IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_efcf6b67-e024-4947-aab9-07095241970c.json (copy)
JSON data
dropped
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\uninstall_ping_308046B0AF4A39CB_efcf6b67-e024-4947-aab9-07095241970c.json.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
dropped
C:\Users\user\AppData\Local\Temp\tmpaddon
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\40371339ad31a7e6.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9Q4ZY7ZCY6QEXJRRCFZG.temp
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AK6T8FNAI3R5LJ82937N.temp
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\ExperimentStoreData.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4 (copy)
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addonStartup.json.lz4.tmp
Mozilla lz4 compressed data, originally 22422 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\addons.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\content-prefs.sqlite
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4 (copy)
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\crashes\store.json.mozlz4.tmp
Mozilla lz4 compressed data, originally 56 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\extensions.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\favicons.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info (copy)
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info.tmp
ASCII text
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\permissions.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs-1.js
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.js (copy)
ASCII text, with very long lines (1765), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\protections.sqlite
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionCheckpoints.json.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.baklz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4 (copy)
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\sessionstore-backups\recovery.jsonlz4.tmp
Mozilla lz4 compressed data, originally 5861 bytes
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\storage.sqlite
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 4, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\targeting.snapshot.json (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\targeting.snapshot.json.tmp
JSON data
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM firefox.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM chrome.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM msedge.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM opera.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /F /IM brave.exe /T
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2264 -parentBuildID 20230927232528 -prefsHandle 2212 -prefMapHandle 2204 -prefsLen 25298 -prefMapSize 238442 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16325912-49ac-40f1-bda4-2cac4c4c2137} 8164 "\\.\pipe\gecko-crash-server-pipe.8164" 26487e6e910 socket
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3684 -parentBuildID 20230927232528 -prefsHandle 4052 -prefMapHandle 4048 -prefsLen 26313 -prefMapSize 238442 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d996e0e9-af63-49e3-adbf-964172d0344a} 8164 "\\.\pipe\gecko-crash-server-pipe.8164" 2649a108510 rdd
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5456 -prefMapHandle 5472 -prefsLen 33481 -prefMapSize 238442 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13e771dd-665e-4a33-a08c-b3d742946c3d} 8164 "\\.\pipe\gecko-crash-server-pipe.8164" 26493ede710 utility
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1678942
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
unknown
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
unknown
https://datastudio.google.com/embed/reporting/
unknown
http://www.mozilla.com0
unknown
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
unknown
https://merino.services.mozilla.com/api/v1/suggest
unknown
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
unknown
https://spocs.getpocket.com/spocs
unknown
https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
unknown
https://shavar.services.mozilla.com
unknown
https://completion.amazon.com/search/complete?q=
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
unknown
https://addons.mozilla.org/user-media/addon_icons/700/700308-64.png?modified=4bc8e79f
unknown
https://identity.mozilla.com/ids/ecosystem_telemetryU
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
unknown
https://monitor.firefox.com/breach-details/
unknown
https://github.com/w3c/csswg-drafts/issues/4650
unknown
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
unknown
https://xhr.spec.whatwg.org/#sync-warning
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://www.msn.com
unknown
https://github.com/mozilla-services/screenshots
unknown
https://services.addons.mozilla.org/api/v4/addons/addon/
unknown
https://tracking-protection-issues.herokuapp.com/new
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
unknown
https://youtube.com/
unknown
https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
unknown
https://www.instagram.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
unknown
https://api.accounts.firefox.com/v1
unknown
https://ok.ru/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.elMx_wJzrE6l
unknown
https://www.amazon.com/
unknown
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
unknown
https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
unknown
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
unknown
http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.youtube.com/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
unknown
https://MD8.mozilla.org/1/m
unknown
https://addons.mozilla.org/firefox/addon/to-google-translate/
unknown
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
unknown
http://127.0.0.1:
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
unknown
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
unknown
https://bugzilla.mo
unknown
https://mitmdetection.services.mozilla.com/
unknown
https://youtube.com/account?=
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
unknown
https://spocs.getpocket.com/
unknown
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
unknown
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
unknown
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
unknown
https://www.iqiyi.com/
unknown
https://youtube.com/account?=https://accounts.google.co
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.
unknown
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
unknown
https://monitor.firefox.com/user/breach-stats?includeResolved=true
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
unknown
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
unknown
https://safebrowsing.google.com/safebrowsing/diagnostic?site=
unknown
https://monitor.firefox.com/user/dashboard
unknown
https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
unknown
https://monitor.firefox.com/about
unknown
http://mozilla.org/MPL/2.0/.
unknown
https://account.bellmedia.c
unknown
https://login.microsoftonline.com
unknown
https://coverage.mozilla.org
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://www.zhihu.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://infra.spec.whatwg.org/#ascii-whitespace
unknown
https://blocked.cdn.mozilla.net/
unknown
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
unknown
http://developer.mozilla.org/en/docs/DOM:element.addEventListener
unknown
https://duckduckgo.com/?t=ffab&q=
unknown
https://profiler.firefox.com
unknown
https://outlook.live.com/default.aspx?rru=compose&to=%s
unknown
https://identity.mozilla.com/apps/relay
unknown
https://mozilla.cloudflare-dns.com/dns-query
unknown
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
unknown
https://mail.yahoo.co.jp/compose/?To=%s
unknown
https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
unknown
https://contile.services.mozilla.com/v1/tiles
unknown
https://monitor.firefox.com/user/preferences
unknown
https://screenshots.firefox.com/
unknown
https://www.google.com/search
unknown
https://gpuweb.github.io/gpuweb/
unknown
https://relay.firefox.com/api/v1/
unknown
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
unknown
https://topsites.services.mozilla.com/cid/
unknown
https://twitter.com/
unknown
https://vk.com/
unknown
https://poczta.interia.pl/mh/?mailto=%s
unknown
https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
example.org
93.184.215.14
star-mini.c10r.facebook.com
157.240.195.35
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216
prod.balrog.prod.cloudops.mozgcp.net
35.244.181.201
twitter.com
104.244.42.193
prod.detectportal.prod.cloudops.mozgcp.net
34.107.221.82
services.addons.mozilla.org
151.101.129.91
dyna.wikimedia.org
185.15.58.224
prod.remote-settings.prod.webservices.mozgcp.net
34.149.100.209
contile.services.mozilla.com
34.117.188.166
youtube.com
142.250.181.78
prod.content-signature-chains.prod.webservices.mozgcp.net
34.160.144.191
youtube-ui.l.google.com
172.217.19.238
us-west1.prod.sumo.prod.webservices.mozgcp.net
34.149.128.2
reddit.map.fastly.net
151.101.1.140
ipv4only.arpa
192.0.0.170
prod.ads.prod.webservices.mozgcp.net
34.117.188.166
push.services.mozilla.com
34.107.243.93
normandy-cdn.services.mozilla.com
35.201.103.21
telemetry-incoming.r53-2.services.mozilla.com
34.120.208.123
www.reddit.com
unknown
spocs.getpocket.com
unknown
content-signature-2.cdn.mozilla.net
unknown
support.mozilla.org
unknown
firefox.settings.services.mozilla.com
unknown
www.youtube.com
unknown
www.facebook.com
unknown
detectportal.firefox.com
unknown
normandy.cdn.mozilla.net
unknown
shavar.services.mozilla.com
unknown
www.wikipedia.org
unknown
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
34.149.100.209
prod.remote-settings.prod.webservices.mozgcp.net
United States
151.101.129.91
services.addons.mozilla.org
United States
34.107.243.93
push.services.mozilla.com
United States
34.107.221.82
prod.detectportal.prod.cloudops.mozgcp.net
United States
35.244.181.201
prod.balrog.prod.cloudops.mozgcp.net
United States
34.117.188.166
contile.services.mozilla.com
United States
35.201.103.21
normandy-cdn.services.mozilla.com
United States
35.190.72.216
prod.classify-client.prod.webservices.mozgcp.net
United States
142.250.181.78
youtube.com
United States
34.160.144.191
prod.content-signature-chains.prod.webservices.mozgcp.net
United States
127.0.0.1
unknown
unknown
34.120.208.123
telemetry-incoming.r53-2.services.mozilla.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
C:\Program Files\Mozilla Firefox|AppLastRunTime

Memdumps

Base Address
Regiontype
Protect
Malicious
264976F1000
heap
page read and write
2649B037000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
26494CC2000
trusted library allocation
page read and write
26499C7D000
trusted library allocation
page read and write
264A03F0000
trusted library allocation
page read and write
2649BB80000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
264A0085000
trusted library allocation
page read and write
26498CF2000
trusted library allocation
page read and write
264A3689000
trusted library allocation
page read and write
2649C116000
heap
page read and write
26497C79000
trusted library allocation
page read and write
2649BBC4000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
26497E90000
trusted library allocation
page read and write
2648EC58000
heap
page read and write
26499381000
trusted library allocation
page read and write
264A01E7000
trusted library allocation
page read and write
2648EC35000
heap
page read and write
264993F1000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
2649C160000
heap
page read and write
2649A5FE000
trusted library allocation
page read and write
26497CCD000
trusted library allocation
page read and write
264984F6000
trusted library allocation
page read and write
264A036C000
trusted library allocation
page read and write
264A0CA3000
trusted library allocation
page read and write
C40000
heap
page read and write
1C6E5D3B000
heap
page read and write
2649B0AD000
trusted library allocation
page read and write
26498CC3000
trusted library allocation
page read and write
2649916D000
trusted library allocation
page read and write
264976EA000
heap
page read and write
2649B8F6000
trusted library allocation
page read and write
2649B6B0000
trusted library allocation
page read and write
26493C1E000
trusted library allocation
page read and write
264976EA000
heap
page read and write
2648EC10000
heap
page read and write
C75000
heap
page read and write
26497B8C000
trusted library allocation
page read and write
264A00DD000
trusted library allocation
page read and write
1B2EF99E000
trusted library allocation
page read and write
26499FA4000
trusted library allocation
page read and write
2649C116000
heap
page read and write
2649B2C4000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
2649BAFC000
trusted library allocation
page read and write
26494FBE000
trusted library allocation
page read and write
C54000
heap
page read and write
1C6E4D50000
unclassified section
page readonly
26497CCD000
trusted library allocation
page read and write
264991D8000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264A23CD000
trusted library allocation
page read and write
2649C162000
heap
page read and write
264991EA000
trusted library allocation
page read and write
26499DFC000
trusted library allocation
page read and write
2649CA59000
trusted library allocation
page read and write
2649BA66000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264990A5000
trusted library allocation
page read and write
1C6E5745000
unkown
page execute read
2648EC64000
heap
page read and write
2649B98B000
trusted library allocation
page read and write
2649B0C3000
trusted library allocation
page read and write
18169640000
unclassified section
page readonly
2649BA70000
trusted library allocation
page read and write
2649BABA000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
2649961C000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
26499388000
trusted library allocation
page read and write
1C6E5740000
unkown
page execute read
2648EC2C000
heap
page read and write
264A01EC000
trusted library allocation
page read and write
26494E86000
trusted library allocation
page read and write
5D4000
heap
page read and write
B23233E000
unkown
page readonly
18169D00000
trusted library allocation
page read and write
1C6E500C000
trusted library allocation
page read and write
264A03FE000
trusted library allocation
page read and write
26493CB0000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
264A0CB4000
trusted library allocation
page read and write
2649B993000
trusted library allocation
page read and write
2649907A000
trusted library allocation
page read and write
2649BAE5000
trusted library allocation
page read and write
2648EC55000
heap
page read and write
2648EC29000
heap
page read and write
26498D44000
trusted library allocation
page read and write
26499686000
trusted library allocation
page read and write
2649BB7E000
trusted library allocation
page read and write
264A14B1000
trusted library allocation
page read and write
2649C15D000
heap
page read and write
2649A1F6000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
26497C7D000
trusted library allocation
page read and write
264984DC000
trusted library allocation
page read and write
2649A50B000
trusted library allocation
page read and write
264992AA000
trusted library allocation
page read and write
18169D5F000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2648EC5A000
heap
page read and write
2648EC17000
heap
page read and write
2649917C000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
2649B8D2000
trusted library allocation
page read and write
1C6E5074000
trusted library allocation
page read and write
18169D13000
trusted library allocation
page read and write
264A0373000
trusted library allocation
page read and write
181698D0000
unclassified section
page readonly
1C6E5C6C000
heap
page read and write
2649B9A1000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
26497AF5000
trusted library allocation
page read and write
264A0379000
trusted library allocation
page read and write
26497E3F000
trusted library allocation
page read and write
264A02C4000
trusted library allocation
page read and write
26497713000
heap
page read and write
264A036D000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
26498433000
trusted library allocation
page read and write
26493B6D000
trusted library allocation
page read and write
264A0373000
trusted library allocation
page read and write
2649A16E000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
2649B8F7000
trusted library allocation
page read and write
26497A61000
trusted library allocation
page read and write
264992FE000
trusted library allocation
page read and write
26498244000
trusted library allocation
page read and write
26493CE4000
trusted library allocation
page read and write
264A037E000
trusted library allocation
page read and write
26494F33000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
1C6E5C69000
heap
page read and write
1C6E5086000
trusted library allocation
page read and write
2649B911000
trusted library allocation
page read and write
2649B825000
trusted library allocation
page read and write
26497A9E000
trusted library allocation
page read and write
26499336000
trusted library allocation
page read and write
264A0355000
trusted library allocation
page read and write
2649BAFC000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
2649B926000
trusted library allocation
page read and write
2649A580000
trusted library allocation
page read and write
2FC1000
heap
page read and write
2649927D000
trusted library allocation
page read and write
264956FE000
trusted library allocation
page read and write
B233C3E000
stack
page read and write
2648EC13000
heap
page read and write
2649938C000
trusted library allocation
page read and write
1C6E5CE1000
heap
page read and write
2649A55B000
trusted library allocation
page read and write
264992BB000
trusted library allocation
page read and write
26497A7A000
trusted library allocation
page read and write
2649BAED000
trusted library allocation
page read and write
2649FFC3000
trusted library allocation
page read and write
18169710000
heap
page read and write
264991ED000
trusted library allocation
page read and write
18169D0E000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649937C000
trusted library allocation
page read and write
264A0063000
trusted library allocation
page read and write
26497713000
heap
page read and write
2649923D000
trusted library allocation
page read and write
264A0036000
trusted library allocation
page read and write
264A3685000
trusted library allocation
page read and write
1B2EF947000
trusted library allocation
page read and write
264991E4000
trusted library allocation
page read and write
26499045000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
2649BAC4000
trusted library allocation
page read and write
2649B6AC000
trusted library allocation
page read and write
2649C162000
heap
page read and write
264993FE000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
264956DC000
trusted library allocation
page read and write
26493CE0000
trusted library allocation
page read and write
2649915F000
trusted library allocation
page read and write
264991D9000
trusted library allocation
page read and write
7C4000
unkown
page readonly
26497B6B000
trusted library allocation
page read and write
26497A96000
trusted library allocation
page read and write
B22FFED000
stack
page read and write
264A01E7000
trusted library allocation
page read and write
1C6E5CE9000
heap
page read and write
2648EC28000
heap
page read and write
26499388000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
2649C162000
heap
page read and write
264976F3000
heap
page read and write
264993FE000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
264A0088000
trusted library allocation
page read and write
2649BAED000
trusted library allocation
page read and write
2649CA66000
trusted library allocation
page read and write
2649B894000
trusted library allocation
page read and write
264992AA000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
2649827E000
trusted library allocation
page read and write
2649BB7C000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649A521000
trusted library allocation
page read and write
264A00DB000
trusted library allocation
page read and write
2649934F000
trusted library allocation
page read and write
26497EED000
trusted library allocation
page read and write
2649A1F8000
trusted library allocation
page read and write
1C6E5D58000
heap
page read and write
1C6E5CEE000
heap
page read and write
264986A4000
trusted library allocation
page read and write
2649B6FC000
trusted library allocation
page read and write
2649FFE6000
trusted library allocation
page read and write
2649B821000
trusted library allocation
page read and write
2648EC24000
heap
page read and write
26499183000
trusted library allocation
page read and write
26499158000
trusted library allocation
page read and write
1C6E5CEE000
heap
page read and write
2649BAC3000
trusted library allocation
page read and write
26499043000
trusted library allocation
page read and write
264986F9000
trusted library allocation
page read and write
18169D70000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2648EC55000
heap
page read and write
26497A6C000
trusted library allocation
page read and write
1B2EF964000
trusted library allocation
page read and write
264A02AF000
trusted library allocation
page read and write
264A0351000
trusted library allocation
page read and write
264A0096000
trusted library allocation
page read and write
26497B54000
trusted library allocation
page read and write
264995A3000
trusted library allocation
page read and write
2649A66E000
trusted library allocation
page read and write
2649B621000
trusted library allocation
page read and write
2649B295000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649BB04000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649B9F9000
trusted library allocation
page read and write
26497A86000
trusted library allocation
page read and write
264A23CA000
trusted library allocation
page read and write
2649B818000
trusted library allocation
page read and write
264993CE000
trusted library allocation
page read and write
264991B8000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
264A00B0000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2648EC23000
heap
page read and write
26493CDB000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
2649B959000
trusted library allocation
page read and write
26499123000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
1B2EFB20000
trusted library allocation
page read and write
5D4000
heap
page read and write
3A05F7503000
trusted library allocation
page read and write
2649911D000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2648EC5A000
heap
page read and write
2649938C000
trusted library allocation
page read and write
264A0095000
trusted library allocation
page read and write
26499086000
trusted library allocation
page read and write
2649A196000
trusted library allocation
page read and write
264A02FA000
trusted library allocation
page read and write
26499EB6000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2648EC10000
heap
page read and write
2649FF64000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
1C6E5CEE000
heap
page read and write
26494FDD000
trusted library allocation
page read and write
2649B993000
trusted library allocation
page read and write
2649BACE000
trusted library allocation
page read and write
26498D0F000
trusted library allocation
page read and write
26494F51000
trusted library allocation
page read and write
