3000
trusted library allocation
page read and write
29B4F6CA000
trusted library allocation
page read and write
29B51344000
heap
page read and write
29B3CB44000
heap
page read and write
29B485B4000
trusted library allocation
page read and write
29B467AE000
trusted library allocation
page read and write
29B47255000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B42E22000
trusted library allocation
page read and write
29B50D6C000
trusted library allocation
page read and write
29B3CB2A000
heap
page read and write
2200C52F000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
136A000
heap
page read and write
1C307780000
unclassified section
page read and write
29B47AA7000
trusted library allocation
page read and write
29B45AC8000
trusted library allocation
page read and write
1381000
heap
page read and write
29B4593F000
trusted library allocation
page read and write
29B4DAB1000
trusted library allocation
page read and write
29B3CB47000
heap
page read and write
29B50E88000
trusted library allocation
page read and write
29B47998000
trusted library allocation
page read and write
29B472FA000
trusted library allocation
page read and write
29B47C82000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B4DF8B000
trusted library allocation
page read and write
29B4DE0B000
trusted library allocation
page read and write
29B513B6000
heap
page read and write
25B29B00000
trusted library allocation
page read and write
29B46C9B000
trusted library allocation
page read and write
29B4DECF000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B47A79000
trusted library allocation
page read and write
29B4584F000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B3CB80000
heap
page read and write
29B45A4A000
trusted library allocation
page read and write
29B45ABE000
trusted library allocation
page read and write
29B4678A000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B459CE000
trusted library allocation
page read and write
29B51D19000
trusted library allocation
page read and write
29B47A17000
trusted library allocation
page read and write
29E2F660000
heap
page read and write
29B46F3A000
trusted library allocation
page read and write
29B3CB4A000
heap
page read and write
29B3CB2A000
heap
page read and write
29B3CB8D000
heap
page read and write
29B47A39000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B477E3000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB39000
heap
page read and write
29B3CB39000
heap
page read and write
29B4766E000
trusted library allocation
page read and write
29E2F450000
unclassified section
page readonly
29B4827C000
trusted library allocation
page read and write
29B475B3000
trusted library allocation
page read and write
29B49444000
trusted library allocation
page read and write
29B48285000
trusted library allocation
page read and write
29B4DF3B000
trusted library allocation
page read and write
29B472F5000
trusted library allocation
page read and write
29B477BB000
trusted library allocation
page read and write
29B4793E000
trusted library allocation
page read and write
29B3CB60000
heap
page read and write
29B3CB82000
heap
page read and write
29B48514000
trusted library allocation
page read and write
29B3CB44000
heap
page read and write
29B4F685000
trusted library allocation
page read and write
29B51063000
trusted library allocation
page read and write
29B47AC7000
trusted library allocation
page read and write
2200CCC0000
heap
page read and write
29B47260000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B47CA2000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B494C5000
trusted library allocation
page read and write
29B41BB1000
trusted library allocation
page read and write
29B47CC3000
trusted library allocation
page read and write
29B46E45000
trusted library allocation
page read and write
29B5105F000
trusted library allocation
page read and write
29B475AA000
trusted library allocation
page read and write
922000
unkown
page readonly
29B4DCED000
trusted library allocation
page read and write
29B47CD7000
trusted library allocation
page read and write
29B485C8000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
12E4000
heap
page read and write
29B45EA7000
trusted library allocation
page read and write
29B4DF5D000
trusted library allocation
page read and write
29B47CB1000
trusted library allocation
page read and write
29B46D24000
trusted library allocation
page read and write
29B45836000
trusted library allocation
page read and write
29B45878000
trusted library allocation
page read and write
29B41A76000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B479A0000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
