IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c06fe41f-c289-4a52-9cc3-7be4e2802015.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_c06fe41f-c289-4a52-9cc3-7be4e2802015.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2172 -parentBuildID 20230927232528 -prefsHandle 2084 -prefMapHandle 2076 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6789b02-c7c3-48d4-a1ac-a4a2567930bd} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 24d7ab6df10 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4364 -parentBuildID 20230927232528 -prefsHandle 4356 -prefMapHandle 2896 -prefsLen 30974 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {043b44f9-de79-4c7a-a5a7-8092897a0483} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 24d0d2c4810 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5024 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5004 -prefMapHandle 4964 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2f9f0cb-803a-47c5-a8fe-41a3040c8247} 6428 "\\.\pipe\gecko-crash-server-pipe.6428" 24d14af1d10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
http://detectportal.firefox.com/
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
http://www.mozilla.com0
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://browser/siteProtections.ftlbrowser/appmenu.ftl
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
http://crl.microso
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
http://exslt.org/sets
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
http://exslt.org/common
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://exslt.org/dates-and-times
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
http://ocsp.digices
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
http://exslt.org/dates-and-timesZ
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://addons.mozilla.org/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
http://a9.com/-/spec/opensearch/1.0/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
http://youtube.com/
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://a9.com/-/spec/opensearch/1.1/
unknown
https://blocked.cdn.mozilla.net/
unknown
https://json-schema.org/draft/2019-09/schema
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://truecolors.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
http://json-schema.org/draft-07/schema#-
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.129
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.193.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.21.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.129.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
151.101.193.91
services.addons.mozilla.org
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
9F8000
heap
page read and write
malicious
24D16931000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D0B6CF000
trusted library allocation
page read and write
224AA749000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
1747F600000
heap
page read and write
2113DAA0000
heap
page read and write
24D7C91E000
heap
page read and write
1747F517000
trusted library allocation
page read and write
24D170AE000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
224AA2D0000
unclassified section
page readonly
24D0B428000
trusted library allocation
page read and write
2113D461000
heap
page read and write
24D1297B000
trusted library allocation
page read and write
24D12682000
trusted library allocation
page read and write
24D0C3B1000
trusted library allocation
page read and write
24D16DB4000
trusted library allocation
page read and write
24D1483C000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8E3000
heap
page read and write
24D0C3FA000
trusted library allocation
page read and write
224AA900000
trusted library allocation
page read and write
24D13EF3000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C2AF000
trusted library allocation
page read and write
24D0A1D3000
trusted library allocation
page read and write
24D0E04F000
trusted library allocation
page read and write
24D0C2EC000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D135C8000
heap
page read and write
24D7C8E9000
heap
page read and write
24D7C8ED000
heap
page read and write
24D7C90C000
heap
page read and write
24D0AD53000
trusted library allocation
page read and write
24D136AA000
heap
page read and write
24D14CAE000
trusted library allocation
page read and write
24D13BE3000
trusted library allocation
page read and write
24D148B8000
trusted library allocation
page read and write
24D1691E000
trusted library allocation
page read and write
24D16917000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D0C82E000
trusted library allocation
page read and write
24D14919000
trusted library allocation
page read and write
24D0C16D000
trusted library allocation
page read and write
24D0D5D5000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C90C000
heap
page read and write
24D13557000
heap
page read and write
24D14931000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D12DC9000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7C8BE000
heap
page read and write
2113DB2A000
heap
page read and write
24D14AEB000
trusted library allocation
page read and write
24D14BB9000
trusted library allocation
page read and write
24D0B943000
trusted library allocation
page read and write
24D0E4AC000
trusted library allocation
page read and write
224AA700000
trusted library allocation
page read and write
24D12659000
trusted library allocation
page read and write
24D0E486000
trusted library allocation
page read and write
24D0ADEB000
trusted library allocation
page read and write
24D7E9BF000
trusted library allocation
page read and write
24D129EB000
trusted library allocation
page read and write
17091200000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C928000
heap
page read and write
24D7C970000
heap
page read and write
24D0AD97000
trusted library allocation
page read and write
24D135A1000
heap
page read and write
24D0AD74000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D13BF1000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D7C924000
heap
page read and write
24D7C91C000
heap
page read and write
24D17B84000
trusted library allocation
page read and write
24D7E985000
trusted library allocation
page read and write
24D167E8000
trusted library allocation
page read and write
24D0C2B8000
trusted library allocation
page read and write
3124000
heap
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C160000
trusted library allocation
page read and write
24D0AA87000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D14C8E000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0AD97000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D0ADCA000
trusted library allocation
page read and write
24D0ADD6000
trusted library allocation
page read and write
2113CE65000
trusted library allocation
page read and write
319997E000
unkown
page readonly
24D7C90C000
heap
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D12985000
trusted library allocation
page read and write
24D14BE0000
trusted library allocation
page read and write
24D14AEB000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D14BE5000
trusted library allocation
page read and write
24D09DCC000
trusted library allocation
page read and write
24D0ADD6000
trusted library allocation
page read and write
24D14CE7000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
1747EFD0000
heap
page read and write
24D1355D000
heap
page read and write
24D0A23D000
trusted library allocation
page read and write
24D7C92B000
heap
page read and write
24D0C2BF000
trusted library allocation
page read and write
24D0AD82000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0ADD6000
trusted library allocation
page read and write
24D0DFAD000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D7C8DD000
heap
page read and write
24D14AEB000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D07AB1000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7C8F2000
heap
page read and write
24D7C90C000
heap
page read and write
24D0B4EF000
trusted library allocation
page read and write
224AA77B000
trusted library allocation
page read and write
24D0B7D1000
trusted library allocation
page read and write
24D0C393000
trusted library allocation
page read and write
2113DA9C000
heap
page read and write
24D0AA87000
trusted library allocation
page read and write
24D16D65000
trusted library allocation
page read and write
24D14BE5000
trusted library allocation
page read and write
24D7C926000
heap
page read and write
24D15902000
trusted library allocation
page read and write
24D14BD4000
trusted library allocation
page read and write
24D0C2B8000
trusted library allocation
page read and write
2113DA9C000
heap
page read and write
24D7C90C000
heap
page read and write
24D16FA1000
trusted library allocation
page read and write
24D1671F000
trusted library allocation
page read and write
24D13E3C000
trusted library allocation
page read and write
24D12ABA000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D12DB8000
trusted library allocation
page read and write
24D7C950000
heap
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D0C2D5000
trusted library allocation
page read and write
24D14B8B000
trusted library allocation
page read and write
24D12651000
trusted library allocation
page read and write
24D0A6A7000
trusted library allocation
page read and write
1747F000000
unclassified section
page read and write
24D0A297000
trusted library allocation
page read and write
24D16E2F000
trusted library allocation
page read and write
24D7C8B7000
heap
page read and write
24D0C407000
trusted library allocation
page read and write
24D12DE1000
trusted library allocation
page read and write
24D147F4000
trusted library allocation
page read and write
24D0A2B8000
trusted library allocation
page read and write
24D17BF1000
trusted library allocation
page read and write
24D0C144000
trusted library allocation
page read and write
24D0C8C4000
trusted library allocation
page read and write
24D1496F000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D167B0000
trusted library allocation
page read and write
24D0A6A0000
trusted library allocation
page read and write
24D12D8E000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0A2D6000
trusted library allocation
page read and write
24D0C8F3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D0AD92000
trusted library allocation
page read and write
1747F410000
trusted library allocation
page read and write
24D13E0F000
trusted library allocation
page read and write
24D12569000
trusted library allocation
page read and write
24D0C230000
trusted library allocation
page read and write
24D0B84E000
trusted library allocation
page read and write
24D14C21000
trusted library allocation
page read and write
24D0C1E0000
trusted library allocation
page read and write
17091177000
heap
page read and write
24D7C92F000
heap
page read and write
24D07A6F000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D7E9D4000
trusted library allocation
page read and write
24D16916000
trusted library allocation
page read and write
24D0AC7C000
trusted library allocation
page read and write
24D14BFC000
trusted library allocation
page read and write
24D12A67000
trusted library allocation
page read and write
24D14B89000
trusted library allocation
page read and write
24D1493A000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D0ADA8000
trusted library allocation
page read and write
17091050000
heap
page read and write
24D14B9E000
trusted library allocation
page read and write
24D12DBE000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D170AE000
trusted library allocation
page read and write
24D14735000
trusted library allocation
page read and write
24D0ADAB000
trusted library allocation
page read and write
24D0A158000
trusted library allocation
page read and write
24D14B9D000
trusted library allocation
page read and write
24D0E533000
trusted library allocation
page read and write
24D12AF8000
trusted library allocation
page read and write
24D0C195000
trusted library allocation
page read and write
24D16FA8000
trusted library allocation
page read and write
24D7C8D0000
heap
page read and write
224AA570000
unclassified section
page readonly
24D0C2C8000
trusted library allocation
page read and write
24D07AD2000
trusted library allocation
page read and write
24D12DCF000
trusted library allocation
page read and write
24D13E3C000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0B792000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8D2000
heap
page read and write
24D7C8D1000
heap
page read and write
24D7C924000
heap
page read and write
2113CCE0000
heap
page read and write
24D14CA2000
trusted library allocation
page read and write
24D12DDB000
trusted library allocation
page read and write
24D0B7CD000
trusted library allocation
page read and write
24D16FFE000
trusted library allocation
page read and write
24D0C1AE000
trusted library allocation
page read and write
1747F4C8000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D1670E000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D0D5A8000
trusted library allocation
page read and write
24D0C8BB000
trusted library allocation
page read and write
24D1685B000
trusted library allocation
page read and write
24D14B33000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8BB000
heap
page read and write
24D12DD1000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0E0A1000
trusted library allocation
page read and write
24D7EA61000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
54C000
unkown
page readonly
24D7C8FE000
heap
page read and write
24D7C8E3000
heap
page read and write
6F60EFE000
stack
page read and write
24D7E9A6000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D12DCC000
trusted library allocation
page read and write
24D0C3F2000
trusted library allocation
page read and write
24D7EADE000
trusted library allocation
page read and write
24D0A26F000
trusted library allocation
page read and write
24D16931000
trusted library allocation
page read and write
24D0C175000
trusted library allocation
page read and write
24D7C8C4000
heap
page read and write
24D14978000
trusted library allocation
page read and write
24D12693000
trusted library allocation
page read and write
24D1355D000
heap
page read and write
24D7C91E000
heap
page read and write
24D1684A000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D0B4E6000
trusted library allocation
page read and write
24D0A6B8000
trusted library allocation
page read and write
24D1691A000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0E486000
trusted library allocation
page read and write
2113DB3D000
heap
page read and write
24D7C91E000
heap
page read and write
24D16740000
trusted library allocation
page read and write
825E9FE000
stack
page read and write
24D0B99E000
trusted library allocation
page read and write
24D0B892000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C924000
heap
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D17024000
trusted library allocation
page read and write
24D0C89B000
trusted library allocation
page read and write
24D148CE000
trusted library allocation
page read and write
24D7F3F5000
trusted library allocation
page read and write
24D14B9D000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14BD2000
trusted library allocation
page read and write
24D0E37B000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D7C91C000
heap
page read and write
24D0B7C3000
trusted library allocation
page read and write
24D7EA4C000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7C950000
heap
page read and write
24D16926000
trusted library allocation
page read and write
24D14AFB000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0A28F000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D148D2000
trusted library allocation
page read and write
24D1492A000
trusted library allocation
page read and write
24D14CC4000
trusted library allocation
page read and write
24D0AA97000
trusted library allocation
page read and write
24D0AA00000
trusted library allocation
page read and write
24D126A8000
trusted library allocation
page read and write
24D0AA93000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D7EA61000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
2113DB20000
heap
page read and write
24D0C3FA000
trusted library allocation
page read and write
24D12AFD000
trusted library allocation
page read and write
24D12A9A000
trusted library allocation
page read and write
24D14AF4000
trusted library allocation
page read and write
1D689D07000
trusted library allocation
page read and write
24D14CB1000
trusted library allocation
page read and write
24D7F01E000
trusted library allocation
page read and write
24D0B7C9000
trusted library allocation
page read and write
24D0A2D6000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D14AE8000
trusted library allocation
page read and write
224AA340000
remote allocation
page read and write
24D7C924000
heap
page read and write
224AA7A2000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
2113CB80000
heap
page read and write
24D0A6CD000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C924000
heap
page read and write
169E000
stack
page read and write
24D0E384000
trusted library allocation
page read and write
24D12AF5000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D1278F000
trusted library allocation
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D1294B000
trusted library allocation
page read and write
24D0C242000
trusted library allocation
page read and write
24D14945000
trusted library allocation
page read and write
2113CE6F000
trusted library allocation
page read and write
24D168CA000
trusted library allocation
page read and write
24D0C8B3000
trusted library allocation
page read and write
24D7F088000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0B4FD000
trusted library allocation
page read and write
236B9B31000
trusted library allocation
page execute read
24D14B56000
trusted library allocation
page read and write
24D0ADAC000
trusted library allocation
page read and write
24D12D9D000
trusted library allocation
page read and write
24D0B8B7000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D07A80000
trusted library allocation
page read and write
2113DB61000
heap
page read and write
24D7C92F000
heap
page read and write
24D7C8AC000
heap
page read and write
24D0C1C5000
trusted library allocation
page read and write
24D0D5B5000
trusted library allocation
page read and write
24D135E4000
heap
page read and write
24D7C926000
heap
page read and write
24D7C90C000
heap
page read and write
24D0C1CF000
trusted library allocation
page read and write
24D0A4A2000
heap
page read and write
24D148ED000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
2113CCE6000
heap
page read and write
24D0A170000
trusted library allocation
page read and write
2113D623000
trusted library allocation
page read and write
24D0C267000
trusted library allocation
page read and write
24D7EA43000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
224AA470000
heap
page read and write
24D0A1A9000
trusted library allocation
page read and write
24D0C22E000
trusted library allocation
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D0C8FA000
trusted library allocation
page read and write
319AA7E000
unkown
page readonly
174000
heap
page read and write
24D7C8B8000
heap
page read and write
24D0E37F000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D16D57000
trusted library allocation
page read and write
24D0ADFA000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D16D59000
trusted library allocation
page read and write
24D7C8C2000
heap
page read and write
24D170E8000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D1496F000
trusted library allocation
page read and write
24D1494C000
trusted library allocation
page read and write
24D0B8B7000
trusted library allocation
page read and write
24D09D8F000
trusted library allocation
page read and write
24D16780000
trusted library allocation
page read and write
24D12652000
trusted library allocation
page read and write
24D0AA6B000
trusted library allocation
page read and write
24D14CF3000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D13557000
heap
page read and write
2113DB84000
heap
page read and write
24D14B7E000
trusted library allocation
page read and write
24D7C8B6000
heap
page read and write
24D1692B000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0AA90000
trusted library allocation
page read and write
24D15FBA000
trusted library allocation
page read and write
319887E000
unkown
page readonly
98F000
stack
page read and write
24D0D175000
trusted library allocation
page read and write
24D13BF1000
trusted library allocation
page read and write
24D7F013000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14BD2000
trusted library allocation
page read and write
24D0C3E5000
trusted library allocation
page read and write
24D7C8E5000
heap
page read and write
24D14EC8000
trusted library allocation
page read and write
24D0C3EA000
trusted library allocation
page read and write
24D0B970000
trusted library allocation
page read and write
24D0E4C5000
trusted library allocation
page read and write
24D129E1000
trusted library allocation
page read and write
24D1355D000
heap
page read and write
24D7C8F1000
heap
page read and write
24D0A696000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D7C8E9000
heap
page read and write
24D0A633000
trusted library allocation
page read and write
24D7C8DD000
heap
page read and write
24D14C3F000
trusted library allocation
page read and write
24D0B827000
trusted library allocation
page read and write
1747F403000
trusted library allocation
page read and write
129E000
stack
page read and write
24D13E3C000