264984BB000
trusted library allocation
page read and write
18169C90000
heap
page read and write
2648EC28000
heap
page read and write
2648EC6A000
heap
page read and write
26499CBF000
trusted library allocation
page read and write
264992AA000
trusted library allocation
page read and write
26499CA2000
trusted library allocation
page read and write
264984C5000
trusted library allocation
page read and write
264A0095000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26495617000
trusted library allocation
page read and write
26495952000
trusted library allocation
page read and write
2649908F000
trusted library allocation
page read and write
26499309000
trusted library allocation
page read and write
26498D96000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2649B8F7000
trusted library allocation
page read and write
2649A66C000
trusted library allocation
page read and write
26494EC0000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2649CB01000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
2649B0D0000
trusted library allocation
page read and write
2648973D000
heap
page read and write
26497AAE000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2648EC31000
heap
page read and write
2648EC2B000
heap
page read and write
264A0363000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
264993C3000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26498476000
trusted library allocation
page read and write
2649B050000
trusted library allocation
page read and write
2649B5D6000
trusted library allocation
page read and write
264A1700000
trusted library allocation
page read and write
264993ED000
trusted library allocation
page read and write
264A0080000
trusted library allocation
page read and write
264990AA000
trusted library allocation
page read and write
264982BE000
trusted library allocation
page read and write
264992B5000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
26499614000
trusted library allocation
page read and write
2649BA0E000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
2649908A000
trusted library allocation
page read and write
264A036F000
trusted library allocation
page read and write
26494F3D000
trusted library allocation
page read and write
2649B089000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2648EC2E000
heap
page read and write
2648EC0D000
heap
page read and write
2648EC62000
heap
page read and write
2649934F000
trusted library allocation
page read and write
2649BA6E000
trusted library allocation
page read and write
264999DC000
trusted library allocation
page read and write
2649934F000
trusted library allocation
page read and write
264A0C8D000
trusted library allocation
page read and write
264A0023000
trusted library allocation
page read and write
2649A1CB000
trusted library allocation
page read and write
2649FFB3000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2649937C000
trusted library allocation
page read and write
1C6E5C8A000
heap
page read and write
26499082000
trusted library allocation
page read and write
26499043000
trusted library allocation
page read and write
2649919D000
trusted library allocation
page read and write
26499EC0000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
1B2EF996000
trusted library allocation
page read and write
2649B98B000
trusted library allocation
page read and write
2649B8C5000
trusted library allocation
page read and write
264995E9000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
1CDE1675000
heap
page read and write
264991A8000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
26497B3A000
trusted library allocation
page read and write
264A01E3000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649B3B2000
trusted library allocation
page read and write
2649930C000
trusted library allocation
page read and write
2649B227000
trusted library allocation
page read and write
264991C1000
trusted library allocation
page read and write
2649907A000
trusted library allocation
page read and write
26499EFE000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
7BC000
unkown
page read and write
2649925C000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
2649907E000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
264993A8000
trusted library allocation
page read and write
2649A1F6000
trusted library allocation
page read and write
26498BF2000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
26497A80000
trusted library allocation
page read and write
2649915F000
trusted library allocation
page read and write
1C6E5C6C000
heap
page read and write
B232B3E000
stack
page read and write
26499123000
trusted library allocation
page read and write
2649B8AA000
trusted library allocation
page read and write
264A0295000
trusted library allocation
page read and write
2649907A000
trusted library allocation
page read and write
264990A4000
trusted library allocation
page read and write
2648EC53000
heap
page read and write
26497EEF000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2648EC18000
heap
page read and write
2648EC55000
heap
page read and write
2649A5B0000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
26499116000
trusted library allocation
page read and write
2649BD9A000
trusted library allocation
page read and write
264984E6000
trusted library allocation
page read and write
2649BB76000
trusted library allocation
page read and write
264A2D02000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
26499913000
trusted library allocation
page read and write
2649B3B6000
trusted library allocation
page read and write
264993ED000
trusted library allocation
page read and write
26493BFE000
trusted library allocation
page read and write
2649A16A000
trusted library allocation
page read and write
26499360000
trusted library allocation
page read and write
26497B7E000
trusted library allocation
page read and write
2649FFC3000
trusted library allocation
page read and write
264A00AE000
trusted library allocation
page read and write
2649A52A000
trusted library allocation
page read and write
2649B129000
trusted library allocation
page read and write
2648EC19000
heap
page read and write
264A01F6000
trusted library allocation
page read and write
2649B290000
trusted library allocation
page read and write
2649929E000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC10000
heap
page read and write
2649B8D8000
trusted library allocation
page read and write
264935DF000
trusted library allocation
page read and write
26494C8F000
trusted library allocation
page read and write
2649B8DA000
trusted library allocation
page read and write
26495661000
trusted library allocation
page read and write
264976DA000
heap
page read and write
264A037E000
trusted library allocation
page read and write
2649B673000
trusted library allocation
page read and write
26498E05000
trusted library allocation
page read and write
2649911B000
trusted library allocation
page read and write
264982EF000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
264982D4000
trusted library allocation
page read and write
26499343000
trusted library allocation
page read and write
264984F1000
trusted library allocation
page read and write
26499C8B000
trusted library allocation
page read and write
264A1561000
trusted library allocation
page read and write
2649BAC6000
trusted library allocation
page read and write
2FC1000
heap
page read and write
2648EC2C000
heap
page read and write
264935A9000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
264995BC000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
26499109000
trusted library allocation
page read and write
26499060000
trusted library allocation
page read and write
C71000
heap
page read and write
18169C96000
heap
page read and write
26498258000
trusted library allocation
page read and write
2649921D000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
26497B74000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2648EC56000
heap
page read and write
264993CE000
trusted library allocation
page read and write
2649B9E1000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
26499CBF000
trusted library allocation
page read and write
264A0380000
trusted library allocation
page read and write
264995E4000
trusted library allocation
page read and write
2648EC61000
heap
page read and write
C64000
heap
page read and write
2649BA27000
trusted library allocation
page read and write
18169D87000
trusted library allocation
page read and write
18169C94000
heap
page read and write
26498277000
trusted library allocation
page read and write
2649847B000
trusted library allocation
page read and write
26494F9E000
trusted library allocation
page read and write
2649905A000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264991D9000
trusted library allocation
page read and write
2649905E000
trusted library allocation
page read and write
2649A6E9000
trusted library allocation
page read and write
26498BFE000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
2649938E000
trusted library allocation
page read and write
26497C97000
trusted library allocation
page read and write
26498D55000
trusted library allocation
page read and write
2649BB80000
trusted library allocation
page read and write
2648EC0A000
heap
page read and write
264993A6000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2649C115000
heap
page read and write
2649C115000
heap
page read and write
26493C13000
trusted library allocation
page read and write
141E000
stack
page read and write
2648EC16000
heap
page read and write
26497E16000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
26497B9D000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
264991ED000
trusted library allocation
page read and write
26499391000
trusted library allocation
page read and write
2648EC55000
heap
page read and write
26498495000
trusted library allocation
page read and write
264956D6000
trusted library allocation
page read and write
264A01E8000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
2649B073000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
26499FF0000
trusted library allocation
page read and write
264A15F9000
trusted library allocation
page read and write
26494F51000
trusted library allocation
page read and write
26494FF6000
trusted library allocation
page read and write
264984E4000
trusted library allocation
page read and write
2649FFDD000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
264A00BE000
trusted library allocation
page read and write
B23333E000
unkown
page readonly
264993FA000
trusted library allocation
page read and write
264A03CA000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264A01FE000
trusted library allocation
page read and write
264A00F8000
trusted library allocation
page read and write
2649C243000
heap
page read and write
264A00D1000
trusted library allocation
page read and write
26499023000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
264984EF000
trusted library allocation
page read and write
18169D82000
trusted library allocation
page read and write
18169990000
heap
page read and write
26499312000
trusted library allocation
page read and write
264993F3000
trusted library allocation
page read and write
2649937C000
trusted library allocation
page read and write
26499360000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
1B2EF97B000
trusted library allocation
page read and write
26499168000
trusted library allocation
page read and write
C51000
heap
page read and write
264984B6000
trusted library allocation
page read and write
26497C8F000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
264935EF000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
1B2EF903000
trusted library allocation
page read and write
E9000
stack
page read and write
26497B82000
trusted library allocation
page read and write
2649A170000
trusted library allocation
page read and write
264984E1000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
264959C3000
trusted library allocation
page read and write
2649A580000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
264A0090000
trusted library allocation
page read and write
26499665000
trusted library allocation
page read and write
26494F5C000
trusted library allocation
page read and write
264A0016000
trusted library allocation
page read and write
2648EC05000
heap
page read and write
2649B2E3000
trusted library allocation
page read and write
26489752000
heap
page read and write
2649BBC7000
trusted library allocation
page read and write
264991E1000
trusted library allocation
page read and write
2649934F000
trusted library allocation
page read and write
26499CA2000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
2649B0E4000
trusted library allocation
page read and write
264A03E5000
trusted library allocation
page read and write
2649B8D2000
trusted library allocation
page read and write
2649962E000
trusted library allocation
page read and write
2649A0C8000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
264A0080000
trusted library allocation
page read and write
18169E00000
trusted library allocation
page read and write
2649B2D6000
trusted library allocation
page read and write
2649A074000
trusted library allocation
page read and write
39FA5FE000
unkown
page readonly
2649BBF6000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
1B2EF960000
trusted library allocation
page read and write
2649904F000
trusted library allocation
page read and write
1C6E5D58000
heap
page read and write
2648EC07000
heap
page read and write
264992B3000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
2649B150000
trusted library allocation
page read and write
26497B45000
trusted library allocation
page read and write
2649A1EA000
trusted library allocation
page read and write
2649595B000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
2649933B000
trusted library allocation
page read and write
26497A80000
trusted library allocation
page read and write
1C6E5C5C000
heap
page read and write
2649930F000
trusted library allocation
page read and write
2648EC1A000
heap
page read and write
264992BE000
trusted library allocation
page read and write
1C6E5C00000
heap
page read and write
264A2349000
trusted library allocation
page read and write
1B2EF630000
heap
page read and write
2649A04B000
trusted library allocation
page read and write
2649FF48000
trusted library allocation
page read and write
2649BAB6000
trusted library allocation
page read and write
2649BAED000
trusted library allocation
page read and write
264991F6000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
26498476000
trusted library allocation
page read and write
2649A192000
trusted library allocation
page read and write
2648EC02000
heap
page read and write
26498247000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
264A036E000
trusted library allocation
page read and write
26494F11000
trusted library allocation
page read and write
264984D8000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
2649A574000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
2649B9E8000
trusted library allocation
page read and write
26497B73000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
26497708000
heap
page read and write
26498D63000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
26497EFA000
trusted library allocation
page read and write
2649FFC7000
trusted library allocation
page read and write
264992CA000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
26499076000
trusted library allocation
page read and write
2649B99E000
trusted library allocation
page read and write
2649B8DC000
trusted library allocation
page read and write
2649B8AC000
trusted library allocation
page read and write
26497AD2000
trusted library allocation
page read and write
26498270000
trusted library allocation
page read and write
2649BB9C000
trusted library allocation
page read and write
26497A63000
trusted library allocation
page read and write
2649A0A9000
trusted library allocation
page read and write
2649FFB3000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2649BA18000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
264A00EF000
trusted library allocation
page read and write
264993CC000
trusted library allocation
page read and write
2649595C000
trusted library allocation
page read and write
2649B121000
trusted library allocation
page read and write
1C6E5D2D000
heap
page read and write
2649B0C2000
trusted library allocation
page read and write
2649FFC3000
trusted library allocation
page read and write
2649B9FD000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
264993D2000
trusted library allocation
page read and write
2649B6D4000
trusted library allocation
page read and write
264A34E1000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
2648EC6A000
heap
page read and write
2648EC1C000
heap
page read and write
2648EC29000
heap
page read and write
2648EC00000
heap
page read and write
2648EC06000
heap
page read and write
2649B60B000
trusted library allocation
page read and write
2649A6C3000
trusted library allocation
page read and write
26499249000
trusted library allocation
page read and write
264993FE000
trusted library allocation
page read and write
2649B89D000
trusted library allocation
page read and write
264A00E5000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
26499118000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649B28E000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
2648EC78000
heap
page read and write
2648EC64000
heap
page read and write
264993A6000
trusted library allocation
page read and write
2649849A000
trusted library allocation
page read and write
2649826D000
trusted library allocation
page read and write
264A01E7000
trusted library allocation
page read and write
55451FE000
stack
page read and write
2649B8BD000
trusted library allocation
page read and write
2649770B000
heap
page read and write
2649B8E5000
trusted library allocation
page read and write
26499681000
trusted library allocation
page read and write
2649770A000
heap
page read and write
26497B9D000
trusted library allocation
page read and write
264993CC000
trusted library allocation
page read and write
26489749000
heap
page read and write
26499270000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26494FF6000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649A604000
trusted library allocation
page read and write
1C6E4E80000
heap
page read and write
39F73CE000
unkown
page readonly
2649B161000
trusted library allocation
page read and write
26499306000
trusted library allocation
page read and write
2648EC73000
heap
page read and write
2648EBFF000
heap
page read and write
2648EC18000
heap
page read and write
2649937C000
trusted library allocation
page read and write
2649B94F000
trusted library allocation
page read and write
1B2EFB00000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
2649926A000
trusted library allocation
page read and write
2649A192000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
26499FDF000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
26497A8C000
trusted library allocation
page read and write
2648EC22000
heap
page read and write
26494FDC000
trusted library allocation
page read and write
264959F4000
trusted library allocation
page read and write
264984F6000
trusted library allocation
page read and write
2649BACB000
trusted library allocation
page read and write
26493C82000
trusted library allocation
page read and write
2649C116000
heap
page read and write
264991D6000
trusted library allocation
page read and write
264A2366000
trusted library allocation
page read and write
26497A8C000
trusted library allocation
page read and write
26499EBF000
trusted library allocation
page read and write
2649BADD000
trusted library allocation
page read and write
2649C116000
heap
page read and write
2649934B000
trusted library allocation
page read and write
2649B8D8000
trusted library allocation
page read and write
2649561A000
trusted library allocation
page read and write
264A038D000
trusted library allocation
page read and write
2649BA53000
trusted library allocation
page read and write
2649A615000
trusted library allocation
page read and write
26499EF5000
trusted library allocation
page read and write
264A2361000
trusted library allocation
page read and write
264959CE000
trusted library allocation
page read and write
2649BAFC000
trusted library allocation
page read and write
2649B2E7000
trusted library allocation
page read and write
2649A1F1000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649BABA000
trusted library allocation
page read and write
264984D4000
trusted library allocation
page read and write
2649B61D000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264993B0000
trusted library allocation
page read and write
2649BD5A000
trusted library allocation
page read and write
2649916B000
trusted library allocation
page read and write
2649A1EF000
trusted library allocation
page read and write
26499324000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
1C6E5C6C000
heap
page read and write
2649936A000
trusted library allocation
page read and write
2649B1A1000
trusted library allocation
page read and write
264993A5000
trusted library allocation
page read and write
264A2401000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
264A2355000
trusted library allocation
page read and write
1C6E4EC0000
heap
page read and write
264A0293000
trusted library allocation
page read and write
2649B097000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
2649B9F2000
trusted library allocation
page read and write
2649BA19000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
2649BA73000
trusted library allocation
page read and write
26494EC0000
trusted library allocation
page read and write
26498CE4000
trusted library allocation
page read and write
264A2424000
trusted library allocation
page read and write
264990D4000
trusted library allocation
page read and write
2649A535000
trusted library allocation
page read and write
1C6E4E60000
heap
page read and write
2648EC17000
heap
page read and write
2649B1AC000
trusted library allocation
page read and write
26494EB4000
trusted library allocation
page read and write
26499E6C000
trusted library allocation
page read and write
2649FF71000
trusted library allocation
page read and write
26498495000
trusted library allocation
page read and write
264A36F1000
trusted library allocation
page read and write
264996A0000
trusted library allocation
page read and write
26499387000
trusted library allocation
page read and write
264A0351000
trusted library allocation
page read and write
264A00E1000
trusted library allocation
page read and write
26499390000
trusted library allocation
page read and write
2649C160000
heap
page read and write
2649BB1B000
trusted library allocation
page read and write
2649B091000
trusted library allocation
page read and write
2649A04C000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2648EC00000
heap
page read and write
264A037B000
trusted library allocation
page read and write
264990D5000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264A0355000
trusted library allocation
page read and write
2649B0BE000
trusted library allocation
page read and write
264A1585000
trusted library allocation
page read and write
264A0295000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC2C000
heap
page read and write
264991D6000
trusted library allocation
page read and write
264A22FC000
trusted library allocation
page read and write
1C6E5CEE000
heap
page read and write
2648EC06000
heap
page read and write
2649B1B1000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264993B1000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26498BF2000
trusted library allocation
page read and write
26497B9D000
trusted library allocation
page read and write
2649FF75000
trusted library allocation
page read and write
264992FD000
trusted library allocation
page read and write
