IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5cffa8e0-c4b8-43a1-a99b-4e8629d16813.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_5cffa8e0-c4b8-43a1-a99b-4e8629d16813.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\activity-stream.discovery_stream.json (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\activity-stream.discovery_stream.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\fqs92o4p.default-release\jumpListCache\pV+3TL7Nu3EP5juvr_gPjg==.ico
MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
modified
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\049WQ4LLFXXS4GTV4K68.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CWUQSG414WCN0956IB82.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 23432 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 9, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 9
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs-1.js
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js (copy)
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f86596a7-7ed7-4758-b8c4-9b7d1a6b9710 (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pings\f86596a7-7ed7-4758-b8c4-9b7d1a6b9710.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2280 -parentBuildID 20230927232528 -prefsHandle 2224 -prefMapHandle 2208 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d8a1b39-e660-4dac-b240-ef4997528783} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e06dd10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20230927232528 -prefsHandle 4132 -prefMapHandle 4228 -prefsLen 26208 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {682e83fa-bff4-48c5-9ba5-30aa68b48bf0} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e3e083610 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5100 -prefMapHandle 5096 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5983122-0af4-4d78-a131-0565779d2050} 7848 "\\.\pipe\gecko-crash-server-pipe.7848" 20e58f22910 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://spocs.getpocket.com/user2
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
http://mozilla.o
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
http://r10.i.lencr.org/0$
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://content-signature-2.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://i.pki.goog/r1.crt0
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://r10.o.lencr.org0#
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
http://crl3.digiRq
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
http://o.pki.goog/s/wr3/yvU0%
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
http://c.pki.goog/r/r1.crl0
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
http://i.pki.goog/wr3.crt0
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.253.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.65.91
dyna.wikimedia.org
185.15.59.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
pki-goog.l.google.com
142.250.186.99
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.185.206
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
142.250.186.110
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.193.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
r10.o.lencr.org
unknown
normandy.cdn.mozilla.net
unknown
o.pki.goog
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 24 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.185.206
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
151.101.65.91
services.addons.mozilla.org
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
142.250.186.99
pki-goog.l.google.com
United States
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
20E4F6F9000
trusted library allocation
page read and write
20E4EDFB000
trusted library allocation
page read and write
1DAFD52E000
trusted library allocation
page read and write
20E44DDB000
heap
page read and write
20E58EB5000
trusted library allocation
page read and write
20E4F7DF000
trusted library allocation
page read and write
B15D7D8000
stack
page read and write
20E59075000
trusted library allocation
page read and write
20E590C5000
trusted library allocation
page read and write
23EFEC19000
heap
page read and write
20E55EA2000
trusted library allocation
page read and write
22EE9B61000
heap
page read and write
20E44E20000
heap
page read and write
20E44E0E000
heap
page read and write
20E44DF4000
heap
page read and write
20E502F5000
trusted library allocation
page read and write
CAC000
unkown
page readonly
20E4E9BB000
trusted library allocation
page read and write
20E4F7CA000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
20E58C00000
trusted library allocation
page read and write
20E4F99F000
trusted library allocation
page read and write
20E595DB000
trusted library allocation
page read and write
20E55F74000
trusted library allocation
page read and write
20E571C2000
trusted library allocation
page read and write
20E513E4000
trusted library allocation
page read and write
20E4B573000
heap
page read and write
20E503A1000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E44DF2000
heap
page read and write
20E595EB000
trusted library allocation
page read and write
20E507CE000
trusted library allocation
page read and write
20E4F84B000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E597C4000
heap
page read and write
20E5768C000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4DEA6000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E5008C000
trusted library allocation
page read and write
20E59029000
trusted library allocation
page read and write
20E5062B000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E59EB3000
trusted library allocation
page read and write
20E4FF2B000
trusted library allocation
page read and write
20E56082000
trusted library allocation
page read and write
20E50091000
trusted library allocation
page read and write
20E4E6A5000
trusted library allocation
page read and write
20E4F102000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E55FEF000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4B138000
trusted library allocation
page read and write
20E4F6ED000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E5719F000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
1DAFD230000
heap
page read and write
20E44E0F000
heap
page read and write
20E57887000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E44D8E000
heap
page read and write
20E44D95000
heap
page read and write
20E4DECF000
trusted library allocation
page read and write
20E4EEA3000
trusted library allocation
page read and write
20E5168F000
trusted library allocation
page read and write
20E56166000
trusted library allocation
page read and write
1481000
heap
page read and write
20E57A06000
trusted library allocation
page read and write
20E561FD000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E516BE000
trusted library allocation
page read and write
20E4E94A000
trusted library allocation
page read and write
20E44DDF000
heap
page read and write
1DAFD1C0000
unclassified section
page readonly
20E4B79E000
trusted library allocation
page read and write
22EE95F0000
heap
page read and write
20E56184000
trusted library allocation
page read and write
20E4F7FB000
trusted library allocation
page read and write
20E5046C000
trusted library allocation
page read and write
20E508B5000
trusted library allocation
page read and write
20E50093000
trusted library allocation
page read and write
20E561AD000
trusted library allocation
page read and write
20E51380000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E55F55000
trusted library allocation
page read and write
20E59289000
trusted library allocation
page read and write
20E4F6F0000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E5047F000
trusted library allocation
page read and write
20E590C3000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E44E14000
heap
page read and write
20E4E45C000
trusted library allocation
page read and write
20E4FBEC000
trusted library allocation
page read and write
20E44DD4000
heap
page read and write
250907C1000
trusted library allocation
page execute read
20E4EF88000
trusted library allocation
page read and write
20E4E9AB000
trusted library allocation
page read and write
20E516E8000
trusted library allocation
page read and write
20E59445000
trusted library allocation
page read and write
20E44DBC000
heap
page read and write
20E584FD000
trusted library allocation
page read and write
20E51DD8000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
22EE961A000
heap
page read and write
20E4FE3C000
trusted library allocation
page read and write
20E4E687000
trusted library allocation
page read and write
1C5F2D40000
heap
page read and write
20E516DC000
trusted library allocation
page read and write
20E59625000
trusted library allocation
page read and write
20E55E81000
trusted library allocation
page read and write
20E4F1BE000
trusted library allocation
page read and write
20E5009D000
trusted library allocation
page read and write
20E4F8AD000
trusted library allocation
page read and write
20E59075000
trusted library allocation
page read and write
20E49EB3000
trusted library allocation
page read and write
20E4E6DB000
trusted library allocation
page read and write
20E5095C000
trusted library allocation
page read and write
20E4FB7B000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4F355000
trusted library allocation
page read and write
20E5974D000
heap
page read and write
20E44DAD000
heap
page read and write
20E44E06000
heap
page read and write
20E44E0B000
heap
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E4F9A9000
trusted library allocation
page read and write
20E5004B000
trusted library allocation
page read and write
20E516D7000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E4F30F000
trusted library allocation
page read and write
20E5132D000
trusted library allocation
page read and write
20E4AE76000
trusted library allocation
page read and write
101BFE000
stack
page read and write
20E4F9C8000
trusted library allocation
page read and write
20E4FF74000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E4AE78000
trusted library allocation
page read and write
20E4EE2E000
trusted library allocation
page read and write
20E513B2000
trusted library allocation
page read and write
20E5002D000
trusted library allocation
page read and write
20E49E26000
trusted library allocation
page read and write
20E5902B000
trusted library allocation
page read and write
20E594B9000
trusted library allocation
page read and write
16B21F80000
heap
page read and write
20E4FBB2000
trusted library allocation
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E4B765000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E513AF000
trusted library allocation
page read and write
20E4EE68000
trusted library allocation
page read and write
20E59031000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DB6000
heap
page read and write
20E50499000
trusted library allocation
page read and write
20E4F438000
trusted library allocation
page read and write
20E4E031000
trusted library allocation
page read and write
20E4FD78000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E4DE5E000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E516BC000
trusted library allocation
page read and write
20E44E18000
heap
page read and write
20E508DB000
trusted library allocation
page read and write
20E4B135000
trusted library allocation
page read and write
20E59445000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E44DFA000
heap
page read and write
20E4EDF7000
trusted library allocation
page read and write
20E44DE5000
heap
page read and write
20E44D9B000
heap
page read and write
20E44E0B000
heap
page read and write
20E5844C000
trusted library allocation
page read and write
20E4DE8F000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4F32D000
trusted library allocation
page read and write
20E4DEDC000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4F9AA000
trusted library allocation
page read and write
20E55F55000
trusted library allocation
page read and write
D74000
heap
page read and write
20E55ECF000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E4FF8B000
trusted library allocation
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E590B2000
trusted library allocation
page read and write
20E50653000
trusted library allocation
page read and write
20E58FC9000
trusted library allocation
page read and write
22EE8F6A000
trusted library allocation
page read and write
20E4B767000
trusted library allocation
page read and write
20E4F780000
trusted library allocation
page read and write
1DAFD61B000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
22EE9681000
heap
page read and write
20E4FEEA000
trusted library allocation
page read and write
20E594C1000
trusted library allocation
page read and write
20E44E1F000
heap
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E5606F000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4F7CA000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
16B22175000
heap
page read and write
20E4C729000
trusted library allocation
page read and write
20E51DAA000
trusted library allocation
page read and write
1C5F305D000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4ED74000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4F0CE000
trusted library allocation
page read and write
20E59038000
trusted library allocation
page read and write
22EE8E00000
trusted library allocation
page read and write
20E44DEA000
heap
page read and write
16B22200000
trusted library allocation
page read and write
20E55E57000
trusted library allocation
page read and write
20E4EF53000
trusted library allocation
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E44DB1000
heap
page read and write
20E594D2000
trusted library allocation
page read and write
20E51FC3000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E506EA000
trusted library allocation
page read and write
20E4E6C6000
trusted library allocation
page read and write
20E5844C000
trusted library allocation
page read and write
20E4ED27000
trusted library allocation
page read and write
20E55FC0000
trusted library allocation
page read and write
20E4F967000
trusted library allocation
page read and write
20E4F3F4000
trusted library allocation
page read and write
20E44DBC000
heap
page read and write
22EE960F000
heap
page read and write
20E59098000
trusted library allocation
page read and write
22EE9B7B000
heap
page read and write
2210000
heap
page read and write
20E4F0C1000
trusted library allocation
page read and write
20E4F945000
trusted library allocation
page read and write
20E55F9E000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E58FF6000
trusted library allocation
page read and write
20E571E9000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E4FBB4000
trusted library allocation
page read and write
20E4F1AC000
trusted library allocation
page read and write
20E594F3000
trusted library allocation
page read and write
20E4B0AA000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E590C5000
trusted library allocation
page read and write
16B22000000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E4F724000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44DA2000
heap
page read and write
20E4DEC2000
trusted library allocation
page read and write
20E500A1000
trusted library allocation
page read and write
20E5976A000
heap
page read and write
20E44DD8000
heap
page read and write
20E44E12000
heap
page read and write
20E4F8F3000
trusted library allocation
page read and write
20E5082F000
trusted library allocation
page read and write
20E500BF000
trusted library allocation
page read and write
20E4E69C000
trusted library allocation
page read and write
20E44D77000
heap
page read and write
20E4F79A000
trusted library allocation
page read and write
20E4F9E6000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
1DAFD607000
trusted library allocation
page read and write
1DAFD0F0000
heap
page read and write
20E4E46A000
trusted library allocation
page read and write
20E59098000
trusted library allocation
page read and write
20E4E687000
trusted library allocation
page read and write
20E59746000
heap
page read and write
147B000
heap
page read and write
143E000
stack
page read and write
20E4F9FE000
trusted library allocation
page read and write
20E4ED67000
trusted library allocation
page read and write
20E5973D000
heap
page read and write
20E4F447000
trusted library allocation
page read and write
20E571C2000
trusted library allocation
page read and write
20E4F99C000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E4F7BA000
trusted library allocation
page read and write
20E513B9000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44D95000
heap
page read and write
20E4F7D3000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4E4D1000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E4F9D9000
trusted library allocation
page read and write
20E4C74E000
trusted library allocation
page read and write
20E4F7F9000
trusted library allocation
page read and write
20E5954E000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E59071000
trusted library allocation
page read and write
20E590C7000
trusted library allocation
page read and write
20E4F7FB000
trusted library allocation
page read and write
20E4B56A000
heap
page read and write
20E44DA4000
heap
page read and write
20E4E4A5000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
20E49EA3000
trusted library allocation
page read and write
20E57948000
trusted library allocation
page read and write
20E59469000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E4F9AA000
trusted library allocation
page read and write
20E5859D000
trusted library allocation
page read and write
20E4B575000
heap
page read and write
20E4F34C000
trusted library allocation
page read and write
20E5076A000
trusted library allocation
page read and write
20E4F0BE000
trusted library allocation
page read and write
20E59099000
trusted library allocation
page read and write
20E4FB51000
trusted library allocation
page read and write
20E501A3000
trusted library allocation
page read and write
20E4DD93000
trusted library allocation
page read and write
20E4E079000
trusted library allocation
page read and write
20E55F94000
trusted library allocation
page read and write
B15CDBE000
unkown
page readonly
20E50565000
trusted library allocation
page read and write
1DAFD193000
heap
page read and write
20E44DE8000
heap
page read and write
20E50622000
trusted library allocation
page read and write
20E594E9000
trusted library allocation
page read and write
20E4F077000
trusted library allocation
page read and write
20E590F6000
trusted library allocation
page read and write
20E3F96A000
heap
page read and write
20E49EF0000
trusted library allocation
page read and write
20E592B9000
trusted library allocation
page read and write
22EE9BA7000
heap
page read and write
20E560E9000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E501C8000
trusted library allocation
page read and write
20E561BD000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E513B2000
trusted library allocation
page read and write
22EE95F9000
heap
page read and write
20E55F3E000
trusted library allocation
page read and write
1450000
heap
page read and write
20E55FC2000
trusted library allocation
page read and write
20E516C7000
trusted library allocation
page read and write
20E58426000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E4F7B5000
trusted library allocation
page read and write
20E518AA000
trusted library allocation
page read and write
20E5A16D000
trusted library allocation
page read and write
20E55E0C000
trusted library allocation
page read and write
20E497CB000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E592BC000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
873FABE000
unkown
page readonly
20E497C2000
trusted library allocation
page read and write
20E51F02000
trusted library allocation
page read and write
20E4FF87000
trusted library allocation
page read and write
20E50643000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E50972000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E5844E000
trusted library allocation
page read and write
20E55EC3000
trusted library allocation
page read and write
20E516E4000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
20E5077E000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E59085000
trusted library allocation
page read and write
20E4FBCC000
trusted library allocation
page read and write
1C5F2D20000
heap
page read and write
20E44DDA000
heap
page read and write
20E4B125000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
22EE8F0A000
trusted library allocation
page read and write
20E592FA000
trusted library allocation
page read and write
22EE9678000
heap
page read and write
20E44D96000
heap
page read and write
20E4FB44000
trusted library allocation
page read and write
20E56065000
trusted library allocation
page read and write
20E5006A000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5006A000
trusted library allocation
page read and write
20E5909B000
trusted library allocation
page read and write
20E4F7BA000
trusted library allocation
page read and write
20E4EFD4000
trusted library allocation
page read and write
20E5035C000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DAE000
heap
page read and write
6AE2DFF000
stack
page read and write
20E56166000
trusted library allocation
page read and write
20E4DB63000
trusted library allocation
page read and write
20E4E449000
trusted library allocation
page read and write
20E56069000
trusted library allocation
page read and write
1DAFD503000
trusted library allocation
page read and write
20E4F77E000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E44DF4000
heap
page read and write
20E51DAF000
trusted library allocation
page read and write
20E44E17000
heap
page read and write
20E4B79E000
trusted library allocation
page read and write
20E4DDAF000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
20E44D9F000
heap
page read and write
DB0000
heap
page read and write
20E5928F000
trusted library allocation
page read and write
20E594D2000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E59024000
trusted library allocation
page read and write
20E4EDEF000
trusted library allocation
page read and write
CDC000
unkown
page write copy
20E44E02000
heap
page read and write
20E590DB000
trusted library allocation
page read and write
20E4DD74000
trusted library allocation
page read and write
20E58E77000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4F9C9000
trusted library allocation
page read and write
20E58FF6000
trusted library allocation
page read and write
20E59E33000
trusted library allocation
page read and write
20E4F343000
trusted library allocation
page read and write
20E44E13000
heap
page read and write
20E4F9F6000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E44E0C000
heap
page read and write
20E4FF87000
trusted library allocation
page read and write
20E4DEDA000
trusted library allocation
page read and write
20E51DD0000
trusted library allocation
page read and write
20E4EEAD000
trusted library allocation
page read and write
20E5064C000
trusted library allocation
page read and write
20E4FB93000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E59432000
trusted library allocation
page read and write
B15CC7E000
stack
page read and write
20E44DA6000
heap
page read and write
20E55F9E000
trusted library allocation
page read and write
22EE95DD000
heap
page read and write
20E4E474000
trusted library allocation
page read and write
20E4F107000
trusted library allocation
page read and write
20E51515000
trusted library allocation
page read and write
20E4F1A5000
trusted library allocation
page read and write
20E5096B000
trusted library allocation
page read and write
20E4E0D8000
trusted library allocation
page read and write
20E4F37C000
trusted library allocation
page read and write
20E4F391000
trusted library allocation
page read and write
20E4F094000
trusted library allocation
page read and write
20E4EE40000
trusted library allocation
page read and write
22EE95EC000
heap
page read and write
20E5903A000
trusted library allocation
page read and write
20E4F32F000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E4E6DB000
trusted library allocation
page read and write
20E590B2000
trusted library allocation
page read and write