trusted library allocation
page read and write
24D0C293000
trusted library allocation
page read and write
2113DBAE000
heap
page read and write
24D7C924000
heap
page read and write
24D14B26000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0B793000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
224AA75D000
trusted library allocation
page read and write
24D0B9CE000
trusted library allocation
page read and write
24D7C8BE000
heap
page read and write
24D0B8BF000
trusted library allocation
page read and write
2113CE7F000
trusted library allocation
page read and write
24D0B7EB000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
16A0000
trusted library allocation
page read and write
825CFFE000
unkown
page readonly
24D7C8E9000
heap
page read and write
24D12AE0000
trusted library allocation
page read and write
24D0B8FA000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D0A282000
trusted library allocation
page read and write
24D0C19D000
trusted library allocation
page read and write
24D7C8EF000
heap
page read and write
24D0C83E000
trusted library allocation
page read and write
24D168C8000
trusted library allocation
page read and write
24D7C8EE000
heap
page read and write
24D0B1EA000
trusted library allocation
page read and write
24D12670000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D7C926000
heap
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D12D8E000
trusted library allocation
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D0C8A1000
trusted library allocation
page read and write
2113D530000
trusted library allocation
page read and write
24D13BBC000
trusted library allocation
page read and write
2113DAE8000
heap
page read and write
24D7F3D5000
trusted library allocation
page read and write
24D14C30000
trusted library allocation
page read and write
24D16928000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D7C8B8000
heap
page read and write
2113CE5F000
trusted library allocation
page read and write
24D0B985000
trusted library allocation
page read and write
24D1493A000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D7C8E7000
heap
page read and write
24D0A21F000
trusted library allocation
page read and write
24D12DC9000
trusted library allocation
page read and write
24D0C8F8000
trusted library allocation
page read and write
24D16FAE000
trusted library allocation
page read and write
24D7C8B6000
heap
page read and write
24D167F9000
trusted library allocation
page read and write
24D14C33000
trusted library allocation
page read and write
24D0B428000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D14966000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7C8FE000
heap
page read and write
24D14F05000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7C92F000
heap
page read and write
24D0AA7D000
trusted library allocation
page read and write
24D7E9D4000
trusted library allocation
page read and write
24D0A288000
trusted library allocation
page read and write
6F5F6FE000
unkown
page readonly
24D16D6F000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7C91C000
heap
page read and write
24D0A24B000
trusted library allocation
page read and write
24D1692D000
trusted library allocation
page read and write
24D12DC9000
trusted library allocation
page read and write
24D0B4A5000
trusted library allocation
page read and write
24D7C92A000
heap
page read and write
24D0C5AB000
trusted library allocation
page read and write
24D13503000
heap
page read and write
24D7C8DF000
heap
page read and write
2113DABD000
heap
page read and write
24D7EAEF000
trusted library allocation
page read and write
24D14978000
trusted library allocation
page read and write
24D0C2C8000
trusted library allocation
page read and write
24D1691A000
trusted library allocation
page read and write
24D0A27C000
trusted library allocation
page read and write
24D0E44D000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
224AA777000
trusted library allocation
page read and write
24D13BB6000
trusted library allocation
page read and write
24D0C1C5000
trusted library allocation
page read and write
A21000
heap
page read and write
1747F479000
trusted library allocation
page read and write
24D0B970000
trusted library allocation
page read and write
24D0C8DA000
trusted library allocation
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D125C4000
trusted library allocation
page read and write
24D7C8DF000
heap
page read and write
24D7C8FE000
heap
page read and write
24D12500000
trusted library allocation
page read and write
24D0D3C2000
trusted library allocation
page read and write
24D14C3F000
trusted library allocation
page read and write
24D168F3000
trusted library allocation
page read and write
24D7C8CA000
heap
page read and write
24D7C8B2000
heap
page read and write
1D689A70000
heap
page read and write
24D17042000
trusted library allocation
page read and write
24D7C8BB000
heap
page read and write
24D7E990000
trusted library allocation
page read and write
24D125CB000
trusted library allocation
page read and write
24D7C8D5000
heap
page read and write
24D126BA000
trusted library allocation
page read and write
24D0A6A5000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
1747F498000
trusted library allocation
page read and write
24D0E4E4000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0B7CD000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D09DD2000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D0A6B8000
trusted library allocation
page read and write
24D13BFB000
trusted library allocation
page read and write
2113DADC000
heap
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D0A2B8000
trusted library allocation
page read and write
24D7C92A000
heap
page read and write
24D7C8C3000
heap
page read and write
24D1492F000
trusted library allocation
page read and write
24D13E0F000
trusted library allocation
page read and write
57C000
unkown
page read and write
24D0AC76000
trusted library allocation
page read and write
24D12DAA000
trusted library allocation
page read and write
24D7E9C3000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D147D8000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
825D0FE000
unkown
page readonly
24D14CD1000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0AA9B000
trusted library allocation
page read and write
24D0B876000
trusted library allocation
page read and write
24D1692D000
trusted library allocation
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D16874000
trusted library allocation
page read and write
24D0B77A000
trusted library allocation
page read and write
2113DBB7000
heap
page read and write
24D14B8B000
trusted library allocation
page read and write
24D0A630000
trusted library allocation
page read and write
24D7C8CA000
heap
page read and write
24D0B86E000
trusted library allocation
page read and write
24D12661000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0A4E1000
heap
page read and write
24D0AA6B000
trusted library allocation
page read and write
3020000
heap
page read and write
24D0B8EE000
trusted library allocation
page read and write
24D14FAC000
trusted library allocation
page read and write
24D0B99E000
trusted library allocation
page read and write
24D14B56000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
24D12AB1000
trusted library allocation
page read and write
24D170E8000
trusted library allocation
page read and write
24D149A2000
trusted library allocation
page read and write
24D0C8AE000
trusted library allocation
page read and write
1747EFF0000
heap
page readonly
24D7C926000
heap
page read and write
24D16D9C000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D7C8D2000
heap
page read and write
24D7C8B2000
heap
page read and write
24D7C92F000
heap
page read and write
24D0C900000
trusted library allocation
page read and write
1747EFD3000
heap
page read and write
24D0A4E1000
heap
page read and write
24D12A6A000
trusted library allocation
page read and write
24D0A6C9000
trusted library allocation
page read and write
24D1264B000
trusted library allocation
page read and write
24D0A6B1000
trusted library allocation
page read and write
24D09D9C000
trusted library allocation
page read and write
24D12D8B000
trusted library allocation
page read and write
24D0B8B2000
trusted library allocation
page read and write
24D13503000
heap
page read and write
24D7C91C000
heap
page read and write
24D12D6D000
trusted library allocation
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D12994000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
2113DACA000
heap
page read and write
24D7C929000
heap
page read and write
24D148CC000
trusted library allocation
page read and write
24D14B89000
trusted library allocation
page read and write
24D167E4000
trusted library allocation
page read and write
24D12DB2000
trusted library allocation
page read and write
24D0A6C9000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D1264B000
trusted library allocation
page read and write
24D147F4000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
224AA70E000
trusted library allocation
page read and write
24D1470B000
trusted library allocation
page read and write
24D14BD5000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D14CB1000
trusted library allocation
page read and write
24D170A6000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
2113DA41000
heap
page read and write
24D0B7FB000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14C97000
trusted library allocation
page read and write
24D0E448000
trusted library allocation
page read and write
24D0D592000
trusted library allocation
page read and write
24D7E998000
trusted library allocation
page read and write
24D0A6B1000
trusted library allocation
page read and write
24D0B950000
trusted library allocation
page read and write
24D09D4E000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7C8C5000
heap
page read and write
24D0C3C9000
trusted library allocation
page read and write
24D126E0000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D16EFA000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D07A9A000
trusted library allocation
page read and write
24D14924000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
24D14937000
trusted library allocation
page read and write
24D0A49C000
heap
page read and write
24D0B7D3000
trusted library allocation
page read and write
24D14C3F000
trusted library allocation
page read and write
2113DA9C000
heap
page read and write
24D14975000
trusted library allocation
page read and write
24D127AB000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D0AA94000
trusted library allocation
page read and write
24D0B46F000
trusted library allocation
page read and write
24D14B55000
trusted library allocation
page read and write
24D1691A000
trusted library allocation
page read and write
2113DBB7000
heap
page read and write
170000
heap
page read and write
2113DAAC000
heap
page read and write
24D125EC000
trusted library allocation
page read and write
24D7EA81000
trusted library allocation
page read and write
24D126B5000
trusted library allocation
page read and write
24D0C12A000
trusted library allocation
page read and write
24D0D28B000
trusted library allocation
page read and write
24D12A9A000
trusted library allocation
page read and write
24D0A68D000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D1283A000
trusted library allocation
page read and write
24D168BE000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14BC2000
trusted library allocation
page read and write
2113DB2A000
heap
page read and write
24D14F0C000
trusted library allocation
page read and write
319917E000
stack
page read and write
24D14C13000
trusted library allocation
page read and write
24D14975000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D128E2000
trusted library allocation
page read and write
24D17075000
trusted library allocation
page read and write
24D0B1D3000
trusted library allocation
page read and write
24D7F082000
trusted library allocation
page read and write
24D7C8E6000
heap
page read and write
24D126E0000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D7C8EB000
heap
page read and write
24D0C1C7000
trusted library allocation
page read and write
24D16E7A000
trusted library allocation
page read and write
24D12DA7000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D12D92000
trusted library allocation
page read and write
24D0E3C8000
trusted library allocation
page read and write
24D12AA8000
trusted library allocation
page read and write
24D0B77A000
trusted library allocation
page read and write
24D14B89000
trusted library allocation
page read and write
24D0E055000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0C47B000
trusted library allocation
page read and write
24D0C3A5000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D0A295000
trusted library allocation
page read and write
24D16712000
trusted library allocation
page read and write
24D0A6BE000
trusted library allocation
page read and write
24D12AB1000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D1355D000
heap
page read and write
24D16DE9000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D16929000
trusted library allocation
page read and write
2113DAEA000
heap
page read and write
24D167B2000
trusted library allocation
page read and write
2113D560000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C929000
heap
page read and write
24D14C21000
trusted library allocation
page read and write
17091162000
heap
page read and write
319BA7E000
unkown
page readonly
24D09D36000
trusted library allocation
page read and write
24D0C175000
trusted library allocation
page read and write
2113DB21000
heap
page read and write
24D148F8000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
1747F50C000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8F2000
heap
page read and write
1BE000
stack
page read and write
24D7C91C000
heap
page read and write
24D7C8D2000
heap
page read and write
24D7C8C7000
heap
page read and write
24D14945000
trusted library allocation
page read and write
24D12DE5000
trusted library allocation
page read and write
24D0C8B1000
trusted library allocation
page read and write
24D0C2E5000
trusted library allocation
page read and write
224AA380000
heap
page read and write
24D16912000
trusted library allocation
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D0ADD2000
trusted library allocation
page read and write
24D0ADDE000
trusted library allocation
page read and write
24D0C3F2000
trusted library allocation
page read and write
24D0D276000
trusted library allocation
page read and write
24D12680000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D14B9D000
trusted library allocation
page read and write
24D0C8B1000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0C2BA000
trusted library allocation
page read and write
2113CE77000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
1747F05A000
heap
page read and write
24D07A86000
trusted library allocation
page read and write
24D7C8EE000
heap
page read and write
24D16E76000
trusted library allocation
page read and write
6F5D3FE000
unkown
page readonly
24D16D65000
trusted library allocation
page read and write
1747F086000
heap
page read and write
24D0B7AD000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
9D0000
heap
page read and write
24D1353C000
heap
page read and write
24D7C8E1000
heap
page read and write
24D148AA000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0B4A5000
trusted library allocation
page read and write
2113CE5C000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C924000
heap
page read and write
24D0AC8A000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D12992000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8EE000
heap
page read and write
24D0D119000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
1747F481000
trusted library allocation
page read and write
2113DAA0000
heap
page read and write
24D0C8A8000
trusted library allocation
page read and write
24D14B7A000
trusted library allocation
page read and write
24D0B7AF000
trusted library allocation
page read and write
24D16EAF000
trusted library allocation
page read and write
24D7C903000
heap
page read and write
24D14C15000
trusted library allocation
page read and write
24D0C8A1000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7F065000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
1D689D00000
trusted library allocation
page read and write
24D0ADD2000
trusted library allocation
page read and write
24D12670000
trusted library allocation
page read and write
24D0C2F0000
trusted library allocation
page read and write
6F5F6BE000
stack
page read and write
24D125C7000
trusted library allocation
page read and write
24D1259A000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C924000
heap
page read and write
3B60BFD000
stack
page read and write
2113CEC6000
trusted library allocation
page read and write
3B623FF000
stack
page read and write
24D0B4A3000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D13550000
heap
page read and write
24D0B871000
trusted library allocation
page read and write
24D167B0000
trusted library allocation
page read and write
24D14BE7000
trusted library allocation
page read and write
24D0C2EC000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
2113DB28000
heap
page read and write
24D0C293000
trusted library allocation
page read and write
24D14B55000
trusted library allocation
page read and write
24D0A2B8000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C926000
heap
page read and write
24D7C924000
heap
page read and write
24D7C91C000
heap
page read and write
24D0ED37000
trusted library allocation
page read and write
24D1496F000
trusted library allocation
page read and write
24D13BCD000
trusted library allocation
page read and write
24D14965000
trusted library allocation
page read and write
24D7F3D9000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D14F41000
trusted library allocation
page read and write
24D17083000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C92F000
heap
page read and write
24D7C91C000
heap
page read and write
24D0ED8A000
trusted library allocation
page read and write
24D0B841000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D14BE2000
trusted library allocation
page read and write
24D14975000
trusted library allocation
page read and write
24D0C3D2000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D1360F000
heap
page read and write
24D7C8E1000
heap
page read and write
24D7C8F3000
heap
page read and write
24D7C8E3000
heap
page read and write
24D7E9A8000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D7C8FE000
heap
page read and write
24D14BA8000
trusted library allocation
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D12ACC000
trusted library allocation
page read and write
24D12D7D000
trusted library allocation
page read and write
24D167F7000
trusted library allocation
page read and write
24D7F075000
trusted library allocation
page read and write
24D0A6B8000
trusted library allocation
page read and write
24D1691A000
trusted library allocation
page read and write
24D1278F000
trusted library allocation
page read and write
24D14939000
trusted library allocation
page read and write
24D14952000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8D3000
heap
page read and write
24D16DB4000
trusted library allocation
page read and write
24D7F026000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
2113DBAE000
heap
page read and write
24D14CAE000
trusted library allocation
page read and write
24D16FF0000
trusted library allocation
page read and write
24D0ED50000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D16778000
trusted library allocation
page read and write
24D0B950000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D16DE0000
trusted library allocation
page read and write
24D0D27F000
trusted library allocation
page read and write
24D13C63000
trusted library allocation
page read and write
24D7C8F0000
heap
page read and write
24D0C1F3000
trusted library allocation
page read and write
236B9A91000
trusted library allocation
page execute read
24D7C8E1000
heap
page read and write
1747F423000
trusted library allocation
page read and write
24D126CC000
trusted library allocation
page read and write
24D1258D000
trusted library allocation
page read and write
24D7EAAD000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D16E7C000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D14735000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D1705F000
trusted library allocation
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D0B871000
trusted library allocation
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C91C000
heap
page read and write
24D0C1C0000
trusted library allocation
page read and write
24D12D7F000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D0A6CB000
trusted library allocation
page read and write
24D0C267000
trusted library allocation
page read and write
24D16FCC000
trusted library allocation
page read and write
24D0AA90000
trusted library allocation
page read and write
24D7C8CB000
heap
page read and write
24D7C924000
heap
page read and write
24D127A1000
trusted library allocation
page read and write
24D1259A000
trusted library allocation
page read and write
24D0C3D2000
trusted library allocation
page read and write
24D7C8C2000
heap
page read and write
24D13503000
heap
page read and write
24D129DD000
trusted library allocation
page read and write
24D0C293000
trusted library allocation
page read and write
24D12670000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D12A81000
trusted library allocation
page read and write
24D0C233000
trusted library allocation
page read and write
24D0B1C5000
trusted library allocation
page read and write
2113CE69000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D14BE5000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D7C90C000