2649FFC3000
trusted library allocation
page read and write
264959CE000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
26497AF5000
trusted library allocation
page read and write
264A0CA3000
trusted library allocation
page read and write
2649B0B5000
trusted library allocation
page read and write
2649B899000
trusted library allocation
page read and write
264A00D4000
trusted library allocation
page read and write
2649A5E3000
trusted library allocation
page read and write
264990A1000
trusted library allocation
page read and write
1B2EF6F0000
heap
page read and write
26499D87000
trusted library allocation
page read and write
26497E54000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
2649905E000
trusted library allocation
page read and write
2649B911000
trusted library allocation
page read and write
26497EEA000
trusted library allocation
page read and write
264956F6000
trusted library allocation
page read and write
2649B2AF000
trusted library allocation
page read and write
2649B0C7000
trusted library allocation
page read and write
2649B591000
trusted library allocation
page read and write
264992B3000
trusted library allocation
page read and write
26497B9D000
trusted library allocation
page read and write
2649915F000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649908F000
trusted library allocation
page read and write
26497EDA000
trusted library allocation
page read and write
264A00D1000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
1B2EF660000
heap
page read and write
2648EC53000
heap
page read and write
2649866F000
trusted library allocation
page read and write
1C6E5CE6000
heap
page read and write
2648EC07000
heap
page read and write
2649B3EF000
trusted library allocation
page read and write
26497C9D000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264991C1000
trusted library allocation
page read and write
264A0366000
trusted library allocation
page read and write
2649B0AD000
trusted library allocation
page read and write
2649B6E8000
trusted library allocation
page read and write
2649561A000
trusted library allocation
page read and write
2649B0EA000
trusted library allocation
page read and write
26499611000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264A01EC000
trusted library allocation
page read and write
264A02FE000
trusted library allocation
page read and write
2648EC0A000
heap
page read and write
2648EC29000
heap
page read and write
2649BB18000
trusted library allocation
page read and write
2649A5DF000
trusted library allocation
page read and write
26493C1B000
trusted library allocation
page read and write
264984A0000
trusted library allocation
page read and write
181696B0000
remote allocation
page read and write
1CDE31E9000
heap
page read and write
264A1900000
trusted library allocation
page read and write
2649B94F000
trusted library allocation
page read and write
B2309D8000
stack
page read and write
26498D71000
trusted library allocation
page read and write
2649931C000
trusted library allocation
page read and write
264976F3000
heap
page read and write
2649B9EC000
trusted library allocation
page read and write
2649B6B2000
trusted library allocation
page read and write
26493B71000
trusted library allocation
page read and write
26493590000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
2648EC78000
heap
page read and write
264A0353000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26499123000
trusted library allocation
page read and write
26497A9A000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649A1EA000
trusted library allocation
page read and write
4E0000
heap
page read and write
264993A8000
trusted library allocation
page read and write
264956F6000
trusted library allocation
page read and write
264993A6000
trusted library allocation
page read and write
26498486000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2649A1FA000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
2649FFE2000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649CA85000
trusted library allocation
page read and write
26494C73000
trusted library allocation
page read and write
2648EC38000
heap
page read and write
2649A051000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649B9E1000
trusted library allocation
page read and write
1C6E5770000
heap
page read and write
2649C163000
heap
page read and write
2649A178000
trusted library allocation
page read and write
264986E1000
trusted library allocation
page read and write
26498486000
trusted library allocation
page read and write
2649B17F000
trusted library allocation
page read and write
26497713000
heap
page read and write
2649BAC6000
trusted library allocation
page read and write
2648EC65000
heap
page read and write
264A155C000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
2649BBD0000
trusted library allocation
page read and write
2649C115000
heap
page read and write
264992B5000
trusted library allocation
page read and write
264A2343000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
26494FDD000
trusted library allocation
page read and write
264A028F000
trusted library allocation
page read and write
2649B594000
trusted library allocation
page read and write
26494FBB000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
26497CA7000
trusted library allocation
page read and write
264A00E3000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
2649596B000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
2649936D000
trusted library allocation
page read and write
264959F3000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649B8ED000
trusted library allocation
page read and write
26499168000
trusted library allocation
page read and write
2649967C000
trusted library allocation
page read and write
26497739000
heap
page read and write
2649966A000
trusted library allocation
page read and write
264991CB000
trusted library allocation
page read and write
26497AB2000
trusted library allocation
page read and write
264982D0000
trusted library allocation
page read and write
2649A644000
trusted library allocation
page read and write
2649A06B000
trusted library allocation
page read and write
264993CE000
trusted library allocation
page read and write
26494C64000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
264993FC000
trusted library allocation
page read and write
1CDE1800000
trusted library allocation
page read and write
26495663000
trusted library allocation
page read and write
2649B993000
trusted library allocation
page read and write
2649B819000
trusted library allocation
page read and write
1CDE180A000
trusted library allocation
page read and write
2649C1F6000
heap
page read and write
2648EC21000
heap
page read and write
2648EC02000
heap
page read and write
264A14FC000
trusted library allocation
page read and write
264984CA000
trusted library allocation
page read and write
2649FF8C000
trusted library allocation
page read and write
2649A1F8000
trusted library allocation
page read and write
264990CE000
trusted library allocation
page read and write
264A00B6000
trusted library allocation
page read and write
2648EC59000
heap
page read and write
2649BADD000
trusted library allocation
page read and write
2648EC0E000
heap
page read and write
2649908F000
trusted library allocation
page read and write
C6A000
heap
page read and write
1CDE1640000
heap
page read and write
26499D6D000
trusted library allocation
page read and write
21989B50000
heap
page read and write
2649934F000
trusted library allocation
page read and write
26494EC8000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
1C6E5CF2000
heap
page read and write
26499043000
trusted library allocation
page read and write
264984C7000
trusted library allocation
page read and write
264982D4000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26498D83000
trusted library allocation
page read and write
264976F1000
heap
page read and write
2649B9F9000
trusted library allocation
page read and write
264990F1000
trusted library allocation
page read and write
18169DF4000
trusted library allocation
page read and write
2649A53F000
trusted library allocation
page read and write
2649B9EC000
trusted library allocation
page read and write
264982AB000
trusted library allocation
page read and write
2648EC58000
heap
page read and write
264993BA000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
2648EC02000
heap
page read and write
264993FE000
trusted library allocation
page read and write
2649825E000
trusted library allocation
page read and write
26499193000
trusted library allocation
page read and write
2649848C000
trusted library allocation
page read and write
2649B819000
trusted library allocation
page read and write
2649BB14000
trusted library allocation
page read and write
26499CE9000
trusted library allocation
page read and write
2649911B000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
2649929E000
trusted library allocation
page read and write
264992F2000
trusted library allocation
page read and write
2649FF71000
trusted library allocation
page read and write
B2322B8000
stack
page read and write
264990A9000
trusted library allocation
page read and write
26499179000
trusted library allocation
page read and write
C5A000
heap
page read and write
264993EA000
trusted library allocation
page read and write
1C6E502F000
trusted library allocation
page read and write
2649936D000
trusted library allocation
page read and write
2649C163000
heap
page read and write
264A22BA000
trusted library allocation
page read and write
26499109000
trusted library allocation
page read and write
2649A17C000
trusted library allocation
page read and write
264993B0000
trusted library allocation
page read and write
2649C9B6000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2649595F000
trusted library allocation
page read and write
2649C162000
heap
page read and write
264984A3000
trusted library allocation
page read and write
26494FBE000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
2649A66E000
trusted library allocation
page read and write
2649A08A000
trusted library allocation
page read and write
264976F3000
heap
page read and write
1B2EFB13000
trusted library allocation
page read and write
26499109000
trusted library allocation
page read and write
2649B022000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
26499316000
trusted library allocation
page read and write
26497B7B000
trusted library allocation
page read and write
264992FD000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
2649BA64000
trusted library allocation
page read and write
26494C64000
trusted library allocation
page read and write
2649BB10000
trusted library allocation
page read and write
2649B9B2000
trusted library allocation
page read and write
B2321FE000
unkown
page readonly
26498D98000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2648EC59000
heap
page read and write
2649BE61000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
2648EC18000
heap
page read and write
2649A170000
trusted library allocation
page read and write
1C6E5CA1000
heap
page read and write
264984E4000
trusted library allocation
page read and write
5D4000
heap
page read and write
2649B0C7000
trusted library allocation
page read and write
26497C6E000
trusted library allocation
page read and write
26494F8E000
trusted library allocation
page read and write
2649B984000
trusted library allocation
page read and write
2649A6C3000
trusted library allocation
page read and write
264A3653000
trusted library allocation
page read and write
26497C6E000
trusted library allocation
page read and write
264A02A0000
trusted library allocation
page read and write
2649770B000
heap
page read and write
2648EC56000
heap
page read and write
264996D6000
trusted library allocation
page read and write
26497ACC000
trusted library allocation
page read and write
26499179000
trusted library allocation
page read and write
264A03C0000
trusted library allocation
page read and write
1CDE14B0000
heap
page read and write
1C6E5CE8000
heap
page read and write
2648EC64000
heap
page read and write
C48000
heap
page read and write
B194DD8000
stack
page read and write
5D4000
heap
page read and write
2648EC1B000
heap
page read and write
2649B6BB000
trusted library allocation
page read and write
264984DF000
trusted library allocation
page read and write
264A1624000
trusted library allocation
page read and write
264A0389000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
264A0299000
trusted library allocation
page read and write
2649B2CE000
trusted library allocation
page read and write
264991B8000
trusted library allocation
page read and write
2649B88A000
trusted library allocation
page read and write
55421FF000
stack
page read and write
26497B7A000
trusted library allocation
page read and write
26494C9C000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
1B2EFB3C000
trusted library allocation
page read and write
2649B62F000
trusted library allocation
page read and write
1C6E5CE8000
heap
page read and write
2649B1A1000
trusted library allocation
page read and write
26499D76000
trusted library allocation
page read and write
2649B0DE000
trusted library allocation
page read and write
264996CD000
trusted library allocation
page read and write
264992BA000
trusted library allocation
page read and write
26495661000
trusted library allocation
page read and write
264984BC000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
2648EC72000
heap
page read and write
26499EC9000
trusted library allocation
page read and write
264991D9000
trusted library allocation
page read and write
2649FFC7000
trusted library allocation
page read and write
26493B2F000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264990A1000
trusted library allocation
page read and write
26497EB0000
trusted library allocation
page read and write
2649FFEE000
trusted library allocation
page read and write
2649BBB7000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
2649C115000
heap
page read and write
1C6E5D3B000
heap
page read and write
2648EC58000
heap
page read and write
2649C116000
heap
page read and write
2648EC00000
heap
page read and write
18169D30000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
1C6E5D69000
heap
page read and write
264991B9000
trusted library allocation
page read and write
2649C15B000
heap
page read and write
26499E5C000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2648EC5A000
heap
page read and write
2648EC6C000
heap
page read and write
2649B2EE000
trusted library allocation
page read and write
2649BE27000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
1CDE167B000
heap
page read and write
BE0000
trusted library allocation
page read and write
2649BA6E000
trusted library allocation
page read and write
264A00A4000
trusted library allocation
page read and write
26497C6C000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
264984CC000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
26499259000
trusted library allocation
page read and write
264A0372000
trusted library allocation
page read and write
2649840D000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
264A00D9000
trusted library allocation
page read and write
26499D56000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
264A3693000
trusted library allocation
page read and write
3130000
heap
page read and write
2648EC00000
heap
page read and write
2649B5FD000
trusted library allocation
page read and write
150000
heap
page read and write
2649C103000
heap
page read and write
26498E07000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
264A15B4000
trusted library allocation
page read and write
26494FC7000
trusted library allocation
page read and write
2649BB0C000
trusted library allocation
page read and write
1B2EF96E000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
2648EC53000
heap
page read and write
26499076000
trusted library allocation
page read and write
2649B1F9000
trusted library allocation
page read and write
1C6E5064000
trusted library allocation
page read and write
2649C161000
heap
page read and write
26497C3A000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
26499EC9000
trusted library allocation
page read and write
26499626000
trusted library allocation
page read and write
5D4000
heap
page read and write
264993EA000
trusted library allocation
page read and write
2649BA6F000
trusted library allocation
page read and write
1C6E4F00000
trusted library allocation
page read and write
264996CD000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
26499333000
trusted library allocation
page read and write
26497C8D000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649FF87000
trusted library allocation
page read and write
2648EC38000
heap
page read and write
2648EC00000
heap
page read and write
181698A0000
unclassified section
page read and write
2649906E000
trusted library allocation
page read and write
2649B6B4000
trusted library allocation
page read and write
26495910000
trusted library allocation
page read and write
1C6E5CE0000
heap
page read and write
26499275000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
264A0CCA000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2649BB9C000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649770B000
heap
page read and write
2648EC0D000
heap
page read and write
2649B6AE000
trusted library allocation
page read and write
264959F3000
trusted library allocation
page read and write
2649B812000
trusted library allocation
page read and write
26497B8A000
trusted library allocation
page read and write
264935CE000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649BA57000
trusted library allocation
page read and write
2649B9A9000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264991DD000
trusted library allocation
page read and write
1E853FC000
stack
page read and write
2648EC18000
heap
page read and write
2648EC28000
heap
page read and write
2649B9E8000
trusted library allocation
page read and write
26499D5F000
trusted library allocation
page read and write
2649A56C000
trusted library allocation
page read and write
264991C4000
trusted library allocation
page read and write
1C6E574B000
unkown
page execute read
2648EC6A000
heap
page read and write
264991D3000
trusted library allocation
page read and write
1CDE31C0000
heap
page read and write
264993FE000
trusted library allocation
page read and write
2648EC22000
heap
page read and write
264A037B000
trusted library allocation
page read and write
26494FFA000
trusted library allocation
page read and write
2649BA57000
trusted library allocation
page read and write
2649C159000
heap
page read and write
26498480000
trusted library allocation
page read and write
6F1000
unkown
page execute read
2649937C000
trusted library allocation
page read and write
26494CAE000
trusted library allocation
page read and write
2649848C000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
264A02C4000
trusted library allocation
page read and write
26495985000
trusted library allocation
page read and write
264A0CB9000
trusted library allocation
page read and write
2649A077000
trusted library allocation
page read and write
181696F0000
heap
page read and write
B1976FE000
unkown
page readonly
2648EC10000
heap
page read and write
2649B099000
trusted library allocation
page read and write
2649FF64000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
2649C116000
heap
page read and write
2648EC21000
heap
page read and write
26494EA1000
trusted library allocation
page read and write
2649FF8C000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649BAFC000
trusted library allocation
page read and write
2649A1EF000
trusted library allocation
page read and write
264984F8000
trusted library allocation
page read and write
264992FD000
trusted library allocation
page read and write
26499CCC000
trusted library allocation
page read and write
2649B9DA000
trusted library allocation
page read and write
2649BB25000
trusted library allocation
page read and write
264A01FE000
trusted library allocation
page read and write
2649B0B9000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
2649B0E4000
trusted library allocation
page read and write
2649938D000
trusted library allocation
page read and write
26499270000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
26499E6E000
trusted library allocation
page read and write
26497A6C000
trusted library allocation
page read and write
264A005D000
trusted library allocation
page read and write
2648EC55000
heap
page read and write
264991B2000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264991CE000
trusted library allocation
page read and write
26497EFE000
trusted library allocation
page read and write
1C6E5C09000
heap
page read and write
2648973D000
heap
page read and write
26497708000
heap
page read and write
264993AD000
trusted library allocation
page read and write
264991C4000
trusted library allocation
page read and write
2649B2E2000
trusted library allocation
page read and write
264996A0000
trusted library allocation
page read and write
26498D83000
trusted library allocation
page read and write
2649B6AE000
trusted library allocation
page read and write
26499E97000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
2649B928000
trusted library allocation
page read and write
26498258000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649C116000
heap
page read and write
2649B1A9000
trusted library allocation
page read and write
55449FF000
stack
page read and write
264991C4000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649C162000
heap
page read and write
264991E8000
trusted library allocation
page read and write
2649B625000
trusted library allocation
page read and write
26499098000
trusted library allocation
page read and write
26499062000
trusted library allocation
page read and write
26498D93000
trusted library allocation
page read and write
264991D9000
trusted library allocation
page read and write
26498235000
trusted library allocation
page read and write
26498460000
trusted library allocation
page read and write
2649A1FA000
trusted library allocation
page read and write
2648EC65000
heap
page read and write
2649B8A5000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
1B2EFF40000
heap
page read and write
2649A6F0000
trusted library allocation
page read and write
2649B8BD000
trusted library allocation
page read and write
2649BABA000
trusted library allocation
page read and write
264A0041000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
264A00A9000
trusted library allocation
page read and write
1B2EFB03000
trusted library allocation
page read and write
2649B81B000
trusted library allocation
page read and write
2649B9FD000
trusted library allocation
page read and write
2649B81B000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
2648EC06000
heap
page read and write
264982BE000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
26499082000
trusted library allocation
page read and write
2649B6C9000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
26499E59000
trusted library allocation
page read and write
26497C7D000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
264A00E3000
trusted library allocation
page read and write
264991C1000
trusted library allocation
page read and write
26499184000
trusted library allocation
page read and write
26494F9A000
trusted library allocation
page read and write
264984DF000
trusted library allocation
page read and write
2648EC50000
heap
page read and write
26499643000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2649B9DE000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
2649934F000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
26497A61000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
26499EA4000
trusted library allocation
page read and write
2649938D000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
B23223E000
unkown
page readonly
264991D3000
trusted library allocation
