IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_89fa439a-470f-47e7-a860-228bb43532e5.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_89fa439a-470f-47e7-a860-228bb43532e5.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2128 -prefMapHandle 2120 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed1a580a-f66e-4919-9609-aeed2be66e0b} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 20c58b6f710 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3728 -parentBuildID 20230927232528 -prefsHandle 4012 -prefMapHandle 3700 -prefsLen 26395 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd08fa81-ebde-40ab-88fb-74e4bf2085ce} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 20c704da910 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5032 -prefMapHandle 5028 -prefsLen 33119 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {559a0b05-97a8-4031-b5ef-464ac3f9e4d4} 3920 "\\.\pipe\gecko-crash-server-pipe.3920" 20c69f72f10 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://youtube.comZ
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://json-schema.org/draft/2019-09/schema.
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://www.leboncoin.fr/
unknown
https://spocs.getpocket.com/spocs
unknown
https://screenshots.firefox.com
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://profiler.firefox.com/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://json-schema.org/draft/2020-12/schema/=
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://fpn.firefox.com
unknown
https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.youtube.com/
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://www.bbc.co.uk/
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://amazon.com
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://youtube.com/account?=
unknown
https://shavar.services.mozilla.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.comp
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://www.amazon.com/Z
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://merino.services.mozilla.com/api/v1/suggestabout
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
http://www.inbox.lv/rfc2368/?value=%su
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1170143
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
https://json-schema.org/draft/2019-09/schema
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=793869
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.196.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.65
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.142
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.21.46
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.171
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.181.142
youtube.com
United States
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
20C74DBA000
heap
page read and write
20C68584000
trusted library allocation
page read and write
20C69E2C000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C5F96F000
heap
page read and write
20C67F9F000
trusted library allocation
page read and write
20C6947E000
trusted library allocation
page read and write
20C68CC3000
trusted library allocation
page read and write
20C6A390000
trusted library allocation
page read and write
2ABCF466000
trusted library allocation
page read and write
5F561BE000
unkown
page readonly
20C5F95B000
heap
page read and write
20C74DAC000
heap
page read and write
20C67D60000
trusted library allocation
page read and write
20C6A075000
trusted library allocation
page read and write
20C6A390000
trusted library allocation
page read and write
20C7096D000
trusted library allocation
page read and write
20C71B06000
trusted library allocation
page read and write
20C5F90B000
heap
page read and write
20C71E17000
trusted library allocation
page read and write
20C71035000
trusted library allocation
page read and write
20C6984A000
trusted library allocation
page read and write
20C71F08000
trusted library allocation
page read and write
20C70E5E000
trusted library allocation
page read and write
20C70D54000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C5F92D000
heap
page read and write
452000
unkown
page readonly
20C751FC000
trusted library allocation
page read and write
20C70853000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C6A162000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6BE9E000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C7055A000
trusted library allocation
page read and write
20C70847000
trusted library allocation
page read and write
20C74639000
trusted library allocation
page read and write
20C70E4A000
trusted library allocation
page read and write
20C710B5000
trusted library allocation
page read and write
20C7488B000
trusted library allocation
page read and write
20C67FA7000
trusted library allocation
page read and write
20C68685000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
1E7EEB00000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C6A024000
trusted library allocation
page read and write
20C6A0E2000
trusted library allocation
page read and write
20C5F903000
heap
page read and write
20C6A464000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C5F8EE000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
20C687A5000
trusted library allocation
page read and write
20C72BD3000
trusted library allocation
page read and write
20C7058C000
trusted library allocation
page read and write
20C70E38000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C69D66000
trusted library allocation
page read and write
20C746C1000
trusted library allocation
page read and write
20C72BCE000
trusted library allocation
page read and write
20C5F8EF000
heap
page read and write
20C5F916000
heap
page read and write
20C74DA2000
heap
page read and write
20C6A181000
trusted library allocation
page read and write
20C68C78000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C6CF60000
trusted library allocation
page read and write
20C697A5000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
2ABCF390000
heap
page read and write
20C5F96B000
heap
page read and write
20C71FD6000
trusted library allocation
page read and write
20C67FCC000
trusted library allocation
page read and write
20C6CD28000
trusted library allocation
page read and write
20C68CC6000
trusted library allocation
page read and write
E29000
heap
page read and write
20C71AE4000
trusted library allocation
page read and write
20C751DF000
trusted library allocation
page read and write
20C67D47000
trusted library allocation
page read and write
20C70573000
trusted library allocation
page read and write
20C6984E000
trusted library allocation
page read and write
20C6B2CA000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C68C9C000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C5F953000
heap
page read and write
E13000
heap
page read and write
20C74DF0000
heap
page read and write
189FB6E9000
heap
page read and write
20C7456B000
trusted library allocation
page read and write
21FDA10C000
trusted library allocation
page read and write
20C5F971000
heap
page read and write
20C6A190000
trusted library allocation
page read and write
20C7485C000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C6A193000
trusted library allocation
page read and write
20C698A2000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6A323000
trusted library allocation
page read and write
20C74DA7000
heap
page read and write
464000
unkown
page readonly
20C6A3A6000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
564000
heap
page read and write
20C6A384000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C71048000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C686CB000
trusted library allocation
page read and write
20C6CFA1000
trusted library allocation
page read and write
20C67F5F000
trusted library allocation
page read and write
20C6BF85000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C710BA000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C6A384000
trusted library allocation
page read and write
20C6CD26000
trusted library allocation
page read and write
20C6CD30000
trusted library allocation
page read and write
20C71EEC000
trusted library allocation
page read and write
2565898A000
heap
page read and write
20C68A9E000
heap
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C6A7E5000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C69ECC000
trusted library allocation
page read and write
20C6A373000
trusted library allocation
page read and write
20C74681000
trusted library allocation
page read and write
20C5F96D000
heap
page read and write
20C67D60000
trusted library allocation
page read and write
20C6ADA6000
trusted library allocation
page read and write
20C68A79000
heap
page read and write
20C67D60000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C69D60000
trusted library allocation
page read and write
20C6CF76000
trusted library allocation
page read and write
189FB6EF000
heap
page read and write
20C64918000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C6A635000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
189FB72D000
heap
page read and write
20C5F922000
heap
page read and write
E2B000
heap
page read and write
20C69D61000
trusted library allocation
page read and write
20C745CC000
trusted library allocation
page read and write
189FAA72000
unclassified section
page read and write
20C642EF000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C5F90E000
heap
page read and write
20C71EE0000
trusted library allocation
page read and write
2ABCF180000
heap
page readonly
20C6A6D8000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C5F901000
heap
page read and write
20C6BEDB000
trusted library allocation
page read and write
20C68660000
trusted library allocation
page read and write
20C70E8F000
trusted library allocation
page read and write
20C6A4D1000
trusted library allocation
page read and write
20C68481000
trusted library allocation
page read and write
2565A56E000
heap
page read and write
20C697C6000
trusted library allocation
page read and write
20C6647A000
trusted library allocation
page read and write
20C746CD000
trusted library allocation
page read and write
20C6CD56000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
B211FFF000
stack
page read and write
20C748E6000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C6C0E5000
trusted library allocation
page read and write
20C6597D000
trusted library allocation
page read and write
20C68A9D000
heap
page read and write
20C73DE5000
trusted library allocation
page read and write
1AC0000
heap
page read and write
20C6AD8B000
trusted library allocation
page read and write
20C749F1000
trusted library allocation
page read and write
20C6B4A9000
trusted library allocation
page read and write
BC5DDD8000
stack
page read and write
20C6C0ED000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C70D44000
trusted library allocation
page read and write
20C73DC9000
trusted library allocation
page read and write
20C6A3F3000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C6B2EF000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
20C6A7E7000
trusted library allocation
page read and write
20C71F0B000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C5F922000
heap
page read and write
20C71EF0000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C6CF30000
trusted library allocation
page read and write
2ABCF515000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C6482F000
trusted library allocation
page read and write
20C71EEC000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C69D5F000
trusted library allocation
page read and write
20C6A349000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C5F910000
heap
page read and write
189FB6F1000
heap
page read and write
20C5F916000
heap
page read and write
20C5F966000
heap
page read and write
20C67F24000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C5F906000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
20C751CB000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
20C6984C000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C6A39F000
trusted library allocation
page read and write
20C694C1000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C6A473000
trusted library allocation
page read and write
20C7456B000
trusted library allocation
page read and write
20C5F921000
heap
page read and write
20C74D7F000
heap
page read and write
20C74DA7000
heap
page read and write
20C69840000
trusted library allocation
page read and write
20C73DDB000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C70758000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C74DAC000
heap
page read and write
20C746F3000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C69755000
trusted library allocation
page read and write
20C5F914000
heap
page read and write
20C5F964000
heap
page read and write
20C746CF000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6D202000
trusted library allocation
page read and write
20C68662000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C694D9000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C71EF8000
trusted library allocation
page read and write
20C691E4000
trusted library allocation
page read and write
20C70DF1000
trusted library allocation
page read and write
20C6A7D3000
trusted library allocation
page read and write
20C6CD0A000
trusted library allocation
page read and write
20C6A390000
trusted library allocation
page read and write
189FB6EF000
heap
page read and write
20C659D1000
trusted library allocation
page read and write
20C6A7BF000
trusted library allocation
page read and write
20C6BE13000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C694FD000
trusted library allocation
page read and write
189FB6F1000
heap
page read and write
20C6C0D8000
trusted library allocation
page read and write
20C5F8F9000
heap
page read and write
20C74DC0000
heap
page read and write
20C70851000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C71B2C000
trusted library allocation
page read and write
20C67FEC000
trusted library allocation
page read and write
20C687AE000
trusted library allocation
page read and write
20C67FEC000
trusted library allocation
page read and write
20C6A47C000
trusted library allocation
page read and write
20C6A5CA000
trusted library allocation
page read and write
20C697DE000
trusted library allocation
page read and write
20C67F9F000
trusted library allocation
page read and write
20C70BDD000
trusted library allocation
page read and write
21FDA500000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
189FB6E0000
heap
page read and write
20C7169E000
trusted library allocation
page read and write
20C6A3F5000
trusted library allocation
page read and write
189FB4B0000
trusted library allocation
page read and write
20C74D87000
heap
page read and write
20C746CD000
trusted library allocation
page read and write
20C71F14000
trusted library allocation
page read and write
20C6CD7A000
trusted library allocation
page read and write
20C751C8000
trusted library allocation
page read and write
20C6A7E7000
trusted library allocation
page read and write
20C705AA000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C73DAB000
trusted library allocation
page read and write
20C6A3FB000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C69E8D000
trusted library allocation
page read and write
20C6A437000
trusted library allocation
page read and write
D665C024000
trusted library allocation
page read and write
20C71EE6000
trusted library allocation
page read and write
20C70DF6000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C5F928000
heap
page read and write
20C5F959000
heap
page read and write
20C694D7000
trusted library allocation
page read and write
20C6A3E1000
trusted library allocation
page read and write
20C73DE5000
trusted library allocation
page read and write
20C687CE000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C73DD8000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C6CD3F000
trusted library allocation
page read and write
20C67BFE000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C748C8000
trusted library allocation
page read and write
20C6A62D000
trusted library allocation
page read and write
20C74DFF000
heap
page read and write
20C70E9F000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C5F90A000
heap
page read and write
20C5F928000
heap
page read and write
20C690E2000
trusted library allocation
page read and write
20C697F2000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C6A32F000
trusted library allocation
page read and write
20C71EC3000
trusted library allocation
page read and write
2EFC641000
trusted library allocation
page execute read
20C6A3AE000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C74637000
trusted library allocation
page read and write
20C6A6A9000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6A32F000
trusted library allocation
page read and write
20C71B01000
trusted library allocation
page read and write
20C6A424000
trusted library allocation
page read and write
20C68D87000
trusted library allocation
page read and write
20C69895000
trusted library allocation
page read and write
20C7094B000
trusted library allocation
page read and write
20C6A3B2000
trusted library allocation
page read and write
20C69457000
trusted library allocation
page read and write
20C70E5A000
trusted library allocation
page read and write
189FB6FD000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C74DAC000
heap
page read and write
20C6A392000
trusted library allocation
page read and write
20C6A39F000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C6CF7B000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C6A1BD000
trusted library allocation
page read and write
20C6A071000
trusted library allocation
page read and write
20C6A041000
trusted library allocation
page read and write
20C7054F000
trusted library allocation
page read and write
2ABCEFF0000
heap
page read and write
20C5F915000
heap
page read and write
20C70DC6000
trusted library allocation
page read and write
189FB65F000
heap
page read and write
20C6644C000
trusted library allocation
page read and write
20C71AA7000
trusted library allocation
page read and write
20C6AF70000
trusted library allocation
page read and write
189FB6E9000
heap
page read and write
189FB6AA000
heap
page read and write
20C74DA2000
heap
page read and write
20C68688000
trusted library allocation
page read and write
20C64281000
trusted library allocation
page read and write
20C67FC2000
trusted library allocation
page read and write
20C70896000
trusted library allocation
page read and write
20C70D1B000
trusted library allocation
page read and write
20C6A3D5000
trusted library allocation
page read and write
20C6865D000
trusted library allocation
page read and write
20C70E9F000
trusted library allocation
page read and write
20C751A9000
trusted library allocation
page read and write
20C70D9B000
trusted library allocation
page read and write
20C6A5BC000
trusted library allocation
page read and write
20C74AF5000
trusted library allocation
page read and write
FB9D53E000
stack
page read and write
20C6A3A6000
trusted library allocation
page read and write
20C6A3AE000
trusted library allocation
page read and write
20C659A8000
trusted library allocation
page read and write
2ABCF500000
trusted library allocation
page read and write
20C6A39F000
trusted library allocation
page read and write
20C74694000
trusted library allocation
page read and write
20C73DDE000
trusted library allocation
page read and write
20C748F0000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C73DCC000
trusted library allocation
page read and write
20C7081D000
trusted library allocation
page read and write
20C6876F000
trusted library allocation
page read and write
20C70B22000
trusted library allocation
page read and write
2ABCF4BA000
trusted library allocation
page read and write
20C67D50000
trusted library allocation
page read and write
20C72E41000
trusted library allocation
page read and write
20C6A4F3000
trusted library allocation
page read and write
20C5F95F000
heap
page read and write
20C5F8F4000
heap
page read and write
2ABCF423000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
189FB6EF000
heap
page read and write
2ABCF468000
trusted library allocation
page read and write
20C6CF5C000
trusted library allocation
page read and write
20C6BED1000
trusted library allocation
page read and write
20C68686000
trusted library allocation
page read and write
20C67D31000
trusted library allocation
page read and write
20C70570000
trusted library allocation
page read and write
20C6A7CE000
trusted library allocation
page read and write
20C6CD65000
trusted library allocation
page read and write
20C6A4E9000
trusted library allocation
page read and write
20C72BF0000
trusted library allocation
page read and write
20C73DD8000
trusted library allocation
page read and write
20C6B14A000
trusted library allocation
page read and write
20C6A376000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C73DFC000
trusted library allocation
page read and write
20C67FB3000
trusted library allocation
page read and write
20C748EE000
trusted library allocation
page read and write
20C6C0A3000
trusted library allocation
page read and write
20C6A37E000
trusted library allocation
page read and write
20C659F2000
trusted library allocation
page read and write
20C7454A000
trusted library allocation
page read and write
20C70E34000
trusted library allocation
page read and write
20C73DF8000
trusted library allocation
page read and write
20C72B7F000
trusted library allocation
page read and write
20C67D29000
trusted library allocation
page read and write
20C6B1DF000
trusted library allocation
page read and write
20C708C3000
trusted library allocation
page read and write
20C70D20000
trusted library allocation
page read and write
20C6CF12000
trusted library allocation
page read and write
20C6A7BB000
trusted library allocation
page read and write
20C5F95E000
heap
page read and write
20C5F8FF000
heap
page read and write
20C6A376000
trusted library allocation
page read and write
20C6A3A6000
trusted library allocation
page read and write
21FDA10E000
trusted library allocation
page read and write
20C6A35D000
trusted library allocation
page read and write
20C6A373000
trusted library allocation
page read and write
20C6A19E000
trusted library allocation
page read and write
20C749DE000
trusted library allocation
page read and write
20C6974E000
trusted library allocation
page read and write
20C6A3FD000
trusted library allocation
page read and write
20C68769000
trusted library allocation
page read and write
20C71A05000
trusted library allocation
page read and write
20C5F92F000
heap
page read and write
21FDA103000
trusted library allocation
page read and write
20C70DFC000
trusted library allocation
page read and write
20C746CB000
trusted library allocation
page read and write
20C65E27000