heap
page read and write
24D129A1000
trusted library allocation
page read and write
24D0C8F8000
trusted library allocation
page read and write
24D0E405000
trusted library allocation
page read and write
24D7C8DA000
heap
page read and write
24D0C141000
trusted library allocation
page read and write
24D16FBC000
trusted library allocation
page read and write
6F5D3BE000
stack
page read and write
24D0A61E000
trusted library allocation
page read and write
2113CE03000
trusted library allocation
page read and write
24D0A4A2000
heap
page read and write
24D7C8B8000
heap
page read and write
24D16DE9000
trusted library allocation
page read and write
24D0C8A1000
trusted library allocation
page read and write
24D0B93D000
trusted library allocation
page read and write
24D0C293000
trusted library allocation
page read and write
24D168F3000
trusted library allocation
page read and write
24D0B817000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D7C8C7000
heap
page read and write
24D16936000
trusted library allocation
page read and write
1747F467000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D0B786000
trusted library allocation
page read and write
24D0D5FB000
trusted library allocation
page read and write
24D0AAF8000
trusted library allocation
page read and write
24D0A6F1000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D1264D000
trusted library allocation
page read and write
24D0C14A000
trusted library allocation
page read and write
24D14BF2000
trusted library allocation
page read and write
24D129EE000
trusted library allocation
page read and write
24D0A26A000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D0A4A0000
heap
page read and write
A0F000
heap
page read and write
24D14B4C000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8FE000
heap
page read and write
24D14BC2000
trusted library allocation
page read and write
24D168F3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0DFC6000
trusted library allocation
page read and write
24D0B7C3000
trusted library allocation
page read and write
24D0A6B6000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D0A2FC000
trusted library allocation
page read and write
2113CB20000
unclassified section
page readonly
24D0C3FA000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D128F5000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C926000
heap
page read and write
24D14926000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7EFFE000
trusted library allocation
page read and write
24D0C3EE000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D0C285000
trusted library allocation
page read and write
24D0E4A7000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C12E000
trusted library allocation
page read and write
24D0C293000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D14CA4000
trusted library allocation
page read and write
24D1268E000
trusted library allocation
page read and write
825D03B000
stack
page read and write
2113DB98000
heap
page read and write
24D0D0F8000
trusted library allocation
page read and write
24D0DF4A000
trusted library allocation
page read and write
24D12DE5000
trusted library allocation
page read and write
24D16E34000
trusted library allocation
page read and write
24D7C8F0000
heap
page read and write
24D12D8B000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D14B7B000
trusted library allocation
page read and write
24D0A170000
trusted library allocation
page read and write
24D129F0000
trusted library allocation
page read and write
24D0A297000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D16FBF000
trusted library allocation
page read and write
24D0C365000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
2113D420000
heap
page read and write
24D7C91D000
heap
page read and write
24D0A696000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D7C8AA000
heap
page read and write
24D7C8FE000
heap
page read and write
24D12979000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D7C91C000
heap
page read and write
A21000
heap
page read and write
24D7C926000
heap
page read and write
24D0B462000
trusted library allocation
page read and write
24D14B43000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D127E7000
trusted library allocation
page read and write
24D0AA9D000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
2113DBB7000
heap
page read and write
24D0A4E1000
heap
page read and write
24D7C8E7000
heap
page read and write
24D14AD5000
trusted library allocation
page read and write
24D0D32E000
trusted library allocation
page read and write
24D14926000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D16DE6000
trusted library allocation
page read and write
2113D407000
unkown
page execute read
24D14BD7000
trusted library allocation
page read and write
24D12A9E000
trusted library allocation
page read and write
24D0C143000
trusted library allocation
page read and write
24D0B7F2000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C91F000
heap
page read and write
24D0C1D6000
trusted library allocation
page read and write
224AA542000
unclassified section
page read and write
3BB7A9003000
trusted library allocation
page read and write
2113D37F000
unclassified section
page read and write
2113DB31000
heap
page read and write
24D7C90C000
heap
page read and write
24D1470B000
trusted library allocation
page read and write
24D14710000
trusted library allocation
page read and write
24D125B0000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0B8E2000
trusted library allocation
page read and write
31988FB000
stack
page read and write
24D16D7C000
trusted library allocation
page read and write
24D0C285000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D16EFC000
trusted library allocation
page read and write
24D0A26F000
trusted library allocation
page read and write
1747F520000
trusted library allocation
page read and write
2113DB7B000
heap
page read and write
24D7C91C000
heap
page read and write
24D0B696000
trusted library allocation
page read and write
24D13558000
heap
page read and write
2113CAA0000
unclassified section
page readonly
17092C50000
heap
page read and write
24D13E7B000
trusted library allocation
page read and write
24D12D79000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D7C8AE000
heap
page read and write
24D14BB9000
trusted library allocation
page read and write
24D13719000
heap
page read and write
24D0C260000
trusted library allocation
page read and write
24D16EF0000
trusted library allocation
page read and write
24D0C5D7000
trusted library allocation
page read and write
24D0A6C9000
trusted library allocation
page read and write
24D16EF2000
trusted library allocation
page read and write
24D16DE6000
trusted library allocation
page read and write
24D14B33000
trusted library allocation
page read and write
24D0A63B000
trusted library allocation
page read and write
24D0C339000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D12DDF000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7F075000
trusted library allocation
page read and write
24D7C8D6000
heap
page read and write
24D13E7B000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D14919000
trusted library allocation
page read and write
24D126F6000
trusted library allocation
page read and write
2113DAA0000
heap
page read and write
24D0A235000
trusted library allocation
page read and write
24D0C1D1000
trusted library allocation
page read and write
224AA35D000
remote allocation
page execute read
24D0D3D6000
trusted library allocation
page read and write
24D0AC6F000
trusted library allocation
page read and write
24D0E09C000
trusted library allocation
page read and write
24D12A39000
trusted library allocation
page read and write
24D12DAD000
trusted library allocation
page read and write
24D14745000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
174000
heap
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D1690D000
trusted library allocation
page read and write
24D170D9000
trusted library allocation
page read and write
24D0C8CA000
trusted library allocation
page read and write
24D0A66F000
trusted library allocation
page read and write
224AA600000
trusted library allocation
page read and write
2113CB3A000
heap
page read and write
2113DB20000
heap
page read and write
24D0B7EE000
trusted library allocation
page read and write
24D0A6DE000
trusted library allocation
page read and write
174000
heap
page read and write
24D14CAE000
trusted library allocation
page read and write
24D0C8F8000
trusted library allocation
page read and write
24D0C3DB000
trusted library allocation
page read and write
24D13561000
heap
page read and write
24D7C8F3000
heap
page read and write
572000
unkown
page readonly
24D0A6F1000
trusted library allocation
page read and write
24D0C402000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8EC000
heap
page read and write
24D0C1D9000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D7E9CC000
trusted library allocation
page read and write
24D0A6AE000
trusted library allocation
page read and write
236B9A6C000
trusted library allocation
page execute read
24D0C15D000
trusted library allocation
page read and write
24D12DD8000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D16DCA000
trusted library allocation
page read and write
24D14C13000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D12DCC000
trusted library allocation
page read and write
24D16821000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
825F1FE000
unkown
page readonly
24D0C1E0000
trusted library allocation
page read and write
24D0A67C000
trusted library allocation
page read and write
24D0B711000
trusted library allocation
page read and write
24D7C8D4000
heap
page read and write
24D167F3000
trusted library allocation
page read and write
24D0A251000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0AA94000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8B8000
heap
page read and write
224AA782000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0ADB3000
trusted library allocation
page read and write
24D0A6AE000
trusted library allocation
page read and write
24D0A6CE000
trusted library allocation
page read and write
24D14C13000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D1690F000
trusted library allocation
page read and write
24D0A14E000
trusted library allocation
page read and write
2113D40B000
unkown
page execute read
24D7C8E5000
heap
page read and write
24D1251C000
trusted library allocation
page read and write
24D14C97000
trusted library allocation
page read and write
24D12532000
trusted library allocation
page read and write
2113DA8D000
heap
page read and write
24D16E74000
trusted library allocation
page read and write
1747F447000
trusted library allocation
page read and write
24D09DC6000
trusted library allocation
page read and write
24D13BE3000
trusted library allocation
page read and write
2113DAA9000
heap
page read and write
24D7C91C000
heap
page read and write
24D0DF4F000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C2BF000
trusted library allocation
page read and write
24D1678A000
trusted library allocation
page read and write
24D14FE4000
trusted library allocation
page read and write
24D1294C000
trusted library allocation
page read and write
24D13553000
heap
page read and write
24D7C8F2000
heap
page read and write
24D129F4000
trusted library allocation
page read and write
24D0B4A3000
trusted library allocation
page read and write
24D14716000
trusted library allocation
page read and write
174000
heap
page read and write
24D0AD50000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D0C2F0000
trusted library allocation
page read and write
24D0B963000
trusted library allocation
page read and write
24D0C8C4000
trusted library allocation
page read and write
24D0DF53000
trusted library allocation
page read and write
24D13537000
heap
page read and write
24D0A282000
trusted library allocation
page read and write
24D0A64D000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0B963000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C926000
heap
page read and write
15CAF4D1E000
trusted library allocation
page read and write
24D12519000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
1D689AE0000
heap
page read and write
24D0B8A6000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0ADE9000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D12DE1000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D1353C000
heap
page read and write
24D0D4C3000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D7C929000
heap
page read and write
24D13529000
heap
page read and write
24D13BCD000
trusted library allocation
page read and write
24D7C970000
heap
page read and write
1747F050000
heap
page read and write
24D7C91C000
heap
page read and write
24D148E2000
trusted library allocation
page read and write
24D12516000
trusted library allocation
page read and write
24D7EAEF000
trusted library allocation
page read and write
24D0AD39000
trusted library allocation
page read and write
24D14BFC000
trusted library allocation
page read and write
24D14CCE000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0BA9D000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8D1000
heap
page read and write
24D0A2B8000
trusted library allocation
page read and write
24D1692D000
trusted library allocation
page read and write
24D12AA8000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C5A3000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C91D000
heap
page read and write
24D7EA86000
trusted library allocation
page read and write
24D17042000
trusted library allocation
page read and write
24D129E4000
trusted library allocation
page read and write
24D16780000
trusted library allocation
page read and write
24D0AD3B000
trusted library allocation
page read and write
24D16DE2000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D7C92F000
heap
page read and write
24D0A274000
trusted library allocation
page read and write
24D0BA9D000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D16870000
trusted library allocation
page read and write
24D14BCC000
trusted library allocation
page read and write
24D14BCC000
trusted library allocation
page read and write
24D14C3F000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0DFFD000
trusted library allocation
page read and write
9A000
stack
page read and write
24D14C97000
trusted library allocation
page read and write
1747F496000
trusted library allocation
page read and write
24D12DCC000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
224AA7D7000
trusted library allocation
page read and write
24D14B9E000
trusted library allocation
page read and write
24D0B99A000
trusted library allocation
page read and write
24D0A27C000
trusted library allocation
page read and write
17091307000
trusted library allocation
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D0D1C9000
trusted library allocation
page read and write
24D0ADD2000
trusted library allocation
page read and write
24D7C926000
heap
page read and write
24D7C8CC000
heap
page read and write
24D1280F000
trusted library allocation
page read and write
24D0C8F3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8E9000
heap
page read and write
24D7C8E1000
heap
page read and write
24D7E9DF000
trusted library allocation
page read and write
24D0AA82000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0C2C8000
trusted library allocation
page read and write
24D0D23F000
trusted library allocation
page read and write
584000
unkown
page readonly
24D7C8F1000
heap
page read and write
24D0B8E2000
trusted library allocation
page read and write
1747EEB0000
unclassified section
page readonly
17091177000
heap
page read and write
24D126CE000
trusted library allocation
page read and write
24D14965000
trusted library allocation
page read and write
24D14C15000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D0EDAC000
trusted library allocation
page read and write
24D14CE2000
trusted library allocation
page read and write
24D12A9E000
trusted library allocation
page read and write
24D7C8DF000
heap
page read and write
24D0C3DB000
trusted library allocation
page read and write
24D0A66F000
trusted library allocation
page read and write
24D14CCE000
trusted library allocation
page read and write
24D0D1C4000
trusted library allocation
page read and write
24D126EB000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D12D88000
trusted library allocation
page read and write
57C000
unkown
page write copy
24D7E9B3000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D14C33000
trusted library allocation
page read and write
24D0C8B3000
trusted library allocation
page read and write
24D0C8AE000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D0B4F9000
trusted library allocation
page read and write
24D0B4B3000
trusted library allocation
page read and write
95E000
stack
page read and write
24D7C924000
heap
page read and write
24D14917000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
2113DACA000
heap
page read and write
24D14BC2000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0B4FC000
trusted library allocation
page read and write
24D0B6C8000
trusted library allocation
page read and write
1747F532000
trusted library allocation
page read and write
24D14B4C000
trusted library allocation
page read and write
24D12981000
trusted library allocation
page read and write
24D0A1F4000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C2D3000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
1747F002000
unclassified section
page read and write
24D12D8B000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D0A6DE000
trusted library allocation
page read and write
24D1355D000
heap
page read and write
24D7C91C000
heap
page read and write
24D0B8B7000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D14F4D000
trusted library allocation
page read and write
24D7E985000
trusted library allocation
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D14CD1000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D7C8FE000
heap
page read and write
24D168CF000
trusted library allocation
page read and write
24D14926000
trusted library allocation
page read and write
24D14922000
trusted library allocation
page read and write
24D0B476000
trusted library allocation
page read and write
24D7E981000
trusted library allocation
page read and write
24D0B478000
trusted library allocation
page read and write
24D1263F000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D0AA8B000
trusted library allocation
page read and write
2113CC70000
heap
page read and write
24D0A82A000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0C1E7000
trusted library allocation
page read and write
24D0A295000
trusted library allocation
page read and write
9F2000
heap
page read and write
24D0AD35000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0C1CE000
trusted library allocation
page read and write
224AA7DB000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D125E1000
trusted library allocation
page read and write
24D0D126000
trusted library allocation
page read and write
24D148E7000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0A49C000
heap
page read and write
24D170C2000
trusted library allocation
page read and write
24D12596000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C124000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0D18C000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8E3000
heap
page read and write
24D7C8D1000
heap
page read and write
24D0B97D000
trusted library allocation
page read and write
24D0B6CA000
trusted library allocation
page read and write
24D0B7D3000
trusted library allocation
page read and write
24D1494C000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
17091405000
heap
page read and write
24D14CE7000
trusted library allocation
page read and write
24D1264F000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D0B6F8000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D14B7A000
trusted library allocation
page read and write
24D0B4C3000
trusted library allocation
page read and write
A21000
heap
page read and write
24D0B4F1000
trusted library allocation
page read and write
2113DB2A000
heap
page read and write
24D7C8E9000
heap
page read and write
24D0C1E7000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C285000
trusted library allocation
page read and write
24D0C8C4000
trusted library allocation
page read and write
24D14F6D000
trusted library allocation
page read and write
24D0C236000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C3D3000
trusted library allocation
page read and write
24D14C8E000
trusted library allocation
page read and write
24D7C8DD000
heap
page read and write
24D16DE2000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C8E3000
heap
page read and write
24D7C8B2000
heap
page read and write
24D7C8AA000
heap
page read and write
24D0C1C0000
trusted library allocation
page read and write
24D14AEB000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D0E384000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
4B0000
unkown
page readonly
24D1492A000
trusted library allocation
page read and write
24D149C3000
trusted library allocation
page read and write
6F5F63D000
stack
page read and write
24D7C8E9000
heap
page read and write
224AA730000
trusted library allocation
page read and write
24D12DF2000
trusted library allocation
page read and write
24D14708000
trusted library allocation
page read and write
24D7C928000
heap
page read and write
24D7C91C000
heap
page read and write
24D1268B000
trusted library allocation
page read and write
17092C60000
heap
page read and write
24D0C13F000
trusted library allocation
page read and write
24D0C2BA000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D16D6F000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D14B4E000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D0C3EE000