page read and write
264A1559000
trusted library allocation
page read and write
2649938C000
trusted library allocation
page read and write
264A00D9000
trusted library allocation
page read and write
BAF000
stack
page read and write
2649B810000
trusted library allocation
page read and write
264A02FE000
trusted library allocation
page read and write
1C6E5CE9000
heap
page read and write
2649C15D000
heap
page read and write
2649BACE000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264995C9000
trusted library allocation
page read and write
2649FF64000
trusted library allocation
page read and write
1C6E5CE3000
heap
page read and write
26499363000
trusted library allocation
page read and write
26497A7A000
trusted library allocation
page read and write
2649C162000
heap
page read and write
264A3780000
trusted library allocation
page read and write
1C6E5C8D000
heap
page read and write
264A01B3000
trusted library allocation
page read and write
26494F43000
trusted library allocation
page read and write
1B2EF9A8000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
26494F97000
trusted library allocation
page read and write
264984C1000
trusted library allocation
page read and write
2648EC31000
heap
page read and write
26498BCF000
trusted library allocation
page read and write
2648EC55000
heap
page read and write
264A0382000
trusted library allocation
page read and write
26497B9D000
trusted library allocation
page read and write
264996E3000
trusted library allocation
page read and write
26499123000
trusted library allocation
page read and write
2649C166000
heap
page read and write
2649B0B5000
trusted library allocation
page read and write
26498D58000
trusted library allocation
page read and write
2649B5D2000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
26495622000
trusted library allocation
page read and write
26497B57000
trusted library allocation
page read and write
26495661000
trusted library allocation
page read and write
26499640000
trusted library allocation
page read and write
264956A8000
trusted library allocation
page read and write
26499E0C000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
2649B943000
trusted library allocation
page read and write
264A23FC000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
264A0349000
trusted library allocation
page read and write
26499299000
trusted library allocation
page read and write
26494C8F000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649939B000
trusted library allocation
page read and write
2649B899000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
26499648000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2649906A000
trusted library allocation
page read and write
21989AC0000
heap
page read and write
1B2EF915000
trusted library allocation
page read and write
26499289000
trusted library allocation
page read and write
264A00AE000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
26494F96000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
264A23F9000
trusted library allocation
page read and write
26499033000
trusted library allocation
page read and write
2649B1FC000
trusted library allocation
page read and write
26499E9A000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
2648EC06000
heap
page read and write
2648EC6B000
heap
page read and write
2649B2E2000
trusted library allocation
page read and write
26499E55000
trusted library allocation
page read and write
1C6E5C5C000
heap
page read and write
2648EC73000
heap
page read and write
264A02A0000
trusted library allocation
page read and write
26499082000
trusted library allocation
page read and write
2649FFC7000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
2649B1F1000
trusted library allocation
page read and write
2649B0CC000
trusted library allocation
page read and write
264993BA000
trusted library allocation
page read and write
2649A0C8000
trusted library allocation
page read and write
264991C3000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
2649B07C000
trusted library allocation
page read and write
1C6E505F000
trusted library allocation
page read and write
2649A612000
trusted library allocation
page read and write
264984FC000
trusted library allocation
page read and write
2649908F000
trusted library allocation
page read and write
264991D8000
trusted library allocation
page read and write
2649B918000
trusted library allocation
page read and write
1C6E5750000
unkown
page execute read
26499191000
trusted library allocation
page read and write
26497EFE000
trusted library allocation
page read and write
1D29CB31000
trusted library allocation
page execute read
26497A61000
trusted library allocation
page read and write
2649C160000
heap
page read and write
B2333BE000
unkown
page readonly
264A2321000
trusted library allocation
page read and write
2649961C000
trusted library allocation
page read and write
2648EC65000
heap
page read and write
2649B198000
trusted library allocation
page read and write
2649B899000
trusted library allocation
page read and write
26497CCC000
trusted library allocation
page read and write
2649A18A000
trusted library allocation
page read and write
2648EC31000
heap
page read and write
2648EC2C000
heap
page read and write
26498497000
trusted library allocation
page read and write
1E85BFE000
stack
page read and write
264A0073000
trusted library allocation
page read and write
2649B9F2000
trusted library allocation
page read and write
26499179000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264A0CB9000
trusted library allocation
page read and write
264993A3000
trusted library allocation
page read and write
264A3691000
trusted library allocation
page read and write
2649C101000
heap
page read and write
2648EC61000
heap
page read and write
2649B07E000
trusted library allocation
page read and write
2649BE3B000
trusted library allocation
page read and write
26498495000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
26498D59000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
1C6E5C7D000
heap
page read and write
26497CD6000
trusted library allocation
page read and write
26499342000
trusted library allocation
page read and write
264A2389000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
264992EC000
trusted library allocation
page read and write
17D67FC1E000
trusted library allocation
page read and write
2648EC0A000
heap
page read and write
264959F4000
trusted library allocation
page read and write
2649A1BD000
trusted library allocation
page read and write
264A0299000
trusted library allocation
page read and write
2649906E000
trusted library allocation
page read and write
264991B9000
trusted library allocation
page read and write
2649FFEE000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2648EC60000
heap
page read and write
26499255000
trusted library allocation
page read and write
2649C15D000
heap
page read and write
2649C1D3000
heap
page read and write
2649BACE000
trusted library allocation
page read and write
2649A0E9000
trusted library allocation
page read and write
264992EC000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
2648EC29000
heap
page read and write
2649BACB000
trusted library allocation
page read and write
26497C8F000
trusted library allocation
page read and write
264A0063000
trusted library allocation
page read and write
39F9DFE000
stack
page read and write
26495952000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
264A0349000
trusted library allocation
page read and write
264982CA000
trusted library allocation
page read and write
264A1566000
trusted library allocation
page read and write
1C6E5023000
trusted library allocation
page read and write
2649921D000
trusted library allocation
page read and write
264A0C8A000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
2649A5D3000
trusted library allocation
page read and write
264A36D6000
trusted library allocation
page read and write
2649B14B000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
1C6E5B09000
trusted library allocation
page read and write
B195DFE000
stack
page read and write
26497B4C000
trusted library allocation
page read and write
264A00F1000
trusted library allocation
page read and write
2649B606000
trusted library allocation
page read and write
26497713000
heap
page read and write
2649B814000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
2649BAEB000
trusted library allocation
page read and write
264986C2000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
2649FF92000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2648EC6E000
heap
page read and write
2649B0EA000
trusted library allocation
page read and write
2649B295000
trusted library allocation
page read and write
2649A190000
trusted library allocation
page read and write
1C6E5760000
trusted library allocation
page read and write
26495997000
trusted library allocation
page read and write
18169E03000
trusted library allocation
page read and write
26497C9B000
trusted library allocation
page read and write
2649849F000
trusted library allocation
page read and write
26499098000
trusted library allocation
page read and write
264A0366000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
18169D24000
trusted library allocation
page read and write
2649A5E3000
trusted library allocation
page read and write
2649938B000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
2649934B000
trusted library allocation
page read and write
2649C104000
heap
page read and write
26493BF6000
trusted library allocation
page read and write
264993FE000
trusted library allocation
page read and write
2648EC0E000
heap
page read and write
264A002B000
trusted library allocation
page read and write
264991D3000
trusted library allocation
page read and write
264A00A9000
trusted library allocation
page read and write
2648EC62000
heap
page read and write
2649FF4E000
trusted library allocation
page read and write
2649BD4F000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
17D67FC24000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
26498BFB000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
26499043000
trusted library allocation
page read and write
2649824F000
trusted library allocation
page read and write
264982AB000
trusted library allocation
page read and write
26497B8D000
trusted library allocation
page read and write
2649C15D000
heap
page read and write
264A236D000
trusted library allocation
page read and write
1B2EF973000
trusted library allocation
page read and write
2648EC6D000
heap
page read and write
2649B58E000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
78C000
unkown
page readonly
2649562A000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26499EAD000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
1B2EF923000
trusted library allocation
page read and write
264A00B6000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
264990D5000
trusted library allocation
page read and write
26493BFB000
trusted library allocation
page read and write
2648EC2B000
heap
page read and write
2649934B000
trusted library allocation
page read and write
26497C79000
trusted library allocation
page read and write
264991F6000
trusted library allocation
page read and write
18169F0C000
trusted library allocation
page read and write
1C6E50C2000
trusted library allocation
page read and write
26497A5D000
trusted library allocation
page read and write
1C6E5D2A000
heap
page read and write
2649B97C000
trusted library allocation
page read and write
26489741000
heap
page read and write
2648EC1F000
heap
page read and write
2649BDA3000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
2649B9D8000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
2648EC5A000
heap
page read and write
26497A5A000
trusted library allocation
page read and write
264996E3000
trusted library allocation
page read and write
2649B2DE000
trusted library allocation
page read and write
26499E93000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
1B2EF580000
unclassified section
page readonly
264A003B000
trusted library allocation
page read and write
2649B215000
trusted library allocation
page read and write
1CDE1925000
heap
page read and write
2648EC28000
heap
page read and write
26493C61000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2648EC06000
heap
page read and write
26499EC9000
trusted library allocation
page read and write
2649BAFC000
trusted library allocation
page read and write
26499D63000
trusted library allocation
page read and write
264956AF000
trusted library allocation
page read and write
264A0083000
trusted library allocation
page read and write
1C6E506A000
trusted library allocation
page read and write
39F728E000
stack
page read and write
26494EC8000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
21989B57000
heap
page read and write
264993A1000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
26499079000
trusted library allocation
page read and write
18169D72000
trusted library allocation
page read and write
26498497000
trusted library allocation
page read and write
26499260000
trusted library allocation
page read and write
18169DA8000
trusted library allocation
page read and write
2649B1AC000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
264991B8000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
2649BAC6000
trusted library allocation
page read and write
1C6E5D44000
heap
page read and write
26497713000
heap
page read and write
2649596B000
trusted library allocation
page read and write
264A1300000
trusted library allocation
page read and write
26498298000
trusted library allocation
page read and write
2649A5EF000
trusted library allocation
page read and write
C53000
heap
page read and write
26493CDB000
trusted library allocation
page read and write
26499168000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649936A000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
26499385000
trusted library allocation
page read and write
2649A5D0000
trusted library allocation
page read and write
264992FE000
trusted library allocation
page read and write
264A02FA000
trusted library allocation
page read and write
2649B164000
trusted library allocation
page read and write
2649C160000
heap
page read and write
26498CE5000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
2649911D000
trusted library allocation
page read and write
B1966BE000
stack
page read and write
264956F6000
trusted library allocation
page read and write
26497708000
heap
page read and write
2649BACB000
trusted library allocation
page read and write
264A233D000
trusted library allocation
page read and write
1C6E5D69000
heap
page read and write
2648EC02000
heap
page read and write
1C6E5D69000
heap
page read and write
26498254000
trusted library allocation
page read and write
26494F4E000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
264990CA000
trusted library allocation
page read and write
2649938D000
trusted library allocation
page read and write
C71000
heap
page read and write
26499390000
trusted library allocation
page read and write
264A028D000
trusted library allocation
page read and write
1C6E5048000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2649B8D2000
trusted library allocation
page read and write
181698AF000
unclassified section
page read and write
264A3660000
trusted library allocation
page read and write
2649B8D8000
trusted library allocation
page read and write
2649937C000
trusted library allocation
page read and write
2649A53F000
trusted library allocation
page read and write
26494EA3000
trusted library allocation
page read and write
264A0355000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26499640000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
2649B6AC000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
2649B149000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
26499299000
trusted library allocation
page read and write
2649BA42000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649915A000
trusted library allocation
page read and write
18169DB5000
trusted library allocation
page read and write
264984B4000
trusted library allocation
page read and write
55431FE000
stack
page read and write
2649561B000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
26499312000
trusted library allocation
page read and write
264A00EF000
trusted library allocation
page read and write
2649A5AC000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
264A00E1000
trusted library allocation
page read and write
26499183000
trusted library allocation
page read and write
C64000
heap
page read and write
2649BE04000
trusted library allocation
page read and write
264993D1000
trusted library allocation
page read and write
264993AC000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2648EC59000
heap
page read and write
26498D5E000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
2649FF57000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
1C6E55AF000
unclassified section
page read and write
26497E16000
trusted library allocation
page read and write
2649934B000
trusted library allocation
page read and write
26499245000
trusted library allocation
page read and write
26498BFB000
trusted library allocation
page read and write
264992B5000
trusted library allocation
page read and write
1C6E5061000
trusted library allocation
page read and write
B1965FE000
unkown
page readonly
2649FF75000
trusted library allocation
page read and write
264A362B000
trusted library allocation
page read and write
2649938A000
trusted library allocation
page read and write
1B2EF610000
unclassified section
page readonly
2649B6A9000
trusted library allocation
page read and write
26494F5C000
trusted library allocation
page read and write
2649B88A000
trusted library allocation
page read and write
2649BD69000
trusted library allocation
page read and write
264995E7000
trusted library allocation
page read and write
1CDE31DA000
heap
page read and write
26499381000
trusted library allocation
page read and write
26499282000
trusted library allocation
page read and write
2649B2EE000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
26499347000
trusted library allocation
page read and write
264935BF000
trusted library allocation
page read and write
2648EC73000
heap
page read and write
26499EAD000
trusted library allocation
page read and write
26499028000
trusted library allocation
page read and write
2649C116000
heap
page read and write
2649B3C5000
trusted library allocation
page read and write
26497A9B000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
2649B8D8000
trusted library allocation
page read and write
26494F51000
trusted library allocation
page read and write
2649B0F0000
trusted library allocation
page read and write
264A0389000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
264992CA000
trusted library allocation
page read and write
1B2EFAC6000
heap
page read and write
2648EC6E000
heap
page read and write
26494FFE000
trusted library allocation
page read and write
2649962E000
trusted library allocation
page read and write
264976F3000
heap
page read and write
2649569E000
trusted library allocation
page read and write
2648EC26000
heap
page read and write
1CDE1590000
heap
page read and write
26499EDF000
trusted library allocation
page read and write
264A00D9000
trusted library allocation
page read and write
2649C160000
heap
page read and write
2648EC65000
heap
page read and write
2649BA58000
trusted library allocation
page read and write
55421FA000
stack
page read and write
1B2EF95B000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
26498BF6000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2649A164000
trusted library allocation
page read and write
264986F3000
trusted library allocation
page read and write
264A3100000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649BAED000
trusted library allocation
page read and write
5D4000
heap
page read and write
2648EC18000
heap
page read and write
264956FC000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
26498D5A000
trusted library allocation
page read and write
2649A164000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2649A5BD000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
264A23CD000
trusted library allocation
page read and write
264956DB000
trusted library allocation
page read and write
2649770B000
heap
page read and write
26497E10000
trusted library allocation
page read and write
26499E87000
trusted library allocation
page read and write
1C6E5003000
trusted library allocation
page read and write
26499C46000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
26499390000
trusted library allocation
page read and write
26494FA8000
trusted library allocation
page read and write
26498BFC000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2648EC5F000
heap
page read and write
181698B0000
heap
page read and write
264986A1000
trusted library allocation
page read and write
2649B98B000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264984CC000
trusted library allocation
page read and write
264A02F8000
trusted library allocation
page read and write
264A00BE000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
2649C163000
heap
page read and write
264991E6000
trusted library allocation
page read and write
1B2EF9B7000
trusted library allocation
page read and write
264A1604000
trusted library allocation
page read and write
264A03DC000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264A0071000
trusted library allocation
page read and write
26499C7B000
trusted library allocation
page read and write
26493BF6000
trusted library allocation
page read and write
2649BAED000
trusted library allocation
page read and write
264991E8000
trusted library allocation
page read and write
26497EFA000
trusted library allocation
page read and write
264976F3000
heap
page read and write
2648EC12000
heap
page read and write
264A01FE000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
26499020000
trusted library allocation
page read and write
26497CE5000
trusted library allocation
page read and write
2649B8C0000
trusted library allocation
page read and write
2648EC6B000
heap
page read and write
2648EC4E000
heap
page read and write
2648EC13000
heap
page read and write
2649BAED000
trusted library allocation
page read and write
2649C116000
heap
page read and write
26499347000
trusted library allocation
page read and write
264A22C1000
trusted library allocation
page read and write
26499DB4000
trusted library allocation
page read and write
1C6E5C01000
heap
page read and write
2648EC56000
heap
page read and write
2648EC00000
heap
page read and write
C4A000
heap
page read and write
26494F41000
trusted library allocation
page read and write
26499383000
trusted library allocation
page read and write
26493CE1000
trusted library allocation
page read and write
264959C8000
trusted library allocation
page read and write
264991D7000
trusted library allocation
page read and write
264956F6000
trusted library allocation
page read and write
2649B12D000
trusted library allocation
page read and write
264A0389000
trusted library allocation
page read and write
264986F7000
trusted library allocation
page read and write
26499360000
trusted library allocation
page read and write
26497ED7000
trusted library allocation
page read and write
26499344000
trusted library allocation
page read and write
2649C162000
heap
page read and write
2649B6BB000
trusted library allocation
page read and write
2649BBD0000
trusted library allocation
page read and write
2649FF92000
trusted library allocation
page read and write
2649CA89000
trusted library allocation
page read and write
26495907000
trusted library allocation
page read and write
2649C115000
heap
page read and write
264991D9000
trusted library allocation
page read and write
264992AD000
trusted library allocation
page read and write
26493CFE000
trusted library allocation
page read and write
2649966E000
trusted library allocation
page read and write