11650390000
heap
page read and write
29B46CBA000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B50244000
trusted library allocation
page read and write
29B47C90000
trusted library allocation
page read and write
2200D330000
heap
page read and write
29B3CB80000
heap
page read and write
29B3CB92000
heap
page read and write
29B3CBA1000
heap
page read and write
29B467A2000
trusted library allocation
page read and write
29E2F800000
unclassified section
page readonly
29B476A1000
trusted library allocation
page read and write
29B4672A000
trusted library allocation
page read and write
29B42AF4000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B45EEF000
trusted library allocation
page read and write
29B46D49000
trusted library allocation
page read and write
29B512F7000
trusted library allocation
page read and write
29B45AC4000
trusted library allocation
page read and write
29B4DB54000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B47CF9000
trusted library allocation
page read and write
29B45A4C000
trusted library allocation
page read and write
29B47CA9000
trusted library allocation
page read and write
29B4725E000
trusted library allocation
page read and write
29B47A30000
trusted library allocation
page read and write
29B51009000
trusted library allocation
page read and write
29B42AD3000
trusted library allocation
page read and write
2200D399000
heap
page read and write
2200D2A9000
heap
page read and write
29B42CF9000
trusted library allocation
page read and write
29B3CB1A000
heap
page read and write
29B3CB82000
heap
page read and write
2200D329000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB36000
heap
page read and write
29B4DB79000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B45EE3000
trusted library allocation
page read and write
29B47A79000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B477F1000
trusted library allocation
page read and write
29B4567F000
heap
page read and write
29B433A2000
trusted library allocation
page read and write
29B4DEEE000
trusted library allocation
page read and write
29B3CB85000
heap
page read and write
29B478BC000
trusted library allocation
page read and write
29B50D38000
trusted library allocation
page read and write
29B45A6F000
trusted library allocation
page read and write
29B47CC1000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
8FC000
unkown
page readonly
29B4759B000
trusted library allocation
page read and write
29B45AFC000
trusted library allocation
page read and write
29B47AB1000
trusted library allocation
page read and write
29B494F7000
trusted library allocation
page read and write
29B4674E000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB60000
heap
page read and write
29B47CEC000
trusted library allocation
page read and write
29B50D5C000
trusted library allocation
page read and write
29B482D1000
trusted library allocation
page read and write
29B46C57000
trusted library allocation
page read and write
29B47BB3000
trusted library allocation
page read and write
29B487DC000
trusted library allocation
page read and write
29B4911E000
trusted library allocation
page read and write
29B4DCDA000
trusted library allocation
page read and write
29B4DF59000
trusted library allocation
page read and write
29B4DE43000
trusted library allocation
page read and write
29B46E94000
trusted library allocation
page read and write
29B414CC000
trusted library allocation
page read and write
29B3CB54000
heap
page read and write
29B3CB5C000
heap
page read and write
29B4E728000
trusted library allocation
page read and write
29B45698000
heap
page read and write
29B47A00000
trusted library allocation
page read and write
1C30778F000
unclassified section
page read and write
29B47CA9000
trusted library allocation
page read and write
29B42DA3000
trusted library allocation
page read and write
29B47AF1000
trusted library allocation
page read and write
29B4586A000
trusted library allocation
page read and write
29B3CB1F000
heap
page read and write
29B4DF3F000
trusted library allocation
page read and write
29B475BE000
trusted library allocation
page read and write
29B4DEA7000
trusted library allocation
page read and write
29B4567E000
heap
page read and write
29B3CB8D000
heap
page read and write
29B42D3F000
trusted library allocation
page read and write
559F3FE000
unkown
page readonly
29B47CB3000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B47594000
trusted library allocation
page read and write
2200C573000
trusted library allocation
page read and write
29B45A5E000
trusted library allocation
page read and write
29B485D5000
trusted library allocation
page read and write
29B42D38000
trusted library allocation