20E4F70F000
trusted library allocation
page read and write
20E55F9C000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4FF65000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E44DA2000
heap
page read and write
20E590AD000
trusted library allocation
page read and write
16B23AB9000
heap
page read and write
20E44E0D000
heap
page read and write
20E4EF9F000
trusted library allocation
page read and write
1DAFD55D000
trusted library allocation
page read and write
20E4C729000
trusted library allocation
page read and write
20E4FEA3000
trusted library allocation
page read and write
20E51329000
trusted library allocation
page read and write
20E501B1000
trusted library allocation
page read and write
20E59473000
trusted library allocation
page read and write
20E5158F000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E44D9B000
heap
page read and write
20E44DA2000
heap
page read and write
20E4F315000
trusted library allocation
page read and write
20E51DE4000
trusted library allocation
page read and write
20E4B56E000
heap
page read and write
20E51D87000
trusted library allocation
page read and write
20E594D8000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E5926D000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E44DFE000
heap
page read and write
20E59480000
trusted library allocation
page read and write
20E4FBA3000
trusted library allocation
page read and write
20E509E8000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44E14000
heap
page read and write
20E4F0D0000
trusted library allocation
page read and write
20E44D85000
heap
page read and write
20E44DA2000
heap
page read and write
20E44DFA000
heap
page read and write
20E595EB000
trusted library allocation
page read and write
20E4F9B8000
trusted library allocation
page read and write
20E4AE91000
trusted library allocation
page read and write
20E516DC000
trusted library allocation
page read and write
1C5F3003000
trusted library allocation
page read and write
20E4FBA0000
trusted library allocation
page read and write
20E4FF4A000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E594CC000
trusted library allocation
page read and write
20E4F333000
trusted library allocation
page read and write
20E561EB000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E44D95000
heap
page read and write
20E584ED000
trusted library allocation
page read and write
20E5130E000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E44E24000
heap
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E5006A000
trusted library allocation
page read and write
20E560B1000
trusted library allocation
page read and write
20E59584000
trusted library allocation
page read and write
22EE972B000
trusted library allocation
page read and write
20E500BB000
trusted library allocation
page read and write
20E594CA000
trusted library allocation
page read and write
20E501D3000
trusted library allocation
page read and write
20E5A1F1000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E50788000
trusted library allocation
page read and write
B15CD7E000
stack
page read and write
20E44DAD000
heap
page read and write
20E56184000
trusted library allocation
page read and write
20E44D98000
heap
page read and write
20E4B122000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44E24000
heap
page read and write
20E4E48C000
trusted library allocation
page read and write
20E560C8000
trusted library allocation
page read and write
20E501C6000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E500D1000
trusted library allocation
page read and write
20E571E9000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E516C0000
trusted library allocation
page read and write
20E51F43000
trusted library allocation
page read and write
20E4F754000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44D91000
heap
page read and write
20E4F7EB000
trusted library allocation
page read and write
20E4F41E000
trusted library allocation
page read and write
20E59771000
heap
page read and write
20E4F3F4000
trusted library allocation
page read and write
20E497DF000
trusted library allocation
page read and write
20E4EF49000
trusted library allocation
page read and write
20E4ED20000
trusted library allocation
page read and write
CDC000
unkown
page read and write
20E44DA6000
heap
page read and write
20E4F099000
trusted library allocation
page read and write
20E508A8000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4F8FB000
trusted library allocation
page read and write
20E500A3000
trusted library allocation
page read and write
20E505DC000
trusted library allocation
page read and write
20E4F32F000
trusted library allocation
page read and write
20E56184000
trusted library allocation
page read and write
20E507C4000
trusted library allocation
page read and write
20E4FC09000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
16B23ABB000
heap
page read and write
20E44D95000
heap
page read and write
20E560BB000
trusted library allocation
page read and write
20E4FF3C000
trusted library allocation
page read and write
20E595BA000
trusted library allocation
page read and write
20E50093000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E4F881000
trusted library allocation
page read and write
20E4EFAC000
trusted library allocation
page read and write
20E4EDD7000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E507ED000
trusted library allocation
page read and write
20E4EFC1000
trusted library allocation
page read and write
20E501BB000
trusted library allocation
page read and write
20E56056000
trusted library allocation
page read and write
20E59283000
trusted library allocation
page read and write
20E44DFA000
heap
page read and write
20E44E0B000
heap
page read and write
20E4F851000
trusted library allocation
page read and write
20E55F99000
trusted library allocation
page read and write
20E516F3000
trusted library allocation
page read and write
20E4F0E0000
trusted library allocation
page read and write
20E5613D000
trusted library allocation
page read and write
20E4DED0000
trusted library allocation
page read and write
20E4F99A000
trusted library allocation
page read and write
20E500BB000
trusted library allocation
page read and write
20E55F99000
trusted library allocation
page read and write
D74000
heap
page read and write
1C5F3180000
heap
page read and write
20E44D96000
heap
page read and write
20E44DD8000
heap
page read and write
20E4F77B000
trusted library allocation
page read and write
20E55F3D000
trusted library allocation
page read and write
20E44DB8000
heap
page read and write
20E4ED89000
trusted library allocation
page read and write
20E3F927000
heap
page read and write
20E5952F000
trusted library allocation
page read and write
20E597E1000
heap
page read and write
22EE95F3000
heap
page read and write
20E516E8000
trusted library allocation
page read and write
20E509D9000
trusted library allocation
page read and write
20E516F3000
trusted library allocation
page read and write
20E4F9EF000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
16B2220A000
trusted library allocation
page read and write
20E4EF83000
trusted library allocation
page read and write
1DAFD5A4000
trusted library allocation
page read and write
20E5004D000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E44DA7000
heap
page read and write
20E44E0B000
heap
page read and write
20E585CF000
trusted library allocation
page read and write
1DAFD619000
trusted library allocation
page read and write
20E55F7B000
trusted library allocation
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E4F9FE000
trusted library allocation
page read and write
20E4FBF4000
trusted library allocation
page read and write
1DAFD615000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E4F0B4000
trusted library allocation
page read and write
20E44E16000
heap
page read and write
20E44D9C000
heap
page read and write
22EE8B6C000
remote allocation
page execute read
20E4ED3D000
trusted library allocation
page read and write
20E513DA000
trusted library allocation
page read and write
20E5907E000
trusted library allocation
page read and write
20E4FF7F000
trusted library allocation
page read and write
22EE8FC1000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E56092000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E44E0B000
heap
page read and write
20E44E06000
heap
page read and write
20E4EF51000
trusted library allocation
page read and write
20E507FA000
trusted library allocation
page read and write
20E4F7B2000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E516D7000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E44D95000
heap
page read and write
20E4FC46000
trusted library allocation
page read and write
20E590F6000
trusted library allocation
page read and write
20E5842D000
trusted library allocation
page read and write
20E4F3EE000
trusted library allocation
page read and write
20E5973E000
heap
page read and write
20E44E10000
heap
page read and write
1C5F3176000
heap
page read and write
20E4AEAC000
trusted library allocation
page read and write
20E594ED000
trusted library allocation
page read and write
20E44DA0000
heap
page read and write
20E4F758000
trusted library allocation
page read and write
22EE9679000
heap
page read and write
20E4E440000
trusted library allocation
page read and write
20E44E1F000
heap
page read and write
20E44E24000
heap
page read and write
20E4ED48000
trusted library allocation
page read and write
1DAFD030000
unclassified section
page readonly
20E44DA7000
heap
page read and write
16B21EA0000
heap
page read and write
20E44DA2000
heap
page read and write
20E501EC000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E44D94000
heap
page read and write
22EE8D5F000
unclassified section
page read and write
20E4E4FB000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
22EE9642000
heap
page read and write
22EE95F0000
heap
page read and write
20E44DA6000
heap
page read and write
1DAFD1A0000
heap
page read and write
20E4E4D1000
trusted library allocation
page read and write
20E44DD5000
heap
page read and write
20E44D9B000
heap
page read and write
20E5955F000
trusted library allocation
page read and write
20E4E9F2000
trusted library allocation
page read and write
20E4F7D6000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E44DA2000
heap
page read and write
20E44E06000
heap
page read and write
20E44E0D000
heap
page read and write
DFE000
stack
page read and write
20E595FA000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E513DA000
trusted library allocation
page read and write
20E58F94000
trusted library allocation
page read and write
20E55ECF000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4E6C4000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44E02000
heap
page read and write
1DAFD184000
heap
page read and write
20E50050000
trusted library allocation
page read and write
20E4FBCC000
trusted library allocation
page read and write
20E5945C000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44DCE000
heap
page read and write
1C5F30DB000
trusted library allocation
page read and write
20E4F0D5000
trusted library allocation
page read and write
20E49E17000
trusted library allocation
page read and write
20E4F36D000
trusted library allocation
page read and write
20E4FFEF000
trusted library allocation
page read and write
20E4F4E6000
trusted library allocation
page read and write
20E4EDD7000
trusted library allocation
page read and write
20E51687000
trusted library allocation
page read and write
1DAFD5B7000
trusted library allocation
page read and write
20E4B0BE000
trusted library allocation
page read and write
20E49F00000
trusted library allocation
page read and write
22EE967D000
heap
page read and write
D74000
heap
page read and write
20E4E6F4000
trusted library allocation
page read and write
20E55FEC000
trusted library allocation
page read and write
873FB3E000
unkown
page readonly
20E5908A000
trusted library allocation
page read and write
20E51D8F000
trusted library allocation
page read and write
20E5928D000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E59098000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
22EE9631000
heap
page read and write
20E44DFE000
heap
page read and write
20E59477000
trusted library allocation
page read and write
20E58EBD000
trusted library allocation
page read and write
20E4F445000
trusted library allocation
page read and write
20E55E40000
trusted library allocation
page read and write
20E51DAF000
trusted library allocation
page read and write
20E4E090000
trusted library allocation
page read and write
20E5617D000
trusted library allocation
page read and write
20E4DE9C000
trusted library allocation
page read and write
20E576D5000
trusted library allocation
page read and write
20E59083000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E55FF7000
trusted library allocation
page read and write
20E5903A000
trusted library allocation
page read and write
20E49E82000
trusted library allocation
page read and write
20E44DBE000
heap
page read and write
20E55FEE000
trusted library allocation
page read and write
20E44E07000
heap
page read and write
20E4ADE0000
trusted library allocation
page read and write
22EE8D76000
heap
page read and write
20E44E12000
heap
page read and write
20E4E4C3000
trusted library allocation
page read and write
20E59075000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E4C7AE000
trusted library allocation
page read and write
20E44DB6000
heap
page read and write
20E59071000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E51685000
trusted library allocation
page read and write
20E5614A000
trusted library allocation
page read and write
20E4F665000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
1DAFD500000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
20E51DE4000
trusted library allocation
page read and write
20E561EB000
trusted library allocation
page read and write
22EE8C1A000
heap
page read and write
20E4E4FC000
trusted library allocation
page read and write
20E50756000
trusted library allocation
page read and write
20E44DBC000
heap
page read and write
20E44D95000
heap
page read and write
20E49D2F000
trusted library allocation
page read and write
20E4B096000
trusted library allocation
page read and write
20E4F95E000
trusted library allocation
page read and write
20E4F3C2000
trusted library allocation
page read and write
20E56400000
trusted library allocation
page read and write
20E501B4000
trusted library allocation
page read and write
20E4F088000
trusted library allocation
page read and write
20E5973D000
heap
page read and write
20E516A2000
trusted library allocation
page read and write
20E509B7000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44D9C000
heap
page read and write
1DAFD0D0000
heap
page read and write
20E516B8000
trusted library allocation
page read and write
20E502F3000
trusted library allocation
page read and write
20E4DB69000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E4ED86000
trusted library allocation
page read and write
20E502C9000
trusted library allocation
page read and write
20E44E05000
heap
page read and write
20E4C74E000
trusted library allocation
page read and write
20E4C733000
trusted library allocation
page read and write
20E4FFF2000
trusted library allocation
page read and write
20E4E0FE000
trusted library allocation
page read and write
CD2000
unkown
page readonly
20E590C7000
trusted library allocation
page read and write
20E4EDF1000
trusted library allocation
page read and write
20E4FD78000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DFB000
heap
page read and write
20E4ED64000
trusted library allocation
page read and write
20E44DDD000
heap
page read and write
20E4EDF7000
trusted library allocation
page read and write
20E44D96000
heap
page read and write
22EE967D000
heap
page read and write
20E5928D000
trusted library allocation
page read and write
20E561AD000
trusted library allocation
page read and write
20E4DBF4000
trusted library allocation
page read and write
20E5099C000
trusted library allocation
page read and write
20E5606D000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44DA6000
heap
page read and write
20E4ED33000
trusted library allocation
page read and write
20E58EA6000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E500B7000
trusted library allocation
page read and write
20E597C6000
heap
page read and write
20E44E14000
heap
page read and write
20E4AD91000
trusted library allocation
page read and write
23EFEB70000
heap
page read and write
20E590F8000
trusted library allocation
page read and write
22EE95FC000
heap
page read and write
20E44DFE000
heap
page read and write
20E44D9E000
heap
page read and write
20E59701000
heap
page read and write
20E44DFE000
heap
page read and write
20E500A3000
trusted library allocation
page read and write
20E516E8000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
20E4E0D8000
trusted library allocation
page read and write
20E594B6000
trusted library allocation
page read and write
20E55E7A000
trusted library allocation
page read and write
20E5909B000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
1C5F3076000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E44DA8000
heap
page read and write
20E44E15000
heap
page read and write
20E57943000
trusted library allocation
page read and write
20E4E484000
trusted library allocation
page read and write
20E506E0000
trusted library allocation
page read and write
22EE8FBA000
trusted library allocation
page read and write
20E505E2000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E500A3000
trusted library allocation
page read and write
20E560BB000
trusted library allocation
page read and write
20E518DE000
trusted library allocation
page read and write
20E55FA1000
trusted library allocation
page read and write
22EE9599000
heap
page read and write
20E58590000
trusted library allocation
page read and write
20E4FBA9000
trusted library allocation
page read and write
20E4F7C2000
trusted library allocation
page read and write
20E55E63000
trusted library allocation
page read and write
20E509EA000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E561F8000
trusted library allocation
page read and write
20E44D9E000
heap
page read and write
20E44E17000
heap
page read and write
20E44DF2000
heap
page read and write
20E4DE8B000
trusted library allocation
page read and write
20E4FBC3000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E4E9EB000
trusted library allocation
page read and write
20E5906F000
trusted library allocation
page read and write
20E4EDF1000
trusted library allocation
page read and write
20E58EDD000
trusted library allocation
page read and write
20E44DAE000
heap
page read and write
1DAFD60E000
trusted library allocation
page read and write
20E5908F000
trusted library allocation
page read and write
20E51370000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E5922E000
trusted library allocation
page read and write
20E5613C000
trusted library allocation
page read and write
20E4B767000
trusted library allocation
page read and write
20E4F73C000
trusted library allocation
page read and write
20E49D76000
trusted library allocation
page read and write
20E4EDEA000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E44DA2000
heap
page read and write
20E4F933000
trusted library allocation
page read and write
22EE9591000
heap
page read and write
22EE9B84000
heap
page read and write
20E509E6000
trusted library allocation
page read and write
20E4FD8B000
trusted library allocation
page read and write
20E56082000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E44D94000
heap
page read and write
20E516A2000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E44E0B000
heap
page read and write
1001FE000
unkown
page readonly
20E44E0F000
heap
page read and write
20E4FBA7000
trusted library allocation
page read and write
20E501C6000
trusted library allocation
page read and write
20E4EF73000
trusted library allocation
page read and write
20E4DC00000
trusted library allocation
page read and write
20E4DEB5000
trusted library allocation
page read and write
22EE9681000
heap
page read and write
20E59083000
trusted library allocation
page read and write
20E4F745000
trusted library allocation
page read and write
20E4F34C000
trusted library allocation
page read and write
20E4E6A5000
trusted library allocation
page read and write
20E4AEA5000
trusted library allocation
page read and write
20E44DFA000
heap
page read and write
22EE95F0000
heap
page read and write
20E44D8E000
heap
page read and write
20E5132F000
trusted library allocation
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E4FFF2000
trusted library allocation
page read and write
20E590A7000
trusted library allocation
page read and write
20E4E64A000
trusted library allocation
page read and write
20E55F77000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
22EE8F64000
trusted library allocation
page read and write
20E51899000
trusted library allocation
page read and write
20E5007E000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E55EC0000
trusted library allocation
page read and write
20E4EE96000
trusted library allocation
page read and write
20E50587000
trusted library allocation
page read and write
20E4EEFD000
trusted library allocation
page read and write
20E4FB9B000
trusted library allocation
page read and write
20E4FC55000
trusted library allocation
page read and write
20E597C4000
heap
page read and write
20E585E6000
trusted library allocation
page read and write
20E4F412000
trusted library allocation
page read and write
20E5185F000
trusted library allocation
page read and write
20E5908D000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E4FFFA000
trusted library allocation
page read and write
20E513E4000
trusted library allocation
page read and write
20E576D2000
trusted library allocation
page read and write
20E4F4DF000
trusted library allocation
page read and write
20E4F94A000
trusted library allocation
page read and write
20E55F9C000
trusted library allocation
page read and write
1484000
heap
page read and write
20E5616B000
trusted library allocation
page read and write
22EE961A000
heap
page read and write
20E55EDB000
trusted library allocation
page read and write
20E44DDB000
heap
page read and write
20E44E02000
heap
page read and write
20E4F894000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
1C5F3030000
trusted library allocation
page read and write
20E51334000
trusted library allocation
page read and write
20E561F8000
trusted library allocation
page read and write
23EFEE00000
trusted library allocation
page read and write
20E4F9FC000
trusted library allocation
page read and write
20E4F739000
trusted library allocation
page read and write
20E4E651000
trusted library allocation
page read and write
20E55F55000
trusted library allocation
page read and write
20E513AB000
trusted library allocation
page read and write
20E44DB1000
heap
page read and write
20E44E12000
heap
page read and write
20E51DD0000
trusted library allocation
page read and write
20E516F3000
trusted library allocation
page read and write
20E5009D000
trusted library allocation
page read and write
20E4EDEB000
trusted library allocation
page read and write
20E59028000
trusted library allocation
page read and write
20E597C6000
heap
page read and write
20E4F7DF000
trusted library allocation
page read and write
20E4F9D9000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E5946B000
trusted library allocation
page read and write
20E4B783000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44E02000
heap
page read and write
20E500B7000
trusted library allocation
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E55EBD000
trusted library allocation
page read and write
20E5614A000
trusted library allocation
page read and write
20E49790000
trusted library allocation
page read and write
20E44DA0000
heap
page read and write
20E44DE6000
heap
page read and write
20E4DE86000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
20E507C9000
trusted library allocation
page read and write
20E4F88A000
trusted library allocation
page read and write
20E4B765000
trusted library allocation
page read and write
22EE9573000
unkown
page execute read
20E44DFB000
heap
page read and write
250907B9000
trusted library allocation
page execute read
20E4DD5F000
trusted library allocation
page read and write
20E58E74000
trusted library allocation
page read and write
1DAFD510000
trusted library allocation