26495633000
trusted library allocation
page read and write
2649A1BA000
trusted library allocation
page read and write
26498440000
trusted library allocation
page read and write
264956D4000
trusted library allocation
page read and write
264A15CA000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
2649B574000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
39F72CE000
unkown
page readonly
26494F3D000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
2649B6ED000
trusted library allocation
page read and write
26498238000
trusted library allocation
page read and write
C6F000
heap
page read and write
2648EC10000
heap
page read and write
26499109000
trusted library allocation
page read and write
26499681000
trusted library allocation
page read and write
B2333FE000
stack
page read and write
264992BD000
trusted library allocation
page read and write
26498D77000
trusted library allocation
page read and write
26499324000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2648EC00000
heap
page read and write
2649A1F1000
trusted library allocation
page read and write
1C6E5D44000
heap
page read and write
2648EC5A000
heap
page read and write
264A00A4000
trusted library allocation
page read and write
2649C109000
heap
page read and write
2648EC60000
heap
page read and write
2648EC29000
heap
page read and write
264991AF000
trusted library allocation
page read and write
2649824D000
trusted library allocation
page read and write
26494EFB000
trusted library allocation
page read and write
2648EC27000
heap
page read and write
264996F7000
trusted library allocation
page read and write
2649B182000
trusted library allocation
page read and write
26494F67000
trusted library allocation
page read and write
26497A73000
trusted library allocation
page read and write
264984D4000
trusted library allocation
page read and write
26498E0A000
trusted library allocation
page read and write
264984E1000
trusted library allocation
page read and write
26498D7D000
trusted library allocation
page read and write
C56000
heap
page read and write
264A0050000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2649BA32000
trusted library allocation
page read and write
26499168000
trusted library allocation
page read and write
26495625000
trusted library allocation
page read and write
2648EC50000
heap
page read and write
2649938D000
trusted library allocation
page read and write
2649B111000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649B661000
trusted library allocation
page read and write
2648EC19000
heap
page read and write
26499DAC000
trusted library allocation
page read and write
26495633000
trusted library allocation
page read and write
26499343000
trusted library allocation
page read and write
264A01C4000
trusted library allocation
page read and write
264984B4000
trusted library allocation
page read and write
26499267000
trusted library allocation
page read and write
2649A556000
trusted library allocation
page read and write
264959F3000
trusted library allocation
page read and write
18169993000
heap
page read and write
264A0293000
trusted library allocation
page read and write
2649B182000
trusted library allocation
page read and write
1C6E5C63000
heap
page read and write
264990A5000
trusted library allocation
page read and write
2649849C000
trusted library allocation
page read and write
26494C7E000
trusted library allocation
page read and write
1CDE31E1000
heap
page read and write
264990A1000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649919C000
trusted library allocation
page read and write
26499F4A000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649BAF2000
trusted library allocation
page read and write
264992FD000
trusted library allocation
page read and write
2649848C000
trusted library allocation
page read and write
1B2EF6C0000
heap
page read and write
264984DC000
trusted library allocation
page read and write
2649BB7E000
trusted library allocation
page read and write
2649B9E1000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649BBFB000
trusted library allocation
page read and write
2649BA53000
trusted library allocation
page read and write
264A15B1000
trusted library allocation
page read and write
264A00A4000
trusted library allocation
page read and write
264A2DA8000
trusted library allocation
page read and write
2648EC50000
heap
page read and write
2649569A000
trusted library allocation
page read and write
2649B6D0000
trusted library allocation
page read and write
26499022000
trusted library allocation
page read and write
26494F9A000
trusted library allocation
page read and write
C48000
heap
page read and write
26494F9A000
trusted library allocation
page read and write
26497EC7000
trusted library allocation
page read and write
2649B154000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
2648EC59000
heap
page read and write
26497CD6000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
264A03F4000
trusted library allocation
page read and write
21989A90000
heap
page read and write
26493598000
trusted library allocation
page read and write
2649CAB1000
trusted library allocation
page read and write
1C6E5CE8000
heap
page read and write
C4F000
heap
page read and write
2649936A000
trusted library allocation
page read and write
2649915A000
trusted library allocation
page read and write
264A36C3000
trusted library allocation
page read and write
1C6E5C8A000
heap
page read and write
2649B825000
trusted library allocation
page read and write
2649CA61000
trusted library allocation
page read and write
1CDE31EA000
heap
page read and write
2649B9E1000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649B57A000
trusted library allocation
page read and write
264A00D4000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26494C6C000
trusted library allocation
page read and write
2648EC3D000
heap
page read and write
1B2EFA00000
heap
page read and write
2649B1F1000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
26497EC2000
trusted library allocation
page read and write
1C6E5C9C000
heap
page read and write
26494FBB000
trusted library allocation
page read and write
2649CACA000
trusted library allocation
page read and write
264993C2000
trusted library allocation
page read and write
B9F000
stack
page read and write
26499336000
trusted library allocation
page read and write
26497A7A000
trusted library allocation
page read and write
2649FFEE000
trusted library allocation
page read and write
26499FA4000
trusted library allocation
page read and write
1C6E5CAA000
heap
page read and write
2648EC6C000
heap
page read and write
26494EB1000
trusted library allocation
page read and write
264A01C9000
trusted library allocation
page read and write
264992FE000
trusted library allocation
page read and write
26494FE5000
trusted library allocation
page read and write
2649A18C000
trusted library allocation
page read and write
1C6E55E0000
heap
page read and write
2FC0000
heap
page read and write
264A14AE000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264A00B6000
trusted library allocation
page read and write
26499195000
trusted library allocation
page read and write
264984A3000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
1C6E5D2A000
heap
page read and write
26499E9A000
trusted library allocation
page read and write
264976F3000
heap
page read and write
264993A6000
trusted library allocation
page read and write
7C4000
unkown
page readonly
264A00C1000
trusted library allocation
page read and write
264993AC000
trusted library allocation
page read and write
2649931C000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
1B2EFB11000
trusted library allocation
page read and write
2648EC02000
heap
page read and write
2649B924000
trusted library allocation
page read and write
2649904F000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
2649B814000
trusted library allocation
page read and write
264992BE000
trusted library allocation
page read and write
264993B1000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
264992FE000
trusted library allocation
page read and write
26499076000
trusted library allocation
page read and write
264A01E5000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
264956FE000
trusted library allocation
page read and write
2649B3AB000
trusted library allocation
page read and write
1C6E506F000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
264A0293000
trusted library allocation
page read and write
264A0293000
trusted library allocation
page read and write
26499025000
trusted library allocation
page read and write
2649BAEA000
trusted library allocation
page read and write
1C6E5078000
trusted library allocation
page read and write
264A00FA000
trusted library allocation
page read and write
39F7DD8000
stack
page read and write
2648EC53000
heap
page read and write
2648EC50000
heap
page read and write
2649C9D4000
trusted library allocation
page read and write
2649B914000
trusted library allocation
page read and write
2649CB04000
trusted library allocation
page read and write
5D4000
heap
page read and write
2649936A000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
26499341000
trusted library allocation
page read and write
264A0351000
trusted library allocation
page read and write
264A00F1000
trusted library allocation
page read and write
2649BB7C000
trusted library allocation
page read and write
264A00AE000
trusted library allocation
page read and write
26497A96000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
264A00E1000
trusted library allocation
page read and write
2649598D000
trusted library allocation
page read and write
2648EC09000
heap
page read and write
2649909A000
trusted library allocation
page read and write
18169F00000
trusted library allocation
page read and write
2649B64B000
trusted library allocation
page read and write
1B2EF60B000
remote allocation
page execute read
2649C15A000
heap
page read and write
7C0000
unkown
page write copy
2649563A000
trusted library allocation
page read and write
2649B198000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
264A03F0000
trusted library allocation
page read and write
26498D70000
trusted library allocation
page read and write
26495672000
trusted library allocation
page read and write
1E863FE000
stack
page read and write
26499344000
trusted library allocation
page read and write
264A01E5000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
2649B8ED000
trusted library allocation
page read and write
1C6E4E8A000
heap
page read and write
2648EC6F000
heap
page read and write
26497708000
heap
page read and write
2649C15D000
heap
page read and write
264992B5000
trusted library allocation
page read and write
78C000
unkown
page readonly
39F95FE000
unkown
page readonly
2649B1B9000
trusted library allocation
page read and write
2648EC61000
heap
page read and write
2649916D000
trusted library allocation
page read and write
264A00D9000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
2649B815000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649770C000
heap
page read and write
C6C000
heap
page read and write
264A2321000
trusted library allocation
page read and write
1816978A000
heap
page read and write
26499062000
trusted library allocation
page read and write
26497B9D000
trusted library allocation
page read and write
26499059000
trusted library allocation
page read and write
264A0077000
trusted library allocation
page read and write
2649B62F000
trusted library allocation
page read and write
2649A6A7000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
26493CA0000
trusted library allocation
page read and write
2649A6EC000
trusted library allocation
page read and write
26499109000
trusted library allocation
page read and write
26498D65000
trusted library allocation
page read and write
264976E7000
heap
page read and write
264990A1000
trusted library allocation
page read and write
26499347000
trusted library allocation
page read and write
2649B6B4000
trusted library allocation
page read and write
264991E4000
trusted library allocation
page read and write
26499133000
trusted library allocation
page read and write
26497A6C000
trusted library allocation
page read and write
264991BB000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
2649594A000
trusted library allocation
page read and write
1CDE15C0000
heap
page read and write
1C6E4EE4000
heap
page read and write
2649A5D0000
trusted library allocation
page read and write
26497A86000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
2649937C000
trusted library allocation
page read and write
26497C6E000
trusted library allocation
page read and write
1B2EF7F2000
unclassified section
page read and write
2649BABA000
trusted library allocation
page read and write
2649BAFC000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
264A0C8D000
trusted library allocation
page read and write
264993B1000
trusted library allocation
page read and write
26499606000
trusted library allocation
page read and write
26498BFB000
trusted library allocation
page read and write
2649A615000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
1B2EF92E000
trusted library allocation
page read and write
264992B3000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
2649A1CB000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
2649B19A000
trusted library allocation
page read and write
2649919B000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264A2315000
trusted library allocation
page read and write
2649A667000
trusted library allocation
page read and write
264A14B6000
trusted library allocation
page read and write
C71000
heap
page read and write
2649B94F000
trusted library allocation
page read and write
1CDE1920000
heap
page read and write
264A00F8000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2648EC6B000
heap
page read and write
26499095000
trusted library allocation
page read and write
26493C7D000
trusted library allocation
page read and write
1B2EFB32000
trusted library allocation
page read and write
2648EC3D000
heap
page read and write
1CDE31EC000
heap
page read and write
2648EC21000
heap
page read and write
18169730000
heap
page read and write
264A01FE000
trusted library allocation
page read and write
2649B0BA000
trusted library allocation
page read and write
26499E87000
trusted library allocation
page read and write
1E853FF000
stack
page read and write
264A03B0000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
26493B23000
trusted library allocation
page read and write
26494F43000
trusted library allocation
page read and write
26498D91000
trusted library allocation
page read and write
264A02F6000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
26499EC9000
trusted library allocation
page read and write
26493B2F000
trusted library allocation
page read and write
2649A1EF000
trusted library allocation
page read and write
1C6E5D69000
heap
page read and write
264A1601000
trusted library allocation
page read and write
2649FF81000
trusted library allocation
page read and write
264999D5000
trusted library allocation
page read and write
2649B9F2000
trusted library allocation
page read and write
264A03E5000
trusted library allocation
page read and write
26493C66000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
1B2EFB0F000
trusted library allocation
page read and write
2649C10A000
heap
page read and write
26497C8F000
trusted library allocation
page read and write
264A011B000
trusted library allocation
page read and write
26499053000
trusted library allocation
page read and write
264A0C90000
trusted library allocation
page read and write
26497A65000
trusted library allocation
page read and write
2649560E000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
264A368B000
trusted library allocation
page read and write
264A368D000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
2648EC28000
heap
page read and write
2649C163000
heap
page read and write
26497C7D000
trusted library allocation
page read and write
264991D9000
trusted library allocation
page read and write
2648EC24000
heap
page read and write
2649CAF9000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264982BE000
trusted library allocation
page read and write
2649934B000
trusted library allocation
page read and write
26499EA1000
trusted library allocation
page read and write
1B2EF912000
trusted library allocation
page read and write
26499289000
trusted library allocation
page read and write
264956AF000
trusted library allocation
page read and write
264991AC000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
2648EC50000
heap
page read and write
21989E07000
trusted library allocation
page read and write
264A0115000
trusted library allocation
page read and write
264959C8000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
264A0077000
trusted library allocation
page read and write
2649591C000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
264A0382000
trusted library allocation
page read and write
2649BB82000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2649B040000
trusted library allocation
page read and write
26499638000
trusted library allocation
page read and write
264A0289000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
26494C73000
trusted library allocation
page read and write
264994F4000
trusted library allocation
page read and write
2649A5EE000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649A57C000
trusted library allocation
page read and write
264991AE000
trusted library allocation
page read and write
1C6E5D77000
heap
page read and write
26494EAC000
trusted library allocation
page read and write
26499383000
trusted library allocation
page read and write
2649C115000
heap
page read and write
2648EC2C000
heap
page read and write
2649933B000
trusted library allocation
page read and write
264A02FC000
trusted library allocation
page read and write
264A01F6000
trusted library allocation
page read and write
26497762000
heap
page read and write
264992BA000
trusted library allocation
page read and write
26499EC1000
trusted library allocation
page read and write
264935EF000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
264A003D000
trusted library allocation
page read and write
1C6E5000000
trusted library allocation
page read and write
2649B11B000
trusted library allocation
page read and write
2649A1C0000
trusted library allocation
page read and write
2649A0BC000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
26493CB0000
trusted library allocation
page read and write
2649BB86000
trusted library allocation
page read and write
2649B914000
trusted library allocation
page read and write
26499E69000
trusted library allocation
page read and write
264A0096000
trusted library allocation
page read and write
264A23C0000
trusted library allocation
page read and write
26494FF6000
trusted library allocation
page read and write
2649C186000
heap
page read and write
264984B4000
trusted library allocation
page read and write
2649C11C000
heap
page read and write
264991C1000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
26499156000
trusted library allocation
page read and write
2649823E000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC59000
heap
page read and write
2649B8F7000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
2648EC79000
heap
page read and write
264993A6000
trusted library allocation
page read and write
26497C75000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649FF4E000
trusted library allocation
page read and write
2649A57C000
trusted library allocation
page read and write
26497C46000
trusted library allocation
page read and write
2649BABA000
trusted library allocation
page read and write
264A01EC000
trusted library allocation
page read and write
2649866C000
trusted library allocation
page read and write
181E000
stack
page read and write
264993C0000
trusted library allocation
page read and write
264A0029000
trusted library allocation
page read and write
18169D78000
trusted library allocation
page read and write
26499400000
trusted library allocation
page read and write
264982D3000
trusted library allocation
page read and write
2649965B000
trusted library allocation
page read and write
1C6E5D58000
heap
page read and write
1B2EF590000
unclassified section
page readonly
2649CAFC000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
26499327000
trusted library allocation
page read and write
2649C162000
heap
page read and write
2648EC07000
heap
page read and write
26493C76000
trusted library allocation
page read and write
264993CE000
trusted library allocation
page read and write
2649B298000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
2648EC23000
heap
page read and write
1C6E55B0000
trusted library allocation
page read and write
264A00F8000
trusted library allocation
page read and write
1C6E4EE6000
heap
page read and write
2649CD02000
trusted library allocation
page read and write
2649C162000
heap
page read and write
2649B926000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2649B027000
trusted library allocation
page read and write
2649934B000
trusted library allocation
page read and write
26494C99000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649A56C000
trusted library allocation
page read and write
18169D49000
trusted library allocation
page read and write
264992BA000
trusted library allocation
page read and write
264956F6000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
264992FE000
trusted library allocation
page read and write
2649A6A9000
trusted library allocation
page read and write
26494ED0000
trusted library allocation
page read and write
26495987000
trusted library allocation
page read and write
26495921000
trusted library allocation
page read and write
2648EC6E000
heap
page read and write
26497ACC000
trusted library allocation
page read and write
264A235C000
trusted library allocation
page read and write
2649B6D5000
trusted library allocation
page read and write
2648EC61000
heap
page read and write
26493BF6000
trusted library allocation
page read and write
1C6E5CFD000
heap
page read and write
19E000
stack
page read and write
26494E98000
trusted library allocation
page read and write
2649BAF4000
trusted library allocation
page read and write
2649B1F9000
trusted library allocation
page read and write
26499133000
trusted library allocation
page read and write
2649938B000
trusted library allocation
page read and write
2648EC01000
heap
page read and write
264992EC000
trusted library allocation
page read and write
2649B01A000
trusted library allocation
page read and write
264990A1000
trusted library allocation
page read and write
264984B4000
trusted library allocation
page read and write
2649FF71000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2648EC28000
heap
page read and write
2649B928000
trusted library allocation
page read and write
2648EC1B000
heap
page read and write
2648EC28000
heap
page read and write
1C6E4D48000
remote allocation
page execute read
1CDE31D5000
heap
page read and write
26497A73000
trusted library allocation
page read and write
26494FA5000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264984D8000
trusted library allocation
page read and write
264A23B1000
trusted library allocation
page read and write
264A0071000
trusted library allocation
page read and write
1C6E5C69000
heap
page read and write
18169B00000
heap
page read and write
2649B911000
trusted library allocation
page read and write
2648EC31000
heap
page read and write
2649B9EC000
trusted library allocation
page read and write
264A00D9000
trusted library allocation
page read and write
2649918B000
trusted library allocation
page read and write
2648EC50000
heap
page read and write
26497C66000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
2649C160000
heap
page read and write
264991B2000
trusted library allocation
page read and write
26499EC1000
trusted library allocation
page read and write
26497B82000
trusted library allocation