trusted library allocation
page read and write
20C6B150000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C5F906000
heap
page read and write
189FB759000
heap
page read and write
20C5F962000
heap
page read and write
20C5F8EE000
heap
page read and write
20C7485C000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
189FB779000
heap
page read and write
254000
heap
page read and write
20C687A7000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
20C687C9000
trusted library allocation
page read and write
21FD9E33000
heap
page read and write
20C5F906000
heap
page read and write
20C67D9D000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C74DBA000
heap
page read and write
21FDA000000
trusted library allocation
page read and write
20C6B3D4000
trusted library allocation
page read and write
20C68CBB000
trusted library allocation
page read and write
20C751CB000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
20C68A82000
heap
page read and write
20C67D29000
trusted library allocation
page read and write
20C67D46000
trusted library allocation
page read and write
20C71069000
trusted library allocation
page read and write
20C6A17D000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C6A3CD000
trusted library allocation
page read and write
20C73E80000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6A374000
trusted library allocation
page read and write
20C6CD22000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C75190000
trusted library allocation
page read and write
20C745D7000
trusted library allocation
page read and write
20C70DFC000
trusted library allocation
page read and write
20C68773000
trusted library allocation
page read and write
20C67F7C000
trusted library allocation
page read and write
20C704A0000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
189FB6F1000
heap
page read and write
20C6A346000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C68662000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C6A423000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C658CA000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
20C68709000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C690C0000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C6864C000
trusted library allocation
page read and write
20C71EC3000
trusted library allocation
page read and write
130ABFF000
stack
page read and write
25658999000
heap
page read and write
21FDA15F000
trusted library allocation
page read and write
FB9BBFE000
unkown
page readonly
20C5F959000
heap
page read and write
20C5F954000
heap
page read and write
20C74649000
trusted library allocation
page read and write
20C70892000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6A475000
trusted library allocation
page read and write
20C74552000
trusted library allocation
page read and write
189FB6E8000
heap
page read and write
20C5F93A000
heap
page read and write
20C5F901000
heap
page read and write
189FB777000
heap
page read and write
20C70B2F000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C5F8FF000
heap
page read and write
20C6A0EA000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C5F973000
heap
page read and write
20C7085F000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6979B000
trusted library allocation
page read and write
20C751BD000
trusted library allocation
page read and write
20C6BE27000
trusted library allocation
page read and write
189FB700000
heap
page read and write
20C6A360000
trusted library allocation
page read and write
20C65960000
trusted library allocation
page read and write
20C6A3B5000
trusted library allocation
page read and write
20C72E86000
trusted library allocation
page read and write
20C6A38A000
trusted library allocation
page read and write
20C6A3AE000
trusted library allocation
page read and write
20C6A4F1000
trusted library allocation
page read and write
20C73C83000
trusted library allocation
page read and write
20C6AF20000
trusted library allocation
page read and write
20C6C03E000
trusted library allocation
page read and write
20C748E6000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C69746000
trusted library allocation
page read and write
20C6A0A1000
trusted library allocation
page read and write
20C68C62000
trusted library allocation
page read and write
20C6A343000
trusted library allocation
page read and write
21FDA170000
trusted library allocation
page read and write
20C70865000
trusted library allocation
page read and write
20C7096F000
trusted library allocation
page read and write
20C68DB7000
trusted library allocation
page read and write
20C690CE000
trusted library allocation
page read and write
20C698B5000
trusted library allocation
page read and write
20C6CD51000
trusted library allocation
page read and write
20C6BECA000
trusted library allocation
page read and write
20C6CD75000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C6646C000
trusted library allocation
page read and write
20C68AA7000
heap
page read and write
20C690C5000
trusted library allocation
page read and write
20C6A359000
trusted library allocation
page read and write
254000
heap
page read and write
1E7EEB0A000
trusted library allocation
page read and write
20C69059000
trusted library allocation
page read and write
20C71F64000
trusted library allocation
page read and write
189FAB86000
trusted library allocation
page read and write
21FD9CE0000
unclassified section
page readonly
20C68CC6000
trusted library allocation
page read and write
189FB609000
heap
page read and write
5F537D8000
stack
page read and write
20C72BC3000
trusted library allocation
page read and write
20C6A38A000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6A4EC000
trusted library allocation
page read and write
25658B00000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C6C0CC000
trusted library allocation
page read and write
20C6B4BC000
trusted library allocation
page read and write
20C6A305000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
2565A579000
heap
page read and write
20C5F966000
heap
page read and write
20C6B148000
trusted library allocation
page read and write
189FB769000
heap
page read and write
20C68CC6000
trusted library allocation
page read and write
20C6CD65000
trusted library allocation
page read and write
20C67D60000
trusted library allocation
page read and write
BC5FF3E000
stack
page read and write
20C68777000
trusted library allocation
page read and write
20C67D39000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C5F952000
heap
page read and write
20C6A1E1000
trusted library allocation
page read and write
20C67D44000
trusted library allocation
page read and write
20C664BB000
trusted library allocation
page read and write
189FB769000
heap
page read and write
20C5F932000
heap
page read and write
20C6855C000
trusted library allocation
page read and write
20C687E6000
trusted library allocation
page read and write
20C67D9A000
trusted library allocation
page read and write
20C6A3F5000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C6A343000
trusted library allocation
page read and write
20C697D5000
trusted library allocation
page read and write
20C68538000
trusted library allocation
page read and write
20C6975A000
trusted library allocation
page read and write
20C6BE72000
trusted library allocation
page read and write
20C6A7E7000
trusted library allocation
page read and write
2EFC631000
trusted library allocation
page execute read
20C74DB0000
heap
page read and write
20C68A79000
heap
page read and write
20C685D5000
trusted library allocation
page read and write
20C70892000
trusted library allocation
page read and write
20C74D80000
heap
page read and write
20C6A3FD000
trusted library allocation
page read and write
20C5F96B000
heap
page read and write
20C6B16F000
trusted library allocation
page read and write
20C70584000
trusted library allocation
page read and write
20C68769000
trusted library allocation
page read and write
20C72B27000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C67F77000
trusted library allocation
page read and write
20C6B164000
trusted library allocation
page read and write
20C69D5C000
trusted library allocation
page read and write
189FAB5F000
trusted library allocation
page read and write
20C72F2C000
trusted library allocation
page read and write
20C67D1E000
trusted library allocation
page read and write
20C6BE18000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C6A7E7000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
21FDA407000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C74DBA000
heap
page read and write
20C67FDD000
trusted library allocation
page read and write
20C70478000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C71EFA000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6A1AC000
trusted library allocation
page read and write
20C6A03F000
trusted library allocation
page read and write
20C67F9F000
trusted library allocation
page read and write
20C70BEF000
trusted library allocation
page read and write
20C68D4C000
trusted library allocation
page read and write
2ABCF464000
trusted library allocation
page read and write
20C68CF6000
trusted library allocation
page read and write
20C6858A000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C5F8F4000
heap
page read and write
20C6B18D000
trusted library allocation
page read and write
20C67F87000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C67FD2000
trusted library allocation
page read and write
20C6A873000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6A7E7000
trusted library allocation
page read and write
20C749E0000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C73DE2000
trusted library allocation
page read and write
20C687A7000
trusted library allocation
page read and write
20C68E9C000
trusted library allocation
page read and write
20C5F961000
heap
page read and write
20C5F92D000
heap
page read and write
21FD9CD0000
unclassified section
page readonly
20C6CD65000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C6A7D6000
trusted library allocation
page read and write
20C6A16C000
trusted library allocation
page read and write
20C70D3F000
trusted library allocation
page read and write
20C70E2E000
trusted library allocation
page read and write
20C6A689000
trusted library allocation
page read and write
20C6A1EE000
trusted library allocation
page read and write
20C74687000
trusted library allocation
page read and write
20C69833000
trusted library allocation
page read and write
20C658CA000
trusted library allocation
page read and write
20C6BF7D000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C71FBA000
trusted library allocation
page read and write
20C69E2C000
trusted library allocation
page read and write
189FB72A000
heap
page read and write
20C6BE69000
trusted library allocation
page read and write
1BC0000
heap
page read and write
20C5F8EE000
heap
page read and write
20C687AE000
trusted library allocation
page read and write
20C70E46000
trusted library allocation
page read and write
189FB500000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C5F928000
heap
page read and write
20C72B27000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6A073000
trusted library allocation
page read and write
20C6A37E000
trusted library allocation
page read and write
BCF000
stack
page read and write
20C5F95D000
heap
page read and write
20C70D68000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C5F91F000
heap
page read and write
20C5F928000
heap
page read and write
20C74AEF000
trusted library allocation
page read and write
189FB6E6000
heap
page read and write
20C6A378000
trusted library allocation
page read and write
20C749D9000
trusted library allocation
page read and write
20C67F9F000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
20C68684000
trusted library allocation
page read and write
20C70928000
trusted library allocation
page read and write
20C687B8000
trusted library allocation
page read and write
20C7517B000
trusted library allocation
page read and write
20C6CFAB000
trusted library allocation
page read and write
20C751DF000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
21FD9F80000
unclassified section
page readonly
20C67FDD000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
20C70BF9000
trusted library allocation
page read and write
20C70E6A000
trusted library allocation
page read and write
20C6A1D1000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C69710000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C6B3D7000
trusted library allocation
page read and write
20C71A0C000
trusted library allocation
page read and write
20C73D6F000
trusted library allocation
page read and write
189FB6A1000
heap
page read and write
20C705B5000
trusted library allocation
page read and write
20C6856D000
trusted library allocation
page read and write
20C71035000
trusted library allocation
page read and write
20C6AD9B000
trusted library allocation
page read and write
20C6B2C3000
trusted library allocation
page read and write
20C70E56000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C69D63000
trusted library allocation
page read and write
20C74DAE000
heap
page read and write
20C6973B000
trusted library allocation
page read and write
20C70770000
trusted library allocation
page read and write
20C69EA9000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C72BF0000
trusted library allocation
page read and write
42C000
unkown
page readonly
189FB6E0000
heap
page read and write
20C6B286000
trusted library allocation
page read and write
20C6A563000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C74D7F000
heap
page read and write
20C73DF6000
trusted library allocation
page read and write
20C71045000
trusted library allocation
page read and write
20C659C3000
trusted library allocation
page read and write
20C659B2000
trusted library allocation
page read and write
350000
heap
page read and write
189FAA80000
heap
page read and write
20C74D1C000
heap
page read and write
189FB722000
heap
page read and write
20C69056000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C6A46C000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C6A368000
trusted library allocation
page read and write
20C6CD61000
trusted library allocation
page read and write
25658D70000
heap
page read and write
20C67F68000
trusted library allocation
page read and write
20C694E9000
trusted library allocation
page read and write
20C6A3D7000
trusted library allocation
page read and write
20C648FB000
trusted library allocation
page read and write
20C6BF89000
trusted library allocation
page read and write
20C5F90B000
heap
page read and write
20C5F905000
heap
page read and write
189FB68A000
heap
page read and write
189FB669000
heap
page read and write
20C6A383000
trusted library allocation
page read and write
20C68CF6000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C5F8F6000
heap
page read and write
20C6498D000
trusted library allocation
page read and write
21FDA176000
trusted library allocation
page read and write
20C70E34000
trusted library allocation
page read and write
20C6A47E000
trusted library allocation
page read and write
20C68D97000
trusted library allocation
page read and write
20C6B3D9000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C6A7BF000
trusted library allocation
page read and write
20C7458C000
trusted library allocation
page read and write
20C74A1D000
trusted library allocation
page read and write
20C71A6D000
trusted library allocation
page read and write
20C716F1000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C6A667000
trusted library allocation
page read and write
20C6BE41000
trusted library allocation
page read and write
20C68AA7000
heap
page read and write
20C5F922000
heap
page read and write
20C67FC0000
trusted library allocation
page read and write
20C6A3D7000
trusted library allocation
page read and write
2ABCEFAC000
remote allocation
page execute read
20C5F97A000
heap
page read and write
20C67D27000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C716CE000
trusted library allocation
page read and write
20C6869C000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
25658940000
heap
page read and write
20C67FEC000
trusted library allocation
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C67BD9000
trusted library allocation
page read and write
20C74E07000
heap
page read and write
20C70DF4000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6CD1C000
trusted library allocation
page read and write
20C71EE2000
trusted library allocation
page read and write
20C70D4E000
trusted library allocation
page read and write
20C74D8B000
heap
page read and write
20C68DFB000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C68A9E000
heap
page read and write
20C5F90B000
heap
page read and write
20C6A03F000
trusted library allocation
page read and write
20C6BFCE000
trusted library allocation
page read and write
20C71A07000
trusted library allocation
page read and write
20C69471000
trusted library allocation
page read and write
20C6B1D0000
trusted library allocation
page read and write
20C67D58000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C697CE000
trusted library allocation
page read and write
20C68777000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
2ABCF1A0000
heap
page read and write
20C6A349000
trusted library allocation
page read and write
20C664A0000
trusted library allocation
page read and write
20C687A7000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C6AF1E000
trusted library allocation
page read and write
20C69781000
trusted library allocation
page read and write
20C68DBB000
trusted library allocation
page read and write
20C5F92C000
heap
page read and write
2ABCF403000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C5F922000
heap
page read and write
20C71F9A000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
189FAB6A000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C5F8EE000
heap
page read and write
189FABC7000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C705F9000
trusted library allocation
page read and write
20C69839000
trusted library allocation
page read and write
20C6A3D5000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C5F922000
heap
page read and write
20C708BB000
trusted library allocation
page read and write
189FB744000
heap
page read and write
20C70720000
trusted library allocation
page read and write
2ABCF4B7000
trusted library allocation
page read and write
20C72D87000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C749EC000
trusted library allocation
page read and write
20C69763000
trusted library allocation
page read and write
20C6A4FA000
trusted library allocation
page read and write
20C68518000
trusted library allocation
page read and write
20C73DDA000
trusted library allocation
page read and write
2061A7A03000
trusted library allocation
page read and write
20C749CF000
trusted library allocation
page read and write
20C694FD000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
5F5507D000
stack
page read and write
20C642B3000
trusted library allocation
page read and write
20C73D8C000
trusted library allocation
page read and write
20C746C7000
trusted library allocation
page read and write
20C6A6C2000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
20C5F968000
heap
page read and write
20C72B7A000
trusted library allocation
page read and write
20C7166D000
trusted library allocation
page read and write
20C70DF1000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C74DA6000
heap
page read and write
20C6B29D000
trusted library allocation
page read and write
20C6A38A000
trusted library allocation
page read and write
20C5F957000
heap
page read and write
20C67F87000
trusted library allocation
page read and write
20C5F921000
heap
page read and write
20C6A7CE000
trusted library allocation
page read and write
20C69E7B000
trusted library allocation
page read and write
20C707F3000
trusted library allocation
page read and write
20C70822000
trusted library allocation
page read and write
20C687B1000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6A79B000
trusted library allocation
page read and write
20C698DD000
trusted library allocation
page read and write
20C74849000
trusted library allocation
page read and write
20C719E5000
trusted library allocation
page read and write
20C70DF4000
trusted library allocation
page read and write
20C67D5D000
trusted library allocation
page read and write
20C73D76000
trusted library allocation
page read and write
20C71684000
trusted library allocation
page read and write
20C68653000
trusted library allocation
page read and write
189FA890000
heap
page read and write
20C6B4DF000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C5F970000
heap
page read and write
20C6496A000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
21FD9E10000
heap
page readonly
20C685F5000
trusted library allocation
page read and write
20C7166D000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
20C5F90B000
heap
page read and write
E29000
heap
page read and write
20C70B5A000
trusted library allocation
page read and write
21FD9E22000
unclassified section
page read and write
20C69EC3000
trusted library allocation
page read and write
20C69746000
trusted library allocation
page read and write
20C6CD65000
trusted library allocation
page read and write
20C67F63000
trusted library allocation
page read and write
149CF2803000
trusted library allocation
page read and write
20C709FD000
trusted library allocation
page read and write
20C709C8000
trusted library allocation
page read and write
20C71A86000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
20C6A041000
trusted library allocation
page read and write
20C67D64000
trusted library allocation
page read and write
20C67D8B000
trusted library allocation
page read and write
20C6A4F4000
trusted library allocation
page read and write
20C6A7E5000
trusted library allocation
page read and write
20C6A4D6000
trusted library allocation
page read and write
20C69728000
trusted library allocation
page read and write
BC60F3E000
stack
page read and write
20C5F906000
heap
page read and write
20C70DDE000
trusted library allocation
page read and write
25658999000
heap
page read and write
20C6CFD0000
trusted library allocation
page read and write
20C6A6FE000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C74593000
trusted library allocation
page read and write
20C72B91000
trusted library allocation
page read and write
20C748D3000
trusted library allocation
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C73C9D000
trusted library allocation
page read and write
20C6A6E2000
trusted library allocation
page read and write
20C68DB1000
trusted library allocation
page read and write
20C5F913000
heap
page read and write
20C6CD22000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C69BE3000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
DD0000
heap
page read and write
20C66467000
trusted library allocation
page read and write
20C6A355000
trusted library allocation