page read and write
20E44DEE000
heap
page read and write
20E49781000
trusted library allocation
page read and write
20E59281000
trusted library allocation
page read and write
20E513DA000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4F4F7000
trusted library allocation
page read and write
20E4F475000
trusted library allocation
page read and write
20E50044000
trusted library allocation
page read and write
23EFEF0A000
trusted library allocation
page read and write
20E4E4C3000
trusted library allocation
page read and write
20E502D6000
trusted library allocation
page read and write
3E21000
heap
page read and write
20E44DE6000
heap
page read and write
20E4FA7A000
trusted library allocation
page read and write
20E57138000
trusted library allocation
page read and write
B15CCFD000
stack
page read and write
20E4F94F000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
13FE000
stack
page read and write
20E4F894000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E51DCC000
trusted library allocation
page read and write
211E000
stack
page read and write
20E5168E000
trusted library allocation
page read and write
20E4F9FE000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E51DB7000
trusted library allocation
page read and write
20E561CB000
trusted library allocation
page read and write
20E4F9A8000
trusted library allocation
page read and write
20E59471000
trusted library allocation
page read and write
20E595E7000
trusted library allocation
page read and write
20E50087000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E560B3000
trusted library allocation
page read and write
20E5002B000
trusted library allocation
page read and write
20E4F9D1000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E516B8000
trusted library allocation
page read and write
20E5095C000
trusted library allocation
page read and write
20E51340000
trusted library allocation
page read and write
1C5F3024000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E560BD000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E4E9F6000
trusted library allocation
page read and write
20E4FF5B000
trusted library allocation
page read and write
20E4EFCB000
trusted library allocation
page read and write
20E4F7B5000
trusted library allocation
page read and write
20E500CF000
trusted library allocation
page read and write
20E55F53000
trusted library allocation
page read and write
20E4FFB9000
trusted library allocation
page read and write
20E5007E000
trusted library allocation
page read and write
20E44DA0000
heap
page read and write
20E503CA000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E4FFC5000
trusted library allocation
page read and write
20E571E0000
trusted library allocation
page read and write
20E590B2000
trusted library allocation
page read and write
20E590C5000
trusted library allocation
page read and write
20E44D99000
heap
page read and write
1C5F340C000
trusted library allocation
page read and write
22EE9678000
heap
page read and write
20E592FE000
trusted library allocation
page read and write
20E516A2000
trusted library allocation
page read and write
13DB000
stack
page read and write
20E44D8E000
heap
page read and write
20E44DD8000
heap
page read and write
20E4EDF8000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E58FD5000
trusted library allocation
page read and write
20E516C7000
trusted library allocation
page read and write
20E4F9F6000
trusted library allocation
page read and write
20E500CF000
trusted library allocation
page read and write
20E4F867000
trusted library allocation
page read and write
20E4FF7D000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4B56F000
heap
page read and write
20E44DDA000
heap
page read and write
20E59075000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44DAE000
heap
page read and write
20E501B9000
trusted library allocation
page read and write
20E503FC000
trusted library allocation
page read and write
20E592A9000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E14000
heap
page read and write
22EE8F77000
trusted library allocation
page read and write
20E4DD6D000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E50065000
trusted library allocation
page read and write
20E58E55000
trusted library allocation
page read and write
1C5F2D0B000
remote allocation
page execute read
20E5047F000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E516B5000
trusted library allocation
page read and write
20E5908A000
trusted library allocation
page read and write
20E4FAD6000
trusted library allocation
page read and write
20E4EF1D000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E503C6000
trusted library allocation
page read and write
20E50360000
trusted library allocation
page read and write
22EE9B62000
heap
page read and write
20E592F4000
trusted library allocation
page read and write
20E4F95F000
trusted library allocation
page read and write
20E4C7EE000
trusted library allocation
page read and write
20E501C8000
trusted library allocation
page read and write
1C5F2EF2000
unclassified section
page read and write
1023FE000
unkown
page readonly
20E44E0D000
heap
page read and write
148F000
heap
page read and write
20E44DBA000
heap
page read and write
20E4F013000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E51DD4000
trusted library allocation
page read and write
20E4EF79000
trusted library allocation
page read and write
20E4DEB5000
trusted library allocation
page read and write
20E4F96C000
trusted library allocation
page read and write
20E4EDC0000
trusted library allocation
page read and write
20E4F1A0000
trusted library allocation
page read and write
20E5131F000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4B565000
heap
page read and write
20E504C8000
trusted library allocation
page read and write
20E4EDFB000
trusted library allocation
page read and write
20E50091000
trusted library allocation
page read and write
20E4F7E2000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E44DA3000
heap
page read and write
20E500CF000
trusted library allocation
page read and write
20E4F7FD000
trusted library allocation
page read and write
20E4B548000
heap
page read and write
20E585D2000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E505CE000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E503D1000
trusted library allocation
page read and write
20E5613C000
trusted library allocation
page read and write
20E4DE7B000
trusted library allocation
page read and write
20E4F968000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DA7000
heap
page read and write
20E4EEA3000
trusted library allocation
page read and write
22EE9560000
trusted library allocation
page read and write
20E4EF7C000
trusted library allocation
page read and write
20E4EEE7000
trusted library allocation
page read and write
873FAFE000
stack
page read and write
20E4B5BB000
heap
page read and write
20E4FB75000
trusted library allocation
page read and write
20E4B0C7000
trusted library allocation
page read and write
20E4F7EA000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E590BA000
trusted library allocation
page read and write
20E513B6000
trusted library allocation
page read and write
20E4F339000
trusted library allocation
page read and write
20E3F97A000
heap
page read and write
20E4F829000
trusted library allocation
page read and write
20E4EFFC000
trusted library allocation
page read and write
20E50373000
trusted library allocation
page read and write
20E5076C000
trusted library allocation
page read and write
20E4E64C000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E516C7000
trusted library allocation
page read and write
20E55F94000
trusted library allocation
page read and write
20E5002B000
trusted library allocation
page read and write
22EE9B98000
heap
page read and write
20E55F0A000
trusted library allocation
page read and write
20E58FCD000
trusted library allocation
page read and write
20E59580000
trusted library allocation
page read and write
20E4E9BB000
trusted library allocation
page read and write
20E590B0000
trusted library allocation
page read and write
22EE8D74000
heap
page read and write
22EE95F9000
heap
page read and write
1DAFD617000
trusted library allocation
page read and write
20E5768C000
trusted library allocation
page read and write
20E5906B000
trusted library allocation
page read and write
20E59556000
trusted library allocation
page read and write
20E4F085000
trusted library allocation
page read and write
20E4DE7B000
trusted library allocation
page read and write
20E4F1D1000
trusted library allocation
page read and write
20E4FB87000
trusted library allocation
page read and write
20E4F1B4000
trusted library allocation
page read and write
1DAFD55B000
trusted library allocation
page read and write
20E55F70000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E513BD000
trusted library allocation
page read and write
20E4EFFE000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4FEFC000
trusted library allocation
page read and write
20E55EC3000
trusted library allocation
page read and write
20E4FC0F000
trusted library allocation
page read and write
20E4FAE8000
trusted library allocation
page read and write
20E4FE61000
trusted library allocation
page read and write
20E49DF6000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E59072000
trusted library allocation
page read and write
20E4F0D1000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E55E62000
trusted library allocation
page read and write
20E4FAF2000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E597C7000
heap
page read and write
20E44DA6000
heap
page read and write
20E560BB000
trusted library allocation
page read and write
20E4FADE000
trusted library allocation
page read and write
20E4F091000
trusted library allocation
page read and write
20E5907D000
trusted library allocation
page read and write
20E58ED1000
trusted library allocation
page read and write
20E4FF21000
trusted library allocation
page read and write
20E4F8C4000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E06000
heap
page read and write
20E44D8E000
heap
page read and write
20E4E6BA000
trusted library allocation
page read and write
20E513B9000
trusted library allocation
page read and write
20E4EF6F000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
1DAFD598000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4FBAC000
trusted library allocation
page read and write
20E5842B000
trusted library allocation
page read and write
22EE9649000
heap
page read and write
20E5964B000
trusted library allocation
page read and write
20E4F8B3000
trusted library allocation
page read and write
20E44DDE000
heap
page read and write
20E44D85000
heap
page read and write
20E4E983000
trusted library allocation
page read and write
20E5973D000
heap
page read and write
20E4FF70000
trusted library allocation
page read and write
1DAFD090000
remote allocation
page read and write
1C5F3120000
unclassified section
page readonly
20E513BD000
trusted library allocation
page read and write
20E55F74000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E515BC000
trusted library allocation
page read and write
20E4F42B000
trusted library allocation
page read and write
20E5008C000
trusted library allocation
page read and write
20E4EE6D000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E59471000
trusted library allocation
page read and write
20E4F728000
trusted library allocation
page read and write
20E4F381000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E4F9C8000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E59098000
trusted library allocation
page read and write
20E44E1B000
heap
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E55FF2000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4FB96000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
1C5F2EE0000
heap
page readonly
20E4B0C7000
trusted library allocation
page read and write
20E518B2000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E4DD97000
trusted library allocation
page read and write
20E44D9F000
heap
page read and write
20E44DCE000
heap
page read and write
20E4E081000
trusted library allocation
page read and write
20E55FF7000
trusted library allocation
page read and write
20E4F32C000
trusted library allocation
page read and write
20E50059000
trusted library allocation
page read and write
20E4C78D000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E59285000
trusted library allocation
page read and write
20E4F9AC000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E4F7E2000
trusted library allocation
page read and write
20E5005C000
trusted library allocation
page read and write
20E506EE000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E4AD21000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E55F9B000
trusted library allocation
page read and write
20E4F9B0000
trusted library allocation
page read and write
20E59701000
heap
page read and write
20E56071000
trusted library allocation
page read and write
20E4F315000
trusted library allocation
page read and write
20E4F7AA000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
20E4C760000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E4F37C000
trusted library allocation
page read and write
20E500D5000
trusted library allocation
page read and write
20E59469000
trusted library allocation
page read and write
20E5002B000
trusted library allocation
page read and write
20E4FB51000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E44E06000
heap
page read and write
20E44D97000
heap
page read and write
20E44E23000
heap
page read and write
20E44E06000
heap
page read and write
20E59735000
heap
page read and write
16B22170000
heap
page read and write
20E44E0B000
heap
page read and write
20E44D9B000
heap
page read and write
20E44DAD000
heap
page read and write
20E4FB8B000
trusted library allocation
page read and write
20E44E0C000
heap
page read and write
20E44E0E000
heap
page read and write
20E4F378000
trusted library allocation
page read and write
22EE9B98000
heap
page read and write
20E44D9C000
heap
page read and write
20E4F782000
trusted library allocation
page read and write
20E57196000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E57696000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E44D8D000
heap
page read and write
20E44DFE000
heap
page read and write
20E4F98F000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E55EFC000
trusted library allocation
page read and write
20E4EFB7000
trusted library allocation
page read and write
20E55E20000
trusted library allocation
page read and write
20E500A1000
trusted library allocation
page read and write
20E44DAA000
heap
page read and write
20E4FBF4000
trusted library allocation
page read and write
20E44E21000
heap
page read and write
20E4F69C000
trusted library allocation
page read and write
20E58EFA000
trusted library allocation
page read and write
20E55E00000
trusted library allocation
page read and write
20E504AF000
trusted library allocation
page read and write
20E4FB6A000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E516B5000
trusted library allocation
page read and write
1C5F3078000
trusted library allocation
page read and write
20E44E0E000
heap
page read and write
20E56200000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E4DDF6000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
1C5F30F6000
trusted library allocation
page read and write
20E4E97B000
trusted library allocation
page read and write
20E571AD000
trusted library allocation
page read and write
20E595CC000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E5906F000
trusted library allocation
page read and write
20E44DF2000
heap
page read and write
20E44DEE000
heap
page read and write
20E5905A000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44DA6000
heap
page read and write
20E4B71F000
trusted library allocation
page read and write
20E513AF000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E507ED000
trusted library allocation
page read and write
20E59075000
trusted library allocation
page read and write
20E585DE000
trusted library allocation
page read and write
20E4F9C8000
trusted library allocation
page read and write
20E500B9000
trusted library allocation
page read and write
20E49E26000
trusted library allocation
page read and write
20E4F7F9000
trusted library allocation
page read and write
20E59426000
trusted library allocation
page read and write
22EE9B98000
heap
page read and write
20E44DA2000
heap
page read and write
20E44DBC000
heap
page read and write
20E5945C000
trusted library allocation
page read and write
20E4DE5E000
trusted library allocation
page read and write
20E516EC000
trusted library allocation
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E4B78C000
trusted library allocation
page read and write
20E4ADE7000
trusted library allocation
page read and write
20E4B553000
heap
page read and write
20E44DB0000
heap
page read and write
20E507C9000
trusted library allocation
page read and write
20E4F7F9000
trusted library allocation
page read and write
20E4F9DF000
trusted library allocation
page read and write
20E4B575000
heap
page read and write
20E4DEC6000
trusted library allocation
page read and write
20E57905000
trusted library allocation
page read and write
20E5983C000
heap
page read and write
20E4E484000
trusted library allocation
page read and write
20E592E2000
trusted library allocation
page read and write
20E4B78A000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E59584000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
1484000
heap
page read and write
20E4E484000
trusted library allocation
page read and write
20E5901A000
trusted library allocation
page read and write
20E58EA6000
trusted library allocation
page read and write
20E4F0F9000
trusted library allocation
page read and write
20E500D7000
trusted library allocation
page read and write
20E56069000
trusted library allocation
page read and write
20E59071000
trusted library allocation
page read and write
20E4F0AB000
trusted library allocation
page read and write
20E571B4000
trusted library allocation
page read and write
20E497A7000
trusted library allocation
page read and write
1C5F2E90000
heap
page read and write
20E55E14000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E594A3000
trusted library allocation
page read and write
20E4FFC5000
trusted library allocation
page read and write
20E500BD000
trusted library allocation
page read and write
20E590D4000
trusted library allocation
page read and write
20E4F95E000
trusted library allocation
page read and write
20E4EDCB000
trusted library allocation
page read and write
20E4EEF5000
trusted library allocation
page read and write
22EE8F23000
trusted library allocation
page read and write
20E5036F000
trusted library allocation
page read and write
20E4EF23000
trusted library allocation
page read and write
1DAFD600000
trusted library allocation
page read and write
20E58437000
trusted library allocation
page read and write
20E594F5000
trusted library allocation
page read and write
20E4B554000
heap
page read and write
20E59228000
trusted library allocation
page read and write
22EE8F2F000
trusted library allocation
page read and write
20E59620000
trusted library allocation
page read and write
20E4DB69000
trusted library allocation
page read and write
20E505D6000
trusted library allocation
page read and write
20E4EE89000
trusted library allocation
page read and write
20E4EFFA000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E44D95000
heap
page read and write
20E4F4F5000
trusted library allocation
page read and write
1C5F3174000
heap
page read and write
20E4EEED000
trusted library allocation
page read and write
22EE9679000
heap
page read and write
22EE95FC000
heap
page read and write
20E50087000
trusted library allocation
page read and write
16B21FB8000
heap
page read and write
20E50562000
trusted library allocation
page read and write
22EE967D000
heap
page read and write
22EE9B6D000
heap
page read and write
20E59701000
heap
page read and write
20E44E14000
heap
page read and write
1484000
heap
page read and write
20E44D8D000
heap
page read and write
20E4EDF9000
trusted library allocation
page read and write
20E44DD8000
heap
page read and write
20E4FFFA000
trusted library allocation
page read and write
20E5168F000
trusted library allocation
page read and write
20E4FEFC000
trusted library allocation
page read and write
22EE8B00000
unclassified section
page readonly
20E44E20000
heap
page read and write
20E4EFC3000
trusted library allocation
page read and write
20E500D5000
trusted library allocation
page read and write
20E4DE99000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E4FF81000
trusted library allocation
page read and write
20E4F84B000
trusted library allocation
page read and write
20E4DEA6000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4EE1A000
trusted library allocation
page read and write
20E4FBA3000
trusted library allocation
page read and write
20E4E987000
trusted library allocation
page read and write
22EE8F5C000
trusted library allocation
page read and write
20E4FD84000
trusted library allocation
page read and write
22EE8D50000
unclassified section
page read and write
20E516BE000
trusted library allocation
page read and write
20E585EF000
trusted library allocation
page read and write
20E4F93B000
trusted library allocation
page read and write
20E585E1000
trusted library allocation
page read and write
20E518F6000
trusted library allocation
page read and write
20E4E60E000
trusted library allocation
page read and write
1C5F3069000
trusted library allocation
page read and write
20E4F771000
trusted library allocation
page read and write
20E4FD8B000
trusted library allocation
page read and write
20E501D5000
trusted library allocation
page read and write
20E4E41C000
trusted library allocation
page read and write
20E44D9F000
heap
page read and write
1C5F3000000
trusted library allocation
page read and write
20E44DE9000
heap
page read and write
20E59077000
trusted library allocation
page read and write
20E4F7B2000
trusted library allocation
page read and write
20E595D5000
trusted library allocation
page read and write
20E4EDFD000
trusted library allocation
page read and write
20E4B0EB000
trusted library allocation
page read and write
20E55F34000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4E461000
trusted library allocation
page read and write
20E513F3000
trusted library allocation
page read and write
20E5844E000
trusted library allocation
page read and write
20E5166B000
trusted library allocation
page read and write
20E515CC000
trusted library allocation
page read and write
20E4F878000
trusted library allocation
page read and write
20E4DEA1000
trusted library allocation
page read and write
20E504BD000
trusted library allocation
page read and write
20E5168F000
trusted library allocation
page read and write
20E5908A000
trusted library allocation
page read and write
20E4EE51000
trusted library allocation
page read and write
20E44DDE000
heap
page read and write
20E44DDA000
heap
page read and write
20E500A1000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44E02000
heap
page read and write
20E4B7CE000
trusted library allocation
page read and write
1469000
heap
page read and write
20E4F367000
trusted library allocation
page read and write
20E4E453000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E55F0F000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E44D95000
heap
page read and write
20E4F42F000
trusted library allocation
page read and write
20E4F9A8000
trusted library allocation
page read and write
20E59493000
trusted library allocation
page read and write
20E51DCC000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E49EFC000
trusted library allocation
page read and write
20E5713A000
trusted library allocation
page read and write
20E4EFFE000
trusted library allocation
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E518B8000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E5908A000
trusted library allocation
page read and write
25090831000
trusted library allocation
page execute read
20E59473000
trusted library allocation
page read and write
20E4FC55000
trusted library allocation
page read and write
20E4F42D000
trusted library allocation
page read and write
20E504BD000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E44D95000
heap
page read and write
20E44E02000
heap
page read and write
20E571CE000
trusted library allocation