trusted library allocation
page read and write
24D0C3FA000
trusted library allocation
page read and write
24D14B4C000
trusted library allocation
page read and write
24D7C8EB000
heap
page read and write
24D126CE000
trusted library allocation
page read and write
24D0B888000
trusted library allocation
page read and write
24D09DD2000
trusted library allocation
page read and write
24D15FA5000
trusted library allocation
page read and write
24D12819000
trusted library allocation
page read and write
24D12989000
trusted library allocation
page read and write
24D14BE7000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
224AA4B0000
heap
page read and write
24D17027000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C8C7000
heap
page read and write
24D0E557000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C8AE000
trusted library allocation
page read and write
24D0C181000
trusted library allocation
page read and write
24D0B4A3000
trusted library allocation
page read and write
24D129FD000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D127C8000
trusted library allocation
page read and write
2113CCF0000
heap
page readonly
24D0C179000
trusted library allocation
page read and write
24D16936000
trusted library allocation
page read and write
319A27E000
stack
page read and write
24D12622000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C950000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C8DD000
heap
page read and write
24D0AC77000
trusted library allocation
page read and write
224AA4D0000
heap
page read and write
24D0E506000
trusted library allocation
page read and write
24D16931000
trusted library allocation
page read and write
24D0B687000
trusted library allocation
page read and write
24D12AF8000
trusted library allocation
page read and write
24D0B8FE000
trusted library allocation
page read and write
24D0B8BF000
trusted library allocation
page read and write
24D0AD3B000
trusted library allocation
page read and write
3120000
heap
page read and write
24D12A92000
trusted library allocation
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D168C2000
trusted library allocation
page read and write
24D7C8D4000
heap
page read and write
24D1495C000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D7C91C000
heap
page read and write
2113CE10000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0B1E0000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0C3B5000
trusted library allocation
page read and write
24D12D8E000
trusted library allocation
page read and write
224AA530000
heap
page readonly
24D1353C000
heap
page read and write
24D7C90C000
heap
page read and write
24D7C8E4000
heap
page read and write
24D7C8D2000
heap
page read and write
24D7C8E7000
heap
page read and write
24D0D3B0000
trusted library allocation
page read and write
24D0A838000
trusted library allocation
page read and write
24D12789000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0DFB6000
trusted library allocation
page read and write
15CAF4D24000
trusted library allocation
page read and write
24D13C23000
trusted library allocation
page read and write
24D0C8FA000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D12DB0000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C90C000
heap
page read and write
2113DAE1000
heap
page read and write
24D0A165000
trusted library allocation
page read and write
24D16DDE000
trusted library allocation
page read and write
24D0C2D5000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D14BCC000
trusted library allocation
page read and write
24D0C5F5000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0ADCA000
trusted library allocation
page read and write
24D12A5C000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C91E000
heap
page read and write
24D15F9B000
trusted library allocation
page read and write
24D7C8C3000
heap
page read and write
2113CE23000
trusted library allocation
page read and write
24D13BBC000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D168DC000
trusted library allocation
page read and write
24D0ADFA000
trusted library allocation
page read and write
24D0C3D5000
trusted library allocation
page read and write
24D0A1F6000
trusted library allocation
page read and write
24D0A2B4000
trusted library allocation
page read and write
24D1692B000
trusted library allocation
page read and write
24D148A4000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D127A1000
trusted library allocation
page read and write
24D0B8FE000
trusted library allocation
page read and write
24D148CA000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7EA86000
trusted library allocation
page read and write
24D125D3000
trusted library allocation
page read and write
24D0C223000
trusted library allocation
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D167B2000
trusted library allocation
page read and write
24D0C405000
trusted library allocation
page read and write
24D14978000
trusted library allocation
page read and write
24D0E07E000
trusted library allocation
page read and write
24D148C4000
trusted library allocation
page read and write
24D14CC4000
trusted library allocation
page read and write
24D7C970000
heap
page read and write
24D7C8B2000
heap
page read and write
24D7C926000
heap
page read and write
24D0A6F0000
trusted library allocation
page read and write
24D15006000
trusted library allocation
page read and write
24D0ADCB000
trusted library allocation
page read and write
24D0C2BF000
trusted library allocation
page read and write
2113DA9F000
heap
page read and write
24D14BC2000
trusted library allocation
page read and write
24D1264F000
trusted library allocation
page read and write
24D148DB000
trusted library allocation
page read and write
24D167FD000
trusted library allocation
page read and write
24D0C2D3000
trusted library allocation
page read and write
24D0E09E000
trusted library allocation
page read and write
24D0C2F2000
trusted library allocation
page read and write
24D12DEF000
trusted library allocation
page read and write
24D0E3E5000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D0A6C7000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D7C8F3000
heap
page read and write
24D7C8F3000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C8E5000
heap
page read and write
24D0B412000
trusted library allocation
page read and write
24D127B3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0B878000
trusted library allocation
page read and write
24D167B0000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7C8E3000
heap
page read and write
2113D3F0000
trusted library allocation
page read and write
17091147000
heap
page read and write
24D0E4AC000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D12DFD000
trusted library allocation
page read and write
24D14CE7000
trusted library allocation
page read and write
24D0DF7F000
trusted library allocation
page read and write
24D0C2D5000
trusted library allocation
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C90C000
heap
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D1263F000
trusted library allocation
page read and write
24D0E407000
trusted library allocation
page read and write
24D168FD000
trusted library allocation
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D14BCC000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D7F0A1000
trusted library allocation
page read and write
24D7C8DF000
heap
page read and write
24D7C8B2000
heap
page read and write
24D16DE2000
trusted library allocation
page read and write
24D14BE7000
trusted library allocation
page read and write
24D13E1E000
trusted library allocation
page read and write
2113CB30000
heap
page read and write
24D0B8FA000
trusted library allocation
page read and write
24D0A6E2000
trusted library allocation
page read and write
24D16929000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D12976000
trusted library allocation
page read and write
1747F200000
trusted library allocation
page read and write
24D0A4A2000
heap
page read and write
17092C7F000
heap
page read and write
24D7C8F3000
heap
page read and write
24D17B9E000
trusted library allocation
page read and write
24D0B425000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0E4C5000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0A6A5000
trusted library allocation
page read and write
24D7C8D0000
heap
page read and write
24D0DF5F000
trusted library allocation
page read and write
24D0A1FC000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C8D2000
heap
page read and write
24D135CE000
heap
page read and write
174000
heap
page read and write
2113D372000
unclassified section
page read and write
24D0C43B000
trusted library allocation
page read and write
825D9FE000
stack
page read and write
24D1264F000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
1709130A000
trusted library allocation
page read and write
24D0C137000
trusted library allocation
page read and write
24D7C92C000
heap
page read and write
24D1264B000
trusted library allocation
page read and write
24D7C8BF000
heap
page read and write
24D13719000
heap
page read and write
1D689AB0000
heap
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D1496F000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0A4A2000
heap
page read and write
24D0AD84000
trusted library allocation
page read and write
24D0A293000
trusted library allocation
page read and write
24D7C8E4000
heap
page read and write
24D129F8000
trusted library allocation
page read and write
24D14CF3000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C8F2000
heap
page read and write
24D7C8DD000
heap
page read and write
24D12661000
trusted library allocation
page read and write
24D1496F000
trusted library allocation
page read and write
24D0B4E9000
trusted library allocation
page read and write
24D14BFC000
trusted library allocation
page read and write
24D127F2000
trusted library allocation
page read and write
24D14B43000
trusted library allocation
page read and write
24D148CC000
trusted library allocation
page read and write
24D12EE7000
trusted library allocation
page read and write
24D127E1000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D13558000
heap
page read and write
24D0B466000
trusted library allocation
page read and write
24D7C8E5000
heap
page read and write
24D7C91F000
heap
page read and write
24D7C8BE000
heap
page read and write
24D0A27F000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C90C000
heap
page read and write
24D1678A000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C90C000
heap
page read and write
24D1495A000
trusted library allocation
page read and write
24D0A28C000
trusted library allocation
page read and write
24D168FD000
trusted library allocation
page read and write
9FB000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0D5BC000
trusted library allocation
page read and write
24D0B9A4000
trusted library allocation
page read and write
24D14B9E000
trusted library allocation
page read and write
24D0D1ED000
trusted library allocation
page read and write
24D07AD2000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C90C000
heap
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D7C8DA000
heap
page read and write
24D0C8FD000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D14CFC000
trusted library allocation
page read and write
24D0C175000
trusted library allocation
page read and write
825B7D8000
stack
page read and write
24D0ADFA000
trusted library allocation
page read and write
24D0ADC4000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
224AA711000
trusted library allocation
page read and write
24D0A4A2000
heap
page read and write
24D0B853000
trusted library allocation
page read and write
24D7EAAD000
trusted library allocation
page read and write
24D13719000
heap
page read and write
A08000
heap
page read and write
24D0B4A7000
trusted library allocation
page read and write
24D0DF5C000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
96E000
stack
page read and write
24D170E8000
trusted library allocation
page read and write
2113DB28000
heap
page read and write
24D125CB000
trusted library allocation
page read and write
24D14B4C000
trusted library allocation
page read and write
24D14BD7000
trusted library allocation
page read and write
24D1474B000
trusted library allocation
page read and write
24D09DFE000
trusted library allocation
page read and write
24D1352C000
heap
page read and write
24D13558000
heap
page read and write
24D0A4E1000
heap
page read and write
24D7C8BF000
heap
page read and write
100000
heap
page read and write
24D1350D000
heap
page read and write
24D7C8E3000
heap
page read and write
24D0B1FC000
trusted library allocation
page read and write
24D14CD1000
trusted library allocation
page read and write
2113DB31000
heap
page read and write
24D7C8E9000
heap
page read and write
24D7C8D5000
heap
page read and write
24D14B4C000
trusted library allocation
page read and write
24D0AD8A000
trusted library allocation
page read and write
24D0B8FA000
trusted library allocation
page read and write
224AA47A000
heap
page read and write
24D0C232000
trusted library allocation
page read and write
24D1690D000
trusted library allocation
page read and write
24D0C2F2000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
1747EEA0000
unclassified section
page readonly
24D0B8FE000
trusted library allocation
page read and write
24D127CF000
trusted library allocation
page read and write
24D0B4B8000
trusted library allocation
page read and write
24D13719000
heap
page read and write
24D7EA81000
trusted library allocation
page read and write
24D14C8E000
trusted library allocation
page read and write
24D0B8E2000
trusted library allocation
page read and write
24D0A6CD000
trusted library allocation
page read and write
24D7F066000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D0AD8D000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0A6BE000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C924000
heap
page read and write
24D0D5A4000
trusted library allocation
page read and write
24D0C339000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0B7EE000
trusted library allocation
page read and write
224AA766000
trusted library allocation
page read and write
24D0ADC9000
trusted library allocation
page read and write
1747F3F0000
heap
page read and write
24D0A2A6000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D136A8000
heap
page read and write
24D0ADCA000
trusted library allocation
page read and write
24D0B4E9000
trusted library allocation
page read and write
24D0C8F8000
trusted library allocation
page read and write
24D0C3EE000
trusted library allocation
page read and write
2113CCE4000
heap
page read and write
224AA800000
heap
page read and write
24D0B7D1000
trusted library allocation
page read and write
24D0A1FC000
trusted library allocation
page read and write
24D16EB3000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
3021000
heap
page read and write
24D0C423000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D12783000
trusted library allocation
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D0B8FA000
trusted library allocation
page read and write
24D1298B000
trusted library allocation
page read and write
24D14AEF000
trusted library allocation
page read and write
4B1000
unkown
page execute read
24D0DFB2000
trusted library allocation
page read and write
24D0E448000
trusted library allocation
page read and write
24D1691E000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D0ED67000
trusted library allocation
page read and write
24D16907000
trusted library allocation
page read and write
24D0B6C1000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
174000
heap
page read and write
24D0D328000
trusted library allocation
page read and write
24D1673F000
trusted library allocation
page read and write
24D0E533000
trusted library allocation
page read and write
24D0A6AE000
trusted library allocation
page read and write
24D14AD5000
trusted library allocation
page read and write
24D14926000
trusted library allocation
page read and write
24D16EF8000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0A2BC000
trusted library allocation
page read and write
24D7F3D7000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C830000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0B98D000
trusted library allocation
page read and write
24D0ADD8000
trusted library allocation
page read and write
24D0ADBF000
trusted library allocation
page read and write
24D16799000
trusted library allocation
page read and write
24D7F07D000
trusted library allocation
page read and write
24D0C2D3000
trusted library allocation
page read and write
24D7E974000
trusted library allocation
page read and write
24D12DEF000
trusted library allocation
page read and write
24D09DDD000
trusted library allocation
page read and write
24D0CB00000
trusted library allocation
page read and write
24D14965000
trusted library allocation
page read and write
24D0B1A1000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D12D7B000
trusted library allocation
page read and write
2113DBB7000
heap
page read and write
24D7C8EC000
heap
page read and write
24D0ADEF000
trusted library allocation
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D0C3EE000
trusted library allocation
page read and write
24D0E405000
trusted library allocation
page read and write
24D0B872000
trusted library allocation
page read and write
24D0B878000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C8FD000
trusted library allocation
page read and write
2113DB31000
heap
page read and write
2113D3C0000
trusted library allocation
page read and write
1747F461000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D12ABB000
trusted library allocation
page read and write
24D0A49C000
heap
page read and write
24D136AA000
heap
page read and write
24D7C8ED000
heap
page read and write
24D7C8EE000
heap
page read and write
24D14BD7000
trusted library allocation
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D17083000
trusted library allocation
page read and write
24D14973000
trusted library allocation
page read and write
9EF000
heap
page read and write
24D0C20F000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0A282000
trusted library allocation
page read and write
24D16FB8000
trusted library allocation
page read and write
24D1283E000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C91C000
heap
page read and write
2113D370000
unclassified section
page read and write
24D7C91C000
heap
page read and write
24D0B9A4000
trusted library allocation
page read and write
24D129E7000
trusted library allocation
page read and write
24D12A28000
trusted library allocation
page read and write
24D12EED000
trusted library allocation
page read and write
24D14932000
trusted library allocation
page read and write
224AA54F000
unclassified section
page read and write
24D13E00000
trusted library allocation
page read and write
236B9A6C000
trusted library allocation
page execute read
24D07AD7000
trusted library allocation
page read and write
1747F512000
trusted library allocation
page read and write
24D0C1E7000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D0B6EC000
trusted library allocation
page read and write
24D0C8A8000
trusted library allocation
page read and write
24D09DF9000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D12968000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D0C251000
trusted library allocation
page read and write
24D16080000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D148BC000
trusted library allocation
page read and write
24D0A4A6000
heap
page read and write
24D7C8ED000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7EF23000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
224AA904000
trusted library allocation
page read and write
24D125EC000
trusted library allocation
page read and write
24D0A6F1000
trusted library allocation
page read and write
24D13719000
heap
page read and write
24D1496F000
trusted library allocation
page read and write
24D1492F000
trusted library allocation
page read and write
99E000
stack
page read and write
24D7C91C000
heap
page read and write
24D12A1B000
trusted library allocation
page read and write
572000
unkown
page readonly
24D14BD5000
trusted library allocation
page read and write
24D0C84B000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D0C2CB000
trusted library allocation
page read and write
24D1682F000
trusted library allocation
page read and write
2113DB23000
heap
page read and write
24D1258B000
trusted library allocation
page read and write
24D167F3000
trusted library allocation
page read and write
24D7F026000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8E1000
heap
page read and write
24D7C90C000
heap
page read and write
24D7C8E3000
heap
page read and write
24D16F9E000
trusted library allocation
page read and write
24D0B7D1000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D15B00000
trusted library allocation
page read and write
24D0C19A000
trusted library allocation
page read and write
24D135E4000
heap
page read and write
24D7EBFC000
trusted library allocation
page read and write
24D16780000
trusted library allocation
page read and write
24D125AF000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0C1A5000
trusted library allocation
page read and write
224AA769000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D12ECE000
trusted library allocation
page read and write
24D0C181000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D7EADE000
trusted library allocation
page read and write
24D1295C000
trusted library allocation
page read and write
24D12DF9000
trusted library allocation
page read and write
24D12EB5000
trusted library allocation
page read and write
24D07AC6000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D7C8B8000