page read and write
20C71F38000
trusted library allocation
page read and write
20C6A19E000
trusted library allocation
page read and write
20C6A692000
trusted library allocation
page read and write
20C73C97000
trusted library allocation
page read and write
20C751C5000
trusted library allocation
page read and write
20C67B7A000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C5F963000
heap
page read and write
20C6A7C2000
trusted library allocation
page read and write
20C7457B000
trusted library allocation
page read and write
20C71EB4000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C73DDA000
trusted library allocation
page read and write
20C73DE2000
trusted library allocation
page read and write
20C746CB000
trusted library allocation
page read and write
20C68C14000
trusted library allocation
page read and write
21FD9E2F000
unclassified section
page read and write
20C70ED0000
trusted library allocation
page read and write
21FDA149000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6A3C1000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C6876F000
trusted library allocation
page read and write
189FB6E6000
heap
page read and write
1E7EE7E0000
heap
page read and write
20C5F93B000
heap
page read and write
2ABCF190000
unclassified section
page read and write
20C697B9000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C74DA6000
heap
page read and write
20C5F951000
heap
page read and write
20C7071C000
trusted library allocation
page read and write
391000
unkown
page execute read
20C73D90000
trusted library allocation
page read and write
20C6A374000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C69154000
trusted library allocation
page read and write
189FB669000
heap
page read and write
20C5F8FE000
heap
page read and write
20C709FD000
trusted library allocation
page read and write
25658992000
heap
page read and write
DFA000
heap
page read and write
452000
unkown
page readonly
20C664F8000
trusted library allocation
page read and write
20C6A3D5000
trusted library allocation
page read and write
20C6A7D3000
trusted library allocation
page read and write
20C74A92000
trusted library allocation
page read and write
20C6CF74000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C71EFA000
trusted library allocation
page read and write
20C69E3B000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
20C6A33B000
trusted library allocation
page read and write
20C6A38A000
trusted library allocation
page read and write
20C642BF000
trusted library allocation
page read and write
20C648F6000
trusted library allocation
page read and write
20C69842000
trusted library allocation
page read and write
20C70E46000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C73DCC000
trusted library allocation
page read and write
189FB6E1000
heap
page read and write
20C6A3D7000
trusted library allocation
page read and write
20C6982B000
trusted library allocation
page read and write
189FB66C000
heap
page read and write
20C6A5B5000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C67D5C000
trusted library allocation
page read and write
20C71F38000
trusted library allocation
page read and write
21FDA16A000
trusted library allocation
page read and write
20C73DC9000
trusted library allocation
page read and write
20C67D54000
trusted library allocation
page read and write
20C6A0F2000
trusted library allocation
page read and write
20C6A38A000
trusted library allocation
page read and write
20C69F9D000
trusted library allocation
page read and write
20C5F8F5000
heap
page read and write
20C6C0BC000
trusted library allocation
page read and write
FB9999B000
stack
page read and write
20C68566000
trusted library allocation
page read and write
20C687C2000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C6491A000
trusted library allocation
page read and write
20C71EEE000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C5F8FF000
heap
page read and write
20C69490000
trusted library allocation
page read and write
20C71EC8000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C691C0000
trusted library allocation
page read and write
20C67D96000
trusted library allocation
page read and write
20C6CD10000
trusted library allocation
page read and write
20C748F0000
trusted library allocation
page read and write
20C709EE000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C5F962000
heap
page read and write
20C74E26000
heap
page read and write
20C6973E000
trusted library allocation
page read and write
20C5F96D000
heap
page read and write
20C5F906000
heap
page read and write
20C6B4AB000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C697CE000
trusted library allocation
page read and write
20C6ADAF000
trusted library allocation
page read and write
20C70588000
trusted library allocation
page read and write
20C67DA1000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C6A36C000
trusted library allocation
page read and write
21FDA1C4000
trusted library allocation
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C5F914000
heap
page read and write
20C5F928000
heap
page read and write
20C6A79B000
trusted library allocation
page read and write
189FABBC000
trusted library allocation
page read and write
20C70400000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C71E17000
trusted library allocation
page read and write
20C6A06D000
trusted library allocation
page read and write
20C68870000
trusted library allocation
page read and write
25658992000
heap
page read and write
20C691E6000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
20C70E70000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C68567000
trusted library allocation
page read and write
20C748EA000
trusted library allocation
page read and write
20C68645000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
BC5EDFE000
stack
page read and write
20C73DF1000
trusted library allocation
page read and write
20C698A8000
trusted library allocation
page read and write
20C6A3C3000
trusted library allocation
page read and write
20C72BD9000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C748F2000
trusted library allocation
page read and write
20C751EF000
trusted library allocation
page read and write
20C7058C000
trusted library allocation
page read and write
20C74D7F000
heap
page read and write
20C71FDF000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C6A68D000
trusted library allocation
page read and write
20C649E4000
trusted library allocation
page read and write
20C71F86000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C5F8EE000
heap
page read and write
20C5F95D000
heap
page read and write
20C6A06D000
trusted library allocation
page read and write
20C6B3FC000
trusted library allocation
page read and write
20C68D98000
trusted library allocation
page read and write
FB9991E000
unkown
page readonly
20C6A313000
trusted library allocation
page read and write
20C6A4F8000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C73C99000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C5F93B000
heap
page read and write
20C5F91F000
heap
page read and write
20C6B18D000
trusted library allocation
page read and write
20C5F8F1000
heap
page read and write
20C6AF87000
trusted library allocation
page read and write
20C697AF000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C6A033000
trusted library allocation
page read and write
20C71B2C000
trusted library allocation
page read and write
20C6A464000
trusted library allocation
page read and write
20C7106F000
trusted library allocation
page read and write
BEF000
stack
page read and write
20C5F95D000
heap
page read and write
20C6A3B5000
trusted library allocation
page read and write
20C74D77000
heap
page read and write
20C5F901000
heap
page read and write
189FB73B000
heap
page read and write
20C74A55000
trusted library allocation
page read and write
20C7457D000
trusted library allocation
page read and write
21FDA130000
trusted library allocation
page read and write
20C6C093000
trusted library allocation
page read and write
E29000
heap
page read and write
20C6A33B000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
20C748EC000
trusted library allocation
page read and write
2ABCF400000
trusted library allocation
page read and write
20C67D50000
trusted library allocation
page read and write
20C5F90C000
heap
page read and write
20C6A386000
trusted library allocation
page read and write
20C72F33000
trusted library allocation
page read and write
20C5F95E000
heap
page read and write
20C6C0FD000
trusted library allocation
page read and write
20C74DA7000
heap
page read and write
20C69F9C000
trusted library allocation
page read and write
20C6A3EB000
trusted library allocation
page read and write
20C6A383000
trusted library allocation
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C68C5F000
trusted library allocation
page read and write
20C68DA2000
trusted library allocation
page read and write
20C67F91000
trusted library allocation
page read and write
20C6ADD8000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
21FD9D60000
unclassified section
page readonly
20C74CF5000
heap
page read and write
20C74887000
trusted library allocation
page read and write
20C71FC5000
trusted library allocation
page read and write
20C6BEE0000
trusted library allocation
page read and write
20C6A3B5000
trusted library allocation
page read and write
20C6A0CC000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C73D9F000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
20C7102F000
trusted library allocation
page read and write
15CE000
stack
page read and write
20C6B186000
trusted library allocation
page read and write
20C70894000
trusted library allocation
page read and write
20C68660000
trusted library allocation
page read and write
20C70ED0000
trusted library allocation
page read and write
BC5D3CD000
stack
page read and write
20C68DA2000
trusted library allocation
page read and write
20C66496000
trusted library allocation
page read and write
20C746C5000
trusted library allocation
page read and write
20C70E62000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C73DE5000
trusted library allocation
page read and write
20C6982B000
trusted library allocation
page read and write
20C67EFA000
trusted library allocation
page read and write
189FA8F4000
heap
page read and write
20C5F963000
heap
page read and write
20C6A36F000
trusted library allocation
page read and write
20C709F4000
trusted library allocation
page read and write
20C69F92000
trusted library allocation
page read and write
25658C07000
trusted library allocation
page read and write
20C72EA7000
trusted library allocation
page read and write
20C6A3D7000
trusted library allocation
page read and write
189FA771000
remote allocation
page execute read
20C5F953000
heap
page read and write
20C5F928000
heap
page read and write
20C73DE2000
trusted library allocation
page read and write
20C6A4FD000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C65982000
trusted library allocation
page read and write
20C6BEE2000
trusted library allocation
page read and write
2ABCF1C0000
unclassified section
page readonly
20C6A06D000
trusted library allocation
page read and write
20C6868C000
trusted library allocation
page read and write
20C70D7B000
trusted library allocation
page read and write
20C690E4000
trusted library allocation
page read and write
20C6BEB1000
trusted library allocation
page read and write
20C748EA000
trusted library allocation
page read and write
20C687A0000
trusted library allocation
page read and write
189FB6F1000
heap
page read and write
20C697C1000
trusted library allocation
page read and write
20C697C3000
trusted library allocation
page read and write
20C68563000
trusted library allocation
page read and write
20C5F970000
heap
page read and write
20C5F922000
heap
page read and write
20C5F951000
heap
page read and write
20C73DC9000
trusted library allocation
page read and write
20C748F2000
trusted library allocation
page read and write
20C6A1D1000
trusted library allocation
page read and write
20C64A00000
trusted library allocation
page read and write
20C7518D000
trusted library allocation
page read and write
21FDA182000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
189FB6F1000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F951000
heap
page read and write
20C74AFD000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
2ABCF4AF000
trusted library allocation
page read and write
20C7095B000
trusted library allocation
page read and write
20C71B33000
trusted library allocation
page read and write
20C6A5BC000
trusted library allocation
page read and write
BBF000
stack
page read and write
20C6C056000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C74D7F000
heap
page read and write
20C6A7CA000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C69E8F000
trusted library allocation
page read and write
20C69E0D000
trusted library allocation
page read and write
20C74694000
trusted library allocation
page read and write
20C748EC000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C67D5C000
trusted library allocation
page read and write
20C70573000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C6A355000
trusted library allocation
page read and write
20C687A5000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
BC5D34E000
stack
page read and write
20C742A4000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C73DE7000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6B14A000
trusted library allocation
page read and write
20C70D48000
trusted library allocation
page read and write
20C6A07B000
trusted library allocation
page read and write
20C69F7F000
trusted library allocation
page read and write
20C7109B000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C73DC5000
trusted library allocation
page read and write
20C687C9000
trusted library allocation
page read and write
20C6A1A0000
trusted library allocation
page read and write
21FDA18F000
trusted library allocation
page read and write
20C67D25000
trusted library allocation
page read and write
20C7057F000
trusted library allocation
page read and write
20C68DBB000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C74A9F000
trusted library allocation
page read and write
20C687BE000
trusted library allocation
page read and write
20C68B2B000
trusted library allocation
page read and write
189FB6E0000
heap
page read and write
20C5F959000
heap
page read and write
20C697F9000
trusted library allocation
page read and write
20C64823000
trusted library allocation
page read and write
21FDA113000
trusted library allocation
page read and write
20C68D8C000
trusted library allocation
page read and write
20C74A92000
trusted library allocation
page read and write
1E7EE9E0000
heap
page read and write
20C68AA7000
heap
page read and write
20C6A349000
trusted library allocation
page read and write
20C71FC9000
trusted library allocation
page read and write
189FA7A0000
heap
page read and write
20C67F91000
trusted library allocation
page read and write
20C6B2EF000
trusted library allocation
page read and write
20C68C80000
trusted library allocation
page read and write
20C6861D000
trusted library allocation
page read and write
20C6A346000
trusted library allocation
page read and write
20C6CD61000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6835B000
trusted library allocation
page read and write
20C6A343000
trusted library allocation
page read and write
20C6C05B000
trusted library allocation
page read and write
20C6B3EE000
trusted library allocation
page read and write
20C6A140000
trusted library allocation
page read and write
20C69EC0000
trusted library allocation
page read and write
20C73DF8000
trusted library allocation
page read and write
1E7EE810000
heap
page read and write
20C6A4F3000
trusted library allocation
page read and write
189FB65C000
heap
page read and write
189FB67D000
heap
page read and write
20C749C5000
trusted library allocation
page read and write
2ABCF4C8000
trusted library allocation
page read and write
20C70DFC000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C5F971000
heap
page read and write
20C6869C000
trusted library allocation
page read and write
20C65950000
trusted library allocation
page read and write
20C69839000
trusted library allocation
page read and write
254000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
20C71986000
trusted library allocation
page read and write
20C74DAE000
heap
page read and write
E0F000
heap
page read and write
20C69E4F000
trusted library allocation
page read and write
20C71045000
trusted library allocation
page read and write
20C68A9D000
heap
page read and write
20C742E8000
trusted library allocation
page read and write
20C69EC3000
trusted library allocation
page read and write
20C6A03F000
trusted library allocation
page read and write
20C72402000
trusted library allocation
page read and write
254000
heap
page read and write
20C709FA000
trusted library allocation
page read and write
20C74D7F000
heap
page read and write
20C74DBA000
heap
page read and write
2ABCF410000
trusted library allocation
page read and write
189FABBE000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
189FAA50000
heap
page readonly
20C6A1AC000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C74DAE000
heap
page read and write
189FB6E8000
heap
page read and write
20C67D58000
trusted library allocation
page read and write
20C6A03C000
trusted library allocation
page read and write
2ABCF396000
heap
page read and write
20C6CF7F000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C5F91D000
heap
page read and write
20C6CD61000
trusted library allocation
page read and write
20C71EEE000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C74DAC000
heap
page read and write
20C5F95D000
heap
page read and write
20C71A41000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C69840000
trusted library allocation
page read and write
20C74891000
trusted library allocation
page read and write
20C6CF93000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C6A4CC000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C6BE98000
trusted library allocation
page read and write
20C68DCE000
trusted library allocation
page read and write
20C67D35000
trusted library allocation
page read and write
189FB67D000
heap
page read and write
189FB601000
heap
page read and write
20C73DED000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C6831C000
trusted library allocation
page read and write
20C6BFC1000
trusted library allocation
page read and write
20C6A1FC000
trusted library allocation
page read and write
20C68A84000
heap
page read and write
20C691E0000
trusted library allocation
page read and write
20C73DBD000
trusted library allocation
page read and write
20C684D8000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6CD51000
trusted library allocation
page read and write
20C72BC6000
trusted library allocation
page read and write
20C5F904000
heap
page read and write
20C6B0C7000
trusted library allocation
page read and write
20C6A7D6000
trusted library allocation
page read and write
20C73D78000
trusted library allocation
page read and write
20C6A7DC000
trusted library allocation
page read and write
2ABCF030000
heap
page read and write
20C6A075000
trusted library allocation
page read and write
20C705D5000
trusted library allocation
page read and write
2ABCEF30000
unclassified section
page readonly
20C698E5000
trusted library allocation
page read and write
20C6A628000
trusted library allocation
page read and write
20C6A3AE000
trusted library allocation
page read and write
20C70DC4000
trusted library allocation
page read and write
464000
unkown
page readonly
20C73DE2000
trusted library allocation
page read and write
20C70DB7000
trusted library allocation
page read and write
20C69EFC000
trusted library allocation
page read and write
20C6A7E5000
trusted library allocation
page read and write
20C68CAD000
trusted library allocation
page read and write
20C6BECA000
trusted library allocation
page read and write
20C70DCC000
trusted library allocation
page read and write
20C748D3000
trusted library allocation
page read and write
20C5F91D000
heap
page read and write
20C5F934000
heap
page read and write
20C74E01000
heap
page read and write
20C6B4B3000
trusted library allocation
page read and write
20C6A343000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C5F8FF000
heap
page read and write
20C71AA3000
trusted library allocation
page read and write
20C72B31000
trusted library allocation
page read and write
20C6AFB1000
trusted library allocation
page read and write
20C68AAC000
heap
page read and write
20C71A41000
trusted library allocation
page read and write
20C7458C000
trusted library allocation
page read and write
20C6A38C000
trusted library allocation
page read and write
20C642EF000
trusted library allocation
page read and write
20C71AC5000
trusted library allocation
page read and write
20C68476000
trusted library allocation
page read and write
20C71EED000
trusted library allocation
page read and write
20C6CFBC000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C74DA6000
heap
page read and write
20C70584000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C5F93B000
heap
page read and write
20C6429B000
trusted library allocation
page read and write
2ABCF479000
trusted library allocation
page read and write
5F52DFB000
stack
page read and write
20C5F95D000
heap
page read and write
21FDA15D000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C74D8F000
heap
page read and write
20C70E5A000
trusted library allocation
page read and write
20C698C6000
trusted library allocation
page read and write
20C73D8D000
trusted library allocation
page read and write
20C74672000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C68D52000
trusted library allocation
page read and write
20C67D59000
trusted library allocation
page read and write
20C6A4F1000
trusted library allocation
page read and write
20C69851000
trusted library allocation
page read and write
20C6A197000
trusted library allocation
page read and write
20C6B1B9000
trusted library allocation
page read and write
20C719A2000
trusted library allocation
page read and write
20C649C8000
trusted library allocation
page read and write
E29000
heap
page read and write
20C5F966000
heap
page read and write
20C6984C000
trusted library allocation
page read and write
20C5F91F000
heap
page read and write
189FB758000
heap
page read and write
20C6863E000
trusted library allocation
page read and write
20C73DF8000
trusted library allocation
page read and write
20C687CB000
trusted library allocation
page read and write
2ABCF517000
trusted library allocation
page read and write
20C71AA3000
trusted library allocation
page read and write
20C71A86000
trusted library allocation
page read and write
20C68A9D000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F905000
heap
page read and write
20C68662000
trusted library allocation
page read and write
20C71EFA000
trusted library allocation