page read and write
29B4F65C000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B47CFB000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B46D9C000
trusted library allocation
page read and write
29B47CDC000
trusted library allocation
page read and write
29B47A7F000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B482F9000
trusted library allocation
page read and write
2200D329000
heap
page read and write
2200D29C000
heap
page read and write
29B3CB1A000
heap
page read and write
29B4778E000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B4DCE6000
trusted library allocation
page read and write
29B491B5000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B512BB000
trusted library allocation
page read and write
29B3CB3B000
heap
page read and write
29B47CD0000
trusted library allocation
page read and write
29B46C38000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B511FC000
trusted library allocation
page read and write
29B3CB2F000
heap
page read and write
29B512DF000
trusted library allocation
page read and write
29B41B9B000
trusted library allocation
page read and write
29B47CC8000
trusted library allocation
page read and write
29B42DF4000
trusted library allocation
page read and write
29B48306000
trusted library allocation
page read and write
29B4DE0E000
trusted library allocation
page read and write
12E4000
heap
page read and write
29B4910C000
trusted library allocation
page read and write
29B51D10000
trusted library allocation
page read and write
29B512FB000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B4724A000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B485C8000
trusted library allocation
page read and write
29B46DC6000
trusted library allocation
page read and write
4A3463E000
unkown
page readonly
29B42D7E000
trusted library allocation
page read and write
29B47AD1000
trusted library allocation
page read and write
29B4792B000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29E2F92E000
trusted library allocation
page read and write
29B485A8000
trusted library allocation
page read and write
29B4DEF8000
trusted library allocation
page read and write
29B481DF000
trusted library allocation
page read and write
29B3CB80000
heap
page read and write
29B46C96000
trusted library allocation
page read and write
29B3CB1F000
heap
page read and write
29B467B6000
trusted library allocation
page read and write
29B433D3000
trusted library allocation
page read and write
29B47273000
trusted library allocation
page read and write
29B45890000
trusted library allocation
page read and write
29B4F6B4000
trusted library allocation
page read and write
29B48524000
trusted library allocation
page read and write
29B3CB35000
heap
page read and write
11650407000
heap
page read and write
20F0000
heap
page read and write
29B3CB21000
heap
page read and write
29B3CB1E000
heap
page read and write
2200D37B000
heap
page read and write
29B3CB44000
heap
page read and write
29B3CB25000
heap
page read and write
29B475AC000
trusted library allocation
page read and write
29B482D3000
trusted library allocation
page read and write
2200C1BD000
remote allocation
page execute read
29B3CB80000
heap
page read and write
29B50D7B000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B47CD5000
trusted library allocation
page read and write
29B476B0000
trusted library allocation
page read and write
29B4598A000
trusted library allocation
page read and write
29B42D52000
trusted library allocation
page read and write
29B47CB3000
trusted library allocation
page read and write
29B47F7E000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
1C30798F000
trusted library allocation
page read and write
29B3CB8E000
heap
page read and write
29B46FB4000
trusted library allocation
page read and write
29B4795D000
trusted library allocation
page read and write
2200C56F000
trusted library allocation
page read and write
559F53E000
unkown
page readonly
29B479C6000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B3CB32000
heap
page read and write
29B45A3B000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
29B3CB80000
heap
page read and write
29B3CB1A000
heap
page read and write
29B47FFB000
trusted library allocation
page read and write
29B4DEEA000
trusted library allocation
page read and write
29B42AFA000
trusted library allocation
page read and write
29B45699000
heap
page read and write
29B46D38000
trusted library allocation
page read and write
29B3CB8B000
heap
page read and write
29B3CB32000
heap
page read and write
29B4DCB9000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B3CB82000
heap
page read and write
29B3CB98000
heap
page read and write