heap
page read and write
24D7C8F3000
heap
page read and write
24D14B33000
trusted library allocation
page read and write
24D13557000
heap
page read and write
3B603FF000
stack
page read and write
24D0ADEF000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D170DF000
trusted library allocation
page read and write
2113DB31000
heap
page read and write
24D0C2D5000
trusted library allocation
page read and write
24D0C1D2000
trusted library allocation
page read and write
2113CEFB000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D14716000
trusted library allocation
page read and write
24D14978000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0C225000
trusted library allocation
page read and write
24D0C1D9000
trusted library allocation
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D0C1A6000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D1264D000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0C3D2000
trusted library allocation
page read and write
24D0AC8C000
trusted library allocation
page read and write
24D12A55000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D7C924000
heap
page read and write
490000
heap
page read and write
24D0C14C000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D12AEA000
trusted library allocation
page read and write
24D7C8C3000
heap
page read and write
24D12AEA000
trusted library allocation
page read and write
24D0C1D2000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D14AEB000
trusted library allocation
page read and write
24D148F9000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7E9D4000
trusted library allocation
page read and write
24D148C6000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D7C92F000
heap
page read and write
24D7C90C000
heap
page read and write
24D7E9A1000
trusted library allocation
page read and write
24D14BDC000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D14C3F000
trusted library allocation
page read and write
24D13EF3000
trusted library allocation
page read and write
24D12AFD000
trusted library allocation
page read and write
24D0A6A5000
trusted library allocation
page read and write
24D168C2000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0ADE9000
trusted library allocation
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D7EA68000
trusted library allocation
page read and write
24D14CC4000
trusted library allocation
page read and write
24D17BCE000
trusted library allocation
page read and write
2113DB7B000
heap
page read and write
24D7C8FE000
heap
page read and write
24D13503000
heap
page read and write
24D7C91D000
heap
page read and write
24D0B4A7000
trusted library allocation
page read and write
24D170A7000
trusted library allocation
page read and write
24D7C8C8000
heap
page read and write
24D13503000
heap
page read and write
24D148DB000
trusted library allocation
page read and write
24D0A2AE000
trusted library allocation
page read and write
1D689990000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C90C000
heap
page read and write
24D0B6DB000
trusted library allocation
page read and write
24D0B4B8000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
24D14928000
trusted library allocation
page read and write
24D0C397000
trusted library allocation
page read and write
24D13544000
heap
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D14C15000
trusted library allocation
page read and write
24D0C4E3000
trusted library allocation
page read and write
24D13BF1000
trusted library allocation
page read and write
24D1705F000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
A1E000
heap
page read and write
224AA762000
trusted library allocation
page read and write
825D0BD000
stack
page read and write
24D0C1FB000
trusted library allocation
page read and write
24D0B1C7000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D0E52C000
trusted library allocation
page read and write
2113DB84000
heap
page read and write
24D7C92F000
heap
page read and write
24D1489C000
trusted library allocation
page read and write
24D0A823000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
2113DABF000
heap
page read and write
24D1692B000
trusted library allocation
page read and write
24D0E506000
trusted library allocation
page read and write
224AA550000
heap
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D7C8E2000
heap
page read and write
24D13E7B000
trusted library allocation
page read and write
24D12A8E000
trusted library allocation
page read and write
24D0AA7D000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D0B7EB000
trusted library allocation
page read and write
24D14C92000
trusted library allocation
page read and write
A1A000
heap
page read and write
24D0C4E3000
trusted library allocation
page read and write
24D1355A000
heap
page read and write
24D0C8C1000
trusted library allocation
page read and write
24D14BE7000
trusted library allocation
page read and write
24D0D4F1000
trusted library allocation
page read and write
24D1692D000
trusted library allocation
page read and write
24D16926000
trusted library allocation
page read and write
24D1690F000
trusted library allocation
page read and write
24D7C8D4000
heap
page read and write
24D0B795000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D14B89000
trusted library allocation
page read and write
24D14AE8000
trusted library allocation
page read and write
24D16D65000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D07A9C000
trusted library allocation
page read and write
24D7EF2F000
trusted library allocation
page read and write
24D07AAD000
trusted library allocation
page read and write
24D0A26F000
trusted library allocation
page read and write
24D1502C000
trusted library allocation
page read and write
24D14BA8000
trusted library allocation
page read and write
24D17087000
trusted library allocation
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D14C3C000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C8FA000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D149DE000
trusted library allocation
page read and write
2113DB31000
heap
page read and write
24D12627000
trusted library allocation
page read and write
24D1268E000
trusted library allocation
page read and write
24D0A2B7000
trusted library allocation
page read and write
24D0E46D000
trusted library allocation
page read and write
24D0C8D1000
trusted library allocation
page read and write
24D7E989000
trusted library allocation
page read and write
24D0C127000
trusted library allocation
page read and write
24D167D1000
trusted library allocation
page read and write
24D0BA53000
trusted library allocation
page read and write
2113D600000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C8E1000
heap
page read and write
24D14B7E000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D129FB000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D159A8000
trusted library allocation
page read and write
2113CEBA000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C92A000
heap
page read and write
24D16918000
trusted library allocation
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C924000
heap
page read and write
24D129DD000
trusted library allocation
page read and write
24D167ED000
trusted library allocation
page read and write
24D0C5F9000
trusted library allocation
page read and write
24D12D92000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7E9EF000
trusted library allocation
page read and write
24D14E87000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7F01B000
trusted library allocation
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D125F2000
trusted library allocation
page read and write
24D149FD000
trusted library allocation
page read and write
24D13537000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C8E3000
heap
page read and write
24D14B89000
trusted library allocation
page read and write
24D16FD6000
trusted library allocation
page read and write
24D0B727000
trusted library allocation
page read and write
24D147E3000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
2113DAA0000
heap
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D0B68C000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D129EC000
trusted library allocation
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D0C1D1000
trusted library allocation
page read and write
24D12DDF000
trusted library allocation
page read and write
24D167ED000
trusted library allocation
page read and write
24D0B93D000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C929000
heap
page read and write
24D7C8C4000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D0AAC6000
trusted library allocation
page read and write
24D7C8DA000
heap
page read and write
24D1690F000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D13E2D000
trusted library allocation
page read and write
24D147DC000
trusted library allocation
page read and write
224AA5C3000
heap
page read and write
1747F45D000
trusted library allocation
page read and write
24D0C8A8000
trusted library allocation
page read and write
24D0E501000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
224AA2E0000
unclassified section
page readonly
24D7C8FE000
heap
page read and write
24D0A6C2000
trusted library allocation
page read and write
24D12AC1000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D0B456000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0D2A1000
trusted library allocation
page read and write
24D14BC2000
trusted library allocation
page read and write
24D0C2C8000
trusted library allocation
page read and write
24D0D5C8000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C195000
trusted library allocation
page read and write
2113DBAE000
heap
page read and write
24D7C8DF000
heap
page read and write
24D7C91D000
heap
page read and write
24D14975000
trusted library allocation
page read and write
24D12DB4000
trusted library allocation
page read and write
A1F000
heap
page read and write
24D7EA6D000
trusted library allocation
page read and write
24D7C8CA000
heap
page read and write
174000
heap
page read and write
24D14BE2000
trusted library allocation
page read and write
24D1298B000
trusted library allocation
page read and write
24D147FB000
trusted library allocation
page read and write
825D17E000
unkown
page readonly
24D14B43000
trusted library allocation
page read and write
224AA7F5000
trusted library allocation
page read and write
24D0C185000
trusted library allocation
page read and write
24D14BC2000
trusted library allocation
page read and write
24D0A6E6000
trusted library allocation
page read and write
24D12DAD000
trusted library allocation
page read and write
24D0C8DA000
trusted library allocation
page read and write
24D0D334000
trusted library allocation
page read and write
24D7C8BF000
heap
page read and write
24D0C2EC000
trusted library allocation
page read and write
24D0B46E000
trusted library allocation
page read and write
24D16EF6000
trusted library allocation
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D14FA7000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D0A17B000
trusted library allocation
page read and write
24D0C1FB000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D12A89000
trusted library allocation
page read and write
24D0D338000
trusted library allocation
page read and write
24D13BBC000
trusted library allocation
page read and write
224AA540000
unclassified section
page read and write
24D14BCC000
trusted library allocation
page read and write
24D126F8000
trusted library allocation
page read and write
24D1492A000
trusted library allocation
page read and write
24D1494A000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D14B8B000
trusted library allocation
page read and write
24D7EA2D000
trusted library allocation
page read and write
24D12DF8000
trusted library allocation
page read and write
24D14B78000
trusted library allocation
page read and write
14D000
stack
page read and write
24D7EF76000
trusted library allocation
page read and write
A01000
heap
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D0D4F9000
trusted library allocation
page read and write
24D12D87000
trusted library allocation
page read and write
24D7EF71000
trusted library allocation
page read and write
24D0D5F9000
trusted library allocation
page read and write
2113DB84000
heap
page read and write
24D16D59000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
2113CEC3000
trusted library allocation
page read and write
24D13BBC000
trusted library allocation
page read and write
24D0B82F000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7EA6D000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
24D12985000
trusted library allocation
page read and write
24D14C36000
trusted library allocation
page read and write
24D0C24B000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D7F093000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
2113DB26000
heap
page read and write
24D135A9000
heap
page read and write
54C000
unkown
page readonly
24D0A4E1000
heap
page read and write
24D7C91C000
heap
page read and write
24D0ADEF000
trusted library allocation
page read and write
24D14708000
trusted library allocation
page read and write
24D14BA7000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0B18C000
trusted library allocation
page read and write
24D0C3F2000
trusted library allocation
page read and write
24D14F86000
trusted library allocation
page read and write
24D0B98D000
trusted library allocation
page read and write
24D0A26F000
trusted library allocation
page read and write
24D0C3EE000
trusted library allocation
page read and write
24D12645000
trusted library allocation
page read and write
3B61BFE000
stack
page read and write
24D1678A000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0A26A000
trusted library allocation
page read and write
580000
unkown
page write copy
2113DB98000
heap
page read and write
24D7C8F2000
heap
page read and write
24D0C8FD000
trusted library allocation
page read and write
24D16D7C000
trusted library allocation
page read and write
24D0C27F000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0C2F8000
trusted library allocation
page read and write
2113CE86000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7EFF6000
trusted library allocation
page read and write
24D14BC2000
trusted library allocation
page read and write
24D0ADE9000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D16EBF000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
17092C80000
heap
page read and write
24D0F302000
trusted library allocation
page read and write
24D0E443000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D126E0000
trusted library allocation
page read and write
24D14F43000
trusted library allocation
page read and write
224AAA0C000
trusted library allocation
page read and write
24D129F8000
trusted library allocation
page read and write
24D14BD2000
trusted library allocation
page read and write
2113CB1A000
remote allocation
page execute read
24D7C8E9000
heap
page read and write
24D0A2C0000
trusted library allocation
page read and write
1D689CE0000
heap
page read and write
24D0A1F7000
trusted library allocation
page read and write
24D16E70000
trusted library allocation
page read and write
24D7C928000
heap
page read and write
24D7C92F000
heap
page read and write
24D0A6B1000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
3197FFE000
stack
page read and write
24D16778000
trusted library allocation
page read and write
17092C77000
heap
page read and write
24D12DCF000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0A4E1000
heap
page read and write
24D1706E000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D14C33000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D1491D000
trusted library allocation
page read and write
24D148B6000
trusted library allocation
page read and write
24D14B1C000
trusted library allocation
page read and write
24D0B7D3000
trusted library allocation
page read and write
24D0C27F000
trusted library allocation
page read and write
2113DA49000
heap
page read and write
24D7E998000
trusted library allocation
page read and write
24D0D3A0000
trusted library allocation
page read and write
24D136AA000
heap
page read and write
24D1283C000
trusted library allocation
page read and write
2113D405000
unkown
page execute read
24D0E441000
trusted library allocation
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D0E37B000
trusted library allocation
page read and write
24D0C89B000
trusted library allocation
page read and write
24D09DF9000
trusted library allocation
page read and write
24D0C267000
trusted library allocation
page read and write
24D14BB9000
trusted library allocation
page read and write
17091172000
heap
page read and write
24D7C8FE000
heap
page read and write
2113DB31000
heap
page read and write
24D0C3AF000
trusted library allocation
page read and write
24D7C8CC000
heap
page read and write
24D0AC38000
trusted library allocation
page read and write
24D0B41E000
trusted library allocation
page read and write
24D15057000
trusted library allocation
page read and write
24D0A662000
trusted library allocation
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D12A83000
trusted library allocation
page read and write
24D14B27000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D7C8F3000
heap
page read and write
24D12ECB000
trusted library allocation
page read and write
1747F160000
unclassified section
page readonly
24D0C2B8000
trusted library allocation
page read and write
24D15FB2000
trusted library allocation
page read and write
24D7C8C4000
heap
page read and write
24D17B6D000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D129F4000
trusted library allocation
page read and write
24D125D3000
trusted library allocation
page read and write
24D0C463000
trusted library allocation
page read and write
24D0A6F1000
trusted library allocation
page read and write
24D0D17B000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D07AA8000
trusted library allocation
page read and write
24D13558000
heap
page read and write
24D7C90C000
heap
page read and write
24D0AA8E000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0A6E2000
trusted library allocation
page read and write
24D12DE1000
trusted library allocation
page read and write
24D0E4A3000
trusted library allocation
page read and write
24D0B4C3000
trusted library allocation
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D0A251000
trusted library allocation
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
2113DB98000
heap
page read and write
24D7C8E9000
heap
page read and write
24D14B1C000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D7C92F000
heap
page read and write
319897E000
unkown
page readonly
24D14BF4000
trusted library allocation
page read and write
24D7C8C4000
heap
page read and write
260ADFF000
stack
page read and write
24D0C124000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D13557000
heap
page read and write
24D7E99E000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0B8FA000
trusted library allocation
page read and write
24D0B772000
trusted library allocation
page read and write
24D0B6AF000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
584000
unkown
page readonly
24D14B33000
trusted library allocation
page read and write
24D1496C000
trusted library allocation
page read and write
24D14C22000
trusted library allocation
page read and write
24D0A18B000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D0A4A2000
heap
page read and write
24D7C929000
heap
page read and write
24D7C92A000
heap
page read and write
24D7C928000
heap
page read and write
24D15FAE000
trusted library allocation
page read and write
24D12A19000
trusted library allocation
page read and write
24D0B8DE000
trusted library allocation
page read and write
24D14B56000
trusted library allocation
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D7C8FB000
heap
page read and write
1747F3F4000
heap
page read and write
17091400000
heap
page read and write
24D7C91D000
heap
page read and write
24D16EF4000
trusted library allocation
page read and write
24D1687D000
trusted library allocation
page read and write
24D167D1000
trusted library allocation
page read and write
17092C7D000
heap
page read and write
24D7C8E8000
heap
page read and write
24D7C8E8000
heap
page read and write
24D0C2B8000
trusted library allocation
page read and write
24D7C8B7000
heap
page read and write
24D7C924000
heap
page read and write
24D0C393000
trusted library allocation
page read and write
24D0C2CB000
trusted library allocation
page read and write
24D14EA3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0C8CD000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D1683A000
trusted library allocation
page read and write
24D7C8EF000
heap
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D16FE5000
trusted library allocation
page read and write
24D168DC000
trusted library allocation
page read and write
24D7C8DD000
heap
page read and write
24D14931000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0A19E000
trusted library allocation
page read and write
24D07AAB000
trusted library allocation
page read and write
24D14C92000
trusted library allocation
page read and write
2113CE2F000
trusted library allocation
page read and write
24D16740000
trusted library allocation
page read and write
24D07A98000
trusted library allocation
page read and write
24D170C2000
trusted library allocation
page read and write
24D12EF3000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7C8FE000
heap
page read and write
24D14832000
trusted library allocation
page read and write
24D0C2DD000
trusted library allocation
page read and write
24D16DE9000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D0E057000
trusted library allocation
page read and write
24D16936000
trusted library allocation
page read and write
3B62BFF000
stack