page read and write
20C6981C000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C5F961000
heap
page read and write
189FB72A000
heap
page read and write
20C5F962000
heap
page read and write
2565A564000
heap
page read and write
20C68CC6000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6C09E000
trusted library allocation
page read and write
20C68C5F000
trusted library allocation
page read and write
20C6A023000
trusted library allocation
page read and write
20C73DCC000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
189FB65C000
heap
page read and write
20C5F922000
heap
page read and write
20C5F8F4000
heap
page read and write
20C6B4F1000
trusted library allocation
page read and write
20C5F95B000
heap
page read and write
20C72B27000
trusted library allocation
page read and write
20C72BEB000
trusted library allocation
page read and write
20C67D3E000
trusted library allocation
page read and write
20C6A349000
trusted library allocation
page read and write
20C73DF8000
trusted library allocation
page read and write
20C69732000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C6A384000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C687E2000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C68DA3000
trusted library allocation
page read and write
20C64993000
trusted library allocation
page read and write
20C6A4EC000
trusted library allocation
page read and write
20C68A79000
heap
page read and write
20C71EB6000
trusted library allocation
page read and write
20C708B7000
trusted library allocation
page read and write
189FB777000
heap
page read and write
20C75154000
trusted library allocation
page read and write
20C74D80000
heap
page read and write
2ABCF40D000
trusted library allocation
page read and write
20C748EE000
trusted library allocation
page read and write
20C6A3CD000
trusted library allocation
page read and write
20C69835000
trusted library allocation
page read and write
20C70D67000
trusted library allocation
page read and write
20C749B3000
trusted library allocation
page read and write
20C71B06000
trusted library allocation
page read and write
20C6A7BF000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6A7D6000
trusted library allocation
page read and write
20C68A61000
heap
page read and write
20C67DEA000
trusted library allocation
page read and write
21FDA1B1000
trusted library allocation
page read and write
189FB72A000
heap
page read and write
20C71B33000
trusted library allocation
page read and write
20C6B1DF000
trusted library allocation
page read and write
20C73D90000
trusted library allocation
page read and write
254000
heap
page read and write
20C5F928000
heap
page read and write
20C6B16F000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C659B1000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6AF55000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C6A65B000
trusted library allocation
page read and write
20C67DBE000
trusted library allocation
page read and write
20C67D9D000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6852C000
trusted library allocation
page read and write
20C68A9D000
heap
page read and write
2ABCF509000
trusted library allocation
page read and write
20C6A4E9000
trusted library allocation
page read and write
20C70D55000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C5F963000
heap
page read and write
20C67B86000
trusted library allocation
page read and write
20C70E2E000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C649C8000
trusted library allocation
page read and write
DFC000
heap
page read and write
20C72DC8000
trusted library allocation
page read and write
20C71A43000
trusted library allocation
page read and write
20C69744000
trusted library allocation
page read and write
20C71B01000
trusted library allocation
page read and write
DFB000
heap
page read and write
20C5F906000
heap
page read and write
42C000
unkown
page readonly
20C5F906000
heap
page read and write
20C5F951000
heap
page read and write
20C74CC1000
heap
page read and write
20C6A30A000
trusted library allocation
page read and write
20C6CF7F000
trusted library allocation
page read and write
20C5F977000
heap
page read and write
20C68DCC000
trusted library allocation
page read and write
20C6852E000
trusted library allocation
page read and write
20C5F91B000
heap
page read and write
20C5F975000
heap
page read and write
20C74DBA000
heap
page read and write
20C6A35D000
trusted library allocation
page read and write
20C6BEDD000
trusted library allocation
page read and write
20C6A3F5000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C74DB0000
heap
page read and write
20C73C8A000
trusted library allocation
page read and write
20C6ACA7000
trusted library allocation
page read and write
20C7048F000
trusted library allocation
page read and write
20C66486000
trusted library allocation
page read and write
20C70588000
trusted library allocation
page read and write
20C748E6000
trusted library allocation
page read and write
20C6A376000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C690CA000
trusted library allocation
page read and write
20C70586000
trusted library allocation
page read and write
20C68C1C000
trusted library allocation
page read and write
33BB89C03000
trusted library allocation
page read and write
20C6A7E5000
trusted library allocation
page read and write
20C6A7CA000
trusted library allocation
page read and write
189FB777000
heap
page read and write
20C6B3B2000
trusted library allocation
page read and write
20C6888B000
trusted library allocation
page read and write
20C68C65000
trusted library allocation
page read and write
20C6859B000
trusted library allocation
page read and write
20C69FE4000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
189FB769000
heap
page read and write
21FD9DC0000
heap
page read and write
25658DB0000
heap
page read and write
20C5F8FE000
heap
page read and write
FB9E53E000
stack
page read and write
20C684EF000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C70E10000
trusted library allocation
page read and write
20C6982E000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6869C000
trusted library allocation
page read and write
20C67D64000
trusted library allocation
page read and write
20C6A1CD000
trusted library allocation
page read and write
2565897D000
heap
page read and write
20C7461F000
trusted library allocation
page read and write
20C67FCC000
trusted library allocation
page read and write
20C70956000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
21FDA162000
trusted library allocation
page read and write
20C697F2000
trusted library allocation
page read and write
20C71045000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
2ABCF394000
heap
page read and write
20C751C5000
trusted library allocation
page read and write
20C70586000
trusted library allocation
page read and write
20C71F98000
trusted library allocation
page read and write
20C70DF1000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
189FB669000
heap
page read and write
20C5F93B000
heap
page read and write
20C72B3B000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C68A9E000
heap
page read and write
20C690C7000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C709FD000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C5F962000
heap
page read and write
20C6A3B5000
trusted library allocation
page read and write
20C6A61C000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C68C47000
trusted library allocation
page read and write
20C749F4000
trusted library allocation
page read and write
20C6A393000
trusted library allocation
page read and write
20C6946F000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
E1E000
heap
page read and write
20C6A0F2000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6A34F000
trusted library allocation
page read and write
20C69F77000
trusted library allocation
page read and write
20C70D6D000
trusted library allocation
page read and write
20C6A359000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C5F966000
heap
page read and write
20C74D80000
heap
page read and write
20C5F95D000
heap
page read and write
20C73DE5000
trusted library allocation
page read and write
20C6CD2A000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
189FAB66000
trusted library allocation
page read and write
E03000
heap
page read and write
20C74DB0000
heap
page read and write
20C5F910000
heap
page read and write
20C6A16C000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C705A5000
trusted library allocation
page read and write
21FDA115000
trusted library allocation
page read and write
20C6B072000
trusted library allocation
page read and write
20C7093F000
trusted library allocation
page read and write
20C698EC000
trusted library allocation
page read and write
20C5F8EF000
heap
page read and write
DEF000
heap
page read and write
20C6CD3D000
trusted library allocation
page read and write
20C6A659000
trusted library allocation
page read and write
20C74D85000
heap
page read and write
189FB67F000
heap
page read and write
20C74DA2000
heap
page read and write
20C749ED000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C67D7E000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C73D6D000
trusted library allocation
page read and write
20C74D80000
heap
page read and write
20C6A343000
trusted library allocation
page read and write
20C751C8000
trusted library allocation
page read and write
20C6498D000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
20C648FE000
trusted library allocation
page read and write
189FB758000
heap
page read and write
20C5F953000
heap
page read and write
20C70EB8000
trusted library allocation
page read and write
20C7162F000
trusted library allocation
page read and write
20C68865000
trusted library allocation
page read and write
20C69143000
trusted library allocation
page read and write
20C698A2000
trusted library allocation
page read and write
20C67F40000
trusted library allocation
page read and write
20C68733000
trusted library allocation
page read and write
20C69EC3000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C6A393000
trusted library allocation
page read and write
20C6A695000
trusted library allocation
page read and write
20C6A7CE000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
189FB060000
heap
page read and write
20C6A4CC000
trusted library allocation
page read and write
20C74D7A000
heap
page read and write
20C74DA6000
heap
page read and write
20C74DA6000
heap
page read and write
20C6A0E2000
trusted library allocation
page read and write
20C74635000
trusted library allocation
page read and write
20C74A76000
trusted library allocation
page read and write
20C7058A000
trusted library allocation
page read and write
20C708A5000
trusted library allocation
page read and write
20C7488B000
trusted library allocation
page read and write
20C694A2000
trusted library allocation
page read and write
170000
heap
page read and write
20C5F923000
heap
page read and write
20C69F92000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C67DFD000
trusted library allocation
page read and write
20C5F931000
heap
page read and write
20C70E52000
trusted library allocation
page read and write
20C67F87000
trusted library allocation
page read and write
20C6984A000
trusted library allocation
page read and write
20C6984E000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C6CD28000
trusted library allocation
page read and write
20C687C9000
trusted library allocation
page read and write
20C67D56000
trusted library allocation
page read and write
20C705BD000
trusted library allocation
page read and write
20C64975000
trusted library allocation
page read and write
20C751CF000
trusted library allocation
page read and write
20C70EB4000
trusted library allocation
page read and write
189FB64D000
heap
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C67D54000
trusted library allocation
page read and write
20C68A96000
heap
page read and write
20C74DBA000
heap
page read and write
20C69723000
trusted library allocation
page read and write
20C7467B000
trusted library allocation
page read and write
2ABCF53D000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6A390000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C5F952000
heap
page read and write
20C66474000
trusted library allocation
page read and write
20C68CB6000
trusted library allocation
page read and write
20C71A05000
trusted library allocation
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C709BD000
trusted library allocation
page read and write
20C6A162000
trusted library allocation
page read and write
20C691E9000
trusted library allocation
page read and write
5F5513E000
unkown
page readonly
20C67FE0000
trusted library allocation
page read and write
20C5F93A000
heap
page read and write
20C7169E000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6AF42000
trusted library allocation
page read and write
20C697B7000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C74534000
trusted library allocation
page read and write
20C6A3F8000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F92D000
heap
page read and write
20C5F922000
heap
page read and write
20C73DAC000
trusted library allocation
page read and write
20C68A9A000
heap
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C69710000
trusted library allocation
page read and write
20C697CE000
trusted library allocation
page read and write
20C74891000
trusted library allocation
page read and write
20C70D20000
trusted library allocation
page read and write
20C67FD2000
trusted library allocation
page read and write
20C74AB8000
trusted library allocation
page read and write
20C6C03B000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C6BED1000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C70DF5000
trusted library allocation
page read and write
20C73DFE000
trusted library allocation
page read and write
20C70584000
trusted library allocation
page read and write
20C5F90E000
heap
page read and write
20C5F92C000
heap
page read and write
20C698E5000
trusted library allocation
page read and write
189FA900000
trusted library allocation
page read and write
E29000
heap
page read and write
20C6A197000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C69494000
trusted library allocation
page read and write
20C6A105000
trusted library allocation
page read and write
20C69F8F000
trusted library allocation
page read and write
20C69831000
trusted library allocation
page read and write
20C68A85000
heap
page read and write
189FABCD000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6A437000
trusted library allocation
page read and write
20C642F9000
trusted library allocation
page read and write
20C68660000
trusted library allocation
page read and write
20C7484B000
trusted library allocation
page read and write
20C73DA7000
trusted library allocation
page read and write
BC5F6FD000
stack
page read and write
29E000
stack
page read and write
20C70525000
trusted library allocation
page read and write
20C68AA2000
heap
page read and write
20C70D26000
trusted library allocation
page read and write
20C687BE000
trusted library allocation
page read and write
20C642A4000
trusted library allocation
page read and write
20C6A6E3000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C70D8B000
trusted library allocation
page read and write
20C687C9000
trusted library allocation
page read and write
20C708D5000
trusted library allocation
page read and write
254000
heap
page read and write
20C687CD000
trusted library allocation
page read and write
254000
heap
page read and write
20C70843000
trusted library allocation
page read and write
20C71AC5000
trusted library allocation
page read and write
20C72DE5000
trusted library allocation
page read and write
189FA8BA000
heap
page read and write
20C74DBA000
heap
page read and write
20C74AEF000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C6A7AC000
trusted library allocation
page read and write
20C6A392000
trusted library allocation
page read and write
19F446603000
trusted library allocation
page read and write
20C74849000
trusted library allocation
page read and write
20C74891000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C74CC1000
heap
page read and write
20C68CC6000
trusted library allocation
page read and write
189FAAF0000
heap
page read and write
20C71FEC000
trusted library allocation
page read and write
20C74DAE000
heap
page read and write
20C72BE1000
trusted library allocation
page read and write
20C5F970000
heap
page read and write
20C6878D000
trusted library allocation
page read and write
20C6A3E9000
trusted library allocation
page read and write
189FAA00000
heap
page read and write
20C5F928000
heap
page read and write
D665C01E000
trusted library allocation
page read and write
20C68D92000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6A386000
trusted library allocation
page read and write
20C70D3C000
trusted library allocation
page read and write
189FAA7F000
unclassified section
page read and write
20C74E08000
heap
page read and write
20C5F966000
heap
page read and write
20C694AE000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C7057F000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C71A0C000
trusted library allocation
page read and write
20C67D35000
trusted library allocation
page read and write
20C719C8000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
189FB4CB000
unkown
page execute read
20C6A6F3000
trusted library allocation
page read and write
20C69D59000
trusted library allocation
page read and write
20C6882A000
trusted library allocation
page read and write
20C6A3A2000
trusted library allocation
page read and write
20C6A3F8000
trusted library allocation
page read and write
20C6A059000
trusted library allocation
page read and write
20C5F8FA000
heap
page read and write
20C5F8FF000
heap
page read and write
189FB514000
trusted library allocation
page read and write
20C6865D000
trusted library allocation
page read and write
20C694F0000
trusted library allocation
page read and write
20C72BF0000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C6A5C8000
trusted library allocation
page read and write
20C6A7E7000
trusted library allocation
page read and write
20C68CF6000
trusted library allocation
page read and write
20C68A82000
heap
page read and write
20C74DBA000
heap
page read and write
20C719E5000
trusted library allocation
page read and write
20C5F931000
heap
page read and write
20C73DCA000
trusted library allocation
page read and write
FB9CCFE000
stack
page read and write
20C6CD5D000
trusted library allocation
page read and write
20C6AFA1000
trusted library allocation
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C6B150000
trusted library allocation
page read and write
20C6858A000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6B1BC000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
25658A70000
heap
page read and write
20C72E0C000
trusted library allocation
page read and write
20C6CF5C000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C6A3B1000
trusted library allocation
page read and write
20C68DD8000
trusted library allocation
page read and write
20C70D14000
trusted library allocation
page read and write
20C68584000
trusted library allocation
page read and write
20C70D4A000
trusted library allocation
page read and write
20C6AFA4000
trusted library allocation
page read and write
20C6A6FE000
trusted library allocation
page read and write
20C68C21000
trusted library allocation
page read and write
20C74DB0000
heap
page read and write
20C69837000
trusted library allocation
page read and write
20C5F972000
heap
page read and write
20C7083A000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C68B36000
trusted library allocation
page read and write
20C6A46D000
trusted library allocation
page read and write
20C6985D000
trusted library allocation
page read and write
20C7058C000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6869C000
trusted library allocation
page read and write
20C68686000
trusted library allocation
page read and write
20C751A9000
trusted library allocation
page read and write
20C6A393000
trusted library allocation
page read and write
20C69DD0000
trusted library allocation
page read and write
20C5F95C000
heap
page read and write
20C5F931000
heap
page read and write
21FD9E30000
heap
page read and write
20C5F905000
heap
page read and write
20C5F8FB000
heap
page read and write
20C751D3000
trusted library allocation
page read and write
20C6A43B000
trusted library allocation
page read and write
189FB769000
heap
page read and write
20C6A0ED000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C6A359000
trusted library allocation
page read and write
20C6A1CD000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
2ABCF50F000
trusted library allocation
page read and write
189FB69C000
heap
page read and write
20C73DE5000
trusted library allocation
page read and write
20C72E05000
trusted library allocation
page read and write
FB9CD3E000
unkown
page readonly
2ABCF520000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C5F951000
heap
page read and write
20C5F921000
heap
page read and write
20C74586000
trusted library allocation
page read and write
20C72F57000
trusted library allocation
page read and write
20C687F0000
trusted library allocation
page read and write
20C74D77000
heap
page read and write
20C705AA000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C70D61000
trusted library allocation
page read and write
20C71B57000
trusted library allocation
page read and write
20C70E27000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C6A65C000
trusted library allocation
page read and write
20C6A07B000
trusted library allocation
page read and write
20C71EFD000
trusted library allocation
page read and write
FB9ED3E000
unkown
page readonly
20C704A0000
trusted library allocation
page read and write
BC5F73E000
unkown
page readonly
20C705A5000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C71EE0000
trusted library allocation
page read and write
20C67BC2000
trusted library allocation
page read and write
20C705F5000
trusted library allocation
page read and write
20C5F8ED000
heap
page read and write
20C69E14000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C74DA2000
heap
page read and write
20C6A31B000
trusted library allocation
page read and write
20C6B4BC000
trusted library allocation
page read and write
20C6A3F5000
trusted library allocation
page read and write
20C690CA000
trusted library allocation
page read and write
20C72B91000
trusted library allocation
page read and write
20C74DAE000
heap
page read and write
20C5F911000
heap
page read and write
250000
heap
page read and write
189FB66C000
heap
page read and write
20C74D77000
heap
page read and write
20C72F06000
trusted library allocation
page read and write
20C751CB000
trusted library allocation
page read and write
20C6C04E000
trusted library allocation
page read and write
20C70886000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C749F4000