page read and write
264991CE000
trusted library allocation
page read and write
26499CDE000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
26499133000
trusted library allocation
page read and write
264956CA000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264993F1000
trusted library allocation
page read and write
2649C166000
heap
page read and write
2648EC18000
heap
page read and write
26498476000
trusted library allocation
page read and write
26494FB9000
trusted library allocation
page read and write
2648EC0A000
heap
page read and write
2648EC28000
heap
page read and write
1CDE1700000
trusted library allocation
page read and write
264A00E1000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
26497B1E000
trusted library allocation
page read and write
264A01F6000
trusted library allocation
page read and write
1C6E5012000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
26497ED7000
trusted library allocation
page read and write
264993CC000
trusted library allocation
page read and write
264991E8000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
26497710000
heap
page read and write
26499252000
trusted library allocation
page read and write
264992AA000
trusted library allocation
page read and write
C6E000
heap
page read and write
2648EC18000
heap
page read and write
2649B8AA000
trusted library allocation
page read and write
2649BAD4000
trusted library allocation
page read and write
2649A5A6000
trusted library allocation
page read and write
2649B808000
trusted library allocation
page read and write
2648EC64000
heap
page read and write
264A01F6000
trusted library allocation
page read and write
181698A2000
unclassified section
page read and write
264A00E1000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
2649B92A000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
26499347000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264991F5000
trusted library allocation
page read and write
1C6E5CFD000
heap
page read and write
264984C5000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
264A038D000
trusted library allocation
page read and write
1B2EFB18000
trusted library allocation
page read and write
B23343E000
unkown
page readonly
2649966E000
trusted library allocation
page read and write
2649B89D000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
C64000
heap
page read and write
2648EC52000
heap
page read and write
26493C80000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264A0353000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264990D5000
trusted library allocation
page read and write
2648EC22000
heap
page read and write
26498235000
trusted library allocation
page read and write
264991D8000
trusted library allocation
page read and write
2649C104000
heap
page read and write
26495963000
trusted library allocation
page read and write
2648EC22000
heap
page read and write
1C6E5730000
trusted library allocation
page read and write
26499123000
trusted library allocation
page read and write
1C6E4CE0000
unclassified section
page readonly
2649A5B0000
trusted library allocation
page read and write
B1966FE000
unkown
page readonly
2649918B000
trusted library allocation
page read and write
2649A06B000
trusted library allocation
page read and write
264990CE000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649B8D5000
trusted library allocation
page read and write
264990A3000
trusted library allocation
page read and write
264935C1000
trusted library allocation
page read and write
1C6E5C64000
heap
page read and write
264959C8000
trusted library allocation
page read and write
1C6E5C7F000
heap
page read and write
1C6E50B0000
trusted library allocation
page read and write
26499383000
trusted library allocation
page read and write
2649B0CB000
trusted library allocation
page read and write
2648EC02000
heap
page read and write
2649911B000
trusted library allocation
page read and write
6F0000
unkown
page readonly
26495931000
trusted library allocation
page read and write
26494FA2000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
2649C115000
heap
page read and write
264984CA000
trusted library allocation
page read and write
264A01DD000
trusted library allocation
page read and write
264956C3000
trusted library allocation
page read and write
264A02AF000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
2648EC2E000
heap
page read and write
2649B6D5000
trusted library allocation
page read and write
2648EC2B000
heap
page read and write
2649C109000
heap
page read and write
2649C109000
heap
page read and write
26497BCD000
trusted library allocation
page read and write
2649B2CE000
trusted library allocation
page read and write
1B2EFA20000
unclassified section
page readonly
264A367C000
trusted library allocation
page read and write
2649FF81000
trusted library allocation
page read and write
2649FF75000
trusted library allocation
page read and write
26499EA1000
trusted library allocation
page read and write
26494F5C000
trusted library allocation
page read and write
2649BB42000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2649B099000
trusted library allocation
page read and write
26499EFE000
trusted library allocation
page read and write
2649BA41000
trusted library allocation
page read and write
2649BAD6000
trusted library allocation
page read and write
2648EC38000
heap
page read and write
26497CAC000
trusted library allocation
page read and write
2649562F000
trusted library allocation
page read and write
2649B8ED000
trusted library allocation
page read and write
2649934F000
trusted library allocation
page read and write
1C6E560F000
heap
page read and write
264992B5000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2648EC10000
heap
page read and write
26498469000
trusted library allocation
page read and write
2649770C000
heap
page read and write
C71000
heap
page read and write
B1943AB000
stack
page read and write
26494CC2000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
264986B5000
trusted library allocation
page read and write
55429FE000
stack
page read and write
2648EC56000
heap
page read and write
26494FF6000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
26499CB3000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649908F000
trusted library allocation
page read and write
2649A5DF000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
264A0295000
trusted library allocation
page read and write
2649B66C000
trusted library allocation
page read and write
26495913000
trusted library allocation
page read and write
1B2EFAC0000
heap
page read and write
2649B899000
trusted library allocation
page read and write
2649A1E6000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264A233B000
trusted library allocation
page read and write
2649967C000
trusted library allocation
page read and write
26498244000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC0C000
heap
page read and write
264991A5000
trusted library allocation
page read and write
264984EF000
trusted library allocation
page read and write
2649FFB3000
trusted library allocation
page read and write
26499045000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
264A2404000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
2649BAC6000
trusted library allocation
page read and write
26495963000
trusted library allocation
page read and write
2649B918000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
26493581000
trusted library allocation
page read and write
2649B8ED000
trusted library allocation
page read and write
26497C8A000
trusted library allocation
page read and write
264991B2000
trusted library allocation
page read and write
2649B924000
trusted library allocation
page read and write
264A008B000
trusted library allocation
page read and write
264A02B4000
trusted library allocation
page read and write
264A00A4000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264991E4000
trusted library allocation
page read and write
2649904F000
trusted library allocation
page read and write
1C6E5120000
heap
page readonly
2649BD5F000
trusted library allocation
page read and write
26497CFB000
trusted library allocation
page read and write
2649B914000
trusted library allocation
page read and write
1B2EF7FF000
unclassified section
page read and write
2649C7DC000
trusted library allocation
page read and write
2649B2D1000
trusted library allocation
page read and write
264A0299000
trusted library allocation
page read and write
5D4000
heap
page read and write
264A0C90000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
26497CD6000
trusted library allocation
page read and write
26499327000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
2648EBFF000
heap
page read and write
26497A73000
trusted library allocation
page read and write
2649B188000
trusted library allocation
page read and write
26494FC7000
trusted library allocation
page read and write
1B2EF7E0000
heap
page readonly
1B2EFB15000
trusted library allocation
page read and write
2649FF7B000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
2649C101000
heap
page read and write
264A02CF000
trusted library allocation
page read and write
264A00EF000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
264984E4000
trusted library allocation
page read and write
2649B89B000
trusted library allocation
page read and write
2649B8E4000
trusted library allocation
page read and write
2648EC58000
heap
page read and write
264A02F6000
trusted library allocation
page read and write
26497ECD000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
26499374000
trusted library allocation
page read and write
2649B9F9000
trusted library allocation
page read and write
2648EC5F000
heap
page read and write
2649B2C4000
trusted library allocation
page read and write
2649A5D3000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
2648EC72000
heap
page read and write
264A00B3000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
2648EC2B000
heap
page read and write
2649B3FB000
trusted library allocation
page read and write
264984C7000
trusted library allocation
page read and write
1C6E5C5C000
heap
page read and write
264993A6000
trusted library allocation
page read and write
2649B279000
trusted library allocation
page read and write
26499133000
trusted library allocation
page read and write
264A034B000
trusted library allocation
page read and write
2649A18E000
trusted library allocation
page read and write
26497A6C000
trusted library allocation
page read and write
2649A188000
trusted library allocation
page read and write
26498D81000
trusted library allocation
page read and write
18169D11000
trusted library allocation
page read and write
1C6E5CEE000
heap
page read and write
264A00D9000
trusted library allocation
page read and write
2649B3B0000
trusted library allocation
page read and write
26499341000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649C15A000
heap
page read and write
264993FE000
trusted library allocation
page read and write
2649FF8C000
trusted library allocation
page read and write
264984FE000
trusted library allocation
page read and write
2649C9D9000
trusted library allocation
page read and write
2649BB7A000
trusted library allocation
page read and write
2649B8A5000
trusted library allocation
page read and write
1C6E4CD0000
unclassified section
page readonly
2649FFB3000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
264A2317000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
2649B5FA000
trusted library allocation
page read and write
26499327000
trusted library allocation
page read and write
2649FF81000
trusted library allocation
page read and write
2649BD45000
trusted library allocation
page read and write
2649A18C000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264A3687000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2649FF92000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264991C1000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
26499306000
trusted library allocation
page read and write
2649A6FA000
trusted library allocation
page read and write
1C6E55F0000
heap
page read and write
26499286000
trusted library allocation
page read and write
1C6E5018000
trusted library allocation
page read and write
264991C1000
trusted library allocation
page read and write
264956DC000
trusted library allocation
page read and write
264A011F000
trusted library allocation
page read and write
2649B0B3000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
18169780000
heap
page read and write
2649916A000
trusted library allocation
page read and write
1C6E5C69000
heap
page read and write
26494CAE000
trusted library allocation
page read and write
7B2000
unkown
page readonly
2648EC60000
heap
page read and write
264A00B6000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
2649B1B1000
trusted library allocation
page read and write
1CDE31D0000
heap
page read and write
264991D7000
trusted library allocation
page read and write
264A00E3000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
2649B89D000
trusted library allocation
page read and write
2649BB82000
trusted library allocation
page read and write
26499076000
trusted library allocation
page read and write
26499E81000
trusted library allocation
page read and write
2648EC24000
heap
page read and write
264984CA000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
2648EC07000
heap
page read and write
2648EC38000
heap
page read and write
2649966A000
trusted library allocation
page read and write
2649B0EF000
trusted library allocation
page read and write
26498476000
trusted library allocation
page read and write
26499193000
trusted library allocation
page read and write
2649C9B1000
trusted library allocation
page read and write
2649B0B3000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
264956DD000
trusted library allocation
page read and write
26498D2A000
trusted library allocation
page read and write
2649B8C3000
trusted library allocation
page read and write
2649C115000
heap
page read and write
264993FE000
trusted library allocation
page read and write
264991E4000
trusted library allocation
page read and write
26498D31000
trusted library allocation
page read and write
1DE000
stack
page read and write
1CDE1664000
heap
page read and write
1E0000
heap
page read and write
2648EC5D000
heap
page read and write
26495916000
trusted library allocation
page read and write
264A0081000
trusted library allocation
page read and write
26494EF7000
trusted library allocation
page read and write
264956F4000
trusted library allocation
page read and write
2649BAEB000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2649B99E000
trusted library allocation
page read and write
26494F49000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
1C6E5CEE000
heap
page read and write
26499CB3000
trusted library allocation
page read and write
26495981000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC6A000
heap
page read and write
2649FF87000
trusted library allocation
page read and write
2649A55B000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
26495611000
trusted library allocation
page read and write
2649A1D5000
trusted library allocation
page read and write
2649C116000
heap
page read and write
26497EC6000
trusted library allocation
page read and write
264A02FC000
trusted library allocation
page read and write
2649C11C000
heap
page read and write
2649BAF4000
trusted library allocation
page read and write
26494C72000
trusted library allocation
page read and write
2649770C000
heap
page read and write
26499304000
trusted library allocation
page read and write
2649A188000
trusted library allocation
page read and write
264A1589000
trusted library allocation
page read and write
264993F2000
trusted library allocation
page read and write
264A02CF000
trusted library allocation
page read and write
264990CE000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
2649938C000
trusted library allocation
page read and write
26497A96000
trusted library allocation
page read and write
1C6E5CE8000
heap
page read and write
264A01FE000
trusted library allocation
page read and write
2648EC24000
heap
page read and write
2649A5F3000
trusted library allocation
page read and write
26498476000
trusted library allocation
page read and write
C48000
heap
page read and write
26499324000
trusted library allocation
page read and write
2649904F000
trusted library allocation
page read and write
264A00D9000
trusted library allocation
page read and write
26499F4A000
trusted library allocation
page read and write
2648EC25000
heap
page read and write
264A036E000
trusted library allocation
page read and write
26499343000
trusted library allocation
page read and write
5B0000
heap
page read and write
264A00A9000
trusted library allocation
page read and write
B19667E000
unkown
page readonly
264991F8000
trusted library allocation
page read and write
26499EB7000
trusted library allocation
page read and write
26497716000
heap
page read and write
2648EC21000
heap
page read and write
26494F68000
trusted library allocation
page read and write
264995B9000
trusted library allocation
page read and write
264A2F00000
trusted library allocation
page read and write
264984F6000
trusted library allocation
page read and write
2649FF87000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649A612000
trusted library allocation
page read and write
2649FF4E000
trusted library allocation
page read and write
39F730D000
stack
page read and write
26498D5C000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2648EC6D000
heap
page read and write
2649C162000
heap
page read and write
2649B17F000
trusted library allocation
page read and write
264990A3000
trusted library allocation
page read and write
1C6E5C60000
heap
page read and write
264A03C0000
trusted library allocation
page read and write
26498242000
trusted library allocation
page read and write
2649C163000
heap
page read and write
2648EC0E000
heap
page read and write
1D29CAC1000
trusted library allocation
page execute read
264991C1000
trusted library allocation
page read and write
26497CCC000
trusted library allocation
page read and write
2649B8AA000
trusted library allocation
page read and write
264A006C000
trusted library allocation
page read and write
26494FA3000
trusted library allocation
page read and write
C50000
heap
page read and write
2648EC13000
heap
page read and write
2648EC04000
heap
page read and write
2649A615000
trusted library allocation
page read and write
2648EC6D000
heap
page read and write
2649CA5C000
trusted library allocation
page read and write
2649B94F000
trusted library allocation
page read and write
2649B9F9000
trusted library allocation
page read and write
2648EC02000
heap
page read and write
26497E78000
trusted library allocation
page read and write
1C6E5C69000
heap
page read and write
26497710000
heap
page read and write
2648EC4E000
heap
page read and write
2648EC2C000
heap
page read and write
26497A65000
trusted library allocation
page read and write
2649BE6A000
trusted library allocation
page read and write
264956AF000
trusted library allocation
page read and write
2649BAC4000
trusted library allocation
page read and write
26499E90000
trusted library allocation
page read and write
26497719000
heap
page read and write
1C6E5D69000
heap
page read and write
264A01BA000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
2648EC00000
heap
page read and write
2648EBFF000
heap
page read and write
264992BD000
trusted library allocation
page read and write
2648EC50000
heap
page read and write
2649B032000
trusted library allocation
page read and write
2649FF81000
trusted library allocation
page read and write
26493B76000
trusted library allocation
page read and write
2649FF64000
trusted library allocation
page read and write
26497710000
heap
page read and write
2649B645000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2649B6A9000
trusted library allocation
page read and write
1CDE1807000
trusted library allocation
page read and write
264A00FB000
trusted library allocation
page read and write
2649A098000
trusted library allocation
page read and write
2649BB89000
trusted library allocation
page read and write
26499316000
trusted library allocation
page read and write
26494F44000
trusted library allocation
page read and write
26498E02000
trusted library allocation
page read and write
2649B928000
trusted library allocation
page read and write
264A0096000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
5D4000
heap
page read and write
264A00F8000
trusted library allocation
page read and write
26494EF2000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649FFEE000
trusted library allocation
page read and write
26499390000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
18169D5D000
trusted library allocation
page read and write
1B2EF800000
trusted library allocation
page read and write
264A02F8000
trusted library allocation
page read and write
264991C4000
trusted library allocation
page read and write
2649561A000
trusted library allocation
page read and write
264996D1000
trusted library allocation
page read and write
26499F55000
trusted library allocation
page read and write
264A0380000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264993BC000
trusted library allocation
page read and write
2649B8D5000
trusted library allocation
page read and write
26493B6B000
trusted library allocation
page read and write
264990D2000
trusted library allocation
page read and write
2649562A000
trusted library allocation
page read and write
264A00A9000
trusted library allocation
page read and write
2649B3AD000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
2649B185000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649905E000
trusted library allocation
page read and write
264A02CF000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
26493CF0000
trusted library allocation
page read and write
264984A3000
trusted library allocation
page read and write
26494F90000
trusted library allocation
page read and write
264A0077000
trusted library allocation
page read and write
26497900000
trusted library allocation
page read and write
264990A1000
trusted library allocation
page read and write
2649965B000
trusted library allocation
page read and write
2649BBE2000
trusted library allocation
page read and write
26497A65000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
264A0363000
trusted library allocation
page read and write
264A0CB9000
trusted library allocation
page read and write
2649B819000
trusted library allocation
page read and write
2649FFC8000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2648EC12000
heap
page read and write
18169DC8000
trusted library allocation
page read and write
264A2385000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649B6ED000
trusted library allocation
page read and write
2649FF7B000
trusted library allocation
page read and write
26494F4F000
trusted library allocation
page read and write
2649A578000
trusted library allocation
page read and write
26497A4E000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
264A02F8000
trusted library allocation
page read and write
2649B117000
trusted library allocation
page read and write
264A00D1000
trusted library allocation
page read and write
264A00DD000
trusted library allocation
page read and write
2649B8D2000
trusted library allocation
page read and write
26499CCC000
trusted library allocation
page read and write
2649919C000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
26499383000
trusted library allocation
page read and write
2648EC31000
heap
page read and write
2649B8D5000
trusted library allocation
page read and write
1CDE31D7000
heap
page read and write
2648EC60000
heap
page read and write
2649937C000
trusted library allocation
page read and write
C4B000
heap
page read and write
26497EC2000
trusted library allocation
page read and write
2649B0D9000
trusted library allocation
page read and write