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D0C2AF000
trusted library allocation
page read and write
24D14945000
trusted library allocation
page read and write
2113DB98000
heap
page read and write
24D13BB6000
trusted library allocation
page read and write
24D7C928000
heap
page read and write
24D0A83B000
trusted library allocation
page read and write
24D0AC1D000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0D1F1000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D17085000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D1354C000
heap
page read and write
24D14BE5000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0A68B000
trusted library allocation
page read and write
24D0D5FD000
trusted library allocation
page read and write
24D0C8D1000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0DFED000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
224AA4E0000
heap
page read and write
24D0ADEB000
trusted library allocation
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D16E80000
trusted library allocation
page read and write
24D0B6A7000
trusted library allocation
page read and write
24D127AB000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
17091180000
heap
page read and write
24D15FB3000
trusted library allocation
page read and write
24D125F2000
trusted library allocation
page read and write
24D0AD39000
trusted library allocation
page read and write
24D7C923000
heap
page read and write
24D7C8D4000
heap
page read and write
24D0E3E5000
trusted library allocation
page read and write
24D7C8C3000
heap
page read and write
24D7C92F000
heap
page read and write
24D14BDC000
trusted library allocation
page read and write
24D0B6A5000
trusted library allocation
page read and write
24D0C285000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D14B55000
trusted library allocation
page read and write
24D14899000
trusted library allocation
page read and write
24D7C8D4000
heap
page read and write
24D0C163000
trusted library allocation
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D13553000
heap
page read and write
1747F4E7000
trusted library allocation
page read and write
24D16DAF000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D12840000
trusted library allocation
page read and write
24D16768000
trusted library allocation
page read and write
24D0B4D6000
trusted library allocation
page read and write
24D1355D000
heap
page read and write
24D0C377000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C91C000
heap
page read and write
24D0C3EE000
trusted library allocation
page read and write
24D0ADD2000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D0A6BE000
trusted library allocation
page read and write
24D0C2DC000
trusted library allocation
page read and write
24D0B419000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C8D2000
heap
page read and write
24D0B985000
trusted library allocation
page read and write
24D13503000
heap
page read and write
24D0C20D000
trusted library allocation
page read and write
24D0AC7C000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D16DE0000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D14BE2000
trusted library allocation
page read and write
24D0C27F000
trusted library allocation
page read and write
24D14CB1000
trusted library allocation
page read and write
24D13BA5000
trusted library allocation
page read and write
24D13541000
heap
page read and write
2113CE61000
trusted library allocation
page read and write
24D1690B000
trusted library allocation
page read and write
24D0C4E3000
trusted library allocation
page read and write
24D13E9D000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
2113D410000
unkown
page execute read
24D0B943000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D13E16000
trusted library allocation
page read and write
24D14971000
trusted library allocation
page read and write
2113DB7B000
heap
page read and write
24D12D87000
trusted library allocation
page read and write
24D7C926000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C8F2000
heap
page read and write
24D7F0BF000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D13BE3000
trusted library allocation
page read and write
24D129F0000
trusted library allocation
page read and write
24D0B882000
trusted library allocation
page read and write
24D14F48000
trusted library allocation
page read and write
174000
heap
page read and write
24D0C3EA000
trusted library allocation
page read and write
24D12649000
trusted library allocation
page read and write
24D0B4B3000
trusted library allocation
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D0E3A2000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D7C92F000
heap
page read and write
24D0C2F0000
trusted library allocation
page read and write
24D12598000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0A6A5000
trusted library allocation
page read and write
24D0C1D9000
trusted library allocation
page read and write
1747F463000
trusted library allocation
page read and write
24D12789000
trusted library allocation
page read and write
2113DB6D000
heap
page read and write
24D7C8E3000
heap
page read and write
24D0C158000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D7C8B7000
heap
page read and write
24D7C8DD000
heap
page read and write
24D14BEC000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D14B89000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
24D16FC3000
trusted library allocation
page read and write
24D0A69D000
trusted library allocation
page read and write
24D125F0000
trusted library allocation
page read and write
24D0D2A7000
trusted library allocation
page read and write
319B27E000
stack
page read and write
24D167FD000
trusted library allocation
page read and write
6F5F5FE000
unkown
page readonly
24D129F8000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8C4000
heap
page read and write
24D7C923000
heap
page read and write
24D12DE8000
trusted library allocation
page read and write
24D14942000
trusted library allocation
page read and write
6F5F67E000
unkown
page readonly
24D0A2FC000
trusted library allocation
page read and write
24D1266B000
trusted library allocation
page read and write
24D7C8D1000
heap
page read and write
24D14C3C000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D12D90000
trusted library allocation
page read and write
24D14BA7000
trusted library allocation
page read and write
24D7C8E5000
heap
page read and write
24D14CAD000
trusted library allocation
page read and write
24D0A2D6000
trusted library allocation
page read and write
24D16909000
trusted library allocation
page read and write
24D0C285000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D12D99000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D7C8F1000
heap
page read and write
24D0A6B1000
trusted library allocation
page read and write
2113DB40000
heap
page read and write
24D7C91F000
heap
page read and write
24D148F4000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D7C8AE000
heap
page read and write
1D689B00000
trusted library allocation
page read and write
24D127F2000
trusted library allocation
page read and write
224AA713000
trusted library allocation
page read and write
A24000
heap
page read and write
24D125DC000
trusted library allocation
page read and write
24D14975000
trusted library allocation
page read and write
24D12A2C000
trusted library allocation
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D0C89B000
trusted library allocation
page read and write
24D0E443000
trusted library allocation
page read and write
24D0E0F0000
trusted library allocation
page read and write
24D0C8A1000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D0A69A000
trusted library allocation
page read and write
24D14FA3000
trusted library allocation
page read and write
2113DAA0000
heap
page read and write
24D7C924000
heap
page read and write
24D7C8FE000
heap
page read and write
24D127C8000
trusted library allocation
page read and write
24D0C5E3000
trusted library allocation
page read and write
24D0AC53000
trusted library allocation
page read and write
24D14C33000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D1492A000
trusted library allocation
page read and write
24D0C3A5000
trusted library allocation
page read and write
24D0C8D5000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C8FE000
heap
page read and write
2113DB23000
heap
page read and write
24D7C8F2000
heap
page read and write
24D0D259000
trusted library allocation
page read and write
31999BE000
stack
page read and write
24D0ED1C000
trusted library allocation
page read and write
224AAA00000
trusted library allocation
page read and write
24D0C2DC000
trusted library allocation
page read and write
24D0AA90000
trusted library allocation
page read and write
224AA70C000
trusted library allocation
page read and write
2113DAA0000
heap
page read and write
24D167F5000
trusted library allocation
page read and write
24D14B8B000
trusted library allocation
page read and write
24D13BCD000
trusted library allocation
page read and write
24D7C8EB000
heap
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D14B43000
trusted library allocation
page read and write
24D12A75000
trusted library allocation
page read and write
24D0B8C3000
trusted library allocation
page read and write
2113DB2A000
heap
page read and write
24D0A4E1000
heap
page read and write
24D0E46D000
trusted library allocation
page read and write
24D0A664000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D168D8000
trusted library allocation
page read and write
24D7F0A1000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C2BF000
trusted library allocation
page read and write
24D148D2000
trusted library allocation
page read and write
24D7EBEF000
trusted library allocation
page read and write
4B0000
unkown
page readonly
24D15F9B000
trusted library allocation
page read and write
24D1363A000
heap
page read and write
24D0B8EE000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0C1E3000
trusted library allocation
page read and write
1747F40B000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0AD45000
trusted library allocation
page read and write
24D0C86A000
trusted library allocation
page read and write
24D0ADB3000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8E9000
heap
page read and write
24D167B2000
trusted library allocation
page read and write
24D0C2DD000
trusted library allocation
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D7C8B8000
heap
page read and write
2113DB2A000
heap
page read and write
24D7C92F000
heap
page read and write
24D0C3FD000
trusted library allocation
page read and write
24D1690D000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D12587000
trusted library allocation
page read and write
24D0D5CD000
trusted library allocation
page read and write
24D0B772000
trusted library allocation
page read and write
24D16DCA000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0D34D000
trusted library allocation
page read and write
24D14710000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C90C000
heap
page read and write
24D14FC5000
trusted library allocation
page read and write
24D15FBA000
trusted library allocation
page read and write
24D0B84D000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D14CFC000
trusted library allocation
page read and write
2113DB26000
heap
page read and write
24D0B95D000
trusted library allocation
page read and write
224AA7C4000
trusted library allocation
page read and write
24D0B8BF000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14745000
trusted library allocation
page read and write
24D0C2D5000
trusted library allocation
page read and write
24D0B8B7000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
24D14BB9000
trusted library allocation
page read and write
24D7EFFB000
trusted library allocation
page read and write
24D0C5D4000
trusted library allocation
page read and write
24D0A15E000
trusted library allocation
page read and write
24D0D38C000
trusted library allocation
page read and write
24D0A158000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
1747EF26000
remote allocation
page execute read
24D7C8FE000
heap
page read and write
24D0C8D3000
trusted library allocation
page read and write
224AA5C0000
heap
page read and write
24D7C8F0000
heap
page read and write
24D7C924000
heap
page read and write
24D1704A000
trusted library allocation
page read and write
24D14C36000
trusted library allocation
page read and write
24D0AD62000
trusted library allocation
page read and write
24D14CE2000
trusted library allocation
page read and write
24D13E1E000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D125BC000
trusted library allocation
page read and write
224AA4D4000
heap
page read and write
24D14BB9000
trusted library allocation
page read and write
24D14942000
trusted library allocation
page read and write
24D0A23D000
trusted library allocation
page read and write
24D14BF2000
trusted library allocation
page read and write
24D0ADB8000
trusted library allocation
page read and write
2113CE00000
trusted library allocation
page read and write
24D1692D000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
24D14BF4000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
1747F47B000
trusted library allocation
page read and write
24D0C5B2000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0B87F000
trusted library allocation
page read and write
24D16FD9000
trusted library allocation
page read and write
24D7E981000
trusted library allocation
page read and write
24D12523000
trusted library allocation
page read and write
24D14BE8000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D14975000
trusted library allocation
page read and write
24D0D5AF000
trusted library allocation
page read and write
24D0E441000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D7C8E5000
heap
page read and write
24D7C8E9000
heap
page read and write
24D7C8AC000
heap
page read and write
24D7F0FE000
trusted library allocation
page read and write
24D1492F000
trusted library allocation
page read and write
24D14CDD000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D0AC85000
trusted library allocation
page read and write
24D167AE000
trusted library allocation
page read and write
24D148F4000
trusted library allocation
page read and write
24D14710000
trusted library allocation
page read and write
24D1671F000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D7C8D2000
heap
page read and write
24D170A4000
trusted library allocation
page read and write
24D14924000
trusted library allocation
page read and write
24D16E3F000
trusted library allocation
page read and write
24D0C1D9000
trusted library allocation
page read and write
2113DBB7000
heap
page read and write
97B000
stack
page read and write
24D7C928000
heap
page read and write
24D7C91C000
heap
page read and write
24D0C8BB000
trusted library allocation
page read and write
24D1258D000
trusted library allocation
page read and write
24D12D92000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D7C91E000
heap
page read and write
24D0C2C8000
trusted library allocation
page read and write
24D148CE000
trusted library allocation
page read and write
24D14C97000
trusted library allocation
page read and write
24D7EA3E000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D0A2B8000
trusted library allocation
page read and write
24D14B89000
trusted library allocation
page read and write
24D12DF2000
trusted library allocation
page read and write
24D7EA0E000
trusted library allocation
page read and write
24D12643000
trusted library allocation
page read and write
24D0C2F0000
trusted library allocation
page read and write
24D12D9A000
trusted library allocation
page read and write
2113DB98000
heap
page read and write
24D7C91F000
heap
page read and write
24D12DE5000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0D4F5000
trusted library allocation
page read and write
24D0A2B4000
trusted library allocation
page read and write
1747F412000
trusted library allocation
page read and write
24D7C8EC000
heap
page read and write
24D1673A000
trusted library allocation
page read and write
24D12651000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D7C8C4000
heap
page read and write
24D12DEF000
trusted library allocation
page read and write
2113DB61000
heap
page read and write
2113DAA9000
heap
page read and write
24D7C90C000
heap
page read and write
24D07ABF000
trusted library allocation
page read and write
24D14AFB000
trusted library allocation
page read and write
24D125DC000
trusted library allocation
page read and write
2113DAF9000
heap
page read and write
24D14800000
trusted library allocation
page read and write
1747F42E000
trusted library allocation
page read and write
6F5FEFE000
stack
page read and write
24D148E2000
trusted library allocation
page read and write
2113DBB9000
heap
page read and write
24D16FE5000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7C91C000
heap
page read and write
825C7FE000
stack
page read and write
24D127B3000
trusted library allocation
page read and write
24D0A6DE000
trusted library allocation
page read and write
24D0C3D2000
trusted library allocation
page read and write
24D0E4A3000
trusted library allocation
page read and write
24D14932000
trusted library allocation
page read and write
24D14AC9000
trusted library allocation
page read and write
24D14BCC000
trusted library allocation
page read and write
24D14735000
trusted library allocation
page read and write
24D7C8C5000
heap
page read and write
24D7C8D2000
heap
page read and write
2113CC90000
heap
page read and write
24D13EF3000
trusted library allocation
page read and write
24D7C950000
heap
page read and write
2113CE12000
trusted library allocation
page read and write
24D0C2BF000
trusted library allocation
page read and write
24D16DB4000
trusted library allocation
page read and write
24D1298F000
trusted library allocation
page read and write
24D0A192000
trusted library allocation
page read and write
24D170A4000
trusted library allocation
page read and write
24D0B8BF000
trusted library allocation
page read and write
24D0A6B8000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0E501000
trusted library allocation
page read and write
24D7C92A000
heap
page read and write
24D7C8FE000
heap
page read and write
24D0DFB0000
trusted library allocation
page read and write
24D7F3E7000
trusted library allocation
page read and write
825E1FE000
unkown
page readonly
24D0C2AF000
trusted library allocation
page read and write
24D14BA7000
trusted library allocation
page read and write
1D689A77000
heap
page read and write
24D0B99A000
trusted library allocation
page read and write
24D0E407000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0C267000
trusted library allocation
page read and write
24D0C1CC000
trusted library allocation
page read and write
4B1000
unkown
page execute read
24D12ABB000
trusted library allocation
page read and write
24D0E4A7000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D0A170000
trusted library allocation
page read and write
24D125F0000
trusted library allocation
page read and write
24D0C40A000
trusted library allocation
page read and write
24D7C8DB000
heap
page read and write
24D12AEA000
trusted library allocation
page read and write
1747F46E000
trusted library allocation
page read and write
1747F53D000
trusted library allocation
page read and write
24D1690B000
trusted library allocation
page read and write
24D7EA5F000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D12B00000
trusted library allocation
page read and write
24D7C8F1000
heap
page read and write
24D0A2FC000
trusted library allocation
page read and write
24D7C8D6000
heap
page read and write
2113DB6A000
heap
page read and write
24D14B89000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C8BD000
heap
page read and write
24D0AC9C000
trusted library allocation
page read and write
2113CEA7000
trusted library allocation
page read and write
24D0A6A7000
trusted library allocation
page read and write
2113DB28000
heap
page read and write
24D7C8C7000
heap
page read and write
24D7C91E000
heap
page read and write
24D1690D000
trusted library allocation
page read and write
24D12DE5000
trusted library allocation
page read and write
24D0C3AD000
trusted library allocation
page read and write
24D7C8EF000
heap
page read and write
24D148EB000
trusted library allocation
page read and write
24D135B4000
heap
page read and write
24D16DE0000
trusted library allocation
page read and write
2113DAAC000
heap
page read and write
24D7E988000
trusted library allocation
page read and write
24D16EFE000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C38D000
trusted library allocation
page read and write
24D0C2CB000
trusted library allocation
page read and write
1747F00F000
unclassified section
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D09D3C000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D0C399000
trusted library allocation
page read and write
24D14BB9000
trusted library allocation
page read and write
24D7EA65000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D12589000
trusted library allocation
page read and write
24D149DE000
trusted library allocation
page read and write
24D14B41000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C2AF000
trusted library allocation
page read and write
24D0C3BD000
trusted library allocation
page read and write
24D7EAF1000
trusted library allocation
page read and write
24D7C8B8000
heap
page read and write
24D149C3000
trusted library allocation
page read and write
2113CE48000
trusted library allocation
page read and write
24D0A66F000
trusted library allocation
page read and write
24D1474B000
trusted library allocation
page read and write
174000
heap
page read and write
24D7C924000
heap
page read and write
24D7C8F2000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C90C000
heap