page read and write
20E57A2C000
trusted library allocation
page read and write
20E59015000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E50637000
trusted library allocation
page read and write
20E4FF27000
trusted library allocation
page read and write
D39000
stack
page read and write
22EE9B98000
heap
page read and write
20E44DA2000
heap
page read and write
20E44E18000
heap
page read and write
20E5081C000
trusted library allocation
page read and write
20E4F79A000
trusted library allocation
page read and write
20E4F95B000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E3F99E000
heap
page read and write
1C5F3082000
trusted library allocation
page read and write
16B21FB0000
heap
page read and write
20E55F83000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4FF98000
trusted library allocation
page read and write
D74000
heap
page read and write
1DAFD160000
heap
page readonly
22EE967D000
heap
page read and write
20E44E1E000
heap
page read and write
20E44DEC000
heap
page read and write
20E44DB7000
heap
page read and write
20E571F5000
trusted library allocation
page read and write
20E509F3000
trusted library allocation
page read and write
20E44E18000
heap
page read and write
20E4F95B000
trusted library allocation
page read and write
20E5094C000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E5035A000
trusted library allocation
page read and write
1C5F2D23000
heap
page read and write
20E4E464000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E44D95000
heap
page read and write
20E44E24000
heap
page read and write
20E44D95000
heap
page read and write
20E55F2C000
trusted library allocation
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E516B5000
trusted library allocation
page read and write
20E4C761000
trusted library allocation
page read and write
20E44DA5000
heap
page read and write
20E55FF7000
trusted library allocation
page read and write
20E4F082000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44E15000
heap
page read and write
20E4C74E000
trusted library allocation
page read and write
20E4FBB4000
trusted library allocation
page read and write
20E4B79E000
trusted library allocation
page read and write
20E503AD000
trusted library allocation
page read and write
20E4E4D1000
trusted library allocation
page read and write
20E4F4C0000
trusted library allocation
page read and write
20E4F8BF000
trusted library allocation
page read and write
20E5712C000
trusted library allocation
page read and write
20E590BA000
trusted library allocation
page read and write
20E4FF4F000
trusted library allocation
page read and write
20E3F97A000
heap
page read and write
20E5081F000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E51687000
trusted library allocation
page read and write
20E4F9E6000
trusted library allocation
page read and write
20E4FE4A000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E59263000
trusted library allocation
page read and write
20E50748000
trusted library allocation
page read and write
147C000
heap
page read and write
20E44DA6000
heap
page read and write
20E58F74000
trusted library allocation
page read and write
20E59473000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
1C5F2D10000
unclassified section
page readonly
20E4F189000
trusted library allocation
page read and write
20E4AEBA000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
D74000
heap
page read and write
20E4F7AA000
trusted library allocation
page read and write
20E500A3000
trusted library allocation
page read and write
20E4EED7000
trusted library allocation
page read and write
20E506FE000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4DEBA000
trusted library allocation
page read and write
20E57199000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E50037000
trusted library allocation
page read and write
20E513F3000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44DA3000
heap
page read and write
20E44D9C000
heap
page read and write
20E5186B000
trusted library allocation
page read and write
20E44D9F000
heap
page read and write
20E49E13000
trusted library allocation
page read and write
20E585C6000
trusted library allocation
page read and write
22EE9682000
heap
page read and write
20E44D95000
heap
page read and write
22EE8C10000
heap
page read and write
20E4FF04000
trusted library allocation
page read and write
20E49EF8000
trusted library allocation
page read and write
20E51662000
trusted library allocation
page read and write
20E4EE64000
trusted library allocation
page read and write
20E4F635000
trusted library allocation
page read and write
20E4E055000
trusted library allocation
page read and write
20E4F99A000
trusted library allocation
page read and write
20E5906F000
trusted library allocation
page read and write
20E590F6000
trusted library allocation
page read and write
1C5F2EF0000
unclassified section
page read and write
20E59024000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E4F1BE000
trusted library allocation
page read and write
22EE9671000
heap
page read and write
20E44E18000
heap
page read and write
20E5619B000
trusted library allocation
page read and write
20E4DED7000
trusted library allocation
page read and write
20E513BD000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
873F9FE000
unkown
page readonly
20E4F410000
trusted library allocation
page read and write
20E4E923000
trusted library allocation
page read and write
20E4E087000
trusted library allocation
page read and write
20E51DB0000
trusted library allocation
page read and write
20E55F24000
trusted library allocation
page read and write
20E513CD000
trusted library allocation
page read and write
20E44E07000
heap
page read and write
20E55FB2000
trusted library allocation
page read and write
20E4F99F000
trusted library allocation
page read and write
20E51DAD000
trusted library allocation
page read and write
20E4EE7C000
trusted library allocation
page read and write
20E4F1AC000
trusted library allocation
page read and write
20E4EEAB000
trusted library allocation
page read and write
22EE9B98000
heap
page read and write
20E509C0000
trusted library allocation
page read and write
20E59075000
trusted library allocation
page read and write
D74000
heap
page read and write
6AE35FE000
stack
page read and write
20E5002B000
trusted library allocation
page read and write
20E4F87F000
trusted library allocation
page read and write
20E59495000
trusted library allocation
page read and write
20E5165B000
trusted library allocation
page read and write
3E21000
heap
page read and write
20E44D95000
heap
page read and write
20E51DE8000
trusted library allocation
page read and write
20E55E16000
trusted library allocation
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E59077000
trusted library allocation
page read and write
20E509AA000
trusted library allocation
page read and write
20E44DAA000
heap
page read and write
20E4FBEC000
trusted library allocation
page read and write
20E59570000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E502BC000
trusted library allocation
page read and write
20E4DBF4000
trusted library allocation
page read and write
1DAFD572000
trusted library allocation
page read and write
22EE95EC000
heap
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E516BE000
trusted library allocation
page read and write
20E5617D000
trusted library allocation
page read and write
20E590FD000
trusted library allocation
page read and write
20E4EEAD000
trusted library allocation
page read and write
20E4DD9F000
trusted library allocation
page read and write
1DAFD110000
heap
page read and write
20E44DBC000
heap
page read and write
20E44DFB000
heap
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E4EF1F000
trusted library allocation
page read and write
20E4F615000
trusted library allocation
page read and write
20E5908D000
trusted library allocation
page read and write
20E59469000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
1DAFD63D000
trusted library allocation
page read and write
20E594D8000
trusted library allocation
page read and write
20E4FFD2000
trusted library allocation
page read and write
6AE4DFF000
stack
page read and write
20E513B2000
trusted library allocation
page read and write
20E4FF7A000
trusted library allocation
page read and write
20E55FEC000
trusted library allocation
page read and write
20E4F1C1000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44DA6000
heap
page read and write
20E4EF77000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44D9B000
heap
page read and write
20E44DD3000
heap
page read and write
20E508AD000
trusted library allocation
page read and write
20E4B5BA000
heap
page read and write
1C5F30A2000
trusted library allocation
page read and write
20E590A0000
trusted library allocation
page read and write
20E4DBF4000
trusted library allocation
page read and write
20E503CA000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E4E906000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E59072000
trusted library allocation
page read and write
23EFEBB0000
heap
page read and write
20E4F463000
trusted library allocation
page read and write
20E4F023000
trusted library allocation
page read and write
20E5945C000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E44E06000
heap
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E4E0DA000
trusted library allocation
page read and write
20E4E6BA000
trusted library allocation
page read and write
20E584DB000
trusted library allocation
page read and write
20E4F752000
trusted library allocation
page read and write
20E4F9D9000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E44DA6000
heap
page read and write
20E44DCE000
heap
page read and write
20E44D9F000
heap
page read and write
20E504DC000
trusted library allocation
page read and write
20E4F3DF000
trusted library allocation
page read and write
20E590EC000
trusted library allocation
page read and write
20E578E5000
trusted library allocation
page read and write
20E44E18000
heap
page read and write
20E57A57000
trusted library allocation
page read and write
20E4F0A4000
trusted library allocation
page read and write
D74000
heap
page read and write
20E4E055000
trusted library allocation
page read and write
20E571F5000
trusted library allocation
page read and write
20E55F69000
trusted library allocation
page read and write
20E4F7C2000
trusted library allocation
page read and write
20E592CD000
trusted library allocation
page read and write
20E59532000
trusted library allocation
page read and write
1C5F308F000
trusted library allocation
page read and write
20E4F8A3000
trusted library allocation
page read and write
20E44DB6000
heap
page read and write
20E502CD000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4DEA1000
trusted library allocation
page read and write
20E44D9D000
heap
page read and write
20E58E00000
trusted library allocation
page read and write
20E592F6000
trusted library allocation
page read and write
20E44E10000
heap
page read and write
20E50499000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E5185F000
trusted library allocation
page read and write
20E44DF5000
heap
page read and write
20E4EE5B000
trusted library allocation
page read and write
20E501B1000
trusted library allocation
page read and write
20E44E18000
heap
page read and write
20E51342000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E59071000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E4DEC6000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4EF1B000
trusted library allocation
page read and write
20E4E012000
trusted library allocation
page read and write
1DAFD020000
unclassified section
page readonly
20E44E0B000
heap
page read and write
CE4000
unkown
page readonly
20E4DEC2000
trusted library allocation
page read and write
20E4ED72000
trusted library allocation
page read and write
20E56089000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4FB64000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E5159C000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E516D7000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
22EE9480000
heap
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E501BB000
trusted library allocation
page read and write
240DABD1E000
trusted library allocation
page read and write
20E561EB000
trusted library allocation
page read and write
1DAFD180000
heap
page read and write
20E57196000
trusted library allocation
page read and write
20E513AF000
trusted library allocation
page read and write
20E4EEF3000
trusted library allocation
page read and write
20E59580000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E4F681000
trusted library allocation
page read and write
22EE9B6A000
heap
page read and write
20E4FF88000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44DAD000
heap
page read and write
20E44E02000
heap
page read and write
20E4FF1F000
trusted library allocation
page read and write
20E4B78A000
trusted library allocation
page read and write
20E44DA5000
heap
page read and write
20E4F337000
trusted library allocation
page read and write
20E4F95E000
trusted library allocation
page read and write
20E51DE8000
trusted library allocation
page read and write
20E59038000
trusted library allocation
page read and write
22EE8BD0000
heap
page read and write
20E4F1A7000
trusted library allocation
page read and write
20E59236000
trusted library allocation
page read and write
20E4DE47000
trusted library allocation
page read and write
20E44DB7000
heap
page read and write
20E4B5BB000
heap
page read and write
20E500D1000
trusted library allocation
page read and write
20E5069D000
trusted library allocation
page read and write
23EFEC1F000
heap
page read and write
20E44D97000
heap
page read and write
20E4B79E000
trusted library allocation
page read and write
20E4E9D4000
trusted library allocation
page read and write
20E590EC000
trusted library allocation
page read and write
20E4DD63000
trusted library allocation
page read and write
20E594FC000
trusted library allocation
page read and write
20E4EDB2000
trusted library allocation
page read and write
20E4E08A000
trusted library allocation
page read and write
1C5F3013000
trusted library allocation
page read and write
20E4FB86000
trusted library allocation
page read and write
20E44E1D000
heap
page read and write
6AE2DFB000
stack
page read and write
20E4FC62000
trusted library allocation
page read and write
20E59471000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4ED82000
trusted library allocation
page read and write
20E44D99000
heap
page read and write
16B21F8A000
heap
page read and write
20E4FF24000
trusted library allocation
page read and write
20E44E1D000
heap
page read and write
20E4F9A8000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E513CD000
trusted library allocation
page read and write
22EE9BA9000
heap
page read and write
20E44D95000
heap
page read and write
20E513F3000
trusted library allocation
page read and write
20E4FF6D000
trusted library allocation
page read and write
20E4E443000
trusted library allocation
page read and write
22EE9673000
heap
page read and write
20E4F32F000
trusted library allocation
page read and write
20E4DEC6000
trusted library allocation
page read and write
20E4E48C000
trusted library allocation
page read and write
20E516B8000
trusted library allocation
page read and write
20E55F40000
trusted library allocation
page read and write
20E50517000
trusted library allocation
page read and write
20E4FFE4000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E58EE5000
trusted library allocation
page read and write
20E4F85F000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
22EE95F0000
heap
page read and write
20E4F9E6000
trusted library allocation
page read and write
20E50392000
trusted library allocation
page read and write
20E44DD5000
heap
page read and write
20E571F5000
trusted library allocation
page read and write
20E55FF2000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44D95000
heap
page read and write
20E5159C000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44D9E000
heap
page read and write
20E594F5000
trusted library allocation
page read and write
20E5903E000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E5089B000
trusted library allocation
page read and write
1DAFD172000
unclassified section
page read and write
20E44DCE000
heap
page read and write
22EE96C0000
heap
page read and write
20E590FD000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E4B5BB000
heap
page read and write
20E592F8000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E506EC000
trusted library allocation
page read and write
20E51672000
trusted library allocation
page read and write
20E59592000
trusted library allocation
page read and write
20E4E4D1000
trusted library allocation
page read and write
22EE9BA7000
heap
page read and write
20E4FCB7000
trusted library allocation
page read and write
20E4ADE5000
trusted library allocation
page read and write
20E4FD8B000
trusted library allocation
page read and write
20E4F48B000
trusted library allocation
page read and write
20E3F967000
heap
page read and write
20E4FF83000
trusted library allocation
page read and write
20E4F3F7000
trusted library allocation
page read and write
20E56044000
trusted library allocation
page read and write
20E59285000
trusted library allocation
page read and write
20E51662000
trusted library allocation
page read and write
20E5908A000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E590F1000
trusted library allocation
page read and write
20E55E1D000
trusted library allocation
page read and write
20E55FBE000
trusted library allocation
page read and write
20E506E8000
trusted library allocation
page read and write
20E5973D000
heap
page read and write
20E571E9000
trusted library allocation
page read and write
148F000
heap
page read and write
20E4DEAC000
trusted library allocation
page read and write
20E4F1B7000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5008C000
trusted library allocation
page read and write
20E59049000
trusted library allocation
page read and write
20E4F9B8000
trusted library allocation
page read and write
22EE8BB0000
heap
page read and write
20E4EFBD000
trusted library allocation
page read and write
20E4F75B000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E57696000
trusted library allocation
page read and write
20E55F53000
trusted library allocation
page read and write
20E59429000
trusted library allocation
page read and write
10447E000
unkown
page readonly
1C5F30C4000
trusted library allocation
page read and write
20E576D7000
trusted library allocation
page read and write
1C5F3016000
trusted library allocation
page read and write
20E4E914000
trusted library allocation
page read and write
20E51DE0000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E59701000
heap
page read and write
20E44DFA000
heap
page read and write
20E44E18000
heap
page read and write
20E5942E000
trusted library allocation
page read and write
20E44E1D000
heap
page read and write
22EE968D000
heap
page read and write
20E51630000
trusted library allocation
page read and write
20E4F4FC000
trusted library allocation
page read and write
20E4E48C000
trusted library allocation
page read and write
250908E1000
trusted library allocation
page execute read
20E56092000
trusted library allocation
page read and write
1C5F3400000
trusted library allocation
page read and write
20E4F371000
trusted library allocation
page read and write
20E4DE4E000
trusted library allocation
page read and write
20E58437000
trusted library allocation
page read and write
20E592B6000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E594FC000
trusted library allocation
page read and write
20E508AD000
trusted library allocation
page read and write
22EE8FC3000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44E1A000
heap
page read and write
20E44E0C000
heap
page read and write
20E513B6000
trusted library allocation
page read and write
20E516EC000
trusted library allocation
page read and write
20E50057000
trusted library allocation
page read and write
22EE9681000
heap
page read and write
20E44DA2000
heap
page read and write
20E590A5000
trusted library allocation
page read and write
20E5046C000
trusted library allocation
page read and write
20E4B561000
heap
page read and write
20E518B2000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E49EF8000
trusted library allocation
page read and write
22EE8DF2000
unkown
page execute read
20E4FCB7000
trusted library allocation
page read and write
20E5079B000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
20E507B8000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E4B76A000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E44D8E000
heap
page read and write
20E4B09A000
trusted library allocation
page read and write
20E518B7000
trusted library allocation
page read and write
1C5F2EFF000
unclassified section
page read and write
20E4F9DF000
trusted library allocation
page read and write
D70000
heap
page read and write
20E44D95000
heap
page read and write
20E5182F000
trusted library allocation
page read and write
20E5A184000
trusted library allocation
page read and write
20E4EF8D000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E50087000
trusted library allocation
page read and write
20E57DA8000
trusted library allocation
page read and write
20E509FC000
trusted library allocation
page read and write
20E50967000
trusted library allocation
page read and write
20E55FF7000
trusted library allocation
page read and write
20E4F07C000
trusted library allocation
page read and write
20E51685000
trusted library allocation
page read and write
20E4E48C000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E50993000
trusted library allocation
page read and write
20E594B9000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E5905A000
trusted library allocation
page read and write
20E4F9F6000
trusted library allocation
page read and write
20E5077B000
trusted library allocation
page read and write
20E4F0F7000
trusted library allocation
page read and write
20E4EE6C000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E15000
heap
page read and write
20E50091000
trusted library allocation
page read and write
20E4EFFA000
trusted library allocation
page read and write
20E4F6EA000
trusted library allocation
page read and write
20E58E16000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E5926D000
trusted library allocation
page read and write
20E44DEF000
heap
page read and write
22EE8F03000
trusted library allocation
page read and write
20E590C0000
trusted library allocation
page read and write
20E55F70000
trusted library allocation
page read and write
22EE8F48000
trusted library allocation
page read and write
20E44E05000
heap
page read and write
20E4E97B000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E44D9E000
heap
page read and write
20E5908D000
trusted library allocation
page read and write
20E592B6000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
6AE3DFE000
stack
page read and write
20E4EE5F000
trusted library allocation
page read and write
20E516EE000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E505D6000
trusted library allocation
page read and write
22EE9B7B000
heap
page read and write
20E4E653000
trusted library allocation
page read and write
20E51DE0000
trusted library allocation
page read and write
20E4E459000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E595B5000
trusted library allocation
page read and write
1497000
heap
page read and write
20E4B0F6000
trusted library allocation
page read and write
20E59077000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E571D3000
trusted library allocation
page read and write
20E4E440000
trusted library allocation
page read and write
20E4E03B000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44E1D000
heap
page read and write
20E4DEA3000
trusted library allocation
page read and write
20E4EE56000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E5904A000
trusted library allocation
page read and write
20E4F6A6000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E5618A000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E44E0F000
heap
page read and write
20E4F7D2000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E44D9F000
heap
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E506E6000
trusted library allocation
page read and write
20E59088000
trusted library allocation
page read and write
20E4FBA0000
trusted library allocation