264992EC000
trusted library allocation
page read and write
2649B138000
trusted library allocation
page read and write
1C6E55A2000
unclassified section
page read and write
2648EC0A000
heap
page read and write
26499665000
trusted library allocation
page read and write
2649B1B9000
trusted library allocation
page read and write
26499299000
trusted library allocation
page read and write
2649A556000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
1C6E5D00000
heap
page read and write
2649B2AF000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2649B25C000
trusted library allocation
page read and write
181696C1000
remote allocation
page execute read
1C6E5C5F000
heap
page read and write
2648EC78000
heap
page read and write
264992BD000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264A1518000
trusted library allocation
page read and write
2649FF54000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
26497AD1000
trusted library allocation
page read and write
2649A692000
trusted library allocation
page read and write
2649B959000
trusted library allocation
page read and write
2649FF75000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
2648EC6E000
heap
page read and write
26495632000
trusted library allocation
page read and write
2648EC13000
heap
page read and write
264993A1000
trusted library allocation
page read and write
2649BBC7000
trusted library allocation
page read and write
264993A6000
trusted library allocation
page read and write
B1943EE000
unkown
page readonly
264A03F4000
trusted library allocation
page read and write
2649933B000
trusted library allocation
page read and write
264A2347000
trusted library allocation
page read and write
1B2EF910000
trusted library allocation
page read and write
264991B9000
trusted library allocation
page read and write
264993A3000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264A00E3000
trusted library allocation
page read and write
2649938A000
trusted library allocation
page read and write
264993C1000
trusted library allocation
page read and write
26494F48000
trusted library allocation
page read and write
26499043000
trusted library allocation
page read and write
26498240000
trusted library allocation
page read and write
264984D8000
trusted library allocation
page read and write
1C6E55A0000
unclassified section
page read and write
2649BBC4000
trusted library allocation
page read and write
26497BCD000
trusted library allocation
page read and write
264991D7000
trusted library allocation
page read and write
1B2EF6A0000
heap
page read and write
26493B23000
trusted library allocation
page read and write
264A00DB000
trusted library allocation
page read and write
2649B2AE000
trusted library allocation
page read and write
18169A00000
trusted library allocation
page read and write
26498476000
trusted library allocation
page read and write
264984F1000
trusted library allocation
page read and write
18169890000
heap
page readonly
2649B9F2000
trusted library allocation
page read and write
2648EC21000
heap
page read and write
264A00EF000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
264993AE000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
6F0000
unkown
page readonly
26494F41000
trusted library allocation
page read and write
26499347000
trusted library allocation
page read and write
264A02A0000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
2649BACE000
trusted library allocation
page read and write
2649BAEB000
trusted library allocation
page read and write
1CDE31ED000
heap
page read and write
2649B220000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2649B188000
trusted library allocation
page read and write
264991C1000
trusted library allocation
page read and write
264A03CA000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649B9FD000
trusted library allocation
page read and write
2649B9B2000
trusted library allocation
page read and write
264959CE000
trusted library allocation
page read and write
1C6E5D3B000
heap
page read and write
26499257000
trusted library allocation
page read and write
2649B01E000
trusted library allocation
page read and write
26498CF5000
trusted library allocation
page read and write
1B2EF6F3000
heap
page read and write
2649A52A000
trusted library allocation
page read and write
26493C17000
trusted library allocation
page read and write
2649913D000
trusted library allocation
page read and write
26493C75000
trusted library allocation
page read and write
2649FF92000
trusted library allocation
page read and write
26493C26000
trusted library allocation
page read and write
26499C46000
trusted library allocation
page read and write
B19663C000
stack
page read and write
18169D03000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264992FE000
trusted library allocation
page read and write
2649BBE2000
trusted library allocation
page read and write
26499FDF000
trusted library allocation
page read and write
26498CF8000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
2649B0DE000
trusted library allocation
page read and write
264A34AD000
trusted library allocation
page read and write
26499EB7000
trusted library allocation
page read and write
26497708000
heap
page read and write
2648EC53000
heap
page read and write
264A23C0000
trusted library allocation
page read and write
264A0343000
trusted library allocation
page read and write
264984B4000
trusted library allocation
page read and write
26499E68000
trusted library allocation
page read and write
2648EC5F000
heap
page read and write
2649B90A000
trusted library allocation
page read and write
264A0127000
trusted library allocation
page read and write
264982EF000
trusted library allocation
page read and write
1B2EF66A000
heap
page read and write
26495676000
trusted library allocation
page read and write
26498D2E000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
264A028D000
trusted library allocation
page read and write
264992B8000
trusted library allocation
page read and write
26498466000
trusted library allocation
page read and write
2649B92A000
trusted library allocation
page read and write
264991A4000
trusted library allocation
page read and write
264A0384000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649B08E000
trusted library allocation
page read and write
264A01F6000
trusted library allocation
page read and write
26499CE9000
trusted library allocation
page read and write
2649BBF3000
trusted library allocation
page read and write
2649CB24000
trusted library allocation
page read and write
1B2EF979000
trusted library allocation
page read and write
2649933B000
trusted library allocation
page read and write
2649936A000
trusted library allocation
page read and write
264993CC000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264990A1000
trusted library allocation
page read and write
26498296000
trusted library allocation
page read and write
2649B825000
trusted library allocation
page read and write
2649A194000
trusted library allocation
page read and write
2649B924000
trusted library allocation
page read and write
26498D33000
trusted library allocation
page read and write
264984E1000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
1C6E5C60000
heap
page read and write
2648EC07000
heap
page read and write
2649C9AE000
trusted library allocation
page read and write
264982FC000
trusted library allocation
page read and write
2649CAB4000
trusted library allocation
page read and write
2649A66E000
trusted library allocation
page read and write
2649B08D000
trusted library allocation
page read and write
2648EC24000
heap
page read and write
2649B841000
trusted library allocation
page read and write
2649C10C000
heap
page read and write
2649B097000
trusted library allocation
page read and write
2649915B000
trusted library allocation
page read and write
26497AF5000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
2649919A000
trusted library allocation
page read and write
26497BA4000
trusted library allocation
page read and write
264991AC000
trusted library allocation
page read and write
26499638000
trusted library allocation
page read and write
2648EC5F000
heap
page read and write
264A00D1000
trusted library allocation
page read and write
2649BA19000
trusted library allocation
page read and write
264935B3000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
2649B2C4000
trusted library allocation
page read and write
264982EF000
trusted library allocation
page read and write
264A1500000
trusted library allocation
page read and write
2648EC19000
heap
page read and write
2649960C000
trusted library allocation
page read and write
26497A65000
trusted library allocation
page read and write
2649A18A000
trusted library allocation
page read and write
264991D9000
trusted library allocation
page read and write
264993F2000
trusted library allocation
page read and write
264992BD000
trusted library allocation
page read and write
2649BD49000
trusted library allocation
page read and write
264A003B000
trusted library allocation
page read and write
7B2000
unkown
page readonly
2648EC31000
heap
page read and write
1CDE165F000
heap
page read and write
2648EC4E000
heap
page read and write
26499EFD000
trusted library allocation
page read and write
264A00AE000
trusted library allocation
page read and write
2649FF7B000
trusted library allocation
page read and write
26499187000
trusted library allocation
page read and write
2649770C000
heap
page read and write
264A00F8000
trusted library allocation
page read and write
2649A1E6000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
C20000
heap
page read and write
2648EC0D000
heap
page read and write
264A3496000
trusted library allocation
page read and write
1C6E5CE6000
heap
page read and write
1C6E5D44000
heap
page read and write
2648EC28000
heap
page read and write
26494FDE000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2649B9B2000
trusted library allocation
page read and write
264956F6000
trusted library allocation
page read and write
26498476000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
2649A176000
trusted library allocation
page read and write
C6F000
heap
page read and write
2649A52C000
trusted library allocation
page read and write
264A02F6000
trusted library allocation
page read and write
2649B919000
trusted library allocation
page read and write
26497708000
heap
page read and write
2649A5AC000
trusted library allocation
page read and write
1C6E505C000
trusted library allocation
page read and write
2649B825000
trusted library allocation
page read and write
2649A667000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
26489735000
heap
page read and write
264984C7000
trusted library allocation
page read and write
26497A7E000
trusted library allocation
page read and write
26499E76000
trusted library allocation
page read and write
26499286000
trusted library allocation
page read and write
264A00B6000
trusted library allocation
page read and write
26498479000
trusted library allocation
page read and write
264A036B000
trusted library allocation
page read and write
2648EC38000
heap
page read and write
264993A6000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2648EC4E000
heap
page read and write
26497B9D000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649B8BD000
trusted library allocation
page read and write
26499183000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
264992AC000
trusted library allocation
page read and write
264991C9000
trusted library allocation
page read and write
26494F90000
trusted library allocation
page read and write
1C6E50F3000
trusted library allocation
page read and write
264A02FA000
trusted library allocation
page read and write
2649B959000
trusted library allocation
page read and write
2649A5BD000
trusted library allocation
page read and write
2648EC0E000
heap
page read and write
26499109000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649BA58000
trusted library allocation
page read and write
264A00B8000
trusted library allocation
page read and write
2649A6A9000
trusted library allocation
page read and write
26497708000
heap
page read and write
2649FF7B000
trusted library allocation
page read and write
264A00EF000
trusted library allocation
page read and write
264A0095000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
26494C9C000
trusted library allocation
page read and write
26494FBB000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
264990A7000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
26494FC7000
trusted library allocation
page read and write
26498D96000
trusted library allocation
page read and write
2649B2C4000
trusted library allocation
page read and write
264A028F000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
264982CD000
trusted library allocation
page read and write
2649C15D000
heap
page read and write
1C6E5010000
trusted library allocation
page read and write
26497EEA000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
264A002B000
trusted library allocation
page read and write
2649C116000
heap
page read and write
C49000
heap
page read and write
2649847B000
trusted library allocation
page read and write
264990A1000
trusted library allocation
page read and write
26499EA4000
trusted library allocation
page read and write
BBB000
stack
page read and write
2649BBF6000
trusted library allocation
page read and write
2649C162000
heap
page read and write
18169D16000
trusted library allocation
page read and write
1CDE1649000
heap
page read and write
2648EC6A000
heap
page read and write
1C6E5C4D000
heap
page read and write
264993A6000
trusted library allocation
page read and write
26499045000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
264993A6000
trusted library allocation
page read and write
C45000
heap
page read and write
26499390000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
26497B9D000
trusted library allocation
page read and write
26498224000
trusted library allocation
page read and write
26494FB9000
trusted library allocation
page read and write
181696D0000
unclassified section
page readonly
2649B90A000
trusted library allocation
page read and write
264984D6000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
264991AE000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2649B89D000
trusted library allocation
page read and write
26493CA7000
trusted library allocation
page read and write
1C6E4D70000
heap
page read and write
2648EC56000
heap
page read and write
26498D92000
trusted library allocation
page read and write
2649C162000
heap
page read and write
2648EC23000
heap
page read and write
26497E78000
trusted library allocation
page read and write
264A2359000
trusted library allocation
page read and write
2649A0C0000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
264991F5000
trusted library allocation
page read and write
B2322BB000
stack
page read and write
2649B2CE000
trusted library allocation
page read and write
2649B9A9000
trusted library allocation
page read and write
26494C8F000
trusted library allocation
page read and write
3134000
heap
page read and write
264996EA000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26493C66000
trusted library allocation
page read and write
2649B274000
trusted library allocation
page read and write
1C6E5CE0000
heap
page read and write
2649C10A000
heap
page read and write
2649A096000
trusted library allocation
page read and write
26498D6F000
trusted library allocation
page read and write
2649B3C0000
trusted library allocation
page read and write
26499DF1000
trusted library allocation
page read and write
2649A190000
trusted library allocation
page read and write
2649B678000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2648EC56000
heap
page read and write
2649FF8C000
trusted library allocation
page read and write
264986C7000
trusted library allocation
page read and write
1C6E5CE3000
heap
page read and write
26499122000
trusted library allocation
page read and write
2649825E000
trusted library allocation
page read and write
2649C106000
heap
page read and write
2648EBFF000
heap
page read and write
26499DE2000
trusted library allocation
page read and write
1C6E50BA000
trusted library allocation
page read and write
2649BD6B000
trusted library allocation
page read and write
26498CE5000
trusted library allocation
page read and write
B196EFE000
unkown
page read and write
2649C162000
heap
page read and write
2649B399000
trusted library allocation
page read and write
264959F2000
trusted library allocation
page read and write
26493C26000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
1C6E5D21000
heap
page read and write
2649B8A5000
trusted library allocation
page read and write
26498480000
trusted library allocation
page read and write
B23337E000
stack
page read and write
1C6E5611000
heap
page read and write
2648EC4E000
heap
page read and write
26495931000
trusted library allocation
page read and write
2649A0E9000
trusted library allocation
page read and write
2648EC60000
heap
page read and write
2648EC55000
heap
page read and write
2649C162000
heap
page read and write
26497713000
heap
page read and write
2648EC28000
heap
page read and write
21989B60000
heap
page read and write
5D4000
heap
page read and write
2648EC23000
heap
page read and write
264A02AF000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
264A0C93000
trusted library allocation
page read and write
26497CF8000
trusted library allocation
page read and write
264986F5000
trusted library allocation
page read and write
26498247000
trusted library allocation
page read and write
26495624000
trusted library allocation
page read and write
2649BA2F000
trusted library allocation
page read and write
18169D0C000
trusted library allocation
page read and write
2649BACE000
trusted library allocation
page read and write
2649B8F3000
trusted library allocation
page read and write
2649911D000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264991E0000
trusted library allocation
page read and write
26499076000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
2649B6B2000
trusted library allocation
page read and write
2648EC38000
heap
page read and write
1B2EF5F0000
remote allocation
page read and write
2649A1F8000
trusted library allocation
page read and write
264982D0000
trusted library allocation
page read and write
2649909A000
trusted library allocation
page read and write
26499263000
trusted library allocation
page read and write
2649BD6D000
trusted library allocation
page read and write
2649B6B0000
trusted library allocation
page read and write
26497AD1000
trusted library allocation
page read and write
2649906E000
trusted library allocation
page read and write
2649BE83000
trusted library allocation
page read and write
2649BAE5000
trusted library allocation
page read and write
26498D55000
trusted library allocation
page read and write
26493C75000
trusted library allocation
page read and write
1C6E5B00000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
2649C11C000
heap
page read and write
2648EC02000
heap
page read and write
264993A1000
trusted library allocation
page read and write
264993CE000
trusted library allocation
page read and write
2649567A000
trusted library allocation
page read and write
18169E07000
trusted library allocation
page read and write
39F8DFE000
stack
page read and write
26499179000
trusted library allocation
page read and write
2648EC16000
heap
page read and write
264A003D000
trusted library allocation
page read and write
264996CF000
trusted library allocation
page read and write
2649824F000
trusted library allocation
page read and write
1C6E4EE0000
heap
page read and write
2649BAF4000
trusted library allocation
page read and write
1C6E5D22000
heap
page read and write
2648EBFF000
heap
page read and write
264A00D2000
trusted library allocation
page read and write
26497A91000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
2648EC4E000
heap
page read and write
26497EDA000
trusted library allocation
page read and write
2649849A000
trusted library allocation
page read and write
1B2EF966000
trusted library allocation
page read and write
1C6E5D58000
heap
page read and write
26497CA1000
trusted library allocation
page read and write
2649911A000
trusted library allocation
page read and write
26499299000
trusted library allocation
page read and write
26499FF0000
trusted library allocation
page read and write
2649B2DE000
trusted library allocation
page read and write
264A00BE000
trusted library allocation
page read and write
26494C70000
trusted library allocation
page read and write
2649BB42000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
2649B8A5000
trusted library allocation
page read and write
5D4000
heap
page read and write
39F734E000
unkown
page readonly
26497A92000
trusted library allocation
page read and write
2649B5AF000
trusted library allocation
page read and write
26497713000
heap
page read and write
2648EC2C000
heap
page read and write
2648EC0F000
heap
page read and write
2649908F000
trusted library allocation
page read and write
2649A1FA000
trusted library allocation
page read and write
C4D000
heap
page read and write
26489734000
heap
page read and write
26499E94000
trusted library allocation
page read and write
2649A18E000
trusted library allocation
page read and write
26497A73000
trusted library allocation
page read and write
2649BB7C000
trusted library allocation
page read and write
2648EC1F000
heap
page read and write
2649C16D000
heap
page read and write
264976F3000
heap
page read and write
2649B0D8000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
1C6E5D2A000
heap
page read and write
264984C5000
trusted library allocation
page read and write
264991BF000
trusted library allocation
page read and write
26499341000
trusted library allocation
page read and write
2649937C000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
B23443E000
unkown
page readonly
26499172000
trusted library allocation
page read and write
264A0072000
trusted library allocation
page read and write
26494ED7000
trusted library allocation
page read and write
264A0C87000
trusted library allocation
page read and write
2649FF87000
trusted library allocation
page read and write
264990CA000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
2649CA18000
trusted library allocation
page read and write
26493B23000
trusted library allocation
page read and write
1C6E50C7000
trusted library allocation
page read and write
26497E16000
trusted library allocation
page read and write
2649BACB000
trusted library allocation
page read and write
C4A000
heap
page read and write
2649C15A000
heap
page read and write
2649919D000
trusted library allocation
page read and write
26499086000
trusted library allocation
page read and write
2649B654000
trusted library allocation
page read and write
2649B99E000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2648EC06000
heap
page read and write
2649A604000
trusted library allocation
page read and write
2649BB7A000
trusted library allocation
page read and write
26499188000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
264991C4000
trusted library allocation
page read and write
2649915F000
trusted library allocation
page read and write
1CDE1673000
heap
page read and write
2648EC27000
heap
page read and write
264A036C000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
2649B88A000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
5D4000
heap
page read and write
264A01E3000
trusted library allocation
page read and write
264993AC000
trusted library allocation
page read and write
2649B0D0000
trusted library allocation
page read and write
264993EA000
trusted library allocation
page read and write
1C6E5081000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
2649B59B000
trusted library allocation
page read and write
26499133000
trusted library allocation
page read and write
264984CA000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
2649938D000
trusted library allocation