29B45A6B000
trusted library allocation
page read and write
29B46D19000
trusted library allocation
page read and write
2200D3A7000
heap
page read and write
29E2F6BF000
unclassified section
page read and write
29B47CCD000
trusted library allocation
page read and write
29B4F6B1000
trusted library allocation
page read and write
559F4FE000
stack
page read and write
29B46F40000
trusted library allocation
page read and write
29B51301000
heap
page read and write
29B3CB2C000
heap
page read and write
29B45871000
trusted library allocation
page read and write
2200C50A000
trusted library allocation
page read and write
29B511FC000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B456E0000
heap
page read and write
29B48727000
trusted library allocation
page read and write
2200D2EA000
heap
page read and write
29B4722B000
trusted library allocation
page read and write
29B494CE000
trusted library allocation
page read and write
29B46E5C000
trusted library allocation
page read and write
29B4DE47000
trusted library allocation
page read and write
29B3CB3E000
heap
page read and write
29B4599E000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
2200C586000
trusted library allocation
page read and write
2200D398000
heap
page read and write
29B3CB4C000
heap
page read and write
29B46EE0000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
29B3CB88000
heap
page read and write
29B3CB24000
heap
page read and write
29B3CB8A000
heap
page read and write
29B475B3000
trusted library allocation
page read and write
29B3CB5D000
heap
page read and write
29B4DD62000
trusted library allocation
page read and write
3E11000
heap
page read and write
29B43362000
trusted library allocation
page read and write
2110000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B47594000
trusted library allocation
page read and write
29B47923000
trusted library allocation
page read and write
29B45EAF000
trusted library allocation
page read and write
29B42D97000
trusted library allocation
page read and write
29B479B9000
trusted library allocation
page read and write
29B4DF76000
trusted library allocation
page read and write
1381000
heap
page read and write
29B4DFF2000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B4F65C000
trusted library allocation
page read and write
29B4DEE4000
trusted library allocation
page read and write
29B4E7F2000
trusted library allocation
page read and write
29B3CB38000
heap
page read and write
29B4DCDA000
trusted library allocation
page read and write
29B478A8000
trusted library allocation
page read and write
29B46FF3000
trusted library allocation
page read and write
29B3CB2C000
heap
page read and write
29B4913D000
trusted library allocation
page read and write
29B4DECB000
trusted library allocation
page read and write
29B42DF6000
trusted library allocation
page read and write
29B4DEC3000
trusted library allocation
page read and write
29B41BBC000
trusted library allocation
page read and write
29B4F659000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B475D5000
trusted library allocation
page read and write
29B4766A000
trusted library allocation
page read and write
29B3CB8D000
heap
page read and write
29B4916E000
trusted library allocation
page read and write
2200D320000
heap
page read and write
29B49493000
trusted library allocation
page read and write
29B47A5D000
trusted library allocation
page read and write
29B3CB92000
heap
page read and write
29B48259000
trusted library allocation
page read and write
29B42D6F000
trusted library allocation
page read and write
29B3CB54000
heap
page read and write
29B46D86000
trusted library allocation
page read and write
29B47F8F000
trusted library allocation
page read and write
2200C548000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B4914D000
trusted library allocation
page read and write
29B47CE4000
trusted library allocation
page read and write
2200C569000
trusted library allocation
page read and write
29B3CB08000
heap
page read and write
2200C503000
trusted library allocation
page read and write
2200CE1C000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
19BFDEE1000
trusted library allocation
page execute read
29B46DA5000
trusted library allocation
page read and write
29B47656000
trusted library allocation
page read and write
11FF000
stack
page read and write
29B46F44000
trusted library allocation
page read and write
29B3CB1D000
heap
page read and write
29B479DA000
trusted library allocation
page read and write
29B4DCDF000
trusted library allocation
page read and write
29B47CFE000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
4A31DD8000
stack
page read and write
29B45ABB000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47CA9000