page read and write
20E506E4000
trusted library allocation
page read and write
20E508B1000
trusted library allocation
page read and write
22EE9700000
trusted library allocation
page read and write
20E4E03D000
trusted library allocation
page read and write
20E59782000
heap
page read and write
20E4F766000
trusted library allocation
page read and write
1C5F3303000
trusted library allocation
page read and write
20E4FF49000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
22EE9B40000
heap
page read and write
20E55FC2000
trusted library allocation
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E4E5AF000
trusted library allocation
page read and write
1001BE000
stack
page read and write
20E4E0EA000
trusted library allocation
page read and write
20E509BA000
trusted library allocation
page read and write
C11000
unkown
page execute read
20E3F967000
heap
page read and write
20E5009D000
trusted library allocation
page read and write
20E509D9000
trusted library allocation
page read and write
20E4E090000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E516EC000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E56112000
trusted library allocation
page read and write
20E51DCC000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E576CC000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E4F4D2000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E44D8D000
heap
page read and write
20E4E62E000
trusted library allocation
page read and write
20E58EB5000
trusted library allocation
page read and write
20E4E467000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E516E4000
trusted library allocation
page read and write
20E4B79E000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4FF4D000
trusted library allocation
page read and write
20E516B8000
trusted library allocation
page read and write
22EE8F86000
trusted library allocation
page read and write
20E595C4000
trusted library allocation
page read and write
20E4DE51000
trusted library allocation
page read and write
20E59017000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E4E45F000
trusted library allocation
page read and write
20E4DB86000
trusted library allocation
page read and write
20E4DDB6000
trusted library allocation
page read and write
20E5955F000
trusted library allocation
page read and write
20E59417000
trusted library allocation
page read and write
20E4C772000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E4DE58000
trusted library allocation
page read and write
102BFE000
stack
page read and write
20E590B0000
trusted library allocation
page read and write
20E4FBEF000
trusted library allocation
page read and write
20E56056000
trusted library allocation
page read and write
20E505DC000
trusted library allocation
page read and write
20E44DE8000
heap
page read and write
20E4E0D8000
trusted library allocation
page read and write
20E5906F000
trusted library allocation
page read and write
20E4FF83000
trusted library allocation
page read and write
20E44DE8000
heap
page read and write
20E4FB72000
trusted library allocation
page read and write
20E4F79A000
trusted library allocation
page read and write
20E4ED67000
trusted library allocation
page read and write
20E503FC000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E59089000
trusted library allocation
page read and write
20E44DD4000
heap
page read and write
20E44DA8000
heap
page read and write
22EE9B84000
heap
page read and write
20E507C4000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5616B000
trusted library allocation
page read and write
20E50072000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44E06000
heap
page read and write
20E516C0000
trusted library allocation
page read and write
20E5039A000
trusted library allocation
page read and write
CAC000
unkown
page readonly
20E4DECE000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E59089000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
22EE968D000
heap
page read and write
20E4F76B000
trusted library allocation
page read and write
20E51DB0000
trusted library allocation
page read and write
20E55FEC000
trusted library allocation
page read and write
20E4F96C000
trusted library allocation
page read and write
20E4EFC5000
trusted library allocation
page read and write
20E4F7B6000
trusted library allocation
page read and write
20E4F3EB000
trusted library allocation
page read and write
20E4B768000
trusted library allocation
page read and write
1C5F3073000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E571F5000
trusted library allocation
page read and write
20E44D81000
heap
page read and write
148F000
heap
page read and write
20E44E0B000
heap
page read and write
20E590DB000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4DECC000
trusted library allocation
page read and write
20E571BD000
trusted library allocation
page read and write
20E515D4000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E55EFC000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4F337000
trusted library allocation
page read and write
20E597B0000
heap
page read and write
20E4F9F6000
trusted library allocation
page read and write
20E59473000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E4F7D3000
trusted library allocation
page read and write
20E576D9000
trusted library allocation
page read and write
20E4E4D1000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E44DF2000
heap
page read and write
20E500CF000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44DFE000
heap
page read and write
20E59432000
trusted library allocation
page read and write
20E4DD7F000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E4B570000
heap
page read and write
20E5973E000
heap
page read and write
20E5908D000
trusted library allocation
page read and write
20E51DB7000
trusted library allocation
page read and write
20E4F33B000
trusted library allocation
page read and write
20E59090000
trusted library allocation
page read and write
20E4B573000
heap
page read and write
20E513D0000
trusted library allocation
page read and write
20E4E647000
trusted library allocation
page read and write
20E4F49C000
trusted library allocation
page read and write
20E4F99A000
trusted library allocation
page read and write
22EE95FC000
heap
page read and write
20E44D9B000
heap
page read and write
20E44E06000
heap
page read and write
20E4B759000
trusted library allocation
page read and write
20E4B573000
heap
page read and write
20E44DAD000
heap
page read and write
20E500CF000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44E18000
heap
page read and write
20E5008C000
trusted library allocation
page read and write
20E44DEE000
heap
page read and write
1C5F2F00000
trusted library allocation
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E5608F000
trusted library allocation
page read and write
23EFEC10000
heap
page read and write
20E590BA000
trusted library allocation
page read and write
20E50723000
trusted library allocation
page read and write
20E44E17000
heap
page read and write
20E4FDA5000
trusted library allocation
page read and write
20E590AC000
trusted library allocation
page read and write
20E51853000
trusted library allocation
page read and write
20E513DA000
trusted library allocation
page read and write
20E4FACA000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E4B04E000
trusted library allocation
page read and write
20E4F96C000
trusted library allocation
page read and write
20E4F348000
trusted library allocation
page read and write
20E585DE000
trusted library allocation
page read and write
20E4F326000
trusted library allocation
page read and write
20E5009D000
trusted library allocation
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E44E07000
heap
page read and write
20E57624000
trusted library allocation
page read and write
20E59469000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
1C5F3049000
trusted library allocation
page read and write
20E59426000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E44E1D000
heap
page read and write
20E4E459000
trusted library allocation
page read and write
22EE9590000
heap
page read and write
20E4F7B2000
trusted library allocation
page read and write
20E49E1E000
trusted library allocation
page read and write
20E5189C000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E44E04000
heap
page read and write
22EE8FEF000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E4C733000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E4B09D000
trusted library allocation
page read and write
20E44E10000
heap
page read and write
20E44E1D000
heap
page read and write
20E58E98000
trusted library allocation
page read and write
20E44DE3000
heap
page read and write
20E4E987000
trusted library allocation
page read and write
20E58F78000
trusted library allocation
page read and write
20E5612E000
trusted library allocation
page read and write
1DAFD400000
trusted library allocation
page read and write
20E51555000
trusted library allocation
page read and write
D74000
heap
page read and write
20E44DFB000
heap
page read and write
20E579AC000
trusted library allocation
page read and write
20E507FA000
trusted library allocation
page read and write
20E4E921000
trusted library allocation
page read and write
20E4F9F1000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E44E24000
heap
page read and write
20E4F1A9000
trusted library allocation
page read and write
1DAFD0B0000
unclassified section
page readonly
16B23BF0000
heap
page read and write
20E4DD9D000
trusted library allocation
page read and write
20E44DB6000
heap
page read and write
20E5790C000
trusted library allocation
page read and write
20E4F772000
trusted library allocation
page read and write
22EE8B90000
heap
page read and write
1C5F300C000
trusted library allocation
page read and write
20E516D7000
trusted library allocation
page read and write
20E4FDA5000
trusted library allocation
page read and write
20E58E0D000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E4E05A000
trusted library allocation
page read and write
20E55FC1000
trusted library allocation
page read and write
22EE8FC7000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E50765000
trusted library allocation
page read and write
20E594E9000
trusted library allocation
page read and write
20E59584000
trusted library allocation
page read and write
20E500CF000
trusted library allocation
page read and write
20E4E0C8000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E44DCE000
heap
page read and write
20E44DCE000
heap
page read and write
20E44D98000
heap
page read and write
20E4FBA3000
trusted library allocation
page read and write
20E504DC000
trusted library allocation
page read and write
20E4DBCF000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E44DA7000
heap
page read and write
20E51899000
trusted library allocation
page read and write
20E4B56D000
heap
page read and write
20E44E10000
heap
page read and write
20E44E0E000
heap
page read and write
20E5617D000
trusted library allocation
page read and write
20E58E15000
trusted library allocation
page read and write
20E597C4000
heap
page read and write
20E5928F000
trusted library allocation
page read and write
20E3F953000
heap
page read and write
20E44DA7000
heap
page read and write
20E55F94000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4DBFC000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44E1A000
heap
page read and write
20E56082000
trusted library allocation
page read and write
20E44E1A000
heap
page read and write
20E4EDEE000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4B0DC000
trusted library allocation
page read and write
20E513E4000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E44DA2000
heap
page read and write
20E44E06000
heap
page read and write
22EE95F4000
heap
page read and write
20E56000000
trusted library allocation
page read and write
20E57661000
trusted library allocation
page read and write
20E4EEE1000
trusted library allocation
page read and write
20E44DD4000
heap
page read and write
20E4B575000
heap
page read and write
20E4F0B1000
trusted library allocation
page read and write
20E4FF53000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E497EF000
trusted library allocation
page read and write
20E4E6E2000
trusted library allocation
page read and write
20E590B2000
trusted library allocation
page read and write
20E4FBA7000
trusted library allocation
page read and write
20E4EE96000
trusted library allocation
page read and write
20E4E0F3000
trusted library allocation
page read and write
20E501D5000
trusted library allocation
page read and write
20E4F766000
trusted library allocation
page read and write
20E4E9BB000
trusted library allocation
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E4F7CA000
trusted library allocation
page read and write
20E4ED62000
trusted library allocation
page read and write
20E51DE8000
trusted library allocation
page read and write
20E59764000
heap
page read and write
20E57941000
trusted library allocation
page read and write
20E4EF8B000
trusted library allocation
page read and write
20E4F95E000
trusted library allocation
page read and write
20E59031000
trusted library allocation
page read and write
20E55FF0000
trusted library allocation
page read and write
20E513E4000
trusted library allocation
page read and write
100BD8000
stack
page read and write
20E55F53000
trusted library allocation
page read and write
20E4F79A000
trusted library allocation
page read and write
20E513B9000
trusted library allocation
page read and write
20E4ED79000
trusted library allocation
page read and write
20E4DEC2000
trusted library allocation
page read and write
20E4EDD7000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
13EF000
stack
page read and write
20E55EE3000
trusted library allocation
page read and write
20E44D74000
heap
page read and write
20E44D92000
heap
page read and write
20E55F70000
trusted library allocation
page read and write
20E513CE000
trusted library allocation
page read and write
20E44DD4000
heap
page read and write
20E4F1BC000
trusted library allocation
page read and write
20E513FB000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E44E04000
heap
page read and write
20E58F4A000
trusted library allocation
page read and write
148F000
heap
page read and write
20E44E06000
heap
page read and write
1C5F2C80000
unclassified section
page readonly
20E51DD4000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E49E78000
trusted library allocation
page read and write
20E500BF000
trusted library allocation
page read and write
20E4B762000
trusted library allocation
page read and write
20E4FF7D000
trusted library allocation
page read and write
20E44DDF000
heap
page read and write
20E59049000
trusted library allocation
page read and write
20E516B5000
trusted library allocation
page read and write
20E4E0F3000
trusted library allocation
page read and write
20E4FA99000
trusted library allocation
page read and write
20E51359000
trusted library allocation
page read and write
20E5605C000
trusted library allocation
page read and write
20E58E69000
trusted library allocation
page read and write
20E4FB8C000
trusted library allocation
page read and write
20E4AD25000
trusted library allocation
page read and write
20E4F9DF000
trusted library allocation
page read and write
F2501FC000
stack
page read and write
20E4F9DF000
trusted library allocation
page read and write
20E55FBE000
trusted library allocation
page read and write
20E571B9000
trusted library allocation
page read and write
16B21FD0000
heap
page read and write
20E44E07000
heap
page read and write
20E59532000
trusted library allocation
page read and write
20E59028000
trusted library allocation
page read and write
20E4EE24000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4FEA3000
trusted library allocation
page read and write
20E4DE8B000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E44E05000
heap
page read and write
20E44D9B000
heap
page read and write
20E49E1B000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
2200000
heap
page read and write
20E44E14000
heap
page read and write
20E44DFB000
heap
page read and write
20E44DEE000
heap
page read and write
10347E000
unkown
page readonly
22EE967D000
heap
page read and write
20E4F9E6000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E578A3000
trusted library allocation
page read and write
20E44E12000
heap
page read and write
20E44E15000
heap
page read and write
20E5008D000
trusted library allocation
page read and write
20E4F0E0000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E585D3000
trusted library allocation
page read and write
D74000
heap
page read and write
23EFEB90000
heap
page read and write
20E44D95000
heap
page read and write
20E44DD3000
heap
page read and write
20E4F0F3000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E55FF7000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4E4C1000
trusted library allocation
page read and write
20E4E66C000
trusted library allocation
page read and write
20E55FB2000
trusted library allocation
page read and write
10007E000
unkown
page readonly
20E44E04000
heap
page read and write
20E4AEF9000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E44DA6000
heap
page read and write
20E4FF6E000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E4F333000
trusted library allocation
page read and write
20E513E4000
trusted library allocation
page read and write
20E44E1F000
heap
page read and write
20E4F649000
trusted library allocation
page read and write
20E5619B000
trusted library allocation
page read and write
20E4F94F000
trusted library allocation
page read and write
20E501B7000
trusted library allocation
page read and write
20E4F0D7000
trusted library allocation
page read and write
20E4979E000
trusted library allocation
page read and write
20E59552000
trusted library allocation
page read and write
20E4F68B000
trusted library allocation
page read and write
20E55F82000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44E02000
heap
page read and write
20E4FC42000
trusted library allocation
page read and write
20E507FA000
trusted library allocation
page read and write
20E509AE000
trusted library allocation
page read and write
20E4F105000
trusted library allocation
page read and write
22EE95F9000
heap
page read and write
20E44E12000
heap
page read and write
20E4F32C000
trusted library allocation
page read and write
20E4EF53000
trusted library allocation
page read and write
20E500BF000
trusted library allocation
page read and write
20E44DA4000
heap
page read and write
20E44DFB000
heap
page read and write
20E44DF5000
heap
page read and write
20E59083000
trusted library allocation
page read and write
20E4E0EF000
trusted library allocation
page read and write
20E4F7F9000
trusted library allocation
page read and write
20E4F063000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E58E86000
trusted library allocation
page read and write
20E576CC000
trusted library allocation
page read and write
20E59088000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
1C5F3307000
trusted library allocation
page read and write
20E44DD8000
heap
page read and write
20E4F947000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4F9E6000
trusted library allocation
page read and write
28FC48703000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E44E0F000
heap
page read and write
20E500B7000
trusted library allocation
page read and write
20E504C8000
trusted library allocation
page read and write
20E44E0E000
heap
page read and write
20E5166C000
trusted library allocation
page read and write
20E5943B000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E44DFB000
heap
page read and write
20E594CC000
trusted library allocation
page read and write
20E4E6DD000
trusted library allocation
page read and write
20E4FB62000
trusted library allocation
page read and write
20E5617D000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E579E4000
trusted library allocation
page read and write
20E507B2000
trusted library allocation
page read and write
20E4E619000
trusted library allocation
page read and write
20E560B1000
trusted library allocation
page read and write
20E4F9F6000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
20E50397000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E51325000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E44DD4000
heap
page read and write
22EE9B6A000
heap
page read and write
20E55FEC000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
22EE9670000
heap
page read and write
22EE8FF5000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E4E051000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E4DB43000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E595CC000
trusted library allocation
page read and write
20E4E5B5000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E50072000
trusted library allocation
page read and write
20E59073000
trusted library allocation
page read and write
20E50585000
trusted library allocation
page read and write
20E4DB31000
trusted library allocation
page read and write
20E4E9D0000
trusted library allocation
page read and write
22EE9681000
heap
page read and write
20E44E12000
heap
page read and write
20E51DD8000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E44D9B000
heap
page read and write
20E44DFA000
heap
page read and write
22EE8FEB000
trusted library allocation
page read and write
22EE8F79000
trusted library allocation
page read and write
20E4ED79000
trusted library allocation
page read and write
20E4DEC3000
trusted library allocation
page read and write
20E4F9B0000
trusted library allocation
page read and write
20E4EF25000
trusted library allocation
page read and write
20E5903E000
trusted library allocation
page read and write
20E508DB000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E59079000
trusted library allocation
page read and write
20E58ED1000
trusted library allocation
page read and write
20E44DEE000
heap
page read and write
20E590AC000
trusted library allocation
page read and write
20E5949E000
trusted library allocation
page read and write
20E4B7CE000
trusted library allocation
page read and write
20E4E9C4000
trusted library allocation
page read and write
C10000
unkown
page readonly
20E4EFD4000
trusted library allocation
page read and write
1C5F3100000
heap
page read and write
20E44DA2000
heap
page read and write
20E4F9AA000
trusted library allocation
page read and write
20E4DEB5000
trusted library allocation
page read and write
B15CD3E000
unkown
page readonly
20E4DECE000
trusted library allocation
page read and write
20E4F8B3000
trusted library allocation
page read and write
20E509AB000
trusted library allocation
page read and write
20E5905A000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E59073000
trusted library allocation
page read and write
20E501EC000
trusted library allocation
page read and write
20E44E10000
heap
page read and write
20E44DA0000
heap
page read and write
20E4FF61000
trusted library allocation
page read and write
20E44DC4000
heap
page read and write
20E4EF95000
trusted library allocation
page read and write
20E4FF7D000
trusted library allocation
page read and write
20E590FD000
trusted library allocation
page read and write
20E5165D000
trusted library allocation
page read and write
20E44DD9000
heap
page read and write
20E4F0A7000
trusted library allocation
page read and write
20E4F1D1000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E55FB5000
trusted library allocation
page read and write
20E59069000
trusted library allocation
page read and write
20E504C3000
trusted library allocation
page read and write
20E51DD8000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4FFB9000
trusted library allocation
page read and write
20E560B1000
trusted library allocation
page read and write
20E4EF4D000
trusted library allocation
page read and write
20E4B573000
heap
page read and write
20E57D02000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E4E0EA000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E51687000
trusted library allocation
page read and write
20E50698000
trusted library allocation
page read and write
20E4ED97000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
1DAFD565000
trusted library allocation
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E55EFC000
trusted library allocation
page read and write
20E4F10A000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E4F742000
trusted library allocation