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D0A6C9000
trusted library allocation
page read and write
24D148C6000
trusted library allocation
page read and write
24D0A6A5000
trusted library allocation
page read and write
24D14B4C000
trusted library allocation
page read and write
24D0A676000
trusted library allocation
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D127E7000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D16FF0000
trusted library allocation
page read and write
24D7C8BD000
heap
page read and write
24D0C2BA000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D0C1EA000
trusted library allocation
page read and write
24D12A6D000
trusted library allocation
page read and write
174000
heap
page read and write
24D0ADD6000
trusted library allocation
page read and write
24D0C339000
trusted library allocation
page read and write
24D14C21000
trusted library allocation
page read and write
24D0B8C3000
trusted library allocation
page read and write
24D12691000
trusted library allocation
page read and write
24D0B7EE000
trusted library allocation
page read and write
24D0AC73000
trusted library allocation
page read and write
24D7C8EB000
heap
page read and write
24D7C92F000
heap
page read and write
2113DBB7000
heap
page read and write
24D16FA5000
trusted library allocation
page read and write
24D1294F000
trusted library allocation
page read and write
24D14CE2000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D0B892000
trusted library allocation
page read and write
24D0C2AF000
trusted library allocation
page read and write
24D14893000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D0B456000
trusted library allocation
page read and write
24D0A4A7000
heap
page read and write
24D7C8E9000
heap
page read and write
24D7E998000
trusted library allocation
page read and write
24D12B00000
trusted library allocation
page read and write
24D14C92000
trusted library allocation
page read and write
24D0AAA2000
trusted library allocation
page read and write
24D0B49B000
trusted library allocation
page read and write
24D13BCD000
trusted library allocation
page read and write
24D148D7000
trusted library allocation
page read and write
24D7C926000
heap
page read and write
24D126EB000
trusted library allocation
page read and write
24D14934000
trusted library allocation
page read and write
24D168CF000
trusted library allocation
page read and write
24D125B9000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
2113D40E000
unkown
page execute read
24D7C8E3000
heap
page read and write
24D12DD1000
trusted library allocation
page read and write
24D0A27C000
trusted library allocation
page read and write
24D170A6000
trusted library allocation
page read and write
24D14B9E000
trusted library allocation
page read and write
24D12575000
trusted library allocation
page read and write
24D0C2BA000
trusted library allocation
page read and write
24D16D57000
trusted library allocation
page read and write
24D0B7F2000
trusted library allocation
page read and write
24D0C213000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C1B5000
trusted library allocation
page read and write
24D0C876000
trusted library allocation
page read and write
24D12A42000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
224AA703000
trusted library allocation
page read and write
24D13E32000
trusted library allocation
page read and write
2113DAA9000
heap
page read and write
24D0C2F0000
trusted library allocation
page read and write
24D12AC1000
trusted library allocation
page read and write
24D0ADD6000
trusted library allocation
page read and write
24D7C8CC000
heap
page read and write
24D7C8FE000
heap
page read and write
24D14AF4000
trusted library allocation
page read and write
24D0C23E000
trusted library allocation
page read and write
24D0C2DC000
trusted library allocation
page read and write
24D0B415000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D1491D000
trusted library allocation
page read and write
24D0A60E000
trusted library allocation
page read and write
24D0A68D000
trusted library allocation
page read and write
24D0CA00000
trusted library allocation
page read and write
24D0A2C0000
trusted library allocation
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D7F075000
trusted library allocation
page read and write
24D14975000
trusted library allocation
page read and write
3B613FE000
stack
page read and write
260A5FF000
stack
page read and write
24D0D1E6000
trusted library allocation
page read and write
24D14AD5000
trusted library allocation
page read and write
24D0B8E2000
trusted library allocation
page read and write
24D0C463000
trusted library allocation
page read and write
24D0C3D5000
trusted library allocation
page read and write
24D0A49C000
heap
page read and write
17091140000
heap
page read and write
24D7C8B2000
heap
page read and write
24D0A61B000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D170D9000
trusted library allocation
page read and write
24D1706F000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
2113CAB0000
unclassified section
page readonly
24D1702B000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D16D9C000
trusted library allocation
page read and write
24D0A2AE000
trusted library allocation
page read and write
24D0C3C9000
trusted library allocation
page read and write
24D14B33000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
174000
heap
page read and write
24D14978000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D7C90C000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
2113DB99000
heap
page read and write
24D0B49B000
trusted library allocation
page read and write
24D0AC70000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D12D69000
trusted library allocation
page read and write
24D0AC7C000
trusted library allocation
page read and write
24D0B86E000
trusted library allocation
page read and write
24D0DF9B000
trusted library allocation
page read and write
24D0ADB3000
trusted library allocation
page read and write
24D0C8DA000
trusted library allocation
page read and write
24D0C8FD000
trusted library allocation
page read and write
24D14BCC000
trusted library allocation
page read and write
24D14B7E000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0B9CC000
trusted library allocation
page read and write
31988F8000
stack
page read and write
24D0AA82000
trusted library allocation
page read and write
1747EF30000
unclassified section
page readonly
24D0C1D6000
trusted library allocation
page read and write
24D0C208000
trusted library allocation
page read and write
24D16799000
trusted library allocation
page read and write
24D7C8F0000
heap
page read and write
24D7C8E9000
heap
page read and write
24D12A8E000
trusted library allocation
page read and write
24D0A2C9000
trusted library allocation
page read and write
2609DFC000
stack
page read and write
24D0A6A7000
trusted library allocation
page read and write
24D0A6E2000
trusted library allocation
page read and write
24D16FFB000
trusted library allocation
page read and write
24D0D3A8000
trusted library allocation
page read and write
24D7C8C2000
heap
page read and write
24D1286D000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D14C21000
trusted library allocation
page read and write
24D7C8C4000
heap
page read and write
24D0C8F3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D12649000
trusted library allocation
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D12661000
trusted library allocation
page read and write
24D0A2B4000
trusted library allocation
page read and write
24D16D59000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8D2000
heap
page read and write
24D7C8EB000
heap
page read and write
24D170C2000
trusted library allocation
page read and write
24D7C8B8000
heap
page read and write
1747EF10000
remote allocation
page read and write
24D7C8D2000
heap
page read and write
24D09DF5000
trusted library allocation
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0A123000
trusted library allocation
page read and write
24D14AC9000
trusted library allocation
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0B6F4000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D12AD1000
trusted library allocation
page read and write
24D0C8CD000
trusted library allocation
page read and write
24D12948000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
A21000
heap
page read and write
24D0AA9B000
trusted library allocation
page read and write
24D170DF000
trusted library allocation
page read and write
24D0AA87000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D7C8ED000
heap
page read and write
24D7C8FE000
heap
page read and write
24D7C91E000
heap
page read and write
24D07AB2000
trusted library allocation
page read and write
24D0C2B8000
trusted library allocation
page read and write
24D14979000
trusted library allocation
page read and write
24D13719000
heap
page read and write
24D0A2F2000
trusted library allocation
page read and write
24D14B78000
trusted library allocation
page read and write
24D0DFF7000
trusted library allocation
page read and write
24D7C928000
heap
page read and write
24D12989000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D7C8E9000
heap
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D14CFC000
trusted library allocation
page read and write
24D0A2BF000
trusted library allocation
page read and write
24D7C8B2000
heap
page read and write
24D7C924000
heap
page read and write
24D14CFC000
trusted library allocation
page read and write
9D8000
heap
page read and write
24D0A49C000
heap
page read and write
24D7C929000
heap
page read and write
24D14C3F000
trusted library allocation
page read and write
24D7EAF1000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D16893000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D0DF77000
trusted library allocation
page read and write
24D7EA8C000
trusted library allocation
page read and write
24D149E0000
trusted library allocation
page read and write
24D0ADD6000
trusted library allocation
page read and write
24D7F3B7000
trusted library allocation
page read and write
24D09DFB000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D167AE000
trusted library allocation
page read and write
24D12A89000
trusted library allocation
page read and write
24D0A690000
trusted library allocation
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D0D5C2000
trusted library allocation
page read and write
24D0AA55000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D7C8E1000
heap
page read and write
24D7C8E7000
heap
page read and write
24D0C423000
trusted library allocation
page read and write
2113DBAE000
heap
page read and write
24D0C2CB000
trusted library allocation
page read and write
24D0D26F000
trusted library allocation
page read and write
24D0C2F0000
trusted library allocation
page read and write
24D0AC79000
trusted library allocation
page read and write
24D168FD000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D12689000
trusted library allocation
page read and write
24D7F017000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
150000
heap
page read and write
24D7C8E1000
heap
page read and write
24D0B1E7000
trusted library allocation
page read and write
24D16924000
trusted library allocation
page read and write
24D0A16B000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D7C8F2000
heap
page read and write
24D14B9D000
trusted library allocation
page read and write
24D0C2AF000
trusted library allocation
page read and write
24D168C8000
trusted library allocation
page read and write
24D0C27F000
trusted library allocation
page read and write
24D7F07F000
trusted library allocation
page read and write
24D168DC000
trusted library allocation
page read and write
24D0C38D000
trusted library allocation
page read and write
24D16DDE000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
31987FE000
unkown
page readonly
24D7C929000
heap
page read and write
24D0B8B2000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D167F5000
trusted library allocation
page read and write
2113DB6A000
heap
page read and write
24D7C8E8000
heap
page read and write
24D14716000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D7C8C9000
heap
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D13BAE000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
2113D430000
heap
page read and write
24D12AAB000
trusted library allocation
page read and write
2113DB28000
heap
page read and write
24D7EA11000
trusted library allocation
page read and write
24D16924000
trusted library allocation
page read and write
24D14BD2000
trusted library allocation
page read and write
2113DABD000
heap
page read and write
24D14BE7000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0E52C000
trusted library allocation
page read and write
24D0C3CF000
trusted library allocation
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D1253C000
trusted library allocation
page read and write
24D7C8DA000
heap
page read and write
24D7C8B0000
heap
page read and write
24D0A1B2000
trusted library allocation
page read and write
24D16E7E000
trusted library allocation
page read and write
825D07E000
unkown
page readonly
24D0C1E3000
trusted library allocation
page read and write
24D170D9000
trusted library allocation
page read and write
24D7C8C8000
heap
page read and write
24D16DE6000
trusted library allocation
page read and write
24D0A6AE000
trusted library allocation
page read and write
24D0B95D000
trusted library allocation
page read and write
1747F4B7000
trusted library allocation
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D0A6CD000
trusted library allocation
page read and write
24D12EBF000
trusted library allocation
page read and write
24D7C8DD000
heap
page read and write
24D7C90C000
heap
page read and write
24D0C1EA000
trusted library allocation
page read and write
3B603FA000
stack
page read and write
24D167FD000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C37A000
trusted library allocation
page read and write
24D1670E000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D1295A000
trusted library allocation
page read and write
24D0ADCB000
trusted library allocation
page read and write
24D0C195000
trusted library allocation
page read and write
24D0B476000
trusted library allocation
page read and write
224AA4D6000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C90C000
heap
page read and write
24D14F07000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D7C8C8000
heap
page read and write
2113DB84000
heap
page read and write
24D0B8FE000
trusted library allocation
page read and write
24D12DDB000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0ADE5000
trusted library allocation
page read and write
24D0C155000
trusted library allocation
page read and write
24D16778000
trusted library allocation
page read and write
24D7E964000
trusted library allocation
page read and write
A09000
heap
page read and write
24D13553000
heap
page read and write
24D0C2F8000
trusted library allocation
page read and write
24D0C167000
trusted library allocation
page read and write
24D7F3BA000
trusted library allocation
page read and write
24D0C38D000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D12680000
trusted library allocation
page read and write
24D0A241000
trusted library allocation
page read and write
24D0E52E000
trusted library allocation
page read and write
24D15F9B000
trusted library allocation
page read and write
24D13BBA000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
A05000
heap
page read and write
2113DAA4000
heap
page read and write
24D0B7EB000
trusted library allocation
page read and write
24D1281D000
trusted library allocation
page read and write
24D0D249000
trusted library allocation
page read and write
24D13BE3000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
6F616FE000
unkown
page readonly
24D0A669000
trusted library allocation
page read and write
24D0A6BE000
trusted library allocation
page read and write
236B9B41000
trusted library allocation
page execute read
24D0A6F0000
trusted library allocation
page read and write
24D16FDC000
trusted library allocation
page read and write
24D09DBD000
trusted library allocation
page read and write
24D16928000
trusted library allocation
page read and write
2113DAAC000
heap
page read and write
24D0A241000
trusted library allocation
page read and write
24D0AD82000
trusted library allocation
page read and write
24D0ED93000
trusted library allocation
page read and write
24D13EF3000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D13558000
heap
page read and write
24D7F0BC000
trusted library allocation
page read and write
24D12DDF000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D7C929000
heap
page read and write
24D0C3C6000
trusted library allocation
page read and write
24D09DFB000
trusted library allocation
page read and write
2113DBB7000
heap
page read and write
1747EF70000
heap
page read and write
24D7C8F3000
heap
page read and write
24D7C92A000
heap
page read and write
24D0A27C000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D12DAE000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D0C242000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C8AC000
heap
page read and write
24D1701A000
trusted library allocation
page read and write
24D14816000
trusted library allocation
page read and write
24D14BB9000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D16939000
trusted library allocation
page read and write
24D0A2C3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0E37F000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D7C91C000
heap
page read and write
24D7C8F3000
heap
page read and write
17091170000
heap
page read and write
6F5DDD8000
stack
page read and write
24D0C1D2000
trusted library allocation
page read and write
24D148CA000
trusted library allocation
page read and write
24D14BDE000
trusted library allocation
page read and write
24D12A92000
trusted library allocation
page read and write
24D0C195000
trusted library allocation
page read and write
2113DAA9000
heap
page read and write
24D0C1E9000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
24D7F01E000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D12AAF000
trusted library allocation
page read and write
24D16D6F000
trusted library allocation
page read and write
24D1355D000
heap
page read and write
2113D639000
trusted library allocation
page read and write
24D0B4AD000
trusted library allocation
page read and write
24D7C928000
heap
page read and write
24D0A2DC000
trusted library allocation
page read and write
24D0C5DC000
trusted library allocation
page read and write
1747F503000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D16D5C000
trusted library allocation
page read and write
A01000
heap
page read and write
24D12A8C000
trusted library allocation
page read and write
24D0C2C1000
trusted library allocation
page read and write
24D0A165000
trusted library allocation
page read and write
24D7F3EE000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D168C8000
trusted library allocation
page read and write
24D14C33000
trusted library allocation
page read and write
24D7C96B000
heap
page read and write
24D14B78000
trusted library allocation
page read and write
24D0ADFA000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0A26A000
trusted library allocation
page read and write
24D7C92B000
heap
page read and write
24D0A28C000
trusted library allocation
page read and write
24D0C85F000
trusted library allocation
page read and write
24D168FD000
trusted library allocation
page read and write
2113CEF1000
trusted library allocation
page read and write
24D16FFD000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0C263000
trusted library allocation
page read and write
24D13E3D000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D14BDE000
trusted library allocation
page read and write
2113DB20000
heap
page read and write
24D7C90C000
heap
page read and write
24D16920000
trusted library allocation
page read and write
24D16D7C000
trusted library allocation
page read and write
24D15033000
trusted library allocation
page read and write
24D0C3BB000
trusted library allocation
page read and write
24D14B33000
trusted library allocation
page read and write
24D7F066000
trusted library allocation
page read and write
24D14B43000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D0C3CF000
trusted library allocation
page read and write
24D14B58000
trusted library allocation
page read and write
1747F3F6000
heap
page read and write
24D14924000
trusted library allocation
page read and write
24D14978000
trusted library allocation
page read and write
170911A0000
heap
page read and write
24D1492F000
trusted library allocation
page read and write
A0D000
heap
page read and write
24D7C924000
heap
page read and write
24D14BCC000
trusted library allocation
page read and write
224AA770000
trusted library allocation
page read and write
24D0A2D6000
trusted library allocation
page read and write
24D14B59000
trusted library allocation
page read and write
24D129FE000
trusted library allocation
page read and write
24D0B8E2000
trusted library allocation
page read and write
24D16916000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D0A129000
trusted library allocation
page read and write
24D129F4000
trusted library allocation
page read and write
24D0B84B000
trusted library allocation
page read and write
24D0A23B000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D17033000
trusted library allocation
page read and write
24D7E971000
trusted library allocation
page read and write
24D129F8000
trusted library allocation
page read and write
24D0A6DE000
trusted library allocation
page read and write
24D7C92A000
heap
page read and write
24D12DFD000
trusted library allocation
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D0E3C8000
trusted library allocation
page read and write