trusted library allocation
page read and write
2200D29C000
heap
page read and write
29B477B8000
trusted library allocation
page read and write
29B4E275000
trusted library allocation
page read and write
29B4DEC6000
trusted library allocation
page read and write
29B4DCEA000
trusted library allocation
page read and write
29B467F8000
trusted library allocation
page read and write
29B433A1000
trusted library allocation
page read and write
29B45A93000
trusted library allocation
page read and write
29B4676E000
trusted library allocation
page read and write
29B4765F000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB60000
heap
page read and write
29B3CB1E000
heap
page read and write
29B42CEF000
trusted library allocation
page read and write
29B46E8F000
trusted library allocation
page read and write
29B4587E000
trusted library allocation
page read and write
29B477CC000
trusted library allocation
page read and write
29B47C8C000
trusted library allocation
page read and write
29B47AE9000
trusted library allocation
page read and write
29B45985000
trusted library allocation
page read and write
29B3CB20000
heap
page read and write
29B42CE8000
trusted library allocation
page read and write
29B47957000
trusted library allocation
page read and write
29B4851C000
trusted library allocation
page read and write
29B47CE6000
trusted library allocation
page read and write
29B46CC5000
trusted library allocation
page read and write
29B47A2B000
trusted library allocation
page read and write
29B50F00000
trusted library allocation
page read and write
29B46762000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB88000
heap
page read and write
29B487CC000
trusted library allocation
page read and write
29B3CB24000
heap
page read and write
25B2B3A0000
heap
page read and write
1C30791C000
trusted library allocation
page read and write
29B4DF89000
trusted library allocation
page read and write
29B47953000
trusted library allocation
page read and write
29B4804B000
trusted library allocation
page read and write
29B46C9A000
trusted library allocation
page read and write
29B479A9000
trusted library allocation
page read and write
29B47820000
trusted library allocation
page read and write
29B4339D000
trusted library allocation
page read and write
29B48200000
trusted library allocation
page read and write
3AC0000
heap
page read and write
29B41B8D000
trusted library allocation
page read and write
29B4566B000
heap
page read and write
29B47252000
trusted library allocation
page read and write
29B42CE4000
trusted library allocation
page read and write
29B479A0000
trusted library allocation
page read and write
29B4915B000
trusted library allocation
page read and write
29E2F90D000
trusted library allocation
page read and write
29B45EEB000
trusted library allocation
page read and write
252464603000
trusted library allocation
page read and write
2200D332000
heap
page read and write
29B3CB20000
heap
page read and write
29B47AF9000
trusted library allocation
page read and write
29B41A71000
trusted library allocation
page read and write
29B48780000
trusted library allocation
page read and write
29B4DE91000
trusted library allocation
page read and write
29B510B9000
trusted library allocation
page read and write
29B50190000
trusted library allocation
page read and write
29B42C76000
trusted library allocation
page read and write
29B45989000
trusted library allocation
page read and write
29B46D41000
trusted library allocation
page read and write
29B3CB3E000
heap
page read and write
29B3CB24000
heap
page read and write
29B4594B000
trusted library allocation
page read and write
29B46797000
trusted library allocation
page read and write
29B46E71000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B482FB000
trusted library allocation
page read and write
29B42D7C000
trusted library allocation
page read and write
29B4DB32000
trusted library allocation
page read and write
29B45871000
trusted library allocation
page read and write
29B475B5000
trusted library allocation
page read and write
2200C523000
trusted library allocation
page read and write
1C3079DB000
trusted library allocation
page read and write
29B47CA5000
trusted library allocation
page read and write
29B4DF7C000
trusted library allocation
page read and write
29B42ADC000
trusted library allocation
page read and write
29B46E74000
trusted library allocation
page read and write
29B3CB82000
heap
page read and write
29B3CB20000
heap
page read and write
29B4566D000
heap
page read and write
29B48075000
trusted library allocation
page read and write
29E2F4D0000
unclassified section
page readonly
29B513BC000
heap