page read and write
20E594A8000
trusted library allocation
page read and write
20E4FB49000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
22EE967D000
heap
page read and write
20E4EEAB000
trusted library allocation
page read and write
20E4FB79000
trusted library allocation
page read and write
20E4E99F000
trusted library allocation
page read and write
20E58EC7000
trusted library allocation
page read and write
20E4FC3E000
trusted library allocation
page read and write
20E44DBE000
heap
page read and write
20E504AF000
trusted library allocation
page read and write
20E4FF3E000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
22EE95F9000
heap
page read and write
20E59077000
trusted library allocation
page read and write
20E584FA000
trusted library allocation
page read and write
20E58EBD000
trusted library allocation
page read and write
20E4E051000
trusted library allocation
page read and write
20E51DCC000
trusted library allocation
page read and write
20E4EE62000
trusted library allocation
page read and write
20E5003B000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E4B78A000
trusted library allocation
page read and write
16B21FB2000
heap
page read and write
20E44DD5000
heap
page read and write
20E44D9B000
heap
page read and write
20E44E0F000
heap
page read and write
22EE9670000
heap
page read and write
20E590CA000
trusted library allocation
page read and write
20E585E8000
trusted library allocation
page read and write
20E4E42D000
trusted library allocation
page read and write
20E50031000
trusted library allocation
page read and write
20E57627000
trusted library allocation
page read and write
20E44DF3000
heap
page read and write
20E44D95000
heap
page read and write
20E5794D000
trusted library allocation
page read and write
20E4FA8B000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E5181F000
trusted library allocation
page read and write
20E590C0000
trusted library allocation
page read and write
20E51685000
trusted library allocation
page read and write
20E4F6F9000
trusted library allocation
page read and write
20E44E23000
heap
page read and write
20E44DFB000
heap
page read and write
20E4EE5F000
trusted library allocation
page read and write
20E59028000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
22EE8D30000
heap
page readonly
20E4F1E0000
trusted library allocation
page read and write
22EE9676000
heap
page read and write
20E44E17000
heap
page read and write
20E55FB5000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5608F000
trusted library allocation
page read and write
20E4E6CA000
trusted library allocation
page read and write
20E44DA1000
heap
page read and write
20E44DB0000
heap
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E504ED000
trusted library allocation
page read and write
20E590C7000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E44E14000
heap
page read and write
13BE000
stack
page read and write
20E59493000
trusted library allocation
page read and write
20E4B569000
heap
page read and write
20E4E947000
trusted library allocation
page read and write
20E518B7000
trusted library allocation
page read and write
20E57A33000
trusted library allocation
page read and write
20E500D7000
trusted library allocation
page read and write
20E51DE4000
trusted library allocation
page read and write
20E502EF000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E44E0D000
heap
page read and write
20E516EC000
trusted library allocation
page read and write
20E4EE96000
trusted library allocation
page read and write
20E571C2000
trusted library allocation
page read and write
20E4F967000
trusted library allocation
page read and write
20E4F8C6000
trusted library allocation
page read and write
240DABD24000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
22EE960D000
heap
page read and write
20E4DE60000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E51DE0000
trusted library allocation
page read and write
20E59090000
trusted library allocation
page read and write
20E4F9AC000
trusted library allocation
page read and write
20E5952F000
trusted library allocation
page read and write
20E44DDB000
heap
page read and write
20E5003E000
trusted library allocation
page read and write
20E571E9000
trusted library allocation
page read and write
2204000
heap
page read and write
20E4E4FB000
trusted library allocation
page read and write
20E4FF61000
trusted library allocation
page read and write
20E5907E000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E497C7000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E44E02000
heap
page read and write
20E4E5A9000
trusted library allocation
page read and write
20E57A2E000
trusted library allocation
page read and write
20E44D9E000
heap
page read and write
20E4EF7C000
trusted library allocation
page read and write
20E59429000
trusted library allocation
page read and write
20E56069000
trusted library allocation
page read and write
6AE55FE000
stack
page read and write
22EE9B61000
heap
page read and write
20E44E0B000
heap
page read and write
20E4EE4F000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E44D90000
heap
page read and write
20E44D9B000
heap
page read and write
20E5048A000
trusted library allocation
page read and write
20E59735000
heap
page read and write
20E4F757000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E59281000
trusted library allocation
page read and write
20E4DEB8000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E4EDF7000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E57192000
trusted library allocation
page read and write
20E59085000
trusted library allocation
page read and write
20E59440000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E44D91000
heap
page read and write
20E44D9B000
heap
page read and write
20E4F0FE000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E59083000
trusted library allocation
page read and write
20E4EDFB000
trusted library allocation
page read and write
20E4FEC1000
trusted library allocation
page read and write
20E592B9000
trusted library allocation
page read and write
20E59615000
trusted library allocation
page read and write
20E3F96A000
heap
page read and write
20E4FAAC000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E59090000
trusted library allocation
page read and write
20E4F45B000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E4FBCC000
trusted library allocation
page read and write
20E44D9C000
heap
page read and write
20E4EF8F000
trusted library allocation
page read and write
20E4F1A3000
trusted library allocation
page read and write
20E4B74B000
trusted library allocation
page read and write
20E4EF93000
trusted library allocation
page read and write
20E4F671000
trusted library allocation
page read and write
20E4C760000
trusted library allocation
page read and write
20E59073000
trusted library allocation
page read and write
20E4E46E000
trusted library allocation
page read and write
20E4F9E6000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4F9B9000
trusted library allocation
page read and write
20E59552000
trusted library allocation
page read and write
20E4EFA4000
trusted library allocation
page read and write
20E4B54D000
heap
page read and write
20E59480000
trusted library allocation
page read and write
2240000
heap
page read and write
20E4E40F000
trusted library allocation
page read and write
20E590C0000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E4DB8F000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E59077000
trusted library allocation
page read and write
20E50046000
trusted library allocation
page read and write
22EE95EC000
heap
page read and write
20E4FE24000
trusted library allocation
page read and write
20E44DA1000
heap
page read and write
20E4F7BA000
trusted library allocation
page read and write
20E504BD000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E590C0000
trusted library allocation
page read and write
1000F8000
stack
page read and write
20E4F9A8000
trusted library allocation
page read and write
20E4B78A000
trusted library allocation
page read and write
20E4E93D000
trusted library allocation
page read and write
20E504C3000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E590DB000
trusted library allocation
page read and write
20E500BB000
trusted library allocation
page read and write
20E4C717000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E44E06000
heap
page read and write
20E5A12F000
trusted library allocation
page read and write
20E59049000
trusted library allocation
page read and write
20E4F94F000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E44DFA000
heap
page read and write
20E59417000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E4FBA0000
trusted library allocation
page read and write
20E4F18D000
trusted library allocation
page read and write
20E51DD4000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
22EE8F61000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4B79E000
trusted library allocation
page read and write
20E4ED8E000
trusted library allocation
page read and write
20E4F4A6000
trusted library allocation
page read and write
20E5924E000
trusted library allocation
page read and write
20E4F8C8000
trusted library allocation
page read and write
20E58EDD000
trusted library allocation
page read and write
20E4F3BF000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E4DB36000
trusted library allocation
page read and write
16B23AA6000
heap
page read and write
20E590FD000
trusted library allocation
page read and write
20E4DD94000
trusted library allocation
page read and write
22EE8D52000
unclassified section
page read and write
20E4F98F000
trusted library allocation
page read and write
20E59ED3000
trusted library allocation
page read and write
20E590E6000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E58E54000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44DFE000
heap
page read and write
20E560C8000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E4EE7C000
trusted library allocation
page read and write
20E513F3000
trusted library allocation
page read and write
20E55FC1000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E513FB000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E58F63000
trusted library allocation
page read and write
20E4E6E2000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E504F9000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E4F7BA000
trusted library allocation
page read and write
20E4E66C000
trusted library allocation
page read and write
20E4F3BB000
trusted library allocation
page read and write
20E59083000
trusted library allocation
page read and write
147F000
heap
page read and write
20E4F77B000
trusted library allocation
page read and write
20E507ED000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E44DDB000
heap
page read and write
1C5F30B2000
trusted library allocation
page read and write
20E4DEC6000
trusted library allocation
page read and write
20E4F428000
trusted library allocation
page read and write
20E4C70B000
trusted library allocation
page read and write
20E59098000
trusted library allocation
page read and write
20E4FFEF000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E59445000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E51DAD000
trusted library allocation
page read and write
20E4F9B8000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E0E000
heap
page read and write
20E5095C000
trusted library allocation
page read and write
20E4F9B8000
trusted library allocation
page read and write
20E4DD63000
trusted library allocation
page read and write
20E4E035000
trusted library allocation
page read and write
20E44DA3000
heap
page read and write
20E58FF6000
trusted library allocation
page read and write
20E5844E000
trusted library allocation
page read and write
20E4E0CE000
trusted library allocation
page read and write
20E50365000
trusted library allocation
page read and write
20E4FAF6000
trusted library allocation
page read and write
20E4F47E000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
20E44D95000
heap
page read and write
20E51DD8000
trusted library allocation
page read and write
22EE9678000
heap
page read and write
20E55F7A000
trusted library allocation
page read and write
20E507C4000
trusted library allocation
page read and write
20E55F3C000
trusted library allocation
page read and write
20E4F7AF000
trusted library allocation
page read and write
20E4FF8E000
trusted library allocation
page read and write
20E50864000
trusted library allocation
page read and write
20E4F913000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E4E443000
trusted library allocation
page read and write
20E515E4000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E57480000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E4FF59000
trusted library allocation
page read and write
20E4DD65000
trusted library allocation
page read and write
20E55F34000
trusted library allocation
page read and write
13CE000
stack
page read and write
20E4EDD8000
trusted library allocation
page read and write
20E4FE9A000
trusted library allocation
page read and write
20E4EDF1000
trusted library allocation
page read and write
20E5908A000
trusted library allocation
page read and write
20E505D4000
trusted library allocation
page read and write
20E55F13000
trusted library allocation
page read and write
20E509E6000
trusted library allocation
page read and write
20E57692000
trusted library allocation
page read and write
CE0000
unkown
page write copy
20E4B759000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E4F09E000
trusted library allocation
page read and write
22EE9649000
heap
page read and write
1DAFD596000
trusted library allocation
page read and write
20E590B0000
trusted library allocation
page read and write
20E4DEDD000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E5009D000
trusted library allocation
page read and write
20E4E446000
trusted library allocation
page read and write
20E4FABD000
trusted library allocation
page read and write
1DAFD5A8000
trusted library allocation
page read and write
22EE9676000
heap
page read and write
20E4DB4B000
trusted library allocation
page read and write
20E59088000
trusted library allocation
page read and write
1C5F3300000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E497BF000
trusted library allocation
page read and write
22EE9681000
heap
page read and write
20E51DB7000
trusted library allocation
page read and write
20E5611B000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
20E56166000
trusted library allocation
page read and write
20E561CB000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E55F53000
trusted library allocation
page read and write
20E4ED1D000
trusted library allocation
page read and write
20E5008C000
trusted library allocation
page read and write
F2511FF000
stack
page read and write
20E5903A000
trusted library allocation
page read and write
20E58EE5000
trusted library allocation
page read and write
20E59429000
trusted library allocation
page read and write
20E4F9C8000
trusted library allocation
page read and write
20E59735000
heap
page read and write
20E5907E000
trusted library allocation
page read and write
22EE9670000
heap
page read and write
20E44E0B000
heap
page read and write
20E4E99E000
trusted library allocation
page read and write
20E5949E000
trusted library allocation
page read and write
20E4AE8E000
trusted library allocation
page read and write
20E44DD4000
heap
page read and write
20E59578000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44DDA000
heap
page read and write
20E4DEBD000
trusted library allocation
page read and write
20E44E23000
heap
page read and write
20E44DA6000
heap
page read and write
20E44E10000
heap
page read and write
20E4F9F6000
trusted library allocation
page read and write
1470000
heap
page read and write
20E57131000
trusted library allocation
page read and write
20E4F75B000
trusted library allocation
page read and write
20E4F871000
trusted library allocation
page read and write
20E500B9000
trusted library allocation
page read and write
20E44E0E000
heap
page read and write
20E50499000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E58E83000
trusted library allocation
page read and write
20E5608F000
trusted library allocation
page read and write
20E4E9A8000
trusted library allocation
page read and write
20E5003E000
trusted library allocation
page read and write
20E4FF8E000
trusted library allocation
page read and write
3E20000
heap
page read and write
20E44E0B000
heap
page read and write
20E55F74000
trusted library allocation
page read and write
20E44E14000
heap
page read and write
20E4EFD8000
trusted library allocation
page read and write
20E516BA000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E513EE000
trusted library allocation
page read and write
20E4E6C0000
trusted library allocation
page read and write
20E4F1AE000
trusted library allocation
page read and write
20E44DB0000
heap
page read and write
20E4F1E9000
trusted library allocation
page read and write
20E4B0EB000
trusted library allocation
page read and write
20E594A8000
trusted library allocation
page read and write
20E4DEAB000
trusted library allocation
page read and write
20E4FBF4000
trusted library allocation
page read and write
20E579C5000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4F33B000
trusted library allocation
page read and write
22EE8FB3000
trusted library allocation
page read and write
20E4EE68000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E44DB0000
heap
page read and write
1DAFD632000
trusted library allocation
page read and write
20E560D1000
trusted library allocation
page read and write
20E4ED8C000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E51660000
trusted library allocation
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E5048A000
trusted library allocation
page read and write
20E5166E000
trusted library allocation
page read and write
20E49DFE000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4FBC3000
trusted library allocation
page read and write
20E4E6DD000
trusted library allocation
page read and write
20E5908A000
trusted library allocation
page read and write
20E59592000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
20E4FF78000
trusted library allocation
page read and write
20E55FF3000
trusted library allocation
page read and write
20E51656000
trusted library allocation
page read and write
20E584F4000
trusted library allocation
page read and write
20E500A1000
trusted library allocation
page read and write
20E55F34000
trusted library allocation
page read and write
20E590C9000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E44E15000
heap
page read and write
20E59493000
trusted library allocation
page read and write
20E44DF3000
heap
page read and write
20E55FF7000
trusted library allocation
page read and write
22EE9580000
heap
page read and write
20E4F780000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E49EFC000
trusted library allocation
page read and write
20E44D98000
heap
page read and write
20E59471000
trusted library allocation
page read and write
20E501A4000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E56077000
trusted library allocation
page read and write
20E44DA1000
heap
page read and write
20E4FD84000
trusted library allocation
page read and write
20E4F763000
trusted library allocation
page read and write
20E49798000
trusted library allocation
page read and write
20E4FB91000
trusted library allocation
page read and write
20E58EA9000
trusted library allocation
page read and write
20E560B3000
trusted library allocation
page read and write
20E513FB000
trusted library allocation
page read and write
20E59445000
trusted library allocation
page read and write
20E4DD81000
trusted library allocation
page read and write
C11000
unkown
page execute read
20E44E06000
heap
page read and write
20E44E14000
heap
page read and write
20E4F0E8000
trusted library allocation
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E5610B000
trusted library allocation
page read and write
20E4DD87000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E4E42C000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E44D8D000
heap
page read and write
20E503F6000
trusted library allocation
page read and write
20E515B5000
trusted library allocation
page read and write
20E5909B000
trusted library allocation
page read and write
20E4F7C2000
trusted library allocation
page read and write
20E4F1B1000
trusted library allocation
page read and write
20E44D78000
heap
page read and write
20E4B0A6000
trusted library allocation
page read and write
20E561FD000
trusted library allocation
page read and write
20E44DE3000
heap
page read and write
20E44D97000
heap
page read and write
20E44E06000
heap
page read and write
20E44E15000
heap
page read and write
873FA7C000
stack
page read and write
20E4DEC0000
trusted library allocation
page read and write
22EE8F7F000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E5186B000
trusted library allocation
page read and write
20E4F9AA000
trusted library allocation
page read and write
22EE963A000
heap
page read and write
20E590FE000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E59592000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E500A1000
trusted library allocation
page read and write
20E4E040000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E4C729000
trusted library allocation
page read and write
20E5A1CE000
trusted library allocation
page read and write
20E4E499000
trusted library allocation
page read and write
20E5008C000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E5908D000
trusted library allocation
page read and write
20E44DD8000
heap
page read and write
20E44DFE000
heap
page read and write
20E4E4C5000
trusted library allocation
page read and write
20E56166000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E516F3000
trusted library allocation
page read and write
20E44E0C000
heap
page read and write
20E44D95000
heap
page read and write
20E44DBC000
heap
page read and write
147F000
heap
page read and write
20E55FF2000
trusted library allocation
page read and write
20E560D1000
trusted library allocation
page read and write
20E4ED3F000
trusted library allocation
page read and write
20E4F1D3000
trusted library allocation
page read and write
20E51F00000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E516C0000
trusted library allocation
page read and write
20E4F341000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E4E5B7000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
22EE8D70000
heap
page read and write
20E5182B000
trusted library allocation
page read and write
20E5973E000
heap
page read and write
20E4E6C4000
trusted library allocation
page read and write
20E44E04000
heap
page read and write
20E497EF000
trusted library allocation
page read and write
20E508F4000
trusted library allocation
page read and write
20E5613C000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E44DFE000
heap
page read and write
20E4DEB5000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44DAD000
heap
page read and write
20E44DA3000
heap
page read and write
20E507CE000
trusted library allocation
page read and write
20E4F0D2000
trusted library allocation
page read and write
20E4EF19000
trusted library allocation
page read and write
20E59578000
trusted library allocation
page read and write
20E4B579000
heap
page read and write
20E4AED8000
trusted library allocation
page read and write
20E44DAE000
heap
page read and write
20E4EFA4000
trusted library allocation
page read and write
20E507B3000
trusted library allocation
page read and write
20E5004D000
trusted library allocation
page read and write
20E55E2E000
trusted library allocation
page read and write
20E5189C000
trusted library allocation
page read and write
20E4B575000
heap
page read and write
20E4F95B000
trusted library allocation
page read and write
1C5F3065000
trusted library allocation
page read and write
20E4ED84000
trusted library allocation
page read and write
20E5964B000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44E06000
heap
page read and write
20E44DAA000
heap
page read and write
1D1E000
stack
page read and write
20E502D5000
trusted library allocation
page read and write
20E51662000
trusted library allocation
page read and write
20E4EF21000
trusted library allocation
page read and write
20E59090000
trusted library allocation
page read and write
20E55F77000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