trusted library allocation
page read and write
20C6BE8F000
trusted library allocation
page read and write
20C6A7DC000
trusted library allocation
page read and write
20C5F8EF000
heap
page read and write
20C72EA3000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C690E7000
trusted library allocation
page read and write
20C68C62000
trusted library allocation
page read and write
20C6B39E000
trusted library allocation
page read and write
20C68D54000
trusted library allocation
page read and write
20C7464F000
trusted library allocation
page read and write
189FB66C000
heap
page read and write
20C6A6C2000
trusted library allocation
page read and write
20C70D3F000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C69736000
trusted library allocation
page read and write
20C69D7E000
trusted library allocation
page read and write
20C5F969000
heap
page read and write
20C73DEE000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C74AFD000
trusted library allocation
page read and write
20C74DB0000
heap
page read and write
B2147FF000
stack
page read and write
20C6C0A7000
trusted library allocation
page read and write
20C69D65000
trusted library allocation
page read and write
20C68653000
trusted library allocation
page read and write
20C6A46E000
trusted library allocation
page read and write
20C749E4000
trusted library allocation
page read and write
20C709B0000
trusted library allocation
page read and write
20C691A7000
trusted library allocation
page read and write
20C649E4000
trusted library allocation
page read and write
20C5F902000
heap
page read and write
20C74DAC000
heap
page read and write
189FB758000
heap
page read and write
20C649A4000
trusted library allocation
page read and write
2ABCF060000
heap
page read and write
FB9C47E000
stack
page read and write
20C716CE000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C68DA0000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
2DE000
stack
page read and write
20C71B2E000
trusted library allocation
page read and write
20C5F978000
heap
page read and write
20C67FAD000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C6859B000
trusted library allocation
page read and write
20C6A374000
trusted library allocation
page read and write
10A000
stack
page read and write
20C67F6E000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C71EEC000
trusted library allocation
page read and write
20C7107C000
trusted library allocation
page read and write
20C69E3B000
trusted library allocation
page read and write
20C65982000
trusted library allocation
page read and write
20C687C7000
trusted library allocation
page read and write
189FB51E000
trusted library allocation
page read and write
254000
heap
page read and write
20C5F916000
heap
page read and write
20C5F959000
heap
page read and write
20C74DA2000
heap
page read and write
20C6981E000
trusted library allocation
page read and write
20C70DEB000
trusted library allocation
page read and write
20C73C63000
trusted library allocation
page read and write
20C6B4A0000
trusted library allocation
page read and write
20C74814000
trusted library allocation
page read and write
21FD9D57000
remote allocation
page execute read
45C000
unkown
page read and write
20C71A07000
trusted library allocation
page read and write
BC5F67E000
stack
page read and write
20C71684000
trusted library allocation
page read and write
20C697AB000
trusted library allocation
page read and write
20C75193000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
189FB744000
heap
page read and write
20C5F975000
heap
page read and write
20C6A346000
trusted library allocation
page read and write
DFF000
heap
page read and write
20C73C1B000
trusted library allocation
page read and write
20C68D92000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C5F95A000
heap
page read and write
20C5F95C000
heap
page read and write
20C683C9000
trusted library allocation
page read and write
189FB6EF000
heap
page read and write
20C67BB1000
trusted library allocation
page read and write
20C6B140000
trusted library allocation
page read and write
20C6A5DC000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C74DA6000
heap
page read and write
20C70DCA000
trusted library allocation
page read and write
20C72B7F000
trusted library allocation
page read and write
20C70B6A000
trusted library allocation
page read and write
20C6CD3F000
trusted library allocation
page read and write
20C68660000
trusted library allocation
page read and write
20C6A5F9000
trusted library allocation
page read and write
20C74618000
trusted library allocation
page read and write
20C687A5000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6A46D000
trusted library allocation
page read and write
2ABCF06A000
heap
page read and write
20C5F951000
heap
page read and write
20C75152000
trusted library allocation
page read and write
20C5F908000
heap
page read and write
20C6CD2D000
trusted library allocation
page read and write
5F569BE000
stack
page read and write
20C74537000
trusted library allocation
page read and write
20C705F0000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C6A346000
trusted library allocation
page read and write
20C6847A000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C68C17000
trusted library allocation
page read and write
25658994000
heap
page read and write
20C73DCB000
trusted library allocation
page read and write
20C6CD68000
trusted library allocation
page read and write
2ABCF45D000
trusted library allocation
page read and write
20C6A35D000
trusted library allocation
page read and write
20C6858E000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
21FDA224000
heap
page read and write
20C68DAE000
trusted library allocation
page read and write
20C685B4000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C5F951000
heap
page read and write
20C70DAD000
trusted library allocation
page read and write
20C6C0B4000
trusted library allocation
page read and write
20C6A349000
trusted library allocation
page read and write
20C6971B000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C751A3000
trusted library allocation
page read and write
20C68860000
trusted library allocation
page read and write
20C68AA2000
heap
page read and write
25658999000
heap
page read and write
20C70888000
trusted library allocation
page read and write
20C6BE2E000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C7102F000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C70D4E000
trusted library allocation
page read and write
20C67F47000
trusted library allocation
page read and write
5F547FE000
stack
page read and write
20C5F92D000
heap
page read and write
20C5F913000
heap
page read and write
20C67D3C000
trusted library allocation
page read and write
20C64A00000
trusted library allocation
page read and write
20C6A343000
trusted library allocation
page read and write
20C6A3C3000
trusted library allocation
page read and write
20C6977C000
trusted library allocation
page read and write
20C6B1D9000
trusted library allocation
page read and write
20C68D5E000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C67FEC000
trusted library allocation
page read and write
20C6CFDF000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6970E000
trusted library allocation
page read and write
20C6A09E000
trusted library allocation
page read and write
20C6A369000
trusted library allocation
page read and write
20C68873000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
189FB6F1000
heap
page read and write
20C70B55000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C65969000
trusted library allocation
page read and write
20C7498B000
trusted library allocation
page read and write
20C6A333000
trusted library allocation
page read and write
20C6859B000
trusted library allocation
page read and write
20C6B1B9000
trusted library allocation
page read and write
20C64926000
trusted library allocation
page read and write
20C71F19000
trusted library allocation
page read and write
20C69E67000
trusted library allocation
page read and write
20C72E07000
trusted library allocation
page read and write
20C72EE4000
trusted library allocation
page read and write
20C6CF8A000
trusted library allocation
page read and write
20C6A7AD000
trusted library allocation
page read and write
189FB6E8000
heap
page read and write
20C5F93B000
heap
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C687AE000
trusted library allocation
page read and write
20C71FB1000
trusted library allocation
page read and write
20C75190000
trusted library allocation
page read and write
20C698C0000
trusted library allocation
page read and write
20C6A390000
trusted library allocation
page read and write
20C694A2000
trusted library allocation
page read and write
20C68DD9000
trusted library allocation
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C6BE89000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C67F87000
trusted library allocation
page read and write
20C68C74000
trusted library allocation
page read and write
20C687A0000
trusted library allocation
page read and write
20C74A79000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6B1D9000
trusted library allocation
page read and write
20C709E7000
trusted library allocation
page read and write
20C6A78B000
trusted library allocation
page read and write
20C68CF6000
trusted library allocation
page read and write
20C694BB000
trusted library allocation
page read and write
20C68DBB000
trusted library allocation
page read and write
20C74D77000
heap
page read and write
20C746F3000
trusted library allocation
page read and write
20C7485A000
trusted library allocation
page read and write
20C65980000
trusted library allocation
page read and write
20C74DB0000
heap
page read and write
20C691E0000
trusted library allocation
page read and write
20C6A34D000
trusted library allocation
page read and write
20C70855000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C698B5000
trusted library allocation
page read and write
20C74845000
trusted library allocation
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C688A2000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C6A7C2000
trusted library allocation
page read and write
20C71EB6000
trusted library allocation
page read and write
20C73DDE000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C68764000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C74246000
trusted library allocation
page read and write
20C7093D000
trusted library allocation
page read and write
20C6BEE2000
trusted library allocation
page read and write
20C71ED6000
trusted library allocation
page read and write
20C6949C000
trusted library allocation
page read and write
20C687B8000
trusted library allocation
page read and write
500000
trusted library allocation
page read and write
20C72B7F000
trusted library allocation
page read and write
20C7484D000
trusted library allocation
page read and write
20C5F971000
heap
page read and write
20C5F93B000
heap
page read and write
20C691E4000
trusted library allocation
page read and write
20C6CD65000
trusted library allocation
page read and write
20C6BF8C000
trusted library allocation
page read and write
20C6978D000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
254000
heap
page read and write
B213FFE000
stack
page read and write
20C69842000
trusted library allocation
page read and write
20C74DA3000
heap
page read and write
20C71A6D000
trusted library allocation
page read and write
21FD9E5A000
heap
page read and write
20C6BF8E000
trusted library allocation
page read and write
20C68C69000
trusted library allocation
page read and write
20C74DA4000
heap
page read and write
20C74A9F000
trusted library allocation
page read and write
20C74997000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C7043C000
trusted library allocation
page read and write
20C6A3FD000
trusted library allocation
page read and write
20C70DEF000
trusted library allocation
page read and write
20C5F8FA000
heap
page read and write
2ABCEF90000
remote allocation
page read and write
20C6A43B000
trusted library allocation
page read and write
20C6A059000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C6B036000
trusted library allocation
page read and write
20C697C0000
trusted library allocation
page read and write
20C69D67000
trusted library allocation
page read and write
20C6B1DF000
trusted library allocation
page read and write
189FAB6F000
trusted library allocation
page read and write
20C72E6D000
trusted library allocation
page read and write
20C68A65000
heap
page read and write
20C5F8FF000
heap
page read and write
FB9A3D8000
stack
page read and write
20C71F1F000
trusted library allocation
page read and write
BC5F6BE000
unkown
page readonly
DF2000
heap
page read and write
20C746C1000
trusted library allocation
page read and write
20C71F94000
trusted library allocation
page read and write
20C664DD000
trusted library allocation
page read and write
21FD9E50000
heap
page read and write
20C68350000
trusted library allocation
page read and write
20C751FC000
trusted library allocation
page read and write
20C68D8E000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C5F953000
heap
page read and write
20C68C21000
trusted library allocation
page read and write
20C5F96B000
heap
page read and write
20C649D1000
trusted library allocation
page read and write
20C6A33B000
trusted library allocation
page read and write
20C664FE000
trusted library allocation
page read and write
20C68558000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C5F966000
heap
page read and write
20C70D23000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C6A06D000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
FB9B3FE000
stack
page read and write
20C5F8FF000
heap
page read and write
20C69EB2000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C698EC000
trusted library allocation
page read and write
189FB663000
heap
page read and write
20C6CF8A000
trusted library allocation
page read and write
20C705F2000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C73DBE000
trusted library allocation
page read and write
B2127FE000
stack
page read and write
21FD9F60000
heap
page read and write
20C694AE000
trusted library allocation
page read and write
189FABE9000
trusted library allocation
page read and write
20C6A40B000
trusted library allocation
page read and write
20C69496000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C5F911000
heap
page read and write
20C642C0000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
20C6A33B000
trusted library allocation
page read and write
20C68681000
trusted library allocation
page read and write
20C74D8A000
heap
page read and write
20C5F8FB000
heap
page read and write
20C6599C000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C67FC6000
trusted library allocation
page read and write
20C6CFEC000
trusted library allocation
page read and write
20C73DDA000
trusted library allocation
page read and write
20C6A0E7000
trusted library allocation
page read and write
20C68D45000
trusted library allocation
page read and write
20C68523000
trusted library allocation
page read and write
20C6A39F000
trusted library allocation
page read and write
20C72B3B000
trusted library allocation
page read and write
20C69083000
trusted library allocation
page read and write
20C70B66000
trusted library allocation
page read and write
130B3FF000
stack
page read and write
20C74858000
trusted library allocation
page read and write
189FB6FD000
heap
page read and write
20C705BA000
trusted library allocation
page read and write
20C6A7CB000
trusted library allocation
page read and write
20C6A7D6000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6BFCE000
trusted library allocation
page read and write
20C6B00D000
trusted library allocation
page read and write
20C74541000
trusted library allocation
page read and write
20C6A3F5000
trusted library allocation
page read and write
20C748EE000
trusted library allocation
page read and write
189FB721000
heap
page read and write
20C746C3000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C5F951000
heap
page read and write
20C71EB4000
trusted library allocation
page read and write
20C746C9000
trusted library allocation
page read and write
20C6B164000
trusted library allocation
page read and write
20C72BE1000
trusted library allocation
page read and write
20C687B6000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C73D9F000
trusted library allocation
page read and write
20C73DC3000
trusted library allocation
page read and write
20C694D9000
trusted library allocation
page read and write
20C72B91000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C5F953000
heap
page read and write
20C67FD9000
trusted library allocation
page read and write
189FB669000
heap
page read and write
20C6CF3D000
trusted library allocation
page read and write
20C6BE54000
trusted library allocation
page read and write
20C73DE5000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
E03000
heap
page read and write
20C74878000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
2ABCF023000
heap
page read and write
20C5F910000
heap
page read and write
20C72BF0000
trusted library allocation
page read and write
20C70E56000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C68DBE000
trusted library allocation
page read and write
20C6855C000
trusted library allocation
page read and write
20C74D31000
heap
page read and write
20C687A5000
trusted library allocation
page read and write
20C6A353000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C698D3000
trusted library allocation
page read and write
20C67FC2000
trusted library allocation
page read and write
189FB73B000
heap
page read and write
20C69742000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C74D87000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
20C70E52000
trusted library allocation
page read and write
20C74A63000
trusted library allocation
page read and write
20C6A35D000
trusted library allocation
page read and write
21FDA178000
trusted library allocation
page read and write
20C688AC000
trusted library allocation
page read and write
20C746F6000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C70BD2000
trusted library allocation
page read and write
20C697EE000
trusted library allocation
page read and write
E2C000
heap
page read and write
20C6599C000
trusted library allocation
page read and write
20C697F2000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C74DAC000
heap
page read and write
20C5F910000
heap
page read and write
20C5F8FF000
heap
page read and write
20C751EF000
trusted library allocation
page read and write
20C71EC6000
trusted library allocation
page read and write
20C5F91F000
heap
page read and write
20C69EB0000
trusted library allocation
page read and write
20C705B5000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C694BE000
trusted library allocation
page read and write
20C74A29000
trusted library allocation
page read and write
20C67F68000
trusted library allocation
page read and write
20C5F90B000
heap
page read and write
20C697AA000
trusted library allocation
page read and write
20C6CD3F000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C6BEBB000
trusted library allocation
page read and write
2ABCF496000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C5F959000
heap
page read and write
20C6CF33000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C74DBA000
heap
page read and write
21FD9D40000
remote allocation
page read and write
20C5F906000
heap
page read and write
20C5F975000
heap
page read and write
5F571BE000
unkown
page readonly
20C67E9D000
trusted library allocation
page read and write
20C72BEB000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C65970000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C690CE000
trusted library allocation
page read and write
20C5F92F000
heap
page read and write
DF4000
heap
page read and write
20C6CD5D000
trusted library allocation
page read and write
20C687DE000
trusted library allocation
page read and write
2ABCEF20000
unclassified section
page readonly
20C709DC000
trusted library allocation
page read and write
20C687B1000
trusted library allocation
page read and write
20C68A9A000
heap
page read and write
5F550BE000
unkown
page readonly
20C68CB6000
trusted library allocation
page read and write
20C709EC000
trusted library allocation
page read and write
20C5F90D000
heap
page read and write
5F550FE000
stack
page read and write
20C6A426000
trusted library allocation
page read and write
20C6BE48000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C74DBB000
heap
page read and write
20C72B7A000
trusted library allocation
page read and write
E0D000
heap
page read and write
20C5F963000
heap
page read and write
20C694E9000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C5F90A000
heap
page read and write
20C74DAE000
heap
page read and write
20C68C9C000
trusted library allocation
page read and write
20C68A9A000
heap
page read and write
20C745D7000
trusted library allocation
page read and write
20C74DA4000
heap
page read and write
20C6AA00000
trusted library allocation
page read and write
20C698C6000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C6869C000
trusted library allocation
page read and write
20C70D58000
trusted library allocation
page read and write
20C6A3B1000
trusted library allocation
page read and write
20C6B195000
trusted library allocation
page read and write
20C73D96000
trusted library allocation
page read and write
20C6A5A3000
trusted library allocation
page read and write
20C705BA000
trusted library allocation
page read and write
20C68A9A000
heap
page read and write
189FB6A8000
heap
page read and write
20C74DBA000
heap
page read and write
20C70DD6000
trusted library allocation
page read and write
20C67D1A000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C68CC3000
trusted library allocation
page read and write
20C6A3F3000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
20C698D3000
trusted library allocation
page read and write
20C71F90000
trusted library allocation
page read and write
20C71EE2000
trusted library allocation
page read and write
189FB664000
heap
page read and write
DD8000
heap
page read and write
20C6B09B000
trusted library allocation
page read and write
390000
unkown
page readonly
20C5F952000
heap
page read and write
20C67D5C000
trusted library allocation
page read and write
20C68AA5000
heap
page read and write
BC5F5FE000
unkown
page readonly
20C67F57000
trusted library allocation
page read and write
20C751A1000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F90A000
heap
page read and write
20C74AA8000
trusted library allocation
page read and write
20C67D41000
trusted library allocation
page read and write
20C68C4E000
trusted library allocation
page read and write
20C6A6E2000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C69DD3000
trusted library allocation
page read and write
20C659AD000
trusted library allocation
page read and write
20C73DEC000
trusted library allocation
page read and write