page read and write
29B46D5F000
trusted library allocation
page read and write
29B45A7D000
trusted library allocation
page read and write
29B478B4000
trusted library allocation
page read and write
29B3CB5D000
heap
page read and write
29B494AB000
trusted library allocation
page read and write
29B3CB25000
heap
page read and write
29B3CB88000
heap
page read and write
29B3CB1E000
heap
page read and write
29B45AC4000
trusted library allocation
page read and write
29B47927000
trusted library allocation
page read and write
29B3CB98000
heap
page read and write
29B46C26000
trusted library allocation
page read and write
19BFDEBC000
trusted library allocation
page execute read
29B4774B000
trusted library allocation
page read and write
29B46DC8000
trusted library allocation
page read and write
2200D330000
heap
page read and write
8E09FF000
stack
page read and write
1C307720000
heap
page read and write
29B3CB35000
heap
page read and write
29B47245000
trusted library allocation
page read and write
29B3CB40000
heap
page read and write
E39000
stack
page read and write
29B47519000
trusted library allocation
page read and write
29B3CB40000
heap
page read and write
29B512E3000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B474CC000
trusted library allocation
page read and write
29B49480000
trusted library allocation
page read and write
29B4DECF000
trusted library allocation
page read and write
29B47953000
trusted library allocation
page read and write
29B4DC87000
trusted library allocation
page read and write
29B459A5000
trusted library allocation
page read and write
29B42DF6000
trusted library allocation
page read and write
2200D328000
heap
page read and write
29B475A8000
trusted library allocation
page read and write
29B456E7000
heap
page read and write
29B512E6000
trusted library allocation
page read and write
29B50226000
trusted library allocation
page read and write
29B47CDC000
trusted library allocation
page read and write
29B4828D000
trusted library allocation
page read and write
29B475DE000
trusted library allocation
page read and write
29B433BF000
trusted library allocation
page read and write
2200D361000
heap
page read and write
29B3CB1E000
heap
page read and write
29B46C2D000
trusted library allocation
page read and write
29B4DB3C000
trusted library allocation
page read and write
29B4586A000
trusted library allocation
page read and write
2200D2A9000
heap
page read and write
29B45ED1000
trusted library allocation
page read and write
29B4DB9A000
trusted library allocation
page read and write
29B3CB32000
heap
page read and write
29B42AC9000
trusted library allocation
page read and write
29B3CB1E000
heap
page read and write
29B47CC8000
trusted library allocation
page read and write
29B414DF000
trusted library allocation
page read and write
29B51014000
trusted library allocation
page read and write
29B45EFD000
trusted library allocation
page read and write
29B4913B000
trusted library allocation
page read and write
8E09FC000
stack
page read and write
29B485E0000
trusted library allocation
page read and write
29B3CB8A000
heap
page read and write
29B3CB92000
heap
page read and write
29B3CB5C000
heap
page read and write
29B45ABE000
trusted library allocation
page read and write
29B3CB5E000
heap
page read and write
29B4DCDA000
trusted library allocation
page read and write
29B4DEB3000
trusted library allocation
page read and write
29B47C80000
trusted library allocation
page read and write
29B3CB5C000
heap
page read and write
29B3CB35000
heap
page read and write
29B45968000
trusted library allocation
page read and write
29B4566D000
heap
page read and write
29B47FAF000
trusted library allocation
page read and write
1371000
heap
page read and write
29B4795A000
trusted library allocation
page read and write
29B481AF000
trusted library allocation
page read and write
29B485FD000
trusted library allocation
page read and write
29B50E88000
trusted library allocation
page read and write
29B3CB21000
heap
page read and write
29B4DED2000
trusted library allocation
page read and write
29B4589C000
trusted library allocation
page read and write
29B47ABE000
trusted library allocation
page read and write
29B3CB8E000
heap
page read and write
29B46EAB000
trusted library allocation
page read and write
29B45A6F000
trusted library allocation
page read and write
29B3CB45000
heap
page read and write
29B47AB0000
trusted library allocation
page read and write
29B45878000
trusted library allocation
page read and write
29B46EA6000
trusted library allocation
page read and write
29B42CE4000
trusted library allocation
page read and write
There are 3769 hidden memdumps, click here to show them.