20E44E0B000
heap
page read and write
22EE8F10000
trusted library allocation
page read and write
20E4AE7D000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E55F92000
trusted library allocation
page read and write
1DAFD612000
trusted library allocation
page read and write
20E5134B000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E4E0C5000
trusted library allocation
page read and write
20E4EFA2000
trusted library allocation
page read and write
20E59085000
trusted library allocation
page read and write
20E49E6A000
trusted library allocation
page read and write
16B23AA5000
heap
page read and write
20E590BA000
trusted library allocation
page read and write
20E59088000
trusted library allocation
page read and write
20E513B6000
trusted library allocation
page read and write
20E509A1000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E44DA6000
heap
page read and write
20E4F7E6000
trusted library allocation
page read and write
20E4E073000
trusted library allocation
page read and write
20E44E18000
heap
page read and write
20E4FEEA000
trusted library allocation
page read and write
20E59071000
trusted library allocation
page read and write
20E4DE7B000
trusted library allocation
page read and write
20E4FC62000
trusted library allocation
page read and write
20E50307000
trusted library allocation
page read and write
B15F7FE000
stack
page read and write
20E44E0F000
heap
page read and write
20E5712C000
trusted library allocation
page read and write
20E5942E000
trusted library allocation
page read and write
20E59077000
trusted library allocation
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E44E1E000
heap
page read and write
20E4EFD8000
trusted library allocation
page read and write
20E4EFD8000
trusted library allocation
page read and write
20E515E4000
trusted library allocation
page read and write
20E59586000
trusted library allocation
page read and write
20E59477000
trusted library allocation
page read and write
20E44DAE000
heap
page read and write
22EE9638000
heap
page read and write
20E59421000
trusted library allocation
page read and write
20E4F7F2000
trusted library allocation
page read and write
20E56092000
trusted library allocation
page read and write
20E5963E000
trusted library allocation
page read and write
20E4B56E000
heap
page read and write
20E509B1000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44E05000
heap
page read and write
20E44D9B000
heap
page read and write
20E594B4000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
3E21000
heap
page read and write
20E50072000
trusted library allocation
page read and write
20E5900F000
trusted library allocation
page read and write
20E4DB84000
trusted library allocation
page read and write
20E59761000
heap
page read and write
20E516B8000
trusted library allocation
page read and write
1DAFD581000
trusted library allocation
page read and write
16B21FB8000
heap
page read and write
20E4B740000
trusted library allocation
page read and write
250908E1000
trusted library allocation
page execute read
20E4F963000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44E0F000
heap
page read and write
1DAFD547000
trusted library allocation
page read and write
20E59782000
heap
page read and write
20E516E8000
trusted library allocation
page read and write
10003D000
stack
page read and write
20E595F8000
trusted library allocation
page read and write
20E5943B000
trusted library allocation
page read and write
20E4F30F000
trusted library allocation
page read and write
20E4B755000
trusted library allocation
page read and write
20E5907B000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E55FA5000
trusted library allocation
page read and write
20E5048A000
trusted library allocation
page read and write
20E5959C000
trusted library allocation
page read and write
20E50726000
trusted library allocation
page read and write
20E44DF2000
heap
page read and write
20E4F0F9000
trusted library allocation
page read and write
20E595FA000
trusted library allocation
page read and write
20E4EE64000
trusted library allocation
page read and write
20E571B8000
trusted library allocation
page read and write
20E560F6000
trusted library allocation
page read and write
20E4FEC1000
trusted library allocation
page read and write
20E5055E000
trusted library allocation
page read and write
20E515CC000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4F193000
trusted library allocation
page read and write
1DAFD594000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4EF27000
trusted library allocation
page read and write
20E51901000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E59701000
heap
page read and write
20E44E15000
heap
page read and write
20E44D9C000
heap
page read and write
20E44E17000
heap
page read and write
20E59073000
trusted library allocation
page read and write
20E594BB000
trusted library allocation
page read and write
20E44DAE000
heap
page read and write
20E4E01E000
trusted library allocation
page read and write
20E44DEE000
heap
page read and write
20E44E15000
heap
page read and write
20E516C0000
trusted library allocation
page read and write
20E4F951000
trusted library allocation
page read and write
20E44D91000
heap
page read and write
20E4F1BA000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E57688000
trusted library allocation
page read and write
20E5166E000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E5906F000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E560CF000
trusted library allocation
page read and write
20E576D1000
trusted library allocation
page read and write
20E4B0DC000
trusted library allocation
page read and write
1C5F2CF0000
remote allocation
page read and write
20E44DDA000
heap
page read and write
20E51687000
trusted library allocation
page read and write
20E50950000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E4EF79000
trusted library allocation
page read and write
20E5763A000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E516E4000
trusted library allocation
page read and write
20E5002B000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E58E0A000
trusted library allocation
page read and write
20E4F824000
trusted library allocation
page read and write
20E5903E000
trusted library allocation
page read and write
20E4F092000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DFB000
heap
page read and write
20E3F953000
heap
page read and write
20E44E05000
heap
page read and write
20E5858E000
trusted library allocation
page read and write
20E5078C000
trusted library allocation
page read and write
20E44D74000
heap
page read and write
20E44DEE000
heap
page read and write
20E5907A000
trusted library allocation
page read and write
20E44DA3000
heap
page read and write
20E5056C000
trusted library allocation
page read and write
20E56038000
trusted library allocation
page read and write
20E44DBB000
heap
page read and write
22EE9681000
heap
page read and write
20E4ED97000
trusted library allocation
page read and write
20E59025000
trusted library allocation
page read and write
20E571F5000
trusted library allocation
page read and write
20E4E993000
trusted library allocation
page read and write
20E44DDF000
heap
page read and write
20E516BE000
trusted library allocation
page read and write
20E516A2000
trusted library allocation
page read and write
20E4F7E4000
trusted library allocation
page read and write
20E571AD000
trusted library allocation
page read and write
20E4F7C2000
trusted library allocation
page read and write
20E5009D000
trusted library allocation
page read and write
20E516C0000
trusted library allocation
page read and write
D74000
heap
page read and write
20E44E04000
heap
page read and write
1DAFD592000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E4FF33000
trusted library allocation
page read and write
20E57692000
trusted library allocation
page read and write
20E5945C000
trusted library allocation
page read and write
20E44DA1000
heap
page read and write
20E506E2000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E44DE3000
heap
page read and write
20E44DDB000
heap
page read and write
20E44E0F000
heap
page read and write
20E4F48F000
trusted library allocation
page read and write
20E507CE000
trusted library allocation
page read and write
20E4FB4B000
trusted library allocation
page read and write
20E4EDFD000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E516F3000
trusted library allocation
page read and write
20E4F0FE000
trusted library allocation
page read and write
20E50720000
trusted library allocation
page read and write
20E508B1000
trusted library allocation
page read and write
22EE95F0000
heap
page read and write
20E44DBF000
heap
page read and write
20E59471000
trusted library allocation
page read and write
20E51DE0000
trusted library allocation
page read and write
20E44DAA000
heap
page read and write
20E516E4000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E44DA5000
heap
page read and write
20E5166B000
trusted library allocation
page read and write
20E4B561000
heap
page read and write
20E4EDF0000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4F438000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44D95000
heap
page read and write
CE4000
unkown
page readonly
1DAFD57B000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E5612C000
trusted library allocation
page read and write
20E513B9000
trusted library allocation
page read and write
20E513FB000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E57A01000
trusted library allocation
page read and write
20E4F95B000
trusted library allocation
page read and write
20E44DAA000
heap
page read and write
20E44E10000
heap
page read and write
20E4E416000
trusted library allocation
page read and write
20E5094C000
trusted library allocation
page read and write
20E501BD000
trusted library allocation
page read and write
22EE968D000
heap
page read and write
20E4EDDA000
trusted library allocation
page read and write
22EE8F1A000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E516BA000
trusted library allocation
page read and write
20E571EF000
trusted library allocation
page read and write
20E4FBA9000
trusted library allocation
page read and write
20E579A3000
trusted library allocation
page read and write
23EFEDC0000
heap
page read and write
20E44E0B000
heap
page read and write
20E44D94000
heap
page read and write
1C5F2E5A000
heap
page read and write
20E500A3000
trusted library allocation
page read and write
20E504C3000
trusted library allocation
page read and write
20E513BD000
trusted library allocation
page read and write
20E50570000
trusted library allocation
page read and write
20E5955F000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E49DFB000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
16B22207000
trusted library allocation
page read and write
20E59098000
trusted library allocation
page read and write
20E4F4B5000
trusted library allocation
page read and write
20E4F3EE000
trusted library allocation
page read and write
20E4EFD6000
trusted library allocation
page read and write
20E59236000
trusted library allocation
page read and write
10343E000
stack
page read and write
20E44E02000
heap
page read and write
20E44DF5000
heap
page read and write
20E4FE7C000
trusted library allocation
page read and write
22EE8F6F000
trusted library allocation
page read and write
20E44DFA000
heap
page read and write
20E55F69000
trusted library allocation
page read and write
20E5002E000
trusted library allocation
page read and write
20E513B2000
trusted library allocation
page read and write
20E4F8A3000
trusted library allocation
page read and write
20E4DB41000
trusted library allocation
page read and write
20E51DE8000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
20E59073000
trusted library allocation
page read and write
20E4F968000
trusted library allocation
page read and write
20E4DEB5000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E4E90A000
trusted library allocation
page read and write
20E4F305000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44DD4000
heap
page read and write
20E58E29000
trusted library allocation
page read and write
20E502D8000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E5611E000
trusted library allocation
page read and write
20E4C72C000
trusted library allocation
page read and write
20E5616B000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44D85000
heap
page read and write
20E44E24000
heap
page read and write
20E4ADAD000
trusted library allocation
page read and write
20E5009D000
trusted library allocation
page read and write
20E59031000
trusted library allocation
page read and write
20E4E6F4000
trusted library allocation
page read and write
20E4F8EE000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E44E0B000
heap
page read and write
20E4DED7000
trusted library allocation
page read and write
20E44DFA000
heap
page read and write
20E516DC000
trusted library allocation
page read and write
20E4DE53000
trusted library allocation
page read and write
20E506B5000
trusted library allocation
page read and write
20E5137E000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E501EC000
trusted library allocation
page read and write
1440000
heap
page read and write
20E516E4000
trusted library allocation
page read and write
20E500CF000
trusted library allocation
page read and write
20E55E4A000
trusted library allocation
page read and write
20E585EE000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5928B000
trusted library allocation
page read and write
B15E7FE000
stack
page read and write
20E513FB000
trusted library allocation
page read and write
20E44E20000
heap
page read and write
20E4DD8D000
trusted library allocation
page read and write
20E579A7000
trusted library allocation
page read and write
20E509EA000
trusted library allocation
page read and write
20E4F0D7000
trusted library allocation
page read and write
20E4C7D0000
trusted library allocation
page read and write
20E4E6B7000
trusted library allocation
page read and write
20E4E9C3000
trusted library allocation
page read and write
103C7E000
stack
page read and write
20E4DE84000
trusted library allocation
page read and write
1DAFD512000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E513B6000
trusted library allocation
page read and write
20E4B0A1000
trusted library allocation
page read and write
20E59098000
trusted library allocation
page read and write
20E44D90000
heap
page read and write
20E4F1E7000
trusted library allocation
page read and write
20E4F3C9000
trusted library allocation
page read and write
20E56092000
trusted library allocation
page read and write
20E58FB7000
trusted library allocation
page read and write
20E44E0D000
heap
page read and write
D74000
heap
page read and write
20E44DFE000
heap
page read and write
20E44DA7000
heap
page read and write
20E4C77A000
trusted library allocation
page read and write
20E576D9000
trusted library allocation
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E18000
heap
page read and write
1DAFD56E000
trusted library allocation
page read and write
20E4F1A9000
trusted library allocation
page read and write
22EE8D60000
trusted library allocation
page read and write
1C5F30AF000
trusted library allocation
page read and write
20E58FA5000
trusted library allocation
page read and write
20E5762E000
trusted library allocation
page read and write
873E1D8000
stack
page read and write
20E4F321000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4F95B000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E4F348000
trusted library allocation
page read and write
20E44DF2000
heap
page read and write
20E4DECE000
trusted library allocation
page read and write
20E4DEB8000
trusted library allocation
page read and write
20E51660000
trusted library allocation
page read and write
20E4EF9C000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DD9000
heap
page read and write
20E44E15000
heap
page read and write
20E4E92A000
trusted library allocation
page read and write
20E4B79E000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E59701000
heap
page read and write
20E4E6B7000
trusted library allocation
page read and write
20E516DC000
trusted library allocation
page read and write
1473000
heap
page read and write
20E5908A000
trusted library allocation
page read and write
20E4B768000
trusted library allocation
page read and write
20E4E94A000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E4E0F9000
trusted library allocation
page read and write
20E5718C000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E5952C000
trusted library allocation
page read and write
16B21FB8000
heap
page read and write
20E55F99000
trusted library allocation
page read and write
20E4F9C9000
trusted library allocation
page read and write
20E4C7EB000
trusted library allocation
page read and write
22EE8F00000
trusted library allocation
page read and write
20E59289000
trusted library allocation
page read and write
20E44DDE000
heap
page read and write
20E4F42F000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
1DAFD700000
heap
page read and write
20E4F1A5000
trusted library allocation
page read and write
20E4F763000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
20E5046C000
trusted library allocation
page read and write
20E44D95000
heap
page read and write
20E44DFB000
heap
page read and write
20E49E9E000
trusted library allocation
page read and write
20E55FBE000
trusted library allocation
page read and write
20E505F3000
trusted library allocation
page read and write
20E4DDCF000
trusted library allocation
page read and write
20E5612C000
trusted library allocation
page read and write
F2501FF000
stack
page read and write
20E44D94000
heap
page read and write
20E55EAA000
trusted library allocation
page read and write
20E4F7D6000
trusted library allocation
page read and write
20E44DD3000
heap
page read and write
20E5007C000
trusted library allocation
page read and write
20E4F923000
trusted library allocation
page read and write
20E4EE49000
trusted library allocation
page read and write
20E4B5BA000
heap
page read and write
16B23AA0000
heap
page read and write
20E4DD9A000
trusted library allocation
page read and write
20E4F078000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E44DA2000
heap
page read and write
20E44DA7000
heap
page read and write
20E4E979000
trusted library allocation
page read and write
2110003F000
trusted library allocation
page read and write
20E50065000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E590FA000
trusted library allocation
page read and write
20E44DB8000
heap
page read and write
20E518AA000
trusted library allocation
page read and write
20E4F385000
trusted library allocation
page read and write
20E516E8000
trusted library allocation
page read and write
20E4E6C0000
trusted library allocation
page read and write
20E5166D000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DA2000
heap
page read and write
20E4B7A5000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E509C0000
trusted library allocation
page read and write
22EE95F0000
heap
page read and write
20E44E0E000
heap
page read and write
20E500A3000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
20E5097F000
trusted library allocation
page read and write
20E4F343000
trusted library allocation
page read and write
20E595CC000
trusted library allocation
page read and write
20E4F700000
trusted library allocation
page read and write
6AE45FE000
stack
page read and write
20E44DE3000
heap
page read and write
20E44DAD000
heap
page read and write
20E58FC3000
trusted library allocation
page read and write
20E4F7D3000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4EDD7000
trusted library allocation
page read and write
20E4E9AB000
trusted library allocation
page read and write
20E44DB8000
heap
page read and write
20E44DA6000
heap
page read and write
1C5F2C90000
unclassified section
page readonly
20E4EFBB000
trusted library allocation
page read and write
20E4DEB5000
trusted library allocation
page read and write
20E4E0FC000
trusted library allocation
page read and write
20E5796D000
trusted library allocation
page read and write
20E518A5000
trusted library allocation
page read and write
20E501D3000
trusted library allocation
page read and write
20E59083000
trusted library allocation
page read and write
20E595AD000
trusted library allocation
page read and write
20E4F329000
trusted library allocation
page read and write
20E5005A000
trusted library allocation
page read and write
20E51659000
trusted library allocation
page read and write
20E55E38000
trusted library allocation
page read and write
20E56107000
trusted library allocation
page read and write
20E58F87000
trusted library allocation
page read and write
20E4F348000
trusted library allocation
page read and write
20E55FC0000
trusted library allocation
page read and write
20E5908D000
trusted library allocation
page read and write
20E4C723000
trusted library allocation
page read and write
20E44E17000
heap
page read and write
20E4EF73000
trusted library allocation
page read and write
20E59089000
trusted library allocation
page read and write
20E51DD0000
trusted library allocation
page read and write
20E571CE000
trusted library allocation
page read and write
1C5F305F000
trusted library allocation
page read and write
20E51DE4000
trusted library allocation
page read and write
20E507C9000
trusted library allocation
page read and write
20E4F7DD000
trusted library allocation
page read and write
20E44DD8000
heap
page read and write
20E44D90000
heap
page read and write
20E44DDA000
heap
page read and write
20E50063000
trusted library allocation
page read and write
20E513F3000
trusted library allocation
page read and write
20E4DED4000
trusted library allocation
page read and write
C10000
unkown
page readonly
20E50087000
trusted library allocation
page read and write
D74000
heap
page read and write
8740B3E000
unkown
page readonly
20E59633000
trusted library allocation
page read and write
20E4EFD2000
trusted library allocation
page read and write
20E55F69000
trusted library allocation
page read and write
20E59736000
heap
page read and write
20E44E1D000
heap
page read and write
20E4E69C000
trusted library allocation
page read and write
20E5606D000
trusted library allocation
page read and write
1C5F3011000
trusted library allocation
page read and write
20E4E040000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44DA6000
heap
page read and write
20E44D91000
heap
page read and write
20E44DA6000
heap
page read and write
20E55FBC000
trusted library allocation
page read and write
20E4F1AC000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E500CF000
trusted library allocation
page read and write
20E4F858000
trusted library allocation
page read and write
20E4FF00000
trusted library allocation
page read and write
20E509E8000
trusted library allocation
page read and write
20E4C7DC000
trusted library allocation
page read and write
20E55FEC000
trusted library allocation
page read and write
20E4FDA5000
trusted library allocation
page read and write
20E4F7F6000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E500C0000
trusted library allocation
page read and write
20E4DE3D000
trusted library allocation
page read and write
20E4EF95000
trusted library allocation
page read and write
20E4B761000
trusted library allocation
page read and write
20E4F7B2000
trusted library allocation
page read and write
20E44DBF000
heap
page read and write
20E58E29000
trusted library allocation
page read and write
20E55F99000
trusted library allocation
page read and write
20E500D1000
trusted library allocation
page read and write
20E4EE68000
trusted library allocation
page read and write
20E4FF53000
trusted library allocation
page read and write
20E4F77E000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E4DE94000
trusted library allocation
page read and write
20E59473000
trusted library allocation
page read and write
1485000
heap
page read and write
20E4F3F7000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E4F7D3000
trusted library allocation
page read and write
20E4FF4F000
trusted library allocation
page read and write
20E44DEC000
heap
page read and write
20E44D8E000
heap
page read and write
20E59480000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E5A19E000
trusted library allocation
page read and write
20E4F85D000
trusted library allocation
page read and write
20E55EC3000
trusted library allocation