20C71ECD000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6B28B000
trusted library allocation
page read and write
20C67DF7000
trusted library allocation
page read and write
189FAB48000
trusted library allocation
page read and write
20C69EC3000
trusted library allocation
page read and write
21FDA124000
trusted library allocation
page read and write
20C6AF7A000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
E2A000
heap
page read and write
20C6A373000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C697D5000
trusted library allocation
page read and write
25658A90000
heap
page read and write
20C69ECC000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C5F901000
heap
page read and write
20C6A43B000
trusted library allocation
page read and write
20C659BD000
trusted library allocation
page read and write
20C67D97000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C71AA7000
trusted library allocation
page read and write
20C6A6A2000
trusted library allocation
page read and write
20C5F961000
heap
page read and write
20C748EC000
trusted library allocation
page read and write
20C6A346000
trusted library allocation
page read and write
20C70D0F000
trusted library allocation
page read and write
2565A570000
heap
page read and write
20C5F928000
heap
page read and write
20C6A384000
trusted library allocation
page read and write
20C71A43000
trusted library allocation
page read and write
20C73DA3000
trusted library allocation
page read and write
20C6A5C4000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C7074B000
trusted library allocation
page read and write
20C6C053000
trusted library allocation
page read and write
189FB6E3000
heap
page read and write
20C5F95B000
heap
page read and write
45C000
unkown
page write copy
20C5F928000
heap
page read and write
20C6B2CA000
trusted library allocation
page read and write
20C70DDE000
trusted library allocation
page read and write
20C748E8000
trusted library allocation
page read and write
20C71E34000
trusted library allocation
page read and write
20C68A85000
heap
page read and write
20C724A8000
trusted library allocation
page read and write
20C687E6000
trusted library allocation
page read and write
20C67FDD000
trusted library allocation
page read and write
20C67D9A000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C5F953000
heap
page read and write
20C5F96B000
heap
page read and write
20C70DFC000
trusted library allocation
page read and write
20C72E48000
trusted library allocation
page read and write
20C69825000
trusted library allocation
page read and write
20C67F3E000
trusted library allocation
page read and write
20C6CD5D000
trusted library allocation
page read and write
20C6CD05000
trusted library allocation
page read and write
20C68D92000
trusted library allocation
page read and write
20C6A073000
trusted library allocation
page read and write
20C67D6E000
trusted library allocation
page read and write
20C68666000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C68711000
trusted library allocation
page read and write
20C6A355000
trusted library allocation
page read and write
189FB73B000
heap
page read and write
20C6856D000
trusted library allocation
page read and write
20C6A0D5000
trusted library allocation
page read and write
20C6A3DC000
trusted library allocation
page read and write
20C6B1BC000
trusted library allocation
page read and write
20C6A355000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C74D80000
heap
page read and write
20C751C0000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C5F97A000
heap
page read and write
20C73DE2000
trusted library allocation
page read and write
20C74580000
trusted library allocation
page read and write
20C6CD3D000
trusted library allocation
page read and write
20C6A33B000
trusted library allocation
page read and write
20C6885E000
trusted library allocation
page read and write
20C6A7D3000
trusted library allocation
page read and write
20C6B06A000
trusted library allocation
page read and write
20C6B3A9000
trusted library allocation
page read and write
20C6CD51000
trusted library allocation
page read and write
20C5F964000
heap
page read and write
20C72BF0000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C73DDA000
trusted library allocation
page read and write
20C6A681000
trusted library allocation
page read and write
20C70E37000
trusted library allocation
page read and write
20C67D85000
trusted library allocation
page read and write
20C709C8000
trusted library allocation
page read and write
20C6A3A5000
trusted library allocation
page read and write
189FAB12000
trusted library allocation
page read and write
20C6A1E1000
trusted library allocation
page read and write
20C6A7E5000
trusted library allocation
page read and write
20C6A6FE000
trusted library allocation
page read and write
20C68552000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C5F8F4000
heap
page read and write
20C5F8F7000
heap
page read and write
20C69F9D000
trusted library allocation
page read and write
21FD9DA0000
heap
page read and write
20C70588000
trusted library allocation
page read and write
2ABCF412000
trusted library allocation
page read and write
20C6A03C000
trusted library allocation
page read and write
2ABCF481000
trusted library allocation
page read and write
20C70E66000
trusted library allocation
page read and write
20C6CD56000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C5F93B000
heap
page read and write
20C75193000
trusted library allocation
page read and write
21FDA50C000
trusted library allocation
page read and write
20C70851000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
189FB660000
heap
page read and write
20C69851000
trusted library allocation
page read and write
20C70BEF000
trusted library allocation
page read and write
20C71F3E000
trusted library allocation
page read and write
20C72B31000
trusted library allocation
page read and write
20C71B2E000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C6913C000
trusted library allocation
page read and write
20C6A356000
trusted library allocation
page read and write
20C69DD5000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
1AC1000
heap
page read and write
20C70D1D000
trusted library allocation
page read and write
20C6977C000
trusted library allocation
page read and write
20C69837000
trusted library allocation
page read and write
2ABCEFD0000
heap
page read and write
254000
heap
page read and write
20C6A06D000
trusted library allocation
page read and write
20C6CD0A000
trusted library allocation
page read and write
20C6CF76000
trusted library allocation
page read and write
B212FFE000
stack
page read and write
20C6A7CE000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C697A1000
trusted library allocation
page read and write
20C6A3E1000
trusted library allocation
page read and write
20C7109A000
trusted library allocation
page read and write
20C70D5C000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6CD5D000
trusted library allocation
page read and write
20C6BEC3000
trusted library allocation
page read and write
20C70532000
trusted library allocation
page read and write
189FB744000
heap
page read and write
20C70B4E000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C68DFB000
trusted library allocation
page read and write
2ABCF47B000
trusted library allocation
page read and write
20C70D64000
trusted library allocation
page read and write
20C687B1000
trusted library allocation
page read and write
20C5F972000
heap
page read and write
20C71EE0000
trusted library allocation
page read and write
20C73DDE000
trusted library allocation
page read and write
20C67F5F000
trusted library allocation
page read and write
20C73D9C000
trusted library allocation
page read and write
20C6B3CB000
trusted library allocation
page read and write
20C5F931000
heap
page read and write
20C6A158000
trusted library allocation
page read and write
20C6A46B000
trusted library allocation
page read and write
20C65956000
trusted library allocation
page read and write
20C68AA7000
heap
page read and write
20C687B8000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C67FCC000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C70DC6000
trusted library allocation
page read and write
20C67D44000
trusted library allocation
page read and write
20C70481000
trusted library allocation
page read and write
20C69DE1000
trusted library allocation
page read and write
20C6B14A000
trusted library allocation
page read and write
20C69738000
trusted library allocation
page read and write
20C7054D000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C6A5B5000
trusted library allocation
page read and write
20C6C043000
trusted library allocation
page read and write
20C6CF4E000
trusted library allocation
page read and write
20C6CD2D000
trusted library allocation
page read and write
20C6A5D0000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C71EF8000
trusted library allocation
page read and write
20C6B0A4000
trusted library allocation
page read and write
20C71984000
trusted library allocation
page read and write
20C6A349000
trusted library allocation
page read and write
20C6A43B000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C5F93B000
heap
page read and write
20C746C3000
trusted library allocation
page read and write
20C6BFBC000
trusted library allocation
page read and write
20C6A3B5000
trusted library allocation
page read and write
20C6A3DC000
trusted library allocation
page read and write
1AC1000
heap
page read and write
20C5F916000
heap
page read and write
20C73DF8000
trusted library allocation
page read and write
20C67DE6000
trusted library allocation
page read and write
20C67F4F000
trusted library allocation
page read and write
20C70E62000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C6A351000
trusted library allocation
page read and write
20C6A900000
trusted library allocation
page read and write
20C72F2E000
trusted library allocation
page read and write
20C70573000
trusted library allocation
page read and write
20C68A9D000
heap
page read and write
20C5F928000
heap
page read and write
20C6BE3A000
trusted library allocation
page read and write
20C6BE60000
trusted library allocation
page read and write
20C6A7D6000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
20C71B57000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
FB9BC7E000
unkown
page readonly
20C6A392000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6A7AB000
trusted library allocation
page read and write
20C691D9000
trusted library allocation
page read and write
20C68682000
trusted library allocation
page read and write
20C74DC1000
heap
page read and write
20C6A43B000
trusted library allocation
page read and write
25658960000
heap
page read and write
20C5F966000
heap
page read and write
20C5F914000
heap
page read and write
20C72BF0000
trusted library allocation
page read and write
25658C0A000
trusted library allocation
page read and write
20C6AD9F000
trusted library allocation
page read and write
20C6CD51000
trusted library allocation
page read and write
20C6A36C000
trusted library allocation
page read and write
21FDA11A000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C5F906000
heap
page read and write
20C70DF5000
trusted library allocation
page read and write
20C6A46E000
trusted library allocation
page read and write
20C705BA000
trusted library allocation
page read and write
20C705A5000
trusted library allocation
page read and write
2565A565000
heap
page read and write
20C697E3000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C5F928000
heap
page read and write
20C694D7000
trusted library allocation
page read and write
20C70E15000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C71084000
trusted library allocation
page read and write
20C704D0000
trusted library allocation
page read and write
20C68400000
trusted library allocation
page read and write
20C6CD0E000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C74DBA000
heap
page read and write
20C68575000
trusted library allocation
page read and write
20C745CC000
trusted library allocation
page read and write
20C71E32000
trusted library allocation
page read and write
390000
unkown
page readonly
20C74593000
trusted library allocation
page read and write
20C659C3000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C7058A000
trusted library allocation
page read and write
20C73DC0000
trusted library allocation
page read and write
20C6AF5F000
trusted library allocation
page read and write
20C69FE4000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C687F1000
trusted library allocation
page read and write
20C691DC000
trusted library allocation
page read and write
20C67FD0000
trusted library allocation
page read and write
20C6900F000
trusted library allocation
page read and write
20C67D47000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C69054000
trusted library allocation
page read and write
BC6073E000
unkown
page readonly
20C6C0F5000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C705FD000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C67F89000
trusted library allocation
page read and write
20C70D38000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C72200000
trusted library allocation
page read and write
20C65E24000
trusted library allocation
page read and write
20C72EAC000
trusted library allocation
page read and write
20C6BE6E000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C5F906000
heap
page read and write
20C5F977000
heap
page read and write
20C687BE000
trusted library allocation
page read and write
20C68473000
trusted library allocation
page read and write
20C642CC000
trusted library allocation
page read and write
189FA700000
unclassified section
page readonly
20C6A7DC000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C6A112000
trusted library allocation
page read and write
FB99998000
stack
page read and write
20C6A3F8000
trusted library allocation
page read and write
20C69831000
trusted library allocation
page read and write
20C5F961000
heap
page read and write
20C5F975000
heap
page read and write
189FB6B9000
heap
page read and write
20C74DAC000
heap
page read and write
20C6497E000
trusted library allocation
page read and write
20C6A346000
trusted library allocation
page read and write
2ABCF020000
heap
page read and write
20C6A073000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C705C0000
trusted library allocation
page read and write
20C71EFA000
trusted library allocation
page read and write
20C70B35000
trusted library allocation
page read and write
20C64913000
trusted library allocation
page read and write
20C5F8EF000
heap
page read and write
20C6BEDB000
trusted library allocation
page read and write
20C67EC8000
trusted library allocation
page read and write
20C70D28000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C70BC8000
trusted library allocation
page read and write
20C6CF58000
trusted library allocation
page read and write
20C69EBF000
trusted library allocation
page read and write
20C749C5000
trusted library allocation
page read and write
20C6CF37000
trusted library allocation
page read and write
20C5F8ED000
heap
page read and write
20C5F928000
heap
page read and write
20C6A7DC000
trusted library allocation
page read and write
189FB4C0000
unkown
page execute read
20C5F93B000
heap
page read and write
20C687F1000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C74537000
trusted library allocation
page read and write
20C7085D000
trusted library allocation
page read and write
20C7484D000
trusted library allocation
page read and write
20C6A7CE000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C5F96C000
heap
page read and write
20C687A7000
trusted library allocation
page read and write
20C659CC000
trusted library allocation
page read and write
20C705AA000
trusted library allocation
page read and write
20C69D53000
trusted library allocation
page read and write
20C5F952000
heap
page read and write
20C70DF4000
trusted library allocation
page read and write
20C649AD000
trusted library allocation
page read and write
20C6CF3D000
trusted library allocation
page read and write
20C74A3A000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C649CF000
trusted library allocation
page read and write
20C6A368000
trusted library allocation
page read and write
20C6CD2D000
trusted library allocation
page read and write
20C6A134000
trusted library allocation
page read and write
20C7075B000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C5F951000
heap
page read and write
20C74DAC000
heap
page read and write
20C67FFE000
trusted library allocation
page read and write
20C70E4A000
trusted library allocation
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C69DD0000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C64980000
trusted library allocation
page read and write
20C6CD1F000
trusted library allocation
page read and write
20C71EF8000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C73DF3000
trusted library allocation
page read and write
20C6A5E5000
trusted library allocation
page read and write
20C70BF0000
trusted library allocation
page read and write
20C70DB9000
trusted library allocation
page read and write
20C6A392000
trusted library allocation
page read and write
189FB6EF000
heap
page read and write
20C69E0D000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C5F95D000
heap
page read and write
20C68566000
trusted library allocation
page read and write
20C68892000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C68CC6000
trusted library allocation
page read and write
20C649A0000
trusted library allocation
page read and write
20C6948C000
trusted library allocation
page read and write
20C716F1000
trusted library allocation
page read and write
20C5F92C000
heap
page read and write
1AC1000
heap
page read and write
20C74DBA000
heap
page read and write
20C73DDE000
trusted library allocation
page read and write
20C64298000
trusted library allocation
page read and write
20C68C58000
trusted library allocation
page read and write
20C659AB000
trusted library allocation
page read and write
20C707A5000
trusted library allocation
page read and write
20C70DC4000
trusted library allocation
page read and write
20C67FC8000
trusted library allocation
page read and write
20C6A6AE000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C71E25000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C70D2F000
trusted library allocation
page read and write
20C6A785000
trusted library allocation
page read and write
BFE000
stack
page read and write
20C71FF8000
trusted library allocation
page read and write
20C67D97000
trusted library allocation
page read and write
20C68538000
trusted library allocation
page read and write
20C6A307000
trusted library allocation
page read and write
20C649D1000
trusted library allocation
page read and write
20C5F913000
heap
page read and write
20C67D2F000
trusted library allocation
page read and write
20C6A079000
trusted library allocation
page read and write
20C6A643000
trusted library allocation
page read and write
20C691D4000
trusted library allocation
page read and write
20C709FA000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C687CD000
trusted library allocation
page read and write
20C6B1D9000
trusted library allocation
page read and write
20C748E8000
trusted library allocation
page read and write
20C687AE000
trusted library allocation
page read and write
20C6A783000
trusted library allocation
page read and write
20C5F90F000
heap
page read and write
20C6CD3D000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C71638000
trusted library allocation
page read and write
20C69E0B000
trusted library allocation
page read and write
20C5F962000
heap
page read and write
20C7513B000
trusted library allocation
page read and write
20C690E0000
trusted library allocation
page read and write
20C6A1BD000
trusted library allocation
page read and write
20C68D5D000
trusted library allocation
page read and write
20C6599A000
trusted library allocation
page read and write
20C69E18000
trusted library allocation
page read and write
20C6A10B000
trusted library allocation
page read and write
20C68686000
trusted library allocation
page read and write
20C690D6000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C6A11B000
trusted library allocation
page read and write
2ABCF51D000
trusted library allocation
page read and write
20C70DAF000
trusted library allocation
page read and write
20C697B2000
trusted library allocation
page read and write
21FDA230000
heap
page read and write
20C6857B000
trusted library allocation
page read and write
20C70AD6000
trusted library allocation
page read and write
20C687E2000
trusted library allocation
page read and write
20C70D38000
trusted library allocation
page read and write
20C6A0FA000
trusted library allocation
page read and write
20C68681000
trusted library allocation
page read and write
20C75197000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C6A3E9000
trusted library allocation
page read and write
460000
unkown
page write copy
20C6A6AE000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C6A47E000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C68A58000
heap
page read and write
20C70888000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C67D20000
trusted library allocation
page read and write
20C6A3CD000
trusted library allocation
page read and write
20C745C4000
trusted library allocation
page read and write
20C73A00000
trusted library allocation
page read and write
20C70D4E000
trusted library allocation
page read and write
20C71AE4000
trusted library allocation
page read and write
20C74995000
trusted library allocation
page read and write
20C6A139000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
189FABC1000
trusted library allocation
page read and write
2ABCF45B000
trusted library allocation
page read and write
20C5F91F000
heap
page read and write
20C6A39F000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C685D5000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C6A457000
trusted library allocation
page read and write
20C659E2000
trusted library allocation
page read and write
20C5F911000
heap
page read and write
20C6AF9E000
trusted library allocation
page read and write
20C5F919000
heap
page read and write
20C69F8B000
trusted library allocation
page read and write
20C708F1000
trusted library allocation
page read and write
20C6B2AA000
trusted library allocation
page read and write
20C6A5A3000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
391000
unkown
page execute read
20C6B3DE000
trusted library allocation
page read and write
20C69BF1000
trusted library allocation
page read and write
20C70896000
trusted library allocation
page read and write
20C68DFB000
trusted library allocation
page read and write
20C64993000
trusted library allocation
page read and write
20C71F64000
trusted library allocation
page read and write
20C5F919000
heap
page read and write
20C6A390000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C67D39000