24D0C862000
trusted library allocation
page read and write
24D7C8D0000
heap
page read and write
24D0B87C000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D12D83000
trusted library allocation
page read and write
24D170AE000
trusted library allocation
page read and write
24D7C8D9000
heap
page read and write
24D7C8B2000
heap
page read and write
24D0C185000
trusted library allocation
page read and write
24D14AC9000
trusted library allocation
page read and write
24D0B114000
trusted library allocation
page read and write
24D7C96B000
heap
page read and write
24D7C90C000
heap
page read and write
24D14C3B000
trusted library allocation
page read and write
24D0E44D000
trusted library allocation
page read and write
1747EF90000
heap
page read and write
24D168CF000
trusted library allocation
page read and write
24D17038000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0A4A0000
heap
page read and write
24D7C91F000
heap
page read and write
24D14AC9000
trusted library allocation
page read and write
24D7C8E1000
heap
page read and write
24D0A2AE000
trusted library allocation
page read and write
319883D000
stack
page read and write
9FF000
heap
page read and write
24D12DF2000
trusted library allocation
page read and write
24D0E40C000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D09DA0000
trusted library allocation
page read and write
24D14CCE000
trusted library allocation
page read and write
24D0A628000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D7C91C000
heap
page read and write
24D0C1DB000
trusted library allocation
page read and write
1747F45B000
trusted library allocation
page read and write
24D1265D000
trusted library allocation
page read and write
24D1702F000
trusted library allocation
page read and write
24D14BDE000
trusted library allocation
page read and write
24D13537000
heap
page read and write
24D12AAF000
trusted library allocation
page read and write
24D148F8000
trusted library allocation
page read and write
24D0C263000
trusted library allocation
page read and write
2113DB2A000
heap
page read and write
24D7C924000
heap
page read and write
24D7C8EC000
heap
page read and write
24D12D87000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D1268E000
trusted library allocation
page read and write
17091177000
heap
page read and write
24D0C232000
trusted library allocation
page read and write
24D13557000
heap
page read and write
24D7C90C000
heap
page read and write
24D0ADE9000
trusted library allocation
page read and write
24D0C8F3000
trusted library allocation
page read and write
24D14BE5000
trusted library allocation
page read and write
24D126CC000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
3021000
heap
page read and write
24D0A690000
trusted library allocation
page read and write
24D7C8EA000
heap
page read and write
174000
heap
page read and write
1747F400000
trusted library allocation
page read and write
2113CD00000
trusted library allocation
page read and write
24D7C8ED000
heap
page read and write
24D7C8E3000
heap
page read and write
24D7C923000
heap
page read and write
24D14975000
trusted library allocation
page read and write
24D14BF2000
trusted library allocation
page read and write
24D7C8DB000
heap
page read and write
24D7E98C000
trusted library allocation
page read and write
9F2000
heap
page read and write
24D0DFF5000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D1502E000
trusted library allocation
page read and write
24D14C15000
trusted library allocation
page read and write
24D14EE5000
trusted library allocation
page read and write
24D0A161000
trusted library allocation
page read and write
24D7C8E8000
heap
page read and write
24D12DB6000
trusted library allocation
page read and write
2113DB3D000
heap
page read and write
24D7C91F000
heap
page read and write
224AA75F000
trusted library allocation
page read and write
24D7F061000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D0AA63000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0D331000
trusted library allocation
page read and write
24D0B97D000
trusted library allocation
page read and write
24D0B90B000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D0C1E0000
trusted library allocation
page read and write
24D0B90B000
trusted library allocation
page read and write
24D0C23F000
trusted library allocation
page read and write
24D0B8EE000
trusted library allocation
page read and write
24D0C8E0000
trusted library allocation
page read and write
24D7E9C9000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D16EA2000
trusted library allocation
page read and write
24D09DA7000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D0A6E2000
trusted library allocation
page read and write
224AA360000
unclassified section
page readonly
24D7C929000
heap
page read and write
24D7C8AC000
heap
page read and write
24D0B8FE000
trusted library allocation
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D16DDE000
trusted library allocation
page read and write
24D170DF000
trusted library allocation
page read and write
24D0A6BE000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D14B56000
trusted library allocation
page read and write
24D0DF86000
trusted library allocation
page read and write
24D0B8B2000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D7C91E000
heap
page read and write
24D7C929000
heap
page read and write
24D7C8F2000
heap
page read and write
2113DB6A000
heap
page read and write
24D0C2DC000
trusted library allocation
page read and write
24D0AD92000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D12689000
trusted library allocation
page read and write
24D7C8EF000
heap
page read and write
24D16E72000
trusted library allocation
page read and write
24D0C37C000
trusted library allocation
page read and write
6F606FE000
unkown
page readonly
24D0C210000
trusted library allocation
page read and write
24D12AEA000
trusted library allocation
page read and write
24D1495F000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D0B894000
trusted library allocation
page read and write
24D0AA82000
trusted library allocation
page read and write
24D0E4E4000
trusted library allocation
page read and write
24D0A6AE000
trusted library allocation
page read and write
24D0C8C1000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D7C8F1000
heap
page read and write
224AA78F000
trusted library allocation
page read and write
24D0B479000
trusted library allocation
page read and write
24D0ADD2000
trusted library allocation
page read and write
2113DACD000
heap
page read and write
24D0AA59000
trusted library allocation
page read and write
24D7C8D4000
heap
page read and write
24D167D1000
trusted library allocation
page read and write
24D13C87000
trusted library allocation
page read and write
24D0C3EA000
trusted library allocation
page read and write
24D14BD7000
trusted library allocation
page read and write
6F5EDFE000
stack
page read and write
24D14978000
trusted library allocation
page read and write
24D7C8C4000
heap
page read and write
24D14BB9000
trusted library allocation
page read and write
24D0C2BA000
trusted library allocation
page read and write
24D7C923000
heap
page read and write
24D13BEC000
trusted library allocation
page read and write
24D0B7CD000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D14BF2000
trusted library allocation
page read and write
24D7C924000
heap
page read and write
24D7C8E7000
heap
page read and write
24D7C924000
heap
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D12A78000
trusted library allocation
page read and write
24D0AA43000
trusted library allocation
page read and write
24D0A165000
trusted library allocation
page read and write
24D14CA4000
trusted library allocation
page read and write
24D16917000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D0A4AA000
heap
page read and write
24D0A2D6000
trusted library allocation
page read and write
2113DAA3000
heap
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D0AAA9000
trusted library allocation
page read and write
2113DB32000
heap
page read and write
24D0C3AD000
trusted library allocation
page read and write
24D17B2F000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D0AD87000
trusted library allocation
page read and write
24D14B48000
trusted library allocation
page read and write
24D0C887000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
31999FE000
unkown
page readonly
24D1280B000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D14AD5000
trusted library allocation
page read and write
24D0D596000
trusted library allocation
page read and write
24D12EC1000
trusted library allocation
page read and write
24D7C929000
heap
page read and write
24D125E1000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D7C8B2000
heap
page read and write
24D0A836000
trusted library allocation
page read and write
24D14BD7000
trusted library allocation
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D0DF42000
trusted library allocation
page read and write
24D16799000
trusted library allocation
page read and write
1780000
heap
page read and write
24D7C8BA000
heap
page read and write
24D7F0FE000
trusted library allocation
page read and write
24D0A6A7000
trusted library allocation
page read and write
24D125B9000
trusted library allocation
page read and write
2113DB62000
heap
page read and write
17091300000
trusted library allocation
page read and write
24D0E40C000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0B84B000
trusted library allocation
page read and write
1747EF50000
heap
page read and write
1747F500000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D0C8DA000
trusted library allocation
page read and write
24D14CF3000
trusted library allocation
page read and write
24D0D387000
trusted library allocation
page read and write
24D16905000
trusted library allocation
page read and write
2113DA40000
heap
page read and write
24D7C8E1000
heap
page read and write
24D7C8E9000
heap
page read and write
24D0C339000
trusted library allocation
page read and write
24D14BEA000
trusted library allocation
page read and write
24D167F9000
trusted library allocation
page read and write
24D0C3F2000
trusted library allocation
page read and write
24D7C8DD000
heap
page read and write
24D0B4AA000
trusted library allocation
page read and write
24D7C938000
heap
page read and write
24D7C92F000
heap
page read and write
24D12672000
trusted library allocation
page read and write
24D12696000
trusted library allocation
page read and write
2113DBAE000
heap
page read and write
24D7C8C0000
heap
page read and write
2609DFF000
stack
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D0A6A0000
trusted library allocation
page read and write
24D12DD1000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
174000
heap
page read and write
24D0C1CC000
trusted library allocation
page read and write
24D7C96B000
heap
page read and write
24D7C8FE000
heap
page read and write
2113D400000
unkown
page execute read
24D0C2BF000
trusted library allocation
page read and write
24D7C91E000
heap
page read and write
24D12DF6000
trusted library allocation
page read and write
24D12974000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D0B4B0000
trusted library allocation
page read and write
24D7C8F3000
heap
page read and write
24D14C36000
trusted library allocation
page read and write
825D13E000
stack
page read and write
24D0B8EE000
trusted library allocation
page read and write
2113DB98000
heap
page read and write
24D0A2D6000
trusted library allocation
page read and write
24D0C3D2000
trusted library allocation
page read and write
24D16768000
trusted library allocation
page read and write
24D7C8D2000
heap
page read and write
24D0C8FA000
trusted library allocation
page read and write
24D7F07D000
trusted library allocation
page read and write
24D14BD2000
trusted library allocation
page read and write
24D125C7000
trusted library allocation
page read and write
24D1491C000
trusted library allocation
page read and write
3021000
heap
page read and write
24D7C929000
heap
page read and write
24D0C82E000
trusted library allocation
page read and write
24D0E52E000
trusted library allocation
page read and write
24D126EB000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
24D17038000
trusted library allocation
page read and write
24D7C8DA000
heap
page read and write
24D13EF3000
trusted library allocation
page read and write
24D12523000
trusted library allocation
page read and write
24D7C8E7000
heap
page read and write
24D14B55000
trusted library allocation
page read and write
24D0B178000
trusted library allocation
page read and write
24D0A6A7000
trusted library allocation
page read and write
3199A3E000
stack
page read and write
24D12AAB000
trusted library allocation
page read and write
24D0AAA2000
trusted library allocation
page read and write
24D0B4B8000
trusted library allocation
page read and write
24D7C8C9000
heap
page read and write
24D0C830000
trusted library allocation
page read and write
24D0DF91000
trusted library allocation
page read and write
24D0B7F2000
trusted library allocation
page read and write
24D07AE2000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D16926000
trusted library allocation
page read and write
24D7C8FE000
heap
page read and write
1747F010000
heap
page read and write
24D0C1E3000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D167E4000
trusted library allocation
page read and write
24D0C1D6000
trusted library allocation
page read and write
24D14B4C000
trusted library allocation
page read and write
24D0C600000
trusted library allocation
page read and write
24D0A263000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7C8EC000
heap
page read and write
24D0C3FA000
trusted library allocation
page read and write
24D0DF6F000
trusted library allocation
page read and write
24D7C8F2000
heap
page read and write
24D1353C000
heap
page read and write
24D0C2CB000
trusted library allocation
page read and write
24D14B55000
trusted library allocation
page read and write
24D168CA000
trusted library allocation
page read and write
24D7C8E3000
heap
page read and write
24D0C4EE000
trusted library allocation
page read and write
2113DBAE000
heap
page read and write
24D7C92A000
heap
page read and write
24D7C8FE000
heap
page read and write
24D170AC000
trusted library allocation
page read and write
24D16DCA000
trusted library allocation
page read and write
24D7C8AA000
heap
page read and write
24D7C8AC000
heap
page read and write
24D0E3A2000
trusted library allocation
page read and write
24D13E24000
trusted library allocation
page read and write
24D12DBE000
trusted library allocation
page read and write
24D167F3000
trusted library allocation
page read and write
24D12DEF000
trusted library allocation
page read and write
24D12D69000
trusted library allocation
page read and write
24D0A669000
trusted library allocation
page read and write
224AA907000
trusted library allocation
page read and write
24D0A62D000
trusted library allocation
page read and write
24D12DE1000
trusted library allocation
page read and write
24D127FE000
trusted library allocation
page read and write
24D167AE000
trusted library allocation
page read and write
24D0C1AE000
trusted library allocation
page read and write
24D0B1EC000
trusted library allocation
page read and write
24D16D9C000
trusted library allocation
page read and write
24D0A6B8000
trusted library allocation
page read and write
24D129A1000
trusted library allocation
page read and write
24D0AC79000
trusted library allocation
page read and write
2113D380000
trusted library section
page readonly
24D13E7B000
trusted library allocation
page read and write
236B9B10000
trusted library allocation
page execute read
24D1692D000
trusted library allocation
page read and write
24D0B9CC000
trusted library allocation
page read and write
24D7C8C8000
heap
page read and write
24D7C92A000
heap
page read and write
24D14BE7000
trusted library allocation
page read and write
2113D440000
heap
page read and write
3199A7E000
unkown
page readonly
24D0A669000
trusted library allocation
page read and write
24D1251E000
trusted library allocation
page read and write
24D16768000
trusted library allocation
page read and write
24D0A282000
trusted library allocation
page read and write
24D14C3F000
trusted library allocation
page read and write
24D7C8E9000
heap
page read and write
24D7EA68000
trusted library allocation
page read and write
24D0C1D2000
trusted library allocation
page read and write
24D16DAF000
trusted library allocation
page read and write
24D13E2F000
trusted library allocation
page read and write
24D0C27F000
trusted library allocation
page read and write
24D0C1D4000
trusted library allocation
page read and write
24D14B43000
trusted library allocation
page read and write
24D15001000
trusted library allocation
page read and write
24D168CA000
trusted library allocation
page read and write
24D0C14D000
trusted library allocation
page read and write
24D12A6F000
trusted library allocation
page read and write
A21000
heap
page read and write
24D1691A000
trusted library allocation
page read and write
24D7E969000
trusted library allocation
page read and write
24D12DEF000
trusted library allocation
page read and write
24D0C1D4000
trusted library allocation
page read and write
3196FD8000
stack
page read and write
24D0ACCB000
trusted library allocation
page read and write
24D0A662000
trusted library allocation
page read and write
24D12828000
trusted library allocation
page read and write
24D7C91D000
heap
page read and write
24D0B4D8000
trusted library allocation
page read and write
24D0C1CE000
trusted library allocation
page read and write
24D7C8AC000
heap
page read and write
24D0C179000
trusted library allocation
page read and write
24D13553000
heap
page read and write
24D14BE0000
trusted library allocation
page read and write
24D14C3F000
trusted library allocation
page read and write
24D168DC000
trusted library allocation
page read and write
24D13BF1000
trusted library allocation
page read and write
24D0A4AC000
heap
page read and write
24D7C8D7000
heap
page read and write
24D7C96B000
heap
page read and write
24D7C8F2000
heap
page read and write
24D7F100000
trusted library allocation
page read and write
24D167ED000
trusted library allocation
page read and write
24D0C47B000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D12EE5000
trusted library allocation
page read and write
24D170AA000
trusted library allocation
page read and write
24D0AC9C000
trusted library allocation
page read and write
24D0ADE9000
trusted library allocation
page read and write
24D15F98000
trusted library allocation
page read and write
24D7C926000
heap
page read and write
24D7C8E9000
heap
page read and write
24D0C83E000
trusted library allocation
page read and write
24D7F3FD000
trusted library allocation
page read and write
24D0C260000
trusted library allocation
page read and write
24D16928000
trusted library allocation
page read and write
9FD000
heap
page read and write
24D148F9000
trusted library allocation
page read and write
224AA7B1000
trusted library allocation
page read and write
24D0C1DB000
trusted library allocation
page read and write
24D0A2BF000
trusted library allocation
page read and write
24D0A2C9000
trusted library allocation
page read and write
24D16D57000
trusted library allocation
page read and write
24D1496F000
trusted library allocation
page read and write
2113DAA0000
heap
page read and write
24D0C2F8000
trusted library allocation
page read and write
24D0A4E1000
heap
page read and write
24D0C862000
trusted library allocation
page read and write
1747F4B3000
trusted library allocation
page read and write
24D16DAF000
trusted library allocation
page read and write
24D7C91C000
heap
page read and write
24D12831000
trusted library allocation
page read and write
224AA774000
trusted library allocation
page read and write
24D0C195000
trusted library allocation
page read and write
24D0A284000
trusted library allocation
page read and write
1D689D0A000
trusted library allocation
page read and write
24D0E557000
trusted library allocation
page read and write
24D7C90C000
heap
page read and write
24D1495B000
trusted library allocation
page read and write
24D167F9000
trusted library allocation
page read and write
24D125C4000
trusted library allocation
page read and write
24D7C970000
heap
page read and write
2113DB3D000
heap
page read and write
24D7C8D8000
heap
page read and write
24D7EA55000
trusted library allocation
page read and write
24D0C4E3000
trusted library allocation
page read and write
24D16909000
trusted library allocation
page read and write
24D7EA65000
trusted library allocation
page read and write
24D7C92F000
heap
page read and write
24D14C97000
trusted library allocation
page read and write
24D15D00000
trusted library allocation
page read and write
24D0C1AD000
trusted library allocation
page read and write
24D12A8E000
trusted library allocation
page read and write
24D0C8AE000
trusted library allocation
page read and write
24D0ACA2000
trusted library allocation
page read and write
24D0ADFA000
trusted library allocation
page read and write
24D14BC2000
trusted library allocation
page read and write
24D12EFE000
trusted library allocation
page read and write
24D0ED05000
trusted library allocation
page read and write
24D7C91F000
heap
page read and write
24D7E981000
trusted library allocation
page read and write
24D0AA45000
trusted library allocation
page read and write
24D0C257000
trusted library allocation
page read and write
24D7C8B8000
heap
page read and write
24D7C90C000
heap
page read and write
24D7C92F000
heap
page read and write
1709115D000
heap
page read and write
1747F472000
trusted library allocation
page read and write
24D0C8A8000
trusted library allocation
page read and write
224AA724000
trusted library allocation
page read and write
There are 3805 hidden memdumps, click here to show them.