page read and write
264A02FE000
trusted library allocation
page read and write
264993FA000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
1C6E56F0000
trusted library section
page readonly
26498230000
trusted library allocation
page read and write
26495624000
trusted library allocation
page read and write
2649C104000
heap
page read and write
2649919C000
trusted library allocation
page read and write
26499374000
trusted library allocation
page read and write
26497A5D000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC56000
heap
page read and write
264A00A4000
trusted library allocation
page read and write
2649911B000
trusted library allocation
page read and write
264993F3000
trusted library allocation
page read and write
2649A1CB000
trusted library allocation
page read and write
2649B1B4000
trusted library allocation
page read and write
264A00A4000
trusted library allocation
page read and write
264A01BF000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
26499643000
trusted library allocation
page read and write
264A00BE000
trusted library allocation
page read and write
264996EA000
trusted library allocation
page read and write
2649B0BE000
trusted library allocation
page read and write
26499188000
trusted library allocation
page read and write
2648EC18000
heap
page read and write
2648EC23000
heap
page read and write
2648EC64000
heap
page read and write
26497CA3000
trusted library allocation
page read and write
5D4000
heap
page read and write
264A00DB000
trusted library allocation
page read and write
2649A16C000
trusted library allocation
page read and write
264982F4000
trusted library allocation
page read and write
2649B6D0000
trusted library allocation
page read and write
264A00E1000
trusted library allocation
page read and write
264992BA000
trusted library allocation
page read and write
264999E0000
trusted library allocation
page read and write
26499626000
trusted library allocation
page read and write
2649A03A000
trusted library allocation
page read and write
26494F31000
trusted library allocation
page read and write
26494FF1000
trusted library allocation
page read and write
2648EC5A000
heap
page read and write
1B2EFAC4000
heap
page read and write
2649B9E8000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
26499393000
trusted library allocation
page read and write
2649BAED000
trusted library allocation
page read and write
C71000
heap
page read and write
264A0049000
trusted library allocation
page read and write
26493CFE000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649A522000
trusted library allocation
page read and write
2649C9FC000
trusted library allocation
page read and write
2648EC65000
heap
page read and write
264991CE000
trusted library allocation
page read and write
26497A7A000
trusted library allocation
page read and write
264A0069000
trusted library allocation
page read and write
2649A1EA000
trusted library allocation
page read and write
2649B81B000
trusted library allocation
page read and write
26497B49000
trusted library allocation
page read and write
264986C7000
trusted library allocation
page read and write
2648EC23000
heap
page read and write
2649C105000
heap
page read and write
264991D5000
trusted library allocation
page read and write
26499390000
trusted library allocation
page read and write
264A0295000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649938A000
trusted library allocation
page read and write
264992B5000
trusted library allocation
page read and write
264995F2000
trusted library allocation
page read and write
264991B8000
trusted library allocation
page read and write
2649A200000
trusted library allocation
page read and write
2649A592000
trusted library allocation
page read and write
2649B80C000
trusted library allocation
page read and write
26494FF6000
trusted library allocation
page read and write
2649B6E8000
trusted library allocation
page read and write
26495661000
trusted library allocation
page read and write
26494CFB000
trusted library allocation
page read and write
26498D87000
trusted library allocation
page read and write
26498443000
trusted library allocation
page read and write
2649B1A9000
trusted library allocation
page read and write
2649B61D000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
26497C76000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
264A012D000
trusted library allocation
page read and write
264A00ED000
trusted library allocation
page read and write
7BC000
unkown
page write copy
26497708000
heap
page read and write
2649BB89000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
2649B2C4000
trusted library allocation
page read and write
26499327000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
26495629000
trusted library allocation
page read and write
2649B55C000
trusted library allocation
page read and write
2649A5A6000
trusted library allocation
page read and write
26493C7E000
trusted library allocation
page read and write
2649B9E8000
trusted library allocation
page read and write
2649BB7E000
trusted library allocation
page read and write
2649B0F4000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
2649BB7A000
trusted library allocation
page read and write
2649C167000
heap
page read and write
2649908F000
trusted library allocation
page read and write
1C6E5CA8000
heap
page read and write
2648EC64000
heap
page read and write
2648EC07000
heap
page read and write
2649B19A000
trusted library allocation
page read and write
26499045000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
55439FE000
stack
page read and write
2648EC0D000
heap
page read and write
2649B559000
trusted library allocation
page read and write
1C6E50E9000
trusted library allocation
page read and write
26499E89000
trusted library allocation
page read and write
26499381000
trusted library allocation
page read and write
6F1000
unkown
page execute read
2649B13E000
trusted library allocation
page read and write
264A0C8E000
trusted library allocation
page read and write
264A00A9000
trusted library allocation
page read and write
BCF000
stack
page read and write
2649A592000
trusted library allocation
page read and write
264A01EC000
trusted library allocation
page read and write
26497A80000
trusted library allocation
page read and write
264A0123000
trusted library allocation
page read and write
26497E11000
trusted library allocation
page read and write
26494E72000
trusted library allocation
page read and write
26499E92000
trusted library allocation
page read and write
2649B9FD000
trusted library allocation
page read and write
2649B3DC000
trusted library allocation
page read and write
264993A8000
trusted library allocation
page read and write
264991A8000
trusted library allocation
page read and write
264A01EC000
trusted library allocation
page read and write
2649A5E8000
trusted library allocation
page read and write
2649849C000
trusted library allocation
page read and write
2649B825000
trusted library allocation
page read and write
2649A5F3000
trusted library allocation
page read and write
26498216000
trusted library allocation
page read and write
264996D6000
trusted library allocation
page read and write
5D0000
heap
page read and write
2648EC18000
heap
page read and write
1B2EF9C9000
trusted library allocation
page read and write
26498497000
trusted library allocation
page read and write
264A03DC000
trusted library allocation
page read and write
2649A574000
trusted library allocation
page read and write
264959CE000
trusted library allocation
page read and write
264990A1000
trusted library allocation
page read and write
26498D87000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
2649BD42000
trusted library allocation
page read and write
2649B05B000
trusted library allocation
page read and write
2648EC22000
heap
page read and write
26494FD6000
trusted library allocation
page read and write
264984C5000
trusted library allocation
page read and write
2649B625000
trusted library allocation
page read and write
2649A615000
trusted library allocation
page read and write
26494F51000
trusted library allocation
page read and write
2649936D000
trusted library allocation
page read and write
26498D65000
trusted library allocation
page read and write
2649B0F4000
trusted library allocation
page read and write
2648EC56000
heap
page read and write
264993BB000
trusted library allocation
page read and write
26499EA0000
trusted library allocation
page read and write
264991E8000
trusted library allocation
page read and write
264A02A0000
trusted library allocation
page read and write
2648EC6A000
heap
page read and write
2649B959000
trusted library allocation
page read and write
2649B63C000
trusted library allocation
page read and write
2649BB9C000
trusted library allocation
page read and write
2648EC58000
heap
page read and write
2649B15A000
trusted library allocation
page read and write
1B2EF7F0000
unclassified section
page read and write
2648EC6E000
heap
page read and write
264993A8000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
26499F55000
trusted library allocation
page read and write
26498D5F000
trusted library allocation
page read and write
26499D81000
trusted library allocation
page read and write
26498DF9000
trusted library allocation
page read and write
264A0073000
trusted library allocation
page read and write
2648EC78000
heap
page read and write
26497A7E000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
18169650000
unclassified section
page readonly
26497CCD000
trusted library allocation
page read and write
2649906E000
trusted library allocation
page read and write
1C6E5D44000
heap
page read and write
1C6E5B2B000
trusted library allocation
page read and write
26494F51000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
264991D9000
trusted library allocation
page read and write
BDE000
stack
page read and write
2649A17C000
trusted library allocation
page read and write
264A00FB000
trusted library allocation
page read and write
264A14D4000
trusted library allocation
page read and write
264991C4000
trusted library allocation
page read and write
26499CDE000
trusted library allocation
page read and write
264991DD000
trusted library allocation
page read and write
21989FB0000
heap
page read and write
2648EC00000
heap
page read and write
1C6E5D58000
heap
page read and write
2648EC07000
heap
page read and write
2648EC16000
heap
page read and write
264A00F8000
trusted library allocation
page read and write
21989D00000
trusted library allocation
page read and write
264A02FC000
trusted library allocation
page read and write
264A15FC000
trusted library allocation
page read and write
1C6E5743000
unkown
page execute read
2FC1000
heap
page read and write
26494FA8000
trusted library allocation
page read and write
2649A1BA000
trusted library allocation
page read and write
2649905E000
trusted library allocation
page read and write
264A03B0000
trusted library allocation
page read and write
2648EC61000
heap
page read and write
2649563A000
trusted library allocation
page read and write
26499024000
trusted library allocation
page read and write
2649B9D8000
trusted library allocation
page read and write
264993C0000
trusted library allocation
page read and write
264995F9000
trusted library allocation
page read and write
2649BAF6000
trusted library allocation
page read and write
26499062000
trusted library allocation
page read and write
264993A1000
trusted library allocation
page read and write
26497EC5000
trusted library allocation
page read and write
264A0044000
trusted library allocation
page read and write
2648EC02000
heap
page read and write
264984C7000
trusted library allocation
page read and write
264992FE000
trusted library allocation
page read and write
2649BAEB000
trusted library allocation
page read and write
2649FFDF000
trusted library allocation
page read and write
264A00DD000
trusted library allocation
page read and write
264A0000000
trusted library allocation
page read and write
2648EC10000
heap
page read and write
264A0125000
trusted library allocation
page read and write
2649562A000
trusted library allocation
page read and write
264991F5000
trusted library allocation
page read and write
2649BB09000
trusted library allocation
page read and write
2649937C000
trusted library allocation
page read and write
55441FE000
stack
page read and write
39F738E000
stack
page read and write
2649B5DA000
trusted library allocation
page read and write
2649C11C000
heap
page read and write
2649A6A5000
trusted library allocation
page read and write
26498DF9000
trusted library allocation
page read and write
26494F5C000
trusted library allocation
page read and write
264991E0000
trusted library allocation
page read and write
264991B9000
trusted library allocation
page read and write
264A003C000
trusted library allocation
page read and write
26494F0F000
trusted library allocation
page read and write
2649A510000
trusted library allocation
page read and write
2649A196000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
264A02B5000
trusted library allocation
page read and write
264A23C0000
trusted library allocation
page read and write
2648EC0D000
heap
page read and write
2649A1F6000
trusted library allocation
page read and write
2649FF71000
trusted library allocation
page read and write
1CDE167B000
heap
page read and write
2648EC2C000
heap
page read and write
264992BA000
trusted library allocation
page read and write
264999E8000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
26499156000
trusted library allocation
page read and write
26499E87000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
264A0299000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
264982C9000
trusted library allocation
page read and write
264993CC000
trusted library allocation
page read and write
264A236B000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
264993A6000
trusted library allocation
page read and write
2649A194000
trusted library allocation
page read and write
264984DC000
trusted library allocation
page read and write
264A14D9000
trusted library allocation
page read and write
264990B2000
trusted library allocation
page read and write
26499656000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
2649825A000
trusted library allocation
page read and write
26493CF0000
trusted library allocation
page read and write
264A00EF000
trusted library allocation
page read and write
264991D2000
trusted library allocation
page read and write
1C6E5C7D000
heap
page read and write
2649359E000
trusted library allocation
page read and write
2648EC0A000
heap
page read and write
2649B926000
trusted library allocation
page read and write
264993C2000
trusted library allocation
page read and write
264994FE000
trusted library allocation
page read and write
26499387000
trusted library allocation
page read and write
26489749000
heap
page read and write
26499306000
trusted library allocation
page read and write
2649845B000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
2648EC2C000
heap
page read and write
26498D3D000
trusted library allocation
page read and write
264A00A9000
trusted library allocation
page read and write
2649B8E5000
trusted library allocation
page read and write
2649BBF3000
trusted library allocation
page read and write
26495672000
trusted library allocation
page read and write
26494FA7000
trusted library allocation
page read and write
2649B185000
trusted library allocation
page read and write
26499363000
trusted library allocation
page read and write
264991F4000
trusted library allocation
page read and write
264992CA000
trusted library allocation
page read and write
2649C1AE000
heap
page read and write
B2319FE000
stack
page read and write
2648EC16000
heap
page read and write
264A038D000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
264A2345000
trusted library allocation
page read and write
1C6E5CF1000
heap
page read and write
1C6E5CB9000
heap
page read and write
2649BA62000
trusted library allocation
page read and write
2648EC3D000
heap
page read and write
264982CC000
trusted library allocation
page read and write
264993F1000
trusted library allocation
page read and write
1C6E5CE0000
heap
page read and write
264986DF000
trusted library allocation
page read and write
26499393000
trusted library allocation
page read and write
26498BC3000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
2648EC07000
heap
page read and write
C4A000
heap
page read and write
1C6E5CFD000
heap
page read and write
2649BB80000
trusted library allocation
page read and write
26494FBE000
trusted library allocation
page read and write
2649908F000
trusted library allocation
page read and write
26497710000
heap
page read and write
26499C8B000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
26498240000
trusted library allocation
page read and write
264A236D000
trusted library allocation
page read and write
26497EC5000
trusted library allocation
page read and write
2648EC6C000
heap
page read and write
1C6E5D21000
heap
page read and write
264991E1000
trusted library allocation
page read and write
264A006C000
trusted library allocation
page read and write
2649A1F4000
trusted library allocation
page read and write
264995E5000
trusted library allocation
page read and write
2649C104000
heap
page read and write
26499383000
trusted library allocation
page read and write
2648EC29000
heap
page read and write
2649936A000
trusted library allocation
page read and write
264991ED000
trusted library allocation
page read and write
2649B3C0000
trusted library allocation
page read and write
26499347000
trusted library allocation
page read and write
264994EB000
trusted library allocation
page read and write
2648EC25000
heap
page read and write
26498238000
trusted library allocation
page read and write
2648EC2C000
heap
page read and write
2649C104000
heap
page read and write
2648EC38000
heap
page read and write
21989A80000
heap
page read and write
C28000
heap
page read and write
2648EC19000
heap
page read and write
2649B9EC000
trusted library allocation
page read and write
26498BF6000
trusted library allocation
page read and write
264A0CBA000
trusted library allocation
page read and write
1B2EF981000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
26499EEC000
trusted library allocation
page read and write
2649939B000
trusted library allocation
page read and write
26498BF0000
trusted library allocation
page read and write
2649B2DE000
trusted library allocation
page read and write
26499082000
trusted library allocation
page read and write
26495914000
trusted library allocation
page read and write
26499390000
trusted library allocation
page read and write
1C6E5D59000
heap
page read and write
2648EC6A000
heap
page read and write
2648EC13000
heap
page read and write
26498BEC000
trusted library allocation
page read and write
264991E8000
trusted library allocation
page read and write
26499E6E000
trusted library allocation
page read and write
264A3458000
trusted library allocation
page read and write
21989E0A000
trusted library allocation
page read and write
2649B8F7000
trusted library allocation
page read and write
264A2318000
trusted library allocation
page read and write
2649BAE3000
trusted library allocation
page read and write
2649B1B4000
trusted library allocation
page read and write
2648EC73000
heap
page read and write
26497B9D000
trusted library allocation
page read and write
26494F94000
trusted library allocation
page read and write
26497E11000
trusted library allocation
page read and write
2649BA67000
trusted library allocation
page read and write
264984A0000
trusted library allocation
page read and write
2648EC17000
heap
page read and write
C43000
heap
page read and write
26499659000
trusted library allocation
page read and write
264995C7000
trusted library allocation
page read and write
264993F3000
trusted library allocation
page read and write
264A23CD000
trusted library allocation
page read and write
2648EC00000
heap
page read and write
2649B92A000
trusted library allocation
page read and write
264959CE000
trusted library allocation
page read and write
2648EC4E000
heap
page read and write
264991DD000
trusted library allocation
page read and write
264993C3000
trusted library allocation
page read and write
2649934B000
trusted library allocation
page read and write
2648EC07000
heap
page read and write
26494F66000
trusted library allocation
page read and write
1B2EF9E7000
trusted library allocation
page read and write
264A368F000
trusted library allocation
page read and write
26497C3C000
trusted library allocation
page read and write
21989E00000
trusted library allocation
page read and write
2649825C000
trusted library allocation
page read and write
26497A7D000
trusted library allocation
page read and write
264956FA000
trusted library allocation
page read and write
1B2EF900000
trusted library allocation
page read and write
C71000
heap
page read and write
2648EC5A000
heap
page read and write
2648EC2C000
heap
page read and write
26493C7D000
trusted library allocation
page read and write
2648EBFF000
heap
page read and write
2649915F000
trusted library allocation
page read and write
264A0CB4000
trusted library allocation
page read and write
2648EC72000
heap
page read and write
264A00D1000
trusted library allocation
page read and write
1C6E5D58000
heap
page read and write
26493B2F000
trusted library allocation
page read and write
264991BB000
trusted library allocation
page read and write
2649C163000
heap
page read and write
2649562C000
trusted library allocation
page read and write
264991EA000
trusted library allocation
page read and write
2649B81B000
trusted library allocation
page read and write
1C6E5D79000
heap
page read and write
2648EC02000
heap
page read and write
26499381000
trusted library allocation
page read and write
264976F3000
heap
page read and write
2649911B000
trusted library allocation
page read and write
26499360000
trusted library allocation
page read and write
2649919D000
trusted library allocation
page read and write
264982FC000
trusted library allocation
page read and write
2648EC12000
heap
page read and write
26493D00000
trusted library allocation
page read and write
264984E6000
trusted library allocation
page read and write
2649A1E6000
trusted library allocation
page read and write
1B2EF95D000
trusted library allocation
page read and write
264A02C4000
trusted library allocation
page read and write
1C6E5D69000
heap
page read and write
2649B811000
trusted library allocation
page read and write
18169D68000
trusted library allocation
page read and write
26499095000
trusted library allocation
page read and write
264A00E3000
trusted library allocation
page read and write
2648EC28000
heap
page read and write
2648EC4E000
heap
page read and write
2648EC56000
heap
page read and write
264A003C000
trusted library allocation
page read and write
2649BAC9000
trusted library allocation
page read and write
26497EEF000
trusted library allocation
page read and write
2649969A000
trusted library allocation
page read and write
2649B016000
trusted library allocation
page read and write
264A0032000
trusted library allocation
page read and write
2648EC06000
heap
page read and write
26489741000
heap
page read and write
264991ED000
trusted library allocation
page read and write
2649B8E5000
trusted library allocation
page read and write
264990A5000
trusted library allocation
page read and write
C6F000
heap
page read and write
2649BADD000
trusted library allocation
page read and write
264A028D000
trusted library allocation
page read and write
2649A578000
trusted library allocation
page read and write
2649B8BD000
trusted library allocation
page read and write
264A23B4000
trusted library allocation
page read and write
264A00BE000
trusted library allocation
page read and write
2649B1FC000
trusted library allocation
page read and write
1CDE167B000
heap
page read and write
There are 3784 hidden memdumps, click here to show them.