trusted library allocation
page read and write
20C5F96B000
heap
page read and write
189FB6EF000
heap
page read and write
20C5F901000
heap
page read and write
20C709C0000
trusted library allocation
page read and write
20C68C4E000
trusted library allocation
page read and write
20C73DD9000
trusted library allocation
page read and write
20C67F39000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
B2137FE000
stack
page read and write
20C69D8C000
trusted library allocation
page read and write
20C6BE5E000
trusted library allocation
page read and write
20C73DC0000
trusted library allocation
page read and write
20C6CD4F000
trusted library allocation
page read and write
20C5F977000
heap
page read and write
20C73DDE000
trusted library allocation
page read and write
20C6A359000
trusted library allocation
page read and write
2ABCF49D000
trusted library allocation
page read and write
20C70894000
trusted library allocation
page read and write
20C70DEB000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C74E2C000
heap
page read and write
20C72BF0000
trusted library allocation
page read and write
20C6B164000
trusted library allocation
page read and write
25658DB5000
heap
page read and write
20C70846000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C5F93B000
heap
page read and write
BC5F63E000
unkown
page readonly
20C6A3A2000
trusted library allocation
page read and write
20C67FA7000
trusted library allocation
page read and write
20C65960000
trusted library allocation
page read and write
20C686A2000
trusted library allocation
page read and write
20C6CD3F000
trusted library allocation
page read and write
20C705CA000
trusted library allocation
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C5F910000
heap
page read and write
20C7514F000
trusted library allocation
page read and write
20C6B3C9000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C70D5C000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6A1A0000
trusted library allocation
page read and write
20C6B4F3000
trusted library allocation
page read and write
20C72E4D000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C64982000
trusted library allocation
page read and write
21FDA1B5000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C74858000
trusted library allocation
page read and write
20C67FD2000
trusted library allocation
page read and write
20C67D35000
trusted library allocation
page read and write
20C6AF1C000
trusted library allocation
page read and write
20C6A7DC000
trusted library allocation
page read and write
20C70DFA000
trusted library allocation
page read and write
1E7EE7C0000
heap
page read and write
20C687A5000
trusted library allocation
page read and write
20C68DA0000
trusted library allocation
page read and write
20C73D74000
trusted library allocation
page read and write
20C68514000
trusted library allocation
page read and write
20C74DB0000
heap
page read and write
21FDA111000
trusted library allocation
page read and write
20C7466B000
trusted library allocation
page read and write
20C72BE5000
trusted library allocation
page read and write
20C642CE000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C5F966000
heap
page read and write
20C6B4B1000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C74AF5000
trusted library allocation
page read and write
20C6A477000
trusted library allocation
page read and write
20C73DE2000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C6A03C000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
20C690ED000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C69DD3000
trusted library allocation
page read and write
20C68D4D000
trusted library allocation
page read and write
20C67D54000
trusted library allocation
page read and write
20C73CC4000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C5F966000
heap
page read and write
20C5F951000
heap
page read and write
20C6A523000
trusted library allocation
page read and write
20C751AB000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
189FAB23000
trusted library allocation
page read and write
20C69D8C000
trusted library allocation
page read and write
20C68D94000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C690DA000
trusted library allocation
page read and write
20C74D7F000
heap
page read and write
20C6BEDD000
trusted library allocation
page read and write
189FABBA000
trusted library allocation
page read and write
DFD000
heap
page read and write
20C5F93B000
heap
page read and write
20C6BECF000
trusted library allocation
page read and write
20C5F919000
heap
page read and write
20C748D3000
trusted library allocation
page read and write
20C690EC000
trusted library allocation
page read and write
20C697A7000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F923000
heap
page read and write
20C71EFA000
trusted library allocation
page read and write
20C70461000
trusted library allocation
page read and write
20C68AA5000
heap
page read and write
20C707A9000
trusted library allocation
page read and write
2ABCF498000
trusted library allocation
page read and write
20C69798000
trusted library allocation
page read and write
20C67FEC000
trusted library allocation
page read and write
20C74D77000
heap
page read and write
20C6A3E1000
trusted library allocation
page read and write
20C6A650000
trusted library allocation
page read and write
20C68DDB000
trusted library allocation
page read and write
20C64290000
trusted library allocation
page read and write
20C6A4D1000
trusted library allocation
page read and write
20C705CD000
trusted library allocation
page read and write
20C5F921000
heap
page read and write
20C694BE000
trusted library allocation
page read and write
20C70476000
trusted library allocation
page read and write
189FB6E8000
heap
page read and write
20C6A3FD000
trusted library allocation
page read and write
20C6AF37000
trusted library allocation
page read and write
21FDA226000
heap
page read and write
20C5F95E000
heap
page read and write
20C7108D000
trusted library allocation
page read and write
20C659CC000
trusted library allocation
page read and write
20C69E7A000
trusted library allocation
page read and write
20C6A3FB000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C6A18A000
trusted library allocation
page read and write
2ABCF4A0000
trusted library allocation
page read and write
20C71EF8000
trusted library allocation
page read and write
20C70D2F000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C697C6000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C751AB000
trusted library allocation
page read and write
20C5F914000
heap
page read and write
20C687DE000
trusted library allocation
page read and write
20C5F910000
heap
page read and write
20C67DA1000
trusted library allocation
page read and write
20C6BE82000
trusted library allocation
page read and write
20C6985D000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C5F963000
heap
page read and write
20C68341000
trusted library allocation
page read and write
189FB758000
heap
page read and write
20C6A18A000
trusted library allocation
page read and write
20C6A695000
trusted library allocation
page read and write
20C749A0000
trusted library allocation
page read and write
BC5D38E000
unkown
page readonly
20C685D5000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C5F92D000
heap
page read and write
20C749CF000
trusted library allocation
page read and write
20C751D3000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C6CD51000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
21FDA220000
heap
page read and write
20C68AA5000
heap
page read and write
20C68A9E000
heap
page read and write
20C67D50000
trusted library allocation
page read and write
20C72EC5000
trusted library allocation
page read and write
21FDA1DB000
trusted library allocation
page read and write
20C69895000
trusted library allocation
page read and write
E09000
heap
page read and write
189FB777000
heap
page read and write
20C73C78000
trusted library allocation
page read and write
20C6A38C000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
189FB758000
heap
page read and write
20C664C3000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C6BE06000
trusted library allocation
page read and write
20C70466000
trusted library allocation
page read and write
20C5F970000
heap
page read and write
20C74DA2000
heap
page read and write
20C6A32F000
trusted library allocation
page read and write
21FD9E20000
unclassified section
page read and write
20C70865000
trusted library allocation
page read and write
189FAB75000
trusted library allocation
page read and write
20C5F92F000
heap
page read and write
20C6A649000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C69F88000
trusted library allocation
page read and write
20C649B9000
trusted library allocation
page read and write
FB9DD3E000
unkown
page readonly
2ABCF46E000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6B4ED000
trusted library allocation
page read and write
2ABCF19F000
unclassified section
page read and write
20C69723000
trusted library allocation
page read and write
20C6B18D000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C72B7A000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
20C719A2000
trusted library allocation
page read and write
20C67D60000
trusted library allocation
page read and write
189FB600000
heap
page read and write
20C6CD06000
trusted library allocation
page read and write
20C70D1D000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C74DA2000
heap
page read and write
20C5F921000
heap
page read and write
20C5F922000
heap
page read and write
20C5F95A000
heap
page read and write
20C6AFA7000
trusted library allocation
page read and write
189FB769000
heap
page read and write
20C6A134000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C70D4B000
trusted library allocation
page read and write
20C6A681000
trusted library allocation
page read and write
20C6A0DD000
trusted library allocation
page read and write
20C71092000
trusted library allocation
page read and write
20C67D89000
trusted library allocation
page read and write
189FB6E3000
heap
page read and write
20C6A35D000
trusted library allocation
page read and write
20C68762000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
20C707E5000
trusted library allocation
page read and write
20C64D6B000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
189FAB81000
trusted library allocation
page read and write
20C687DE000
trusted library allocation
page read and write
20C694B8000
trusted library allocation
page read and write
189FAB00000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C70D48000
trusted library allocation
page read and write
20C72DA3000
trusted library allocation
page read and write
20C70884000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6C0B1000
trusted library allocation
page read and write
20C687E2000
trusted library allocation
page read and write
20C74815000
trusted library allocation
page read and write
20C67FC2000
trusted library allocation
page read and write
25658989000
heap
page read and write
20C687B1000
trusted library allocation
page read and write
20C6CFE6000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C6A3F8000
trusted library allocation
page read and write
20C72BCE000
trusted library allocation
page read and write
20C7057F000
trusted library allocation
page read and write
20C6A38C000
trusted library allocation
page read and write
20C74A4F000
trusted library allocation
page read and write
20C72B3B000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C709B8000
trusted library allocation
page read and write
20C697E8000
trusted library allocation
page read and write
20C73DBD000
trusted library allocation
page read and write
20C6CD61000
trusted library allocation
page read and write
1E7EE819000
heap
page read and write
20C74DBA000
heap
page read and write
20C67D6E000
trusted library allocation
page read and write
20C69F7A000
trusted library allocation
page read and write
20C719C8000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C73D66000
trusted library allocation
page read and write
20C7164E000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
20C685D0000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C698C0000
trusted library allocation
page read and write
20C687AE000
trusted library allocation
page read and write
20C73800000
trusted library allocation
page read and write
20C68575000
trusted library allocation
page read and write
20C6A800000
trusted library allocation
page read and write
21FDA166000
trusted library allocation
page read and write
20C5F916000
heap
page read and write
20C74DAC000
heap
page read and write
20C698FA000
trusted library allocation
page read and write
20C6B186000
trusted library allocation
page read and write
20C67E8D000
trusted library allocation
page read and write
20C698DD000
trusted library allocation
page read and write
20C71EFD000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C6A460000
trusted library allocation
page read and write
20C745D7000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C5F963000
heap
page read and write
21FDA403000
trusted library allocation
page read and write
20C6A62D000
trusted library allocation
page read and write
20C67D58000
trusted library allocation
page read and write
20C71AAC000
trusted library allocation
page read and write
20C67D3E000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
500000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C746CF000
trusted library allocation
page read and write
20C68DBE000
trusted library allocation
page read and write
20C68647000
trusted library allocation
page read and write
20C70D43000
trusted library allocation
page read and write
20C69D66000
trusted library allocation
page read and write
20C71EE6000
trusted library allocation
page read and write
189FAB10000
trusted library allocation
page read and write
20C71EE2000
trusted library allocation
page read and write
20C6CD3F000
trusted library allocation
page read and write
20C748EA000
trusted library allocation
page read and write
20C6A3A6000
trusted library allocation
page read and write
20C687E6000
trusted library allocation
page read and write
20C69738000
trusted library allocation
page read and write
20C74580000
trusted library allocation
page read and write
189FAB5C000
trusted library allocation
page read and write
20C751A9000
trusted library allocation
page read and write
20C70DFA000
trusted library allocation
page read and write
20C67F91000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
189FA8F6000
heap
page read and write
20C5F963000
heap
page read and write
20C68C7E000
trusted library allocation
page read and write
20C74DAC000
heap
page read and write
20C6A37E000
trusted library allocation
page read and write
20C6A8D3000
trusted library allocation
page read and write
189FA8B0000
heap
page read and write
20C68575000
trusted library allocation
page read and write
20C5F971000
heap
page read and write
20C5F8EE000
heap
page read and write
20C68C78000
trusted library allocation
page read and write
20C6B16F000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C6B3E1000
trusted library allocation
page read and write
20C5F92A000
heap
page read and write
20C748C8000
trusted library allocation
page read and write
189FB769000
heap
page read and write
20C5F906000
heap
page read and write
20C74887000
trusted library allocation
page read and write
2ABCF532000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C649AB000
trusted library allocation
page read and write
20C5F90B000
heap
page read and write
20C5F922000
heap
page read and write
20C6CD56000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C74DA2000
heap
page read and write
20C68B23000
trusted library allocation
page read and write
20C72BCF000
trusted library allocation
page read and write
20C68CF6000
trusted library allocation
page read and write
20C685B8000
trusted library allocation
page read and write
20C7455C000
trusted library allocation
page read and write
20C71F62000
trusted library allocation
page read and write
20C6864C000
trusted library allocation
page read and write
20C6A7AB000
trusted library allocation
page read and write
189FB68A000
heap
page read and write
189FB6FD000
heap
page read and write
20C6CD5D000
trusted library allocation
page read and write
20C5F909000
heap
page read and write
20C6A466000
trusted library allocation
page read and write
E29000
heap
page read and write
20C68C63000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C6B4C1000
trusted library allocation
page read and write
20C687F1000
trusted library allocation
page read and write
20C6CFF9000
trusted library allocation
page read and write
20C6A176000
trusted library allocation
page read and write
20C67FDD000
trusted library allocation
page read and write
20C74CFF000
heap
page read and write
20C6A7BF000
trusted library allocation
page read and write
1E7EE81F000
heap
page read and write
20C74989000
trusted library allocation
page read and write
20C6A3E1000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C6BE20000
trusted library allocation
page read and write
20C68C6A000
trusted library allocation
page read and write
189FA8F0000
heap
page read and write
20C73DDA000
trusted library allocation
page read and write
5F54FFE000
unkown
page readonly
20C64876000
trusted library allocation
page read and write
20C71F14000
trusted library allocation
page read and write
20C6A031000
trusted library allocation
page read and write
20C75185000
trusted library allocation
page read and write
20C5F95A000
heap
page read and write
20C6A39A000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C5F922000
heap
page read and write
20C68D39000
trusted library allocation
page read and write
20C6A187000
trusted library allocation
page read and write
20C6A041000
trusted library allocation
page read and write
20C686CB000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C5F91D000
heap
page read and write
20C6B3A0000
trusted library allocation
page read and write
20C72E43000
trusted library allocation
page read and write
20C6CD56000
trusted library allocation
page read and write
20C642DF000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C6A176000
trusted library allocation
page read and write
20C68DFB000
trusted library allocation
page read and write
20C5F93B000
heap
page read and write
20C74DA2000
heap
page read and write
20C5F8FA000
heap
page read and write
20C6496D000
trusted library allocation
page read and write
20C745BA000
trusted library allocation
page read and write
20C71EFD000
trusted library allocation
page read and write
20C70D4E000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C71EFA000
trusted library allocation
page read and write
20C74D80000
heap
page read and write
20C71A48000
trusted library allocation
page read and write
20C698A4000
trusted library allocation
page read and write
189FA710000
unclassified section
page readonly
20C71F19000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C6CD61000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C708BB000
trusted library allocation
page read and write
2565A577000
heap
page read and write
20C71F94000
trusted library allocation
page read and write
1E7EEB07000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C72F01000
trusted library allocation
page read and write
189FB4D0000
trusted library allocation
page read and write
20C67D5C000
trusted library allocation
page read and write
20C70432000
trusted library allocation
page read and write
20C6BEA7000
trusted library allocation
page read and write
20C5F952000
heap
page read and write
20C5F906000
heap
page read and write
20C67F6E000
trusted library allocation
page read and write
20C6A3DC000
trusted library allocation
page read and write
20C698A4000
trusted library allocation
page read and write
20C70BE7000
trusted library allocation
page read and write
20C649FE000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
20C70918000
trusted library allocation
page read and write
20C687B8000
trusted library allocation
page read and write
20C6C04B000
trusted library allocation
page read and write
20C74DB0000
heap
page read and write
20C7464D000
trusted library allocation
page read and write
20C6850E000
trusted library allocation
page read and write
20C5F8FE000
heap
page read and write
20C5F901000
heap
page read and write
20C7047E000
trusted library allocation
page read and write
FB999DE000
stack
page read and write
20C67BD5000
trusted library allocation
page read and write
20C5F977000
heap
page read and write
20C6B21D000
trusted library allocation
page read and write
20C73CA5000
trusted library allocation
page read and write
20C6BEE0000
trusted library allocation
page read and write
20C6C09B000
trusted library allocation
page read and write
20C6A7C2000
trusted library allocation
page read and write
20C74D77000
heap
page read and write
20C74DB0000
heap
page read and write
20C6BEA0000
trusted library allocation
page read and write
2ABCF42E000
trusted library allocation
page read and write
20C649B0000
trusted library allocation
page read and write
20C67F54000
trusted library allocation
page read and write
20C6A3A9000
trusted library allocation
page read and write
20C6A7C2000
trusted library allocation
page read and write
20C74D80000
heap
page read and write
130A3FC000
stack
page read and write
20C5F91F000
heap
page read and write
20C74D80000
heap
page read and write
21FD9D80000
heap
page read and write
189FB777000
heap
page read and write
20C70ADF000
trusted library allocation
page read and write
DF2000
heap
page read and write
20C74D80000
heap
page read and write
20C6CD16000
trusted library allocation
page read and write
20C68DD4000
trusted library allocation
page read and write
20C6A13E000
trusted library allocation
page read and write
20C5F953000
heap
page read and write
20C6844E000
trusted library allocation
page read and write
20C69E3B000
trusted library allocation
page read and write
20C69DE1000
trusted library allocation
page read and write
20C659B1000
trusted library allocation
page read and write
20C745C9000
trusted library allocation
page read and write
20C73DC6000
trusted library allocation
page read and write
20C6B195000
trusted library allocation
page read and write
20C72000000
trusted library allocation
page read and write
20C5F975000
heap
page read and write
20C6A359000
trusted library allocation
page read and write
20C5F8FA000
heap
page read and write
20C6CD56000
trusted library allocation
page read and write
20C73DC3000
trusted library allocation
page read and write
189FB65C000
heap
page read and write
20C705A0000
trusted library allocation
page read and write
2ABCF940000
heap
page read and write
20C70AF1000
trusted library allocation
page read and write
20C751C0000
trusted library allocation
page read and write
20C7465F000
trusted library allocation
page read and write
20C694F0000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C5F96C000
heap
page read and write