page read and write
20E50550000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E58598000
trusted library allocation
page read and write
20E4F0C4000
trusted library allocation
page read and write
20E59432000
trusted library allocation
page read and write
20E44D9C000
heap
page read and write
20E44DCE000
heap
page read and write
20E44D85000
heap
page read and write
20E4EE2B000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
D74000
heap
page read and write
20E5943B000
trusted library allocation
page read and write
20E55E38000
trusted library allocation
page read and write
20E4E4F4000
trusted library allocation
page read and write
20E58E90000
trusted library allocation
page read and write
20E518AF000
trusted library allocation
page read and write
20E4F1AE000
trusted library allocation
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E59799000
heap
page read and write
20E4E484000
trusted library allocation
page read and write
22EE9B98000
heap
page read and write
20E59421000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E55E59000
trusted library allocation
page read and write
20E4E448000
trusted library allocation
page read and write
20E4F7D6000
trusted library allocation
page read and write
20E4FD78000
trusted library allocation
page read and write
20E4F9C8000
trusted library allocation
page read and write
20E4B563000
heap
page read and write
1DAFD523000
trusted library allocation
page read and write
20E504ED000
trusted library allocation
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E44E15000
heap
page read and write
20E44DA7000
heap
page read and write
16B21FA2000
heap
page read and write
20E4FB6A000
trusted library allocation
page read and write
20E59083000
trusted library allocation
page read and write
20E58437000
trusted library allocation
page read and write
20E4FF55000
trusted library allocation
page read and write
20E44E1D000
heap
page read and write
20E516B5000
trusted library allocation
page read and write
20E44DF4000
heap
page read and write
20E44D9B000
heap
page read and write
20E4F991000
trusted library allocation
page read and write
20E5903A000
trusted library allocation
page read and write
20E5004B000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E55FB2000
trusted library allocation
page read and write
20E4E448000
trusted library allocation
page read and write
20E4DE7F000
trusted library allocation
page read and write
22EE9BA7000
heap
page read and write
20E500D7000
trusted library allocation
page read and write
22EE8DFE000
unkown
page execute read
20E51648000
trusted library allocation
page read and write
20E594CA000
trusted library allocation
page read and write
20E4F933000
trusted library allocation
page read and write
20E44DDA000
heap
page read and write
20E4B565000
heap
page read and write
20E518A5000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E5608F000
trusted library allocation
page read and write
20E44D85000
heap
page read and write
20E44E04000
heap
page read and write
20E4DEAE000
trusted library allocation
page read and write
20E44D74000
heap
page read and write
20E4F381000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E58EC7000
trusted library allocation
page read and write
20E55FF2000
trusted library allocation
page read and write
20E49E7F000
trusted library allocation
page read and write
20E44DF2000
heap
page read and write
20E55F55000
trusted library allocation
page read and write
20E4E4EE000
trusted library allocation
page read and write
20E4F9C0000
trusted library allocation
page read and write
20E44E21000
heap
page read and write
20E500D5000
trusted library allocation
page read and write
20E4E0F3000
trusted library allocation
page read and write
20E4F9A9000
trusted library allocation
page read and write
20E4DE86000
trusted library allocation
page read and write
148F000
heap
page read and write
20E561F8000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E4F326000
trusted library allocation
page read and write
20E504C8000
trusted library allocation
page read and write
20E44DA3000
heap
page read and write
20E4EDD7000
trusted library allocation
page read and write
20E4DE3B000
trusted library allocation
page read and write
20E58EDD000
trusted library allocation
page read and write
20E50997000
trusted library allocation
page read and write
20E56044000
trusted library allocation
page read and write
20E4F92A000
trusted library allocation
page read and write
20E4DB89000
trusted library allocation
page read and write
20E49D23000
trusted library allocation
page read and write
1DAFD0AE000
remote allocation
page execute read
20E4F7BA000
trusted library allocation
page read and write
20E4F7ED000
trusted library allocation
page read and write
20E4EFD6000
trusted library allocation
page read and write
22EE8AF0000
unclassified section
page readonly
20E5928B000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E44DA2000
heap
page read and write
20E497B3000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E594F3000
trusted library allocation
page read and write
20E44DA6000
heap
page read and write
873F1FE000
stack
page read and write
1C5F3070000
trusted library allocation
page read and write
22EE9BA7000
heap
page read and write
20E5924E000
trusted library allocation
page read and write
20E4F348000
trusted library allocation
page read and write
20E500C2000
trusted library allocation
page read and write
20E4FF74000
trusted library allocation
page read and write
20E44DB6000
heap
page read and write
20E5952C000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44DFB000
heap
page read and write
20E4DD7B000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E51DD4000
trusted library allocation
page read and write
20E590AC000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E44DBC000
heap
page read and write
20E44D97000
heap
page read and write
20E4E0F9000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44E21000
heap
page read and write
20E44DA2000
heap
page read and write
20E4F9B0000
trusted library allocation
page read and write
1DAFD562000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E578C8000
trusted library allocation
page read and write
148F000
heap
page read and write
20E4B0BC000
trusted library allocation
page read and write
20E59701000
heap
page read and write
20E4DB4B000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44DFB000
heap
page read and write
20E44DD4000
heap
page read and write
20E4E9CD000
trusted library allocation
page read and write
20E51DB7000
trusted library allocation
page read and write
20E5909B000
trusted library allocation
page read and write
20E4E9D0000
trusted library allocation
page read and write
20E4F651000
trusted library allocation
page read and write
20E504AF000
trusted library allocation
page read and write
20E4ED86000
trusted library allocation
page read and write
20E4F9DF000
trusted library allocation
page read and write
20E5003B000
trusted library allocation
page read and write
20E595FA000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E44DA6000
heap
page read and write
20E4FB62000
trusted library allocation
page read and write
20E58E83000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E5973E000
heap
page read and write
20E44D94000
heap
page read and write
20E4E0DA000
trusted library allocation
page read and write
20E4B56F000
heap
page read and write
20E4B761000
trusted library allocation
page read and write
20E4AE97000
trusted library allocation
page read and write
20E516BA000
trusted library allocation
page read and write
20E4E6C6000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E4F905000
trusted library allocation
page read and write
20E44DEC000
heap
page read and write
20E44D94000
heap
page read and write
20E59423000
trusted library allocation
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E56184000
trusted library allocation
page read and write
20E500B7000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E501BD000
trusted library allocation
page read and write
20E4DE7E000
trusted library allocation
page read and write
20E4E92C000
trusted library allocation
page read and write
20E4B575000
heap
page read and write
20E4FAB7000
trusted library allocation
page read and write
20E584EA000
trusted library allocation
page read and write
20E5844C000
trusted library allocation
page read and write
20E4F0FE000
trusted library allocation
page read and write
22EE9460000
heap
page read and write
20E4E64E000
trusted library allocation
page read and write
20E4AEF8000
trusted library allocation
page read and write
20E590B2000
trusted library allocation
page read and write
20E44D9A000
heap
page read and write
20E44E16000
heap
page read and write
20E44DF4000
heap
page read and write
B15EFFE000
unkown
page readonly
20E44E14000
heap
page read and write
20E44E06000
heap
page read and write
20E44E20000
heap
page read and write
20E4DEDA000
trusted library allocation
page read and write
20E55F53000
trusted library allocation
page read and write
20E4F023000
trusted library allocation
page read and write
20E4F7D3000
trusted library allocation
page read and write
10017E000
unkown
page readonly
20E4C7D7000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E5007E000
trusted library allocation
page read and write
20E58E72000
trusted library allocation
page read and write
20E4F7B5000
trusted library allocation
page read and write
22EE9BA7000
heap
page read and write
20E4FFE4000
trusted library allocation
page read and write
20E44DE6000
heap
page read and write
20E44E0C000
heap
page read and write
20E59706000
heap
page read and write
22EE968D000
heap
page read and write
20E44DFE000
heap
page read and write
20E4FF46000
trusted library allocation
page read and write
22EE9678000
heap
page read and write
20E58E98000
trusted library allocation
page read and write
20E59083000
trusted library allocation
page read and write
20E51DD0000
trusted library allocation
page read and write
20E518B2000
trusted library allocation
page read and write
20E44E06000
heap
page read and write
20E4FC12000
trusted library allocation
page read and write
20E4FBA7000
trusted library allocation
page read and write
20E4F337000
trusted library allocation
page read and write
20E516C7000
trusted library allocation
page read and write
20E5927F000
trusted library allocation
page read and write
22EE8F5F000
trusted library allocation
page read and write
1DAFD170000
unclassified section
page read and write
20E4EEF0000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E5963D000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E4F7AA000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E500D5000
trusted library allocation
page read and write
20E44DA3000
heap
page read and write
20E58595000
trusted library allocation
page read and write
1000FB000
stack
page read and write
20E571C2000
trusted library allocation
page read and write
1483000
heap
page read and write
20E4F1FB000
trusted library allocation
page read and write
20E5047F000
trusted library allocation
page read and write
20E4B569000
heap
page read and write
20E4B79E000
trusted library allocation
page read and write
20E44E23000
heap
page read and write
20E4B0F6000
trusted library allocation
page read and write
1DAFD23A000
heap
page read and write
20E44D95000
heap
page read and write
20E44D95000
heap
page read and write
20E44E15000
heap
page read and write
20E516C7000
trusted library allocation
page read and write
20E516D7000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E4F96C000
trusted library allocation
page read and write
20E44DB5000
heap
page read and write
20E5976A000
heap
page read and write
20E4DEB5000
trusted library allocation
page read and write
22EE960D000
heap
page read and write
20E44E1A000
heap
page read and write
20E44DDA000
heap
page read and write
20E4E03B000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
1DAFD17F000
unclassified section
page read and write
1C5F301B000
trusted library allocation
page read and write
1C5F2E30000
heap
page read and write
20E571CE000
trusted library allocation
page read and write
20E57688000
trusted library allocation
page read and write
20E590C5000
trusted library allocation
page read and write
CD2000
unkown
page readonly
20E4F183000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E55F55000
trusted library allocation
page read and write
22EE9B7B000
heap
page read and write
20E500C2000
trusted library allocation
page read and write
20E4DEDC000
trusted library allocation
page read and write
20E4E6CA000
trusted library allocation
page read and write
20E516BE000
trusted library allocation
page read and write
20E44DFB000
heap
page read and write
20E4F8AD000
trusted library allocation
page read and write
20E515F7000
trusted library allocation
page read and write
20E50763000
trusted library allocation
page read and write
20E4DBFC000
trusted library allocation
page read and write
20E4EE62000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
22EE95F0000
heap
page read and write
20E516BC000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E55F83000
trusted library allocation
page read and write
20E4F1A0000
trusted library allocation
page read and write
20E5927F000
trusted library allocation
page read and write
20E4F98F000
trusted library allocation
page read and write
20E5614A000
trusted library allocation
page read and write
20E59263000
trusted library allocation
page read and write
20E4FBC2000
trusted library allocation
page read and write
20E4EFD2000
trusted library allocation
page read and write
20E55FF0000
trusted library allocation
page read and write
20E4FBB9000
trusted library allocation
page read and write
20E4F9B9000
trusted library allocation
page read and write
20E4F1F8000
trusted library allocation
page read and write
20E44DBE000
heap
page read and write
22EE8B70000
unclassified section
page readonly
20E59077000
trusted library allocation
page read and write
1DAFD190000
heap
page read and write
20E55E32000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
23EFEF00000
trusted library allocation
page read and write
20E44DA8000
heap
page read and write
20E44D95000
heap
page read and write
20E59098000
trusted library allocation
page read and write
20E516BC000
trusted library allocation
page read and write
20E4EEE1000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E50065000
trusted library allocation
page read and write
20E44D94000
heap
page read and write
20E4B749000
trusted library allocation
page read and write
20E504DC000
trusted library allocation
page read and write
20E44DCE000
heap
page read and write
20E4EE1D000
trusted library allocation
page read and write
20E4EE30000
trusted library allocation
page read and write
874033E000
unkown
page read and write
20E44E24000
heap
page read and write
20E4F9AC000
trusted library allocation
page read and write
22EE9B6A000
heap
page read and write
20E4EEAD000
trusted library allocation
page read and write
20E4B79E000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E4B0C1000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E44DA2000
heap
page read and write
20E59701000
heap
page read and write
22EE9B84000
heap
page read and write
20E44DDA000
heap
page read and write
20E4F9EA000
trusted library allocation
page read and write
20E590F6000
trusted library allocation
page read and write
20E59283000
trusted library allocation
page read and write
20E4EEAB000
trusted library allocation
page read and write
20E4B0BE000
trusted library allocation
page read and write
20E50987000
trusted library allocation
page read and write
20E4F7F9000
trusted library allocation
page read and write
20E518B7000
trusted library allocation
page read and write
20E4F9ED000
trusted library allocation
page read and write
20E59578000
trusted library allocation
page read and write
20E4F191000
trusted library allocation
page read and write
20E594ED000
trusted library allocation
page read and write
20E4C760000
trusted library allocation
page read and write
20E4FF40000
trusted library allocation
page read and write
20E4B54F000
heap
page read and write
20E4FF1F000
trusted library allocation
page read and write
20E59580000
trusted library allocation
page read and write
20E3F99E000
heap
page read and write
20E44E15000
heap
page read and write
20E59071000
trusted library allocation
page read and write
20E4F923000
trusted library allocation
page read and write
20E44DDB000
heap
page read and write
20E4F090000
trusted library allocation
page read and write
1C5F3170000
heap
page read and write
20E59083000
trusted library allocation
page read and write
20E3F917000
heap
page read and write
22EE9BA7000
heap
page read and write
22EE8D80000
trusted library section
page readonly
873FA3E000
unkown
page readonly
20E57618000
trusted library allocation
page read and write
20E3F917000
heap
page read and write
20E5906F000
trusted library allocation
page read and write
20E51D97000
trusted library allocation
page read and write
20E4FF59000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E44DD3000
heap
page read and write
20E500A1000
trusted library allocation
page read and write
22EE95F0000
heap
page read and write
20E44DDA000
heap
page read and write
20E4F951000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E44E02000
heap
page read and write
20E4F9B0000
trusted library allocation
page read and write
20E5942E000
trusted library allocation
page read and write
20E4AE9A000
trusted library allocation
page read and write
22EE8DE0000
trusted library allocation
page read and write
20E590EC000
trusted library allocation
page read and write
20E516BA000
trusted library allocation
page read and write
20E4E42D000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44D95000
heap
page read and write
20E4B561000
heap
page read and write
20E4F1A5000
trusted library allocation
page read and write
1C5F2E50000
heap
page read and write
20E55EBD000
trusted library allocation
page read and write
20E44D97000
heap
page read and write
22EE8F12000
trusted library allocation
page read and write
20E4E927000
trusted library allocation
page read and write
22EE9673000
heap
page read and write
20E4C7EE000
trusted library allocation
page read and write
20E4B5BB000
heap
page read and write
20E55E55000
trusted library allocation
page read and write
20E5007E000
trusted library allocation
page read and write
20E4F94A000
trusted library allocation
page read and write
20E4FF6D000
trusted library allocation
page read and write
20E504F9000
trusted library allocation
page read and write
20E50093000
trusted library allocation
page read and write
20E49E66000
trusted library allocation
page read and write
B15CCBE000
unkown
page readonly
20E44DA4000
heap
page read and write
20E4FA9F000
trusted library allocation
page read and write
20E590FD000
trusted library allocation
page read and write
20E4F329000
trusted library allocation
page read and write
20E4EFCE000
trusted library allocation
page read and write
20E4F01E000
trusted library allocation
page read and write
20E5903A000
trusted library allocation
page read and write
20E57907000
trusted library allocation
page read and write
20E592A9000
trusted library allocation
page read and write
20E4DE5E000
trusted library allocation
page read and write
20E59701000
heap
page read and write
16B21F9D000
heap
page read and write
20E59735000
heap
page read and write
22EE9B99000
heap
page read and write
20E44DA6000
heap
page read and write
20E44D9C000
heap
page read and write
20E58E86000
trusted library allocation
page read and write
1DAFD186000
heap
page read and write
20E5166D000
trusted library allocation
page read and write
20E51685000
trusted library allocation
page read and write
16B22100000
heap
page read and write
20E4FF7A000
trusted library allocation
page read and write
20E4979B000
trusted library allocation
page read and write
20E516BC000
trusted library allocation
page read and write
20E44D9B000
heap
page read and write
20E44DD4000
heap
page read and write
20E4EEA5000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E56600000
trusted library allocation
page read and write
873D7EB000
stack
page read and write
20E4FBEC000
trusted library allocation
page read and write
20E560B1000
trusted library allocation
page read and write
20E4E63D000
trusted library allocation
page read and write
20E5616B000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
20E44E0B000
heap
page read and write
20E4F1E9000
trusted library allocation
page read and write
20E4F333000
trusted library allocation
page read and write
F2509FF000
stack
page read and write
20E59075000
trusted library allocation
page read and write
20E58EE6000
trusted library allocation
page read and write
20E4B565000
heap
page read and write
20E590C2000
trusted library allocation
page read and write
20E4F7B5000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E4C027000
trusted library allocation
page read and write
20E59701000
heap
page read and write
20E56038000
trusted library allocation
page read and write
20E597C4000
heap
page read and write
1DAFD5E7000
trusted library allocation
page read and write
20E44DA2000
heap
page read and write
20E58E92000
trusted library allocation
page read and write
20E44E08000
heap
page read and write
20E4DE9E000
trusted library allocation
page read and write
20E571B8000
trusted library allocation
page read and write
20E4FE96000
trusted library allocation
page read and write
20E44D9E000
heap
page read and write
20E4E467000
trusted library allocation
page read and write
20E44D9A000
heap
page read and write
20E5766A000
trusted library allocation
page read and write
20E44D8D000
heap
page read and write
20E4FD84000
trusted library allocation
page read and write
20E4F37A000
trusted library allocation
page read and write
23EFEF07000
trusted library allocation
page read and write
20E4EDC3000
trusted library allocation
page read and write
20E4F428000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E55F26000
trusted library allocation
page read and write
20E44E02000
heap
page read and write
22EE8FCE000
trusted library allocation
page read and write
20E55FF2000
trusted library allocation
page read and write
20E44E24000
heap
page read and write
20E4FF8E000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E560C8000
trusted library allocation
page read and write
20E5766A000
trusted library allocation
page read and write
20E44DA7000
heap
page read and write
20E58FC9000
trusted library allocation
page read and write
20E516DC000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E44E1D000
heap
page read and write
20E4DB10000
trusted library allocation
page read and write
20E3F927000
heap
page read and write
20E5061B000
trusted library allocation
page read and write
20E44E0B000
heap
page read and write
20E44E08000
heap
page read and write
20E4B579000
heap
page read and write
20E57986000
trusted library allocation
page read and write
20E4F95E000
trusted library allocation
page read and write
20E4EEFD000
trusted library allocation
page read and write
20E51342000
trusted library allocation
page read and write
1458000
heap
page read and write
20E4F0DA000
trusted library allocation
page read and write
20E50780000
trusted library allocation
page read and write
20E44D9F000
heap
page read and write
20E4DEB0000
trusted library allocation
page read and write
20E44D8E000
heap
page read and write
20E4F7DF000
trusted library allocation
page read and write
20E44DFE000
heap
page read and write
20E4E4D1000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
20E44E0F000
heap
page read and write
20E4DEC2000
trusted library allocation
page read and write
1DAFD579000
trusted library allocation
page read and write
20E58EE7000
trusted library allocation
page read and write
20E49D71000
trusted library allocation
page read and write
20E44DAD000
heap
page read and write
20E44E08000
heap
page read and write
20E4F9DF000
trusted library allocation
page read and write
20E44DF5000
heap
page read and write
20E44E15000
heap
page read and write
20E516BA000
trusted library allocation
page read and write
22EE9B84000
heap
page read and write
20E4F64B000
trusted library allocation
page read and write
B15FFFE000
unkown
page readonly
20E44DA6000
heap
page read and write
20E5614A000
trusted library allocation
page read and write
22EE9706000
trusted library allocation
page read and write
20E4EDE1000
trusted library allocation
page read and write
There are 4100 hidden memdumps, click here to show them.