20C69ECC000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
189FAB03000
trusted library allocation
page read and write
20C64966000
trusted library allocation
page read and write
189FAB77000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C5F951000
heap
page read and write
20C7465F000
trusted library allocation
page read and write
20C709CC000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C70967000
trusted library allocation
page read and write
E0B000
heap
page read and write
20C6CFA6000
trusted library allocation
page read and write
20C69EF2000
trusted library allocation
page read and write
189FABF3000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C74DBB000
heap
page read and write
20C70458000
trusted library allocation
page read and write
20C5F95A000
heap
page read and write
20C67D50000
trusted library allocation
page read and write
20C6A18C000
trusted library allocation
page read and write
20C6A383000
trusted library allocation
page read and write
20C74847000
trusted library allocation
page read and write
20C74DBB000
heap
page read and write
20C5F931000
heap
page read and write
20C5F910000
heap
page read and write
20C74D7F000
heap
page read and write
20C6A667000
trusted library allocation
page read and write
20C68D5B000
trusted library allocation
page read and write
2EFC581000
trusted library allocation
page execute read
20C6A378000
trusted library allocation
page read and write
20C746C9000
trusted library allocation
page read and write
20C6A359000
trusted library allocation
page read and write
B211FFB000
stack
page read and write
20C6CF93000
trusted library allocation
page read and write
20C6B4AF000
trusted library allocation
page read and write
20C5F931000
heap
page read and write
1E7EEA00000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
20C70E5E000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C5F97A000
heap
page read and write
20C5F916000
heap
page read and write
20C6A359000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C68584000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C6649C000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C67F89000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C6A353000
trusted library allocation
page read and write
20C690C3000
trusted library allocation
page read and write
189FB777000
heap
page read and write
20C68D3B000
trusted library allocation
page read and write
2565896A000
heap
page read and write
20C71A4D000
trusted library allocation
page read and write
20C73DFC000
trusted library allocation
page read and write
20C6A39F000
trusted library allocation
page read and write
20C6A33B000
trusted library allocation
page read and write
20C67D54000
trusted library allocation
page read and write
20C6A374000
trusted library allocation
page read and write
20C749F1000
trusted library allocation
page read and write
20C67FC6000
trusted library allocation
page read and write
E06000
heap
page read and write
20C72B78000
trusted library allocation
page read and write
20C5F906000
heap
page read and write
189FAB2F000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C6868C000
trusted library allocation
page read and write
20C5F96C000
heap
page read and write
20C5F959000
heap
page read and write
2E0000
heap
page read and write
20C6CF7B000
trusted library allocation
page read and write
20C70D68000
trusted library allocation
page read and write
20C69DCD000
trusted library allocation
page read and write
20C74567000
trusted library allocation
page read and write
20C69FE4000
trusted library allocation
page read and write
20C68726000
trusted library allocation
page read and write
20C6A0A2000
trusted library allocation
page read and write
20C690F9000
trusted library allocation
page read and write
20C7058A000
trusted library allocation
page read and write
20C74847000
trusted library allocation
page read and write
20C697E0000
trusted library allocation
page read and write
20C6A4C5000
trusted library allocation
page read and write
189FB6F2000
heap
page read and write
20C72BCE000
trusted library allocation
page read and write
20C751CB000
trusted library allocation
page read and write
20C6856D000
trusted library allocation
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C6A1CA000
trusted library allocation
page read and write
20C7514A000
trusted library allocation
page read and write
2ABCF192000
unclassified section
page read and write
20C74586000
trusted library allocation
page read and write
20C67D58000
trusted library allocation
page read and write
20C70B82000
trusted library allocation
page read and write
25658982000
heap
page read and write
20C751A3000
trusted library allocation
page read and write
20C748E8000
trusted library allocation
page read and write
20C5F970000
heap
page read and write
20C67EAE000
trusted library allocation
page read and write
2ABCF200000
trusted library allocation
page read and write
20C6A900000
trusted library allocation
page read and write
20C690ED000
trusted library allocation
page read and write
20C6B4AD000
trusted library allocation
page read and write
20C687AE000
trusted library allocation
page read and write
20C6A7BF000
trusted library allocation
page read and write
189FB744000
heap
page read and write
20C705A0000
trusted library allocation
page read and write
21FDA100000
trusted library allocation
page read and write
20C6A7CA000
trusted library allocation
page read and write
20C6A378000
trusted library allocation
page read and write
20C71A48000
trusted library allocation
page read and write
B214FFE000
stack
page read and write
20C5F8FF000
heap
page read and write
20C70D4E000
trusted library allocation
page read and write
20C72B5D000
trusted library allocation
page read and write
20C7484B000
trusted library allocation
page read and write
20C664ED000
trusted library allocation
page read and write
20C7107E000
trusted library allocation
page read and write
20C6A3D7000
trusted library allocation
page read and write
20C71F1F000
trusted library allocation
page read and write
20C6B499000
trusted library allocation
page read and write
20C68826000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C5F953000
heap
page read and write
189FB081000
heap
page read and write
20C6869C000
trusted library allocation
page read and write
20C5F8EF000
heap
page read and write
20C5F93B000
heap
page read and write
20C70D54000
trusted library allocation
page read and write
19CE000
stack
page read and write
20C6A7C2000
trusted library allocation
page read and write
20C6AFB1000
trusted library allocation
page read and write
20C70946000
trusted library allocation
page read and write
20C67FDC000
trusted library allocation
page read and write
189FB758000
heap
page read and write
20C649FE000
trusted library allocation
page read and write
20C67F68000
trusted library allocation
page read and write
20C71A4D000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C6A349000
trusted library allocation
page read and write
20C751A3000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C68CF0000
trusted library allocation
page read and write
20C69074000
trusted library allocation
page read and write
20C6A1CA000
trusted library allocation
page read and write
20C74CC1000
heap
page read and write
20C74D77000
heap
page read and write
5F5503E000
unkown
page readonly
20C6A690000
trusted library allocation
page read and write
20C69833000
trusted library allocation
page read and write
20C6B140000
trusted library allocation
page read and write
20C7460B000
trusted library allocation
page read and write
20C704DE000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C6A45C000
trusted library allocation
page read and write
20C69E54000
trusted library allocation
page read and write
20C71EF0000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C6A3C0000
trusted library allocation
page read and write
20C6873B000
trusted library allocation
page read and write
20C707FC000
trusted library allocation
page read and write
20C6A692000
trusted library allocation
page read and write
20C687E6000
trusted library allocation
page read and write
20C67FE0000
trusted library allocation
page read and write
20C68C7B000
trusted library allocation
page read and write
20C70DF1000
trusted library allocation
page read and write
20C71EEC000
trusted library allocation
page read and write
21FDA400000
trusted library allocation
page read and write
254000
heap
page read and write
20C6905D000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C71E30000
trusted library allocation
page read and write
2ABCF447000
trusted library allocation
page read and write
20C68718000
trusted library allocation
page read and write
FB9CC7E000
unkown
page readonly
20C74878000
trusted library allocation
page read and write
20C6906C000
trusted library allocation
page read and write
20C705D1000
trusted library allocation
page read and write
20C7197B000
trusted library allocation
page read and write
20C5F91B000
heap
page read and write
20C68C4E000
trusted library allocation
page read and write
20C5F921000
heap
page read and write
20C694CF000
trusted library allocation
page read and write
20C5F90A000
heap
page read and write
20C745CC000
trusted library allocation
page read and write
20C5F905000
heap
page read and write
20C67FC6000
trusted library allocation
page read and write
20C69835000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C74DBA000
heap
page read and write
20C5F928000
heap
page read and write
20C68CF6000
trusted library allocation
page read and write
20C74258000
trusted library allocation
page read and write
20C5F952000
heap
page read and write
20C6A346000
trusted library allocation
page read and write
20C73D71000
trusted library allocation
page read and write
20C5F915000
heap
page read and write
20C74845000
trusted library allocation
page read and write
20C5F8EE000
heap
page read and write
20C6A687000
trusted library allocation
page read and write
20C6429E000
trusted library allocation
page read and write
20C71EF8000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C5F93B000
heap
page read and write
20C687E6000
trusted library allocation
page read and write
20C6A39F000
trusted library allocation
page read and write
20C6A0F3000
trusted library allocation
page read and write
20C71ECD000
trusted library allocation
page read and write
20C70DEF000
trusted library allocation
page read and write
20C6B195000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C70DF4000
trusted library allocation
page read and write
20C6A3C3000
trusted library allocation
page read and write
20C6A643000
trusted library allocation
page read and write
20C5F921000
heap
page read and write
20C698A8000
trusted library allocation
page read and write
20C6B1BC000
trusted library allocation
page read and write
20C709C0000
trusted library allocation
page read and write
20C70E8F000
trusted library allocation
page read and write
20C68A9A000
heap
page read and write
20C745BA000
trusted library allocation
page read and write
20C5F963000
heap
page read and write
20C751CF000
trusted library allocation
page read and write
20C748BF000
trusted library allocation
page read and write
20C6B3A2000
trusted library allocation
page read and write
20C67FB8000
trusted library allocation
page read and write
20C6BEAC000
trusted library allocation
page read and write
20C5F908000
heap
page read and write
20C5F910000
heap
page read and write
20C5F919000
heap
page read and write
20C6CFCC000
trusted library allocation
page read and write
20C67F65000
trusted library allocation
page read and write
20C74A37000
trusted library allocation
page read and write
20C705B5000
trusted library allocation
page read and write
20C5F96F000
heap
page read and write
2ABCEFB0000
unclassified section
page readonly
20C69E09000
trusted library allocation
page read and write
20C6A3EB000
trusted library allocation
page read and write
20C6BFC1000
trusted library allocation
page read and write
20C69D66000
trusted library allocation
page read and write
20C687A7000
trusted library allocation
page read and write
20C6869C000
trusted library allocation
page read and write
20C5F922000
heap
page read and write
20C68D87000
trusted library allocation
page read and write
20C5F95A000
heap
page read and write
20C709C8000
trusted library allocation
page read and write
20C73C7A000
trusted library allocation
page read and write
DFA000
heap
page read and write
20C6A68D000
trusted library allocation
page read and write
20C6A390000
trusted library allocation
page read and write
20C6CFC5000
trusted library allocation
page read and write
20C6CF4E000
trusted library allocation
page read and write
20C6B4BA000
trusted library allocation
page read and write
20C748F0000
trusted library allocation
page read and write
20C74DA6000
heap
page read and write
20C687BE000
trusted library allocation
page read and write
20C72B31000
trusted library allocation
page read and write
20C74AB8000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C6A4F8000
trusted library allocation
page read and write
20C5F952000
heap
page read and write
20C73C52000
trusted library allocation
page read and write
20C69EC3000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C68D60000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
130A3FF000
stack
page read and write
20C746C7000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C687BE000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C74A68000
trusted library allocation
page read and write
189FA780000
unclassified section
page readonly
20C69728000
trusted library allocation
page read and write
20C6982E000
trusted library allocation
page read and write
20C67DC6000
trusted library allocation
page read and write
20C73D63000
trusted library allocation
page read and write
20C5F901000
heap
page read and write
20C6A690000
trusted library allocation
page read and write
20C691E6000
trusted library allocation
page read and write
20C70726000
trusted library allocation
page read and write
20C68C1A000
trusted library allocation
page read and write
20C6A6D8000
trusted library allocation
page read and write
20C70E6A000
trusted library allocation
page read and write
21FDA146000
trusted library allocation
page read and write
FB998DC000
stack
page read and write
20C6ACA3000
trusted library allocation
page read and write
20C68AA4000
heap
page read and write
20C5F8FF000
heap
page read and write
20C70B3E000
trusted library allocation
page read and write
189FB660000
heap
page read and write
20C708BB000
trusted library allocation
page read and write
20C69166000
trusted library allocation
page read and write
20C70BD7000
trusted library allocation
page read and write
20C748F2000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C687F0000
trusted library allocation
page read and write
20C6A4F8000
trusted library allocation
page read and write
20C67FD9000
trusted library allocation
page read and write
20C69F53000
trusted library allocation
page read and write
189FAA70000
unclassified section
page read and write
25658C00000
trusted library allocation
page read and write
20C746C5000
trusted library allocation
page read and write
20C73DF6000
trusted library allocation
page read and write
1E7EE7A0000
heap
page read and write
20C5F978000
heap
page read and write
20C67FD9000
trusted library allocation
page read and write
DF7000
heap
page read and write
20C6970A000
trusted library allocation
page read and write
20C705A0000
trusted library allocation
page read and write
20C66478000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C6BE65000
trusted library allocation
page read and write
20C67FC0000
trusted library allocation
page read and write
20C6491E000
trusted library allocation
page read and write
20C697C6000
trusted library allocation
page read and write
20C6A62B000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C5F91F000
heap
page read and write
20C67FC0000
trusted library allocation
page read and write
20C69123000
trusted library allocation
page read and write
20C67D51000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C74D8A000
heap
page read and write
254000
heap
page read and write
20C67FD2000
trusted library allocation
page read and write
20C69093000
trusted library allocation
page read and write
20C5F959000
heap
page read and write
20C6CF58000
trusted library allocation
page read and write
20C751AB000
trusted library allocation
page read and write
20C5F966000
heap
page read and write
20C70416000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C659AD000
trusted library allocation
page read and write
20C70586000
trusted library allocation
page read and write
20C659D1000
trusted library allocation
page read and write
20C71AAC000
trusted library allocation
page read and write
20C5F923000
heap
page read and write
20C5F966000
heap
page read and write
20C6B0AB000
trusted library allocation
page read and write
20C6871B000
trusted library allocation
page read and write
20C70D90000
trusted library allocation
page read and write
20C5F928000
heap
page read and write
20C5F97A000
heap
page read and write
20C694B8000
trusted library allocation
page read and write
2ABCF472000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C69DD5000
trusted library allocation
page read and write
20C749B3000
trusted library allocation
page read and write
20C68A9E000
heap
page read and write
20C74DA2000
heap
page read and write
20C6CF6F000
trusted library allocation
page read and write
20C70D4E000
trusted library allocation
page read and write
20C64926000
trusted library allocation
page read and write
20C6A3AE000
trusted library allocation
page read and write
20C71F05000
trusted library allocation
page read and write
20C6A392000
trusted library allocation
page read and write
20C6B148000
trusted library allocation
page read and write
189FB68D000
heap
page read and write
20C72BCA000
trusted library allocation
page read and write
20C6A4F8000
trusted library allocation
page read and write
189FAA90000
trusted library section
page readonly
20C749A7000
trusted library allocation
page read and write
20C6A35D000
trusted library allocation
page read and write
20C6CD16000
trusted library allocation
page read and write
20C6BECF000
trusted library allocation
page read and write
20C74687000
trusted library allocation
page read and write
BDB000
stack
page read and write
20C5F928000
heap
page read and write
20C74D89000
heap
page read and write
20C6A650000
trusted library allocation
page read and write
20C5F8FB000
heap
page read and write
20C74DA6000
heap
page read and write
20C6A469000
trusted library allocation
page read and write
20C6A117000
trusted library allocation
page read and write
20C6B150000
trusted library allocation
page read and write
2ABCF4E7000
trusted library allocation
page read and write
20C6A17D000
trusted library allocation
page read and write
20C6CD30000
trusted library allocation
page read and write
20C6A302000
trusted library allocation
page read and write
20C74DBA000
heap
page read and write
20C6B186000
trusted library allocation
page read and write
20C5F8FA000
heap
page read and write
20C6858A000
trusted library allocation
page read and write
20C71EFD000
trusted library allocation
page read and write
20C5F8F4000
heap
page read and write
20C6A00F000
trusted library allocation
page read and write
20C6A373000
trusted library allocation
page read and write
560000
heap
page read and write
20C69EFC000
trusted library allocation
page read and write
189FB721000
heap
page read and write
20C690BC000
trusted library allocation
page read and write
20C6BE7A000
trusted library allocation
page read and write
189FB51A000
trusted library allocation
page read and write
20C69816000
trusted library allocation
page read and write
20C73DDE000
trusted library allocation
page read and write
189FAAD0000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C6A3F5000
trusted library allocation
page read and write
20C6A33B000
trusted library allocation
page read and write
20C74A1B000
trusted library allocation
page read and write
20C687A5000
trusted library allocation
page read and write
20C687B8000
trusted library allocation
page read and write
20C6A386000
trusted library allocation
page read and write
20C68B3B000
trusted library allocation
page read and write
20C70E12000
trusted library allocation
page read and write
254000
heap
page read and write
20C6A3B6000
trusted library allocation
page read and write
20C5F95D000
heap
page read and write
20C687A7000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C6B3E9000
trusted library allocation
page read and write
20C5F97A000
heap
page read and write
20C6A635000
trusted library allocation
page read and write
20C69EB2000
trusted library allocation
page read and write
20C74DA2000
heap
page read and write
20C68C8C000
trusted library allocation
page read and write
20C6A4D6000
trusted library allocation
page read and write
20C67F6E000
trusted library allocation
page read and write
E29000
heap
page read and write
20C7197F000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
20C64871000
trusted library allocation
page read and write
20C69E22000
trusted library allocation
page read and write
BC6173E000
unkown
page readonly
20C5F8FB000
heap
page read and write
20C6CD3D000
trusted library allocation
page read and write
2565A560000
heap
page read and write
20C72BE1000
trusted library allocation
page read and write
20C71E28000
trusted library allocation
page read and write
20C5F92D000
heap
page read and write
20C6A11E000
trusted library allocation
page read and write
20C6BFBC000
trusted library allocation
page read and write
20C69825000
trusted library allocation
page read and write
20C748C8000
trusted library allocation
page read and write
20C5F8FF000
heap
page read and write
20C73DDE000
trusted library allocation
page read and write
20C68523000
trusted library allocation
page read and write
20C6A36F000
trusted library allocation
page read and write
20C67D54000
trusted library allocation
page read and write
20C70E66000
trusted library allocation
page read and write
20C6A353000
trusted library allocation
page read and write
5F559BE000
stack
page read and write
20C6A131000
trusted library allocation
page read and write
20C68AA5000
heap
page read and write
2ABCF50C000
trusted library allocation
page read and write
20C5F96F000
heap
page read and write
20C691E9000
trusted library allocation
page read and write
E1E000
heap
page read and write
20C6A396000
trusted library allocation
page read and write
189FB777000
heap
page read and write
20C73C74000
trusted library allocation
page read and write
20C5F951000
heap
page read and write
FB9CCBE000
unkown
page readonly
20C71EF8000
trusted library allocation
page read and write
20F0003F000
trusted library allocation
page read and write
189FB4E9000
unkown
page execute read
20C7485A000
trusted library allocation
page read and write
21FDA1F6000
trusted library allocation
page read and write
20C690E9000
trusted library allocation
page read and write
There are 3849 hidden memdumps, click here